Jump to content
Not connected, Your IP: 3.17.79.60

Search the Community

Showing results for tags 'Vpn'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 203 results

  1. My phone is connected to AirVPN via OpenVPN for Android. Most websites are fooled by the VPN, but when I ask google directly (OK Google), it shows my actual IP address. I do not have this issue on my PC. What can I do about this? Thanks in advance.
  2. Certainly an off-topic question. But i have to ask myself how and why did services like AirVPN come to be? Most of the providers i have been able to gather some information on AirVPN included started at or around 2010-2013. Obviously the latter correlates to the Snowden leaks; Clearly however this was a concern before the Snowden leaks but why? For privacy and torrenting reasons, why were VPN providers non-existant from the 1990's to 2010? ( The beginning of the modern web to their first appearance) From 1990-2010 there was obviously government surveillance and piracy occurring, so why were VPN's overlooked as a corporate utility for remote employees until 2010? What changed? After 2010 and the Snowden revelations in 2013 VPN's and VPN providers sprung up seemingly out of nowhere. Removing the Snowden leaks from consideration, why were VPN's first used to protect the privacy and security of citizens in the first place when the technology was designed for a completely different reason?
  3. Hey All, I use PfSense with AirVPN and its set up to use AirVPN DNS (10.39.0.1 IIRC) to prevent DNS leakage, however the "client" in Pfsense is configured to use europe.vpn.airdns.org which cannot resolve until the AirVPN is up. I've found out what europe.vpn.airdns.org CURRENTLY resolves to and used the IP instead to work around this, but i assume this changes frequently to manage load (correct?). So am i ok to just leave this as it is or should i be doing something else? Finally, download speed across the VPN are about 2-3Mbps when i have a 20Mbps connection - seems a little slow - anything i can check here?
  4. Is anyone able to get good speeds on Alcor? The most i was able to get was 4-5 mbits/second. Other servers nearby in Latvia and Lithuania can get 20-40 mbits per second.
  5. I am on the new Eddie beta and i cannot connect via Tor when it is using a obfs bridge. The error reads that it cannot identify the first node in the established circuit. Is this a bug or does AirVPN only work over non obfuscated tor? Log is bellow I 2016.11.20 16:16:06 - Eddie client version: 2.11.7 / windows_x64, System: Windows, Name: Microsoft Windows NT 10.0.14393.0. 2016.11.20 16:16:06 - Reading options from C:\Users\M3CHWARRI0R935\AppData\Local\AirVPN\AirVPN.xml. 2016.11.20 16:16:06 - Data Path: C:\Users\M3CHWARRI0R935\AppData\Local\AirVPN. 2016.11.20 16:16:06 - App Path: C:\Program Files\AirVPN. 2016.11.20 16:16:06 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe. 2016.11.20 16:16:06 - Command line arguments (1): path="home". 2016.11.20 16:16:06 - Operating System: Microsoft Windows NT 10.0.14393.0I 2016.11.20 16:16:06 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2I 2016.11.20 16:16:06 - OpenVPN - Version: 2.3.13 - OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09 (C:\Program Files\AirVPN\openvpn.exe)I 2016.11.20 16:16:06 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)I 2016.11.20 16:16:06 - SSL - Version: stunnel 5.37 (C:\Program Files\AirVPN\stunnel.exe)! 2016.11.20 16:16:06 - Activation of Network Lock - Windows Filtering Platform! 2016.11.20 16:16:07 - Ready. 2016.11.20 16:16:07 - Updating systems & servers data ...I 2016.11.20 16:16:17 - Session starting.. 2016.11.20 16:16:17 - IPv6 disabled with packet filtering.I 2016.11.20 16:16:17 - Checking authorization .... 2016.11.20 16:17:03 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (curl: (7) Failed to receive SOCKS4 connect request ack., with 'socks' proxy and 'none' auth)W 2016.11.20 16:17:03 - Authorization check failed, continue anyway ({1])I 2016.11.20 16:17:03 - Cancel requested.. 2016.11.20 16:17:03 - IPv6 restored with packet filtering.! 2016.11.20 16:17:03 - Session terminated.! 2016.11.20 16:17:07 - Deactivation of Network LockI 2016.11.20 16:17:42 - Session starting.. 2016.11.20 16:17:42 - IPv6 disabled with packet filtering.I 2016.11.20 16:17:42 - Checking authorization ...! 2016.11.20 16:17:43 - Connecting to Hamal (Switzerland, Zurich). 2016.11.20 16:17:43 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016. 2016.11.20 16:17:43 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2016.11.20 16:17:43 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2016.11.20 16:17:43 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.11.20 16:17:43 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.20 16:17:43 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:17:43 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:17:43 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2016.11.20 16:17:43 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 [nonblock]. 2016.11.20 16:17:43 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:9150. 2016.11.20 16:17:45 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2016.11.20 16:17:45 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:9150. 2016.11.20 16:17:45 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:9150, sid=a30f1ab4 4d335e9d. 2016.11.20 16:17:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.20 16:17:46 - OpenVPN > Validating certificate key usage. 2016.11.20 16:17:46 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.20 16:17:46 - OpenVPN > VERIFY KU OK. 2016.11.20 16:17:46 - OpenVPN > Validating certificate extended key usage. 2016.11.20 16:17:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.20 16:17:46 - OpenVPN > VERIFY EKU OK. 2016.11.20 16:17:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.20 16:17:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.20 16:17:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:17:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.20 16:17:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:17:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.20 16:17:47 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:9150. 2016.11.20 16:17:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.20 16:17:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.8 255.255.0.0'. 2016.11.20 16:17:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.20 16:17:50 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.20 16:17:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.20 16:17:50 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.20 16:17:50 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.20 16:17:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.20 16:17:50 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=17 HWADDR=d0:17:c2:86:0d:25. 2016.11.20 16:17:50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.20 16:17:50 - OpenVPN > open_tun, tt->ipv6=0. 2016.11.20 16:17:50 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5A56F43F-C323-4E15-ACAB-2724F9D83812}.tap. 2016.11.20 16:17:50 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.11.20 16:17:50 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.8/255.255.0.0 [sUCCEEDED]. 2016.11.20 16:17:50 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.8/255.255.0.0 on interface {5A56F43F-C323-4E15-ACAB-2724F9D83812} