Jump to content
Not connected, Your IP: 54.234.191.202

Search the Community

Showing results for tags 'Vpn'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP
    • Mirrors

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 197 results

  1. Hot off the press! Arstechnica 'VPN servers seized by Ukrainian authorities weren’t encrypted' Why did they wait almost 2 weeks? The post was published on July 9th. The blog post seems to rather be in full damage control mode than to admit how much of a failure it was that it apparently contained the single VPN certificate shared across all servers. (looks like I got it wrong read first reply) On top of that a technically incorrect explanation of when this acquired certificate can be successfully exploited. I don't wanna rant right now but will expand on my points when asked. I'm also curious whether AirVPN actually keeps all sensitive data in RAM as stated in the Torrentfreak article: Although I don't see that Windscribe had actually lied about any of their stuff (beyond omissions in current damage control), can we be sure AirVPN actually has all of the above implemented? Though I like how specific the response in the description. Also AMD's Zen CPUs are currently the only ones on the market (in x86 space fore sure) with actual RAM encryption. Having data on RAM disk wouldn't be enough for a prepared attacker due to technical possibility of extracting the data in a cold boot attack. Such an upgrade would not only take a while for the infrastructure and but be costly.
  2. This guide will explain how to setup OpenVPN in a way such that only select programs will be able to use the VPN connection while all other life continues as usual. Please read this notice before applying the guide Advantages: fail-free "kill switch" functionality (actually better than 98% of VPNs out there) continue using another VPN as primary or don't reroute any other traffic at all nobody, not even peers on LAN, will be able to connect to your torrent client (the only way: through the VPN connection) - eliminating unintended leaks Disadvantage: the apps will still use your default DNS for hostname lookups (secure your DNS separately!) See two more drawings at the end. The guide is applicable to all VPN providers who don't restrict their users to use the OpenVPN client. The method however is universally applicable. It was made with examples from Windows, but with Linux/BSD you will only need little tweaking to do. Specifically, net_gateway placeholder may not available and that's all there is to it. Android clients are probably too limited for this task and lack options we need. - Since there'll be a lot of text, sections titled in (parantheses) are entirely optional to read. The other guide by NaDre is old (2013), hard to read and pursues a slightly different approach. A Staff member actually posted a good first comment there, that's what we're gonna do. (Preface) The BitTorrent as a network is entirely public. Through the decentralized technology called DHT, everyone in the world can find out what torrents you are presumably participating in (this does not apply to private trackers who disable DHT). Clearly this creates an unhealthy atmosphere for privacy of users, e.g. one could find out the OS distribution one is using for a more targetted attack etc. Sometimes the ISPs are outright hostile to peer-to-peer technologies due to the traffic and bandwidth these are consuming. Instead of upgrading dated infrastructure, they cripple their users instead. There are many reasons to use a VPN, that was but a limited selection. ("Split-tunneling") This has become somewhat a marketing term nowadays, but actually explains the nature of the traffic flow well. In this guide only the programs set to use the VPN connection will use it, nothing else. All your traffic goes past the VPN while torrent client traffic (or any other selected program) uses only the VPN connection. ("Kill switch") We'll literally nail it using software settings of your program (the torrent client). This is a marketing-loaded name. In short: if the VPN connection is not available, no traffic ought to be sent bypassing it. In most cases where you have a VPN redirect all your system traffic - you should not rely on it as a feature. The OpenVPN software on Windows is not 100% proof, based on empirical evidence (reconnects and startup/shutdown phases) and some other VPN providers do no better (based on comments and stories). The only bulletproof solution: the VPN tunnel is set up on an intermediary device your PC is connected to - your end device (the PC) has no chance whatsoever to bypass the tunnel in that case. If the VPN provider uses a firewall under the hood, that's good too but with this guide you will not need a firewall nor rely on the VPN software. ("Dual-hop") With the knowledge and methods from this guide you will be able to daisy-chain multiple VPN servers. In essence, your traffic passes PC->VPN1->VPN2->Destination. This was not intended for this guide nor with AirVPN, it's finicky and I wouldn't recommend it myself without a real need and skills to automate the setup and configuration. How it will work Many users (aka mostly idiots on Reddit) are running in circles like qBittorrent is the only client (or probably the only application in the universe, unconfirmed) that can be set to use a certain VPN. Here's the technicality: this is called 'binding' - you can 'bind to IP' which will force the app to use a specific IP address and nothing else. If it cannot use the IP (when VPN is disconnected) then it will not be able to do any networking at all. The OS will deny any communication with the internet: boom! Here's your praised 'kill switch' and 'split-tunneling', 2-in-1. This is the next best bulletproof solution (the only better alternative is to use an intermediary VPN device, as any software could choose a different interface now to communicate with the internet). In a broader sense, you want to 'bind to a network interface' - your client will use any available IPs from the VPN interface - making it ready for IPv4 and IPv6. Oh and you don't need to change the IP once the VPN connection changes to another server. The OS handles the rest. Examples of programs that can bind to user-defined addresses include: (Windows) ping, tracert (IPv6-only, WTF?), curl and wget, and many others, including your favorite torrent client You will find guides online how to do that in your client or just look in settings. (Linux-specific differences of the guide) If you are a Linux/*nix user, there're some minor changes to the quick guide below: * Create custom VPN interface: Create with ip tuntap command. The below line will create 5 interfaces "tun-air1" etc. for YOUR user. Specifying your user allows OpenVPN to drop root rights after connection and run under your user (security). AirVPN allows up to 5 connections. If you have no use for this, create only one. user="$(whoami)"; for i in {1..5}; do sudo ip tuntap add dev "tun-airvpn$i" mode tun user "$user" group "$user"; done Check their existance with ip -d a -- the interfaces will not be shown under /dev/tun* ALTERNATIVE: openvpn --mktap/--mktun. See manual with man openvpn * Select custom VPN interface: This config part differs from Windows, very confusing. Steps: 1. Replace "dev-node" in config with "dev" 2. Add "dev-type tun" or "tap". Example of config: # if you have these defined multiple times, last entries override previous entries dev tun-airvpn1 # previously dev-node dev-type tun # previously "dev tun" on Windows There're no more differences. In-depth explanation: If you try to use dev-node like for Windows, you will see: OpenVPN log: ERROR: Cannot open TUN/TAP dev /dev/tun-airvpn1: No such file or directory (errno=2) Example strace of error: openat(AT_FDCWD, "/dev/tun-airvpn1", O_RDWR) = -1 ENOENT (No such file or directory) OpenVPN cannot find the TUN/TAP with the name? No, on Linux/*nix/*BSD dev-node has a totally different meaning. Dev-node specifies where the control interface with the kernel is located. On Linux it's usually /dev/node/tun, for the "mknode" command. If OpenVPN can't detect it for some reason, then you'd need to use dev-node. Finally you can start OpenVPN from terminal: sudo openvpn --config 'path/to/config.ovpn' --user mysystemusername --group mysystemusergroup Windows Quick Guide Go to the folder where you installed OpenVPN and its exe files: 'C:\Program Files\OpenVPN\' Open CMD inside the 'bin' folder: Hold Shift + Right Click the 'bin' folder -> 'Open Command Window here' We will use tapctl.exe to create a new VPN network interface solely for use with AirVPN (to look around: run "tapctl.exe" or "tapctl.exe help") C:\Program Files\OpenVPN\bin>tapctl create --name AirVPN-TAP {FDA13378-69B9-9000-8FFE-C52DEADBEEF0} C:\Program Files\OpenVPN\bin> A TAP interface is created by default. I have not played enough with Wireguard's TUN to recommend it. You can check it out, it will be under adapters in your Windows network settings Important: Configure your app/torrent client to use this 'AirVPN-TAP' interface. This is what ensures your traffic never leaks. It may appear under a different name, in such case find out which one it is in the output of 'ipconfig /all' (enter this into CMD) If your client does not allow to bind to a general interface but a specific IP (poor decision) then connect to the VPN first to find out the local IP within the VPN network. In this case with AirVPN you may only use one single server or you'll have to constantly change the IP in settings. Generate AirVPN configs where you connect to the server via IPv4! This is important Add these to the .ovpn config files (either under 'Advanced' on the config generator page or manually to each config file) # NOPULL START route-nopull # IF YOU DO NOT USE ANOTHER VPN THAT TAKES OVER ALL YOUR TRAFFIC, USE "net_gateway" (just copy-paste all of this) # net_gateway WILL BE AUTOMATICALLY DETERMINED AND WILL WORK IF YOU CONNECT THROUGH OTHER NETWORKS LIKE A PUBLIC WIFI # personally, due to a second VPN, I had to specify my router IP explicitly instead of net_gateway: 192.168.69.1 # "default"/"vpn_gateway"/"remote_host"/"net_gateway" are allowed placeholders for IPv4 route remote_host 255.255.255.255 net_gateway route 10.0.0.0 255.0.0.0 vpn_gateway route 0.0.0.0 0.0.0.0 default 666 route-ipv6 ::/0 default 666 dev-node AirVPN-TAP # END OF NOPULL Test if the configuration works. Full tests, don't leave it up to chance. In-depth explanation of the OpenVPN config route-nopull rejects any networking routes pushed to you by the server, we will write our own route remote_host 255.255.255.255 <router IP> we tell our system that, to reach remote_host (the AirVPN server IP), it must send traffic to <router IP>. The subnet mask 255.255.255.255 says that this only applies to this single IP set <router IP> to be net_gateway (only for Windows users, check availability on other platforms) <router IP> may be any of the OpenVPN placeholders too, for example "net_gateway" should work universally (you avoid hard-coding the router IP and if it ever changes: wondering years later why the config no longer works) <router IP> is "192.168.1.1" in my case, for my home router that connects me to the internet. route 10.0.0.0 255.0.0.0 vpn_gateway we tell our system that all 10.x.x.x traffic will be sent to the AirVPN server the internal VPN network with AirVPN is always on the 10.0.0.0 - 10.255.255.255 network range. The subnet mask reflects that. However this may interfere with other VPNs if you ever need to be connected to both at once. I will not go into detail on this. What you need to do is to be more specific with 10.x.x.x routes in this config, i.e. instead of /8 subnet, only route the specific /24 subnet of the current VPN server (AirVPN uses a /24 subnet for your connections on each VPN server -> 10.a.b.0 255.255.255.0) vpn_gateway is one of OpenVPN placeholders route 0.0.0.0 0.0.0.0 default 666 allow routing of ANY traffic via the VPN we set the metric to 666, metric defined as path cost (historically) so setting it to a high value will make sure no normal connection runs through it, unless specifically bound to the VPN IP. route-ipv6 ::/0 default 666 same for IPv6. How many can claim they have working VPN IPv6 setup? Welcome in the future. IPv6 is over 20 years old at this point anyhow. dev-node AirVPN-TAP (Windows-only) tell OpenVPN to ONLY use this network interface to create the VPN tunnel on. Nothing should interfere with our setup now That's all, folks! Note: Somehow on Windows my AirVPN connection receives a wrong internal IP that doesn't enable networking at first. In my case I need to wait 1-3 minutes until OpenVPN reconnects itself based on ping timeout: after the reconnect I receive another IP and everything starts to work. I do not know whether it's an OpenVPN or a Windows bug. One last note: using multiple VPNs Actually this will work, that's how I roll. As long as both VPNs don't clash by using the same 10.0.0.0/8 subnet. If this happens, you will need to change Line 5 to point to a more specific (aka smaller) subnet tailored to your AirVPN server. Specifying a 10.x.x.0/24 subnet for routing will surely do (subnet mask: 255.255.255.0). Just be aware that you cannot practically use the same IP range in both networks at the same time (well, you'd need to bind the application you are using to either interface, which you cannot do with a browser or the printing service in case of internal resources). (The story of broken net_gateway) For this placeholder, OpenVPN attempts to determine your 'default gateway', i.e. the router all your internet traffic passes through. It normally works, but may not be supported on other platforms (Linux, sigh). However it has one unintended side-effect: if you already have a VPN that reroutes all your traffic, net_gateway will make all AirVPN traffic go through the first VPN: Your traffic -> VPN1 -> Internet Torrent traffic -> VPN1 -> AirVPN -> Internet That's the unintended dual-hop. Surely you can extend that scheme to 3,4,n-hops if you fiddle enough with routing, subnet masks and correct order. I'm not responsible for headaches We avoid that behavior with Line 4 from our config - the remote_host line forces the AirVPN traffic to go straight to the internet (through your LAN router). One more thing: net_gateway is not available for IPv6 routes in OpenVPN. That's why it currently only works with a IPv4 connection to the VPN server. (Crash course: Subnet masks) You've seen the weird number 255.0.0.0 above. You should refer to other pages for a proper explanation, but basically this is a very simple way for computers to determine the range of IP addresses that are part of a network (a subnet). What's simple for computers is very hard to grasp for us humans. 255 means there are NO changes allowed to the first set of IP numbers. I.e. the 10 in 10.0.0.0 always stays a 10. 0 means all numbers can be used. I.e. the zeroes in 10.0.0.0 can be (0-255), lowest address is 10.0.0.1 and the last address is 10.255.255.254 (technically, 10.0.0.0 is the first and the last 10.255.255.255 is reserved for 'broadcast') Any number in between denotes ... a range in between. 2^(32-prefix)=number. Number is the amount of available addresses and prefix is called the subnet prefix. Both are meant to describe the same thing. For 10.0.0.0/26 or 10.0.0.0 with subnet mask of 255.255.255.192 you get addresses in range 10.0.0.0-10.0.0.64 -- 2^(32-26) = 64. Similarly you can convert the subnet mask into the prefix number and work from there; or eyeball it: 256-192 = 64. (Two ways to accomplish routing) If you have two equal routes, e.g. 0.0.0.0 goes through VPN with metric 666 0.0.0.0 goes through LAN router with metric 10 then obviously the default route for a packet will travel through (2) - because it's a cheaper path. Unless an application specifies to talk only on the VPN interface. However a different rule applies whenever a more specific route exists 0.0.0.0/0 goes through VPN2 with metric 666 0.0.0.0/0 goes through LAN router with metric 10 0.0.0.0/1 goes through VPN1 with metric 30 128.0.0.0/1 goes through VPN1 with metric 30 Here the routes (3) and (4) cover the entire addressing space, just like 0.0.0.0/0. However because they are more specific, they'll be preferred for all traffic because these routes are more selective. This is how OpenVPN does override system routing with VPN routing by default. This is also what the other guide attempted as well, by pushing four {0,64,128,192}.0.0.0/2 routes. Since that was more specific, it would in return override the 0,128 routes and so on. We can calculate how many multi-hops we would be able to do with this method: IPv4 has 32 bits, we will not touch the last 8 bits of the subnets. That leaves us then with 24 bits or 24 maximum amount of hops. Theoretically. The routing table would be outright f---- to look at. This method is a bit more 'secure' in a way because you don't need to rely on overriding a certain metric value, you just slap a more specific route on top and it's automatically made default. Also you don't need to override the default gateway (router) and all that junk. However with my preferred method (first) you can quite easily do DIY dual-hop routing: 0.0.0.0/0 goes through VPN2 with metric 666 0.0.0.0/0 goes through LAN router with metric 10 0.0.0.0/1 goes through VPN1 with metric 30 128.0.0.0/1 goes through VPN1 with metric 30 <VPN2-IP>/32 goes through VPN1 with metric (any) Such a setup will make sure that all traffic destined for the internet (hits 3 and 4) will go through VPN1. If a program specifies the VPN2 network interface, then VPN2 will be reached via VPN1 first (you->VPN1->VPN2). This is quite 'quizzacious' to set up/control. Not part of this guide. As a part of this guide we told the system to route VPN2 via router on LAN. Yet you could indeed chain multiple VPNs this way and force the VPN1 to not only catch all traffic but also be chained via multiple VPNs itself so you would not need to manually set programs. I've seen scripts online for that purpose. Although be aware of MTU issues due to encapsulation. Troubleshooting tips TEST. SERIOUSLY, TEST YOUR SETUP BEFORE ENGAGING YOUR DATA CANNONS! A couple hours now are infinitely many times more worth than a 'leaked' mistake and headaches later on. https://ipleak.net/ - tests your client's default connection route. It would not tell you if your client is alternatively available on LAN for example. If you followed this guide and set up your client correctly, it will not be available on LAN etc. See the images below: 'without interface binding' (most newbie users) and 'with interface binding' (this guide) Wireshark to inspect how the traffic is actually flowing. Follow online tutorials, you only need to select the right network interfaces and filter traffic by port/IP (tcp/udp and your local or VPN IP) curl to send network requests. Like ifconfig.co / ifconfig.io will respond with the IP address it sees you as: curl --interface <your computer IP> http://ifconfig.co curl --interface 192.168.1.42 http://ifconfig.co # for IPv4 or IPv6, default route curl -4 http://ifconfig.co curl -6 http://ifconfig.co > route -4 print and > route -6 print on Windows. To compare the outputs, you can use Notepad++ with the compare plugin (you need two documents open, one in left and another in right pane before comparing). PS: AirVPN configuration generator does not support #comment lines. Please fix. Sorry Linux users, maybe another time I will write something tailored to you. But I believe you are smart cookies and will adapt the OS-specific steps to fulfill this guide's goal.
  3. There is one Teamspeak Server (gommehd.net) that disconnects and bans you almost instantly if you are using a VPN - its not just a list of blocked IPs, since you are able to connect but some seconds later you get blocked, try for yourself to understand what I mean. Is there anyway to bypass that? any ideas?
  4. The average number of times I lost the connection to the server is once a day. Is this is expected, or is this an issue with my OS? Is there any variation about the interval for each server restart?
  5. Last week i shared a nice topic about VPN’s and how in the 21st century it is mandatory that every single person should be using one, is how some one mentioned AirVPN. I “had” 5 VPN’s on my iphone ( since it is where i use the internet the most ) i signed aboard to AirVPN and asked for a trial. And let me tell you i have not been this excited in a long time. after my trial ended few days ago i decided i should support AirVPN and get a subscription. Set up my windows 10 tablet, linux mint PC and of course my phone, i deleted the other VPNs off my system and did a few test and research in between and I have to say AirVPN is simple, fast, affordable, transparent and yet reliable. i can not believe i have not came across AirVPN before ( Google definitely did not help bring up any mention of AirVPN ) and wasted so much time, money, researching and hassle with choosing the right VPN service. enough of my ranting, keep up the good work and keep up with the good fight!!!
  6. Recently, the Tor Project announced a membership program. As Air has always been a strong supporter of the Tor Project, maybe you can also consider the membership? This can help secure its independecy while also making AirVPN known to a wider audience. Many NGOs still struggle as the pandemic has decreased their donations. Here is the link to the announcement: https://blog.torproject.org/tor-project-membership-program
  7. Every week or so I am finding my connection really slow. After troubleshooting, I find that changing the DNS server fixes the problem. Because I have the VPN configured on my ASUS Merlin router the DNS settings are manual. I select a DNS server from the OpenNIC project, but I would like to avoid having to manually change every couple of weeks. Do the DNS servers periodically experience issues? Is there a way to find a stable DNS server? Could my issue be related to something else?
  8. Hello. Today, I stumbled across this interesting video hosted by Techlore and The Hated One. I watched some of Techlore's videos before and I enjoy the use of AirVPN (I used to use PIA and NordVPN - until I learned of NordVPN's data mining practises). I thought I would share this video, get you to watch it so we can talk about the points it brings up. How VPN providers use common myths to trick you into using them Please watch and listen to this! I am aware that my browsing traffic and real IP addressgets routed through a server and can potentially be monitored by my VPN provider, whether they claim to have a no-logs policy or not. And I definitely know VPN's don't prevent social media from tracking you - that's what add-ons like uBlock Origin and uMatrix and, of course, not using social media is for. Third-parties like governments, companies and hackers can use correlation attacks to track you (i.e. compare when I access a website to when I access the VPN server) along with other techniques to identify you, in spite of your VPN, like fingerprinting. Basically, completely anonymity with a VPN is impossible - even if you make an account with a temporary email address and pay for it with cryptocurrency if you're not careful how you browse the web. What caught my attention is that while VPN providers claim you can combine their VPN with Tor for improved security and anonymity (hiding the fact you are using Tor from your ISP, for instance), using Tor bridges effectively do that as well. Plus using a VPN with Tor would basically help third parties correlate your browsing traffic to your VPN's IP address. There are other interesting points that bear discussion such as web traffic being decrypted once leaving a VPN server (Is even AirVPN lying about encrypting our web traffic?) and such. So what are anyone's thoughts on this?
  9. SemperVideo, a German HackInfo site has published a video on youtube claiming ALL VPN service provider lie when claiming NO LOG blabla. In the video you can see two examples. Video is in German (sorry), maybe subtitle works.. https://www.youtube.com/watch?v=zCePL6lkfGA Now the question is: How is this with AIRvpn???
  10. Hi I am trying to connect to AirVPN from an OPNSense Firewall. I have tried many different configs and the status of my openvpn tunnel is always "connecting". The log file shows no errors, there is just a entry state all and client disconnected. Is there any working guide for the current OPNSense version. I do not have any problems to connect to AirVPN from any Windows Client in my network. I looked at my firewall log and did a tcpdump, but i can not see any incoming traffic. I do not have a private ip address, because i use a 5G router. could this be the problem? why is it working on other clients (Android, Windows Workstation)? thank you for your help
  11. Lately I've been thinking about the prospect of using VPN's in conjunction with the Tor proxy and done some research. I know there are both pros and cons to Tor-over-VPN and VPN--Over-Tor connections and played with the idea of using both connection types at once - something I like to call the "Sandwiched Connection" in that you layer your Tor connection between two separate VPN connections. Please correct me if I got any details wrong or missing. First, you have your plain naked internet connection without a VPN or proxy so your ISP and local network can see everything you're doing. Next, you connect to a VPN server. It masks your IP address and location from your ISP as well as encrypts your web traffic so they have no idea what you're doing. However, the company managing the VPN server will have access to your real IP address, location and web traffic that will be decrypted in their servers - making it important it is a trustworthy service provider that doesn't keep logs of your activities and allows you to create your account with a temporary email address, no personal details and paid with cryptocurrency (that is untraceable like Z-Cash and Monero). You connect to your Tor proxy. Ordinarily, the Tor entry node will know your IP address and location. Since you are using a VPN, it will only know the masked address provided by the VPN server. Not only that but the Tor proxy will further encrypt your web traffic so even the VPN provider won't know what you are doing, just like how it, in turn, hides it from your ISP. Even better? Your ISP won't even know you are using Tor in the first place. However, the Tor exit node decrypts your web traffic and has full access to it as if you were never using a VPN to begin with. If the exit node happens to be malicious or operated by any authority that doesn't like what you're doing, they could potentially call whoever is operating the entry node and/or follow the mask IP address to the VPN service provider and contact them for details concerning you. Again, a trustworthy VPN provider with a no-logs policy is important. Then comes the second VPN connection. After you connect to Tor, you connect to that second VPN server which should encrypt your web traffic from the tor exit node. Whatever company is managing that second server (it could be the same service as the first one or a different one) will only know the IP address and location provided by the Tor proxy and first VPN server but it will know your web traffic as it is being fed to their servers and decrypted. Not to mention that this "sandwiched connection" will deliver a big dent to your connection performance so it helps if you have a powerful router connected via ethernet. So at the end of the day, I figured, someone has to know what you're up to online which leaves the question "Who do you trust with your personal information?" Plus this is all just theory, as far I can tell. Has anyone ever tried putting this into practise? Can anyone provide any further insight into the "sandwiched connection"? I look forward to talking about it.
  12. I enjoy online multiplayer gaming as a past time and although I enjoy using a VPN to keep even my gaming sessions safe and encrypted, I know it can give a hit to my ping and such. I never tried AirVPN with online gaming yet but I wonder if anyone, from experience, can tell me if it is indeed a suitable VPN for online gaming. Otherwise, what other VPN service can anyone suggest for just gaming while still using AirVPN for other online activities? Thanks.
  13. I have always been an advocate of paid VPN service over free ones in fear of those free VPN providers doing god knows what with my internet trafic that is going through their servers and yesterday I stumbled upon this article about free VPNs doing just that and much more. Not only do yo have no idea what they are doing with your traffic, but these providers are manipulating google play store search algorithms lol, yo can read the full article here, vpnpro whoever they may be made a deepdive into this an frankly its kind of scarry.
  14. Hello all, If I read and understand the forum correctly, I’m not the only one who is unable to set up a port forwarding with vpn. Because I have tried all sorts of things and cannot find a solution, I’m curious if there is someone who can help me out on this. What I want to do: I want to acces my NASserver and my Webcam from outside my network. This requires three ports. I chose Air vpn because they support port forwarding and I bought an Asus router (RT-AC66U) that has a vpn-server and that also has a vpn-client. My network configuration is set as follows: - modem / router from ISP (iprange 192.168.xxx.xxx) - behind it the Asus router (iprange 192.169.xxx.xxx) - WAN port Asus router is connected to LAN port of ISP - behind Asus router an additional router (sitecom) that serves as an "amplifier". These routers are connected by a cable between LAN. The sitecom router has a fixed IP address within the range of the Asus router. - DHCP from sitecom is switched off. Asus router controls the allocation of IP addresses and handling of internet traffic. This setup has always worked great (without VPN). After setting up a vpn-client, all computers, phones etc can acces the internet without any problems. The NASserver is able to make a backup via a built-in SSH to a server at a different location (outside LAN). It is no longer possible to access the NAS server from outside the LAN via http / ftp / sftp. I tried the following to get it working: - vpn server enabled / vpn client disabled - vpn server enabled & vpn client enabled - nasserver provided with ipadress within range of vpn-server - routes - Port forwarding set from VPN server to LAN and vice versa I don't get it working. Thanks in advance for your tips and help Kind regards, Ivo
  15. Hey, i have a debian 8 root server i want to run a mysql database on it and access it from external. But i want to have the root server connected to a vpn server so the real ip dosent get leaked! What would be the best way to set this up? I am not really experienced with debian and ipconfigs. I first thought about using openvpn and just connect to a server, but the ip needs to be static to connect to the database on long-term. If i am not wrong there wasnt option for it... Does anyone have a idea how to do this, or could help me with that ? Didnt found anything useful about this yet ;( thanks a lot already!
  16. Hello, my problem is the following: I have a self-hosted server mydomain.noho.st. When I am connected without vpn, with the IP address of my ISP, I can access it from outside my local network without any problem. However, when I am connected with my VPN (AirVPN), I get errors on my browser: the waiting period has expired, or the connection has failed or web page not available net:: err_connection_reset My configuration: raspberry Pi3, raspbian, ethernet, at home vpn at airvpn which works independently of yunohost, with the sudo command eddie-ui -cli -login=xxx -password=yyyy -server=Zzzz -mode.protocol=udp -connect -netlock openvpn installed, before installing yunohost ssh on a port other than 22 (e. g. xxxx) yunohost recently installed, in manual mode, v.3.4.4.2.4 stable creation of a user on yunohost deluge installed beforehand in yunohost, with a forwarded ports made on my AirVPN customer area, and which works well I have not done any port forwarding on my box, since this is not recommended by AirVPN > I get a ping from mydomaine.noho.st > At https://www.whatsmydns.net, in field A, mydomain.noho.st points to the correct AirVPN IP address. > On https://ports.yunohost.org, all ports of mydomain.noho.st are closed, while they are open if I redirect the ports to my box. I DO NOT KNOW TO DO A PORT REDIRECTION < 2048 on my raspberry (Web: 80 443 SSH: 22), if that is the problem. Thank you for your help. Translated with www.DeepL.com/Translator Pas d’accès à mondomaine.noho.st sous vpn bonjour, mon problème est le suivant : je dispose d'un serveur auto-hébergé mondomaine.noho.st. Lorsque je suis connecté sans vpn, avec l'adresse IP de mon FAI, j'y accède sans problème de l'extérieur de mon réseau local. Par contre, lorsque je suis connecté avec mon VPN (AirVPN), j'obtiens des erreurs sur mon navigateur : le délai d’attente est dépassé, ou la connexion a échoué ou page web non disponible net:: err_connection_reset Ma configuration : raspberry Pi3, raspbian, ethernet, à la maison vpn chez airvpn qui fonctionne indépendemment de yunohost, avec la commande sudo eddie-ui -cli -login=xxx -password=yyy -server=Zzzz -mode.protocol=udp -connect -netlock openvpn installé, avant l’installation de yunohost ssh sur un autre port que 22 (par ex. xxxx) yunohost installé récemment, en mode manuel, v.3.4.2.4 stable création d’un utilisateur sur yunohost deluge installé préalablement à yunohost, avec un forwarded ports effectué sur mon client area d'AirVPN, et qui fonctionne bien je n'ai fait aucune redirection de port sur ma box, puisque cela est déconseillé par AirVPN > j’obtiens un ping depuis mondomaine.noho.st > Sur https://www.whatsmydns.net, dans le champ A, mondomaine.noho.st pointe à la bonne adresse IP d'AirVPN. > Sur https://ports.yunohost.org, tous les ports de mondomaine.noho.st sont fermés, alors qu'ils sont ouverts si je fait une redirection des ports sur ma box. JE NE SAIS PAS FAIRE UNE REDIRECTION DE PORT < 2048 sur mon raspberry (Web: 80 443 SSH: 22), si cela est le problème. Merci pour votre aide.
  17. I hope this is the right place to chat about this. Been notified about this article today: https://vpnpro.com/blog/vpn-market-share-overview/. I'm an AirVPN user and was kind of surprised there's no mention of AirVPN in this article at all. In my personal experience AirVPN hits all the buttons and I really enjoy the service and support i get from them, so it's just a little disappointing it's not on the list. Are there any global lists of VPN market share where we could see where AirVPN stands?
  18. Hi, I keep getting VPN Errors on Android which I guess can happen (although not as often as I am getting them). This happens once every one or two hours. What makes it difficult is that the connection gets locked and no apps can connect to anything. When this happens all I get is a normal notification and it often takes a while until I see it. In the meantime I am not getting mail and messages. Screenshot below. What could these VPN errors be and it is anything I can do to prevent and limit them? I'm on Android 8.1 with Eddie 2.0.1
  19. Hello, I was messing around with a local web page hosted on my raspberry pi for local projects, and using that web page works fine from my pc which has an ethernet cable to my router. However when I try to access the page with my android phone, I cannot connect to the web page. I can also not reach my router admin page from my android device, something that DOES work on my pc... All three devices: pc, android phone, raspberry pi are running on AirVPN. The moment I disconnect from the VPN, I can access the admin panel and the website from my phone. Is there a way to make devices connected via wifi while using the VPN able to access my router / other local machines? Thanks in advance.
  20. Hello,As we know no VPNs even the safest VPNs like AirVPN or ProtonVPN? are really safe, in fact there is always the problem that none of us users really know if they keeps logs.My solution would be to host running a VPN on a rented VPS server in order to personally manage it.To do so I do not want to limit at something pre-compiled, such as "digital ocean", infact my plan is to run it in Softether host inside a VPS.The scheme should be so: Within a Windows Server VPS placed in some data center run VMware emulating another operating system, within this guest run Softether host app.Then connect via VPN tunnel from Softether host app to my real domestic PC. I just wonder if the VPS server owner or the VPS internet operator itself could actually trace the source back to my real PC even though ill establish a VPN tunnelling from softether to my actual pc. PS: The idea of ​​running everything inside a VM instead of into just the VPS itself is to make the Softether logs inaccessible to a potential attacker protecting them in a shell, plus mask the imei and the operation system.I look forward to understand if they (NSA or potential attackers) would have some way to track back the encrypted VPN connection from Softether to my current PC
  21. Hello, I've tried AirVPN now on my desktop and am very pleased with the experience so i wanted to pursue my main goal with AirVPN: My ISP uses CGNAT so i have no public IPV4 adress. My plan was to setup a Ubuntu Server VM that acts as a gateway to AirVPN for my plex server (which currently isn't available outside of my network thanks to CGNAT). I've read elsewhere that i needed to tunnel the IPV4 application (plex) to IPV6 using the program 6tunnel. My first step was to install openvpn and launch the TCP.ovpn file, SSH is telling me: "Initialization Sequence Completed", now I'm stuck at connecting to the gateway (and maybe configuring it as one?) and tunneling the IPV4 traffic of the VPN and Plex to IPV6. I've also just discovered the advanced mode of the config file generator and am a bit overwhelmed. Should I use "IPV4&IPV6 (connect with IPV6) and which ports? I think my current config files where normal IPV4 so that's probably why it only worked on my desktop with eddie. Your help is greatly appreciated and thanks in advance.
  22. Hello. I read that connecting to AirVPN using port UDP 53 instead of UDP 443 is a way to get better speeds, but when I tried to do it today it could not connect to that port on any server and kept giving me an error. This happened on both my phone (connected with Wi-Fi) and PC (connected with ethernet cable) . I contacted my ISP and asked them if they were blocking any ports, and they said they were only blocking ports 80 and 25. I had the ISP unblock these ports just in case that was somehow the issue, but it was not and VPN on UDP 53 continued to not work. I even tried forwarding UDP port 53 to my devices from my router, but that didn't do anything. However, when I turn off Wi-Fi on my phone and connect to my mobile network, UDP 53 works flawlessly. Here is a log of me trying to connect to an AirVPN server on port UDP 53 on my Wi-Fi using my android phone and the Eddie for Android app Eddie Log created on 09 Aug 2018 19:24:41 UTC Eddie for Android 1.0 RC 2 Version Code 5 09 Aug 2018 19:23:52 UTC [debug] NativeMethods.OVPN3.Init succeeded (version=3) 09 Aug 2018 19:23:52 UTC Network is connected to WIFI 09 Aug 2018 19:23:52 UTC [debug] VPNService.NetworkStatusChanged: action='RESUME' 09 Aug 2018 19:23:52 UTC Network is connected to WIFI 09 Aug 2018 19:23:52 UTC [debug] VPNService.NetworkStatusChanged: action='RESUME' 09 Aug 2018 19:24:03 UTC Network is connected to WIFI 09 Aug 2018 19:24:03 UTC [debug] VPNService.NetworkStatusChanged: action='RESUME' 09 Aug 2018 19:24:03 UTC Network is connected to WIFI 09 Aug 2018 19:24:03 UTC [debug] VPNService.NetworkStatusChanged: action='RESUME' 09 Aug 2018 19:24:04 UTC OpenVPN3: ovpn3_client_set_option '1' - 'tls_version_min:tls_1_0' 09 Aug 2018 19:24:04 UTC OpenVPN3: ovpn3_client_set_option '1' - 'protocol:' 09 Aug 2018 19:24:04 UTC OpenVPN3: ovpn3_client_set_option '1' - 'ipv6:yes' 09 Aug 2018 19:24:04 UTC OpenVPN3: ovpn3_client_set_option '1' - 'timeout:30' 09 Aug 2018 19:24:04 UTC OpenVPN3: ovpn3_client_set_option '1' - 'tun_persist:true' 09 Aug 2018 19:24:04 UTC OpenVPN3: ovpn3_client_set_option '1' - 'compression_mode:yes' 09 Aug 2018 19:24:04 UTC OpenVPN3: ovpn3_client_set_option '1' - 'synchronous_dns_lookup:false' 09 Aug 2018 19:24:04 UTC OpenVPN3: ovpn3_client_set_option '1' - 'autologin_sessions:true' 09 Aug 2018 19:24:04 UTC OpenVPN3: ovpn3_client_set_option '1' - 'disable_client_cert:false' 09 Aug 2018 19:24:04 UTC OpenVPN3: ovpn3_client_set_option '1' - 'ssl_debug_level:0' 09 Aug 2018 19:24:04 UTC OpenVPN3: ovpn3_client_set_option '1' - 'default_key_direction:-1' 09 Aug 2018 19:24:04 UTC OpenVPN3: ovpn3_client_set_option '1' - 'force_aes_cbc_ciphersuites:false' 09 Aug 2018 19:24:04 UTC OpenVPN3: ovpn3_client_set_option '1' - 'tls_cert_profile:' 09 Aug 2018 19:24:04 UTC Eddie Native Library: client '1' starting 09 Aug 2018 19:24:04 UTC Eddie Native Library: loading profile 09 Aug 2018 19:24:04 UTC OpenVPN3: config.protoOverride: 09 Aug 2018 19:24:04 UTC OpenVPN3: config.connTimeout: 30 09 Aug 2018 19:24:04 UTC OpenVPN3: config.compressionMode: yes 09 Aug 2018 19:24:04 UTC OpenVPN3: config.ipv6: yes 09 Aug 2018 19:24:04 UTC OpenVPN3: config.tlsVersionMinOverride: tls_1_0 09 Aug 2018 19:24:04 UTC OpenVPN3: config.tlsCertProfileOverride: 09 Aug 2018 19:24:04 UTC OpenVPN3: config.disableClientCert: false 09 Aug 2018 19:24:04 UTC OpenVPN3: config.proxyHost: 09 Aug 2018 19:24:04 UTC OpenVPN3: config.proxyPort: 09 Aug 2018 19:24:04 UTC OpenVPN3: config.proxyAllowCleartextAuth: false 09 Aug 2018 19:24:04 UTC OpenVPN3: config.defaultKeyDirection: -1 09 Aug 2018 19:24:04 UTC OpenVPN3: config.forceAesCbcCiphersuites: false 09 Aug 2018 19:24:04 UTC OpenVPN3: config.sslDebugLevel: 0 09 Aug 2018 19:24:04 UTC [debug] DoUpdate - Begin 09 Aug 2018 19:24:04 UTC OpenVPN3: config.autologinSessions: true 09 Aug 2018 19:24:04 UTC OpenVPN3: config.tunPersist: true 09 Aug 2018 19:24:04 UTC OpenVPN3: config.synchronousDnsLookup: false 09 Aug 2018 19:24:04 UTC Eddie Native Library: profile loaded, connecting to server 09 Aug 2018 19:24:04 UTC Eddie Native Library: connect_attach 09 Aug 2018 19:24:04 UTC [debug] OnConnectAttach 09 Aug 2018 19:24:04 UTC OpenVPN3: Frame=512/2048/512 mssfix-ctrl=1250 09 Aug 2018 19:24:04 UTC [debug] OpenVPN Event: type=RESOLVE, name=RESOLVE, info=, data=0 09 Aug 2018 19:24:04 UTC Eddie Native Library: connect_pre_run 09 Aug 2018 19:24:04 UTC [debug] OnConnectPreRun 09 Aug 2018 19:24:04 UTC Eddie Native Library: connect_run 09 Aug 2018 19:24:04 UTC OpenVPN3: Contacting 107.150.23.66:53 via UDP 09 Aug 2018 19:24:04 UTC [debug] OpenVPN Event: type=WAIT, name=WAIT, info=, data=0 09 Aug 2018 19:24:04 UTC Eddie Native Library: socket_protect(socket=81) 09 Aug 2018 19:24:04 UTC [debug] OnSocketProtect(socket=81) 09 Aug 2018 19:24:04 UTC OpenVPN3: Connecting to [107.150.23.66]:53 (107.150.23.66) via UDPv4 09 Aug 2018 19:24:14 UTC OpenVPN3: Server poll timeout, trying next remote entry... 09 Aug 2018 19:24:14 UTC [debug] OpenVPN Event: type=RECONNECTING, name=RECONNECTING, info=, data=0 09 Aug 2018 19:24:14 UTC OpenVPN3: Contacting 107.150.23.66:53 via UDP 09 Aug 2018 19:24:14 UTC [debug] OpenVPN Event: type=WAIT, name=WAIT, info=, data=0 09 Aug 2018 19:24:14 UTC Eddie Native Library: socket_protect(socket=77) 09 Aug 2018 19:24:14 UTC [debug] OnSocketProtect(socket=77) 09 Aug 2018 19:24:14 UTC OpenVPN3: Connecting to [107.150.23.66]:53 (107.150.23.66) via UDPv4 09 Aug 2018 19:24:24 UTC OpenVPN3: Server poll timeout, trying next remote entry... 09 Aug 2018 19:24:24 UTC [debug] OpenVPN Event: type=RECONNECTING, name=RECONNECTING, info=, data=0 09 Aug 2018 19:24:24 UTC OpenVPN3: Contacting 107.150.23.66:53 via UDP 09 Aug 2018 19:24:24 UTC [debug] OpenVPN Event: type=WAIT, name=WAIT, info=, data=0 09 Aug 2018 19:24:24 UTC Eddie Native Library: socket_protect(socket=77) 09 Aug 2018 19:24:24 UTC [debug] OnSocketProtect(socket=77) 09 Aug 2018 19:24:24 UTC OpenVPN3: Connecting to [107.150.23.66]:53 (107.150.23.66) via UDPv4 09 Aug 2018 19:24:34 UTC OpenVPN3 CONNECTION_TIMEOUT: CONNECTION_TIMEOUT 09 Aug 2018 19:24:34 UTC VPN error detected. Locking VPN 09 Aug 2018 19:24:34 UTC Eddie Native Library: client '1' pausing 09 Aug 2018 19:24:34 UTC Eddie Native Library: client '1' paused 09 Aug 2018 19:24:34 UTC VPN locked 09 Aug 2018 19:24:34 UTC Eddie Native Library: tun_builder_teardown(disconnect=false) 09 Aug 2018 19:24:34 UTC [debug] OnTunBuilderTeardown(disconnect=0) 09 Aug 2018 19:24:34 UTC OpenVPN DISCONNECTED - DISCONNECTED: 09 Aug 2018 19:24:34 UTC [debug] OnConnectRun 09 Aug 2018 19:24:34 UTC Eddie Native Library: OpenVPN3 client started 09 Aug 2018 19:24:34 UTC Eddie Native Library: client '1' started 09 Aug 2018 19:24:34 UTC Eddie Native Library: client '1' stopping 09 Aug 2018 19:24:34 UTC Eddie Native Library: client '1' stopped 09 Aug 2018 19:24:34 UTC [debug] ClearContexts 09 Aug 2018 19:24:35 UTC Exception: client not initialized (Eddie.NativeAndroidApp.OpenVPNDispatcher.Run)I would highly appreciate if a fix for this issue could be found, thank you.
  23. Hi I'm using a Samsung Galaxy S8+ running Android 8.0 and having issues with the VPN disconnecting after a few minutes (<1 hour) of not using the device. This happens with both OpenVPN for Android & the Eddie - OpenVPN GUI. I've tried uninstalling and reinstalling OpenVPN for Android as well as deleted the config files and redownloaded them, but still doing so. Power Saving mode is off & I've also tried switching to other modes (Game/Entertainment/High performance). Does anyone know why/how to fix this? Apologies if this has already been discussed in another post/thread, I had a look but couldn't find anything, happy to use such a thread if you can point me to it. Thank you.
  24. Hi, I'm trying to use a NetGear R6300v1 as a VPN Router with the latest DD-WRT build I could find (dd-wrt.v24-36330_NEWD-2_K3.x_mega-R6300). I can establish a TCP/443 connection to AirVPN (using DE or NL servers) and everything is fine in my opinion: There seem to be no DNS leaks and when the VPN goes down the R6300v1 stops traffic over the WAN interface, just as I want it to. With my 100/40 MBit/s NetCologne DSL @ home I see about 15/13 MBit/s VPN Performance on the R6300v1 with TCP, I have not yet seen more than 30% CPU usage on the R6300v1 during Speedtests. Streaming 1080p YouTube videos in a browser window on a PC connected via LAN to the R6300v1 the CPU usage stays below 15%. Streaming 4K video to an iPad connected via 5 GHz WLAN results in 25% to 35% CPU usage on the R6300v1. This is using a TCP connection - I wonder if UDP would give me more performance and if I should strive further to get that up and running? My problem is: With the very same settings - AFAIK I don't have anything TCP exclusive in there - just switching to UDP for connecting to AirVPN I cannot browse anything anymore. DNS resolution still works with UDP, I can ping for example www.heise.de both in Windows and via SSH directly on the R6300v1, I just cannot browse to www.heise.de. On a sidenote, the same is true if I use 'OpenVPN connect' on an iPad (iOS 11.4.1) - when I generate a .ovpn config for TCP/443 to German servers all is well, same config just with UDP/443 not so much on the iPad, too. On a second sidenote, I can get the latest Tomato build I could find for the R6300v1 (tomato-Netgear-R6300V1_RT-AC6x--140-AIO-64K) to do the same and have the same UDP issue as with the DD-WRT load ... I settled for DD-WRT for now because it seems to me the hardware support, especially WLAN AC, is better in the more recent DD-WRT build I'm using. I think I'm either missing something obvious or UDP simply cannot work on the R6300v1 (and an iPad). If anybody has an idea what I should try differently with the settings, I'd very much appreciate the information. Thanks in advance, Kyle
×
×
  • Create New...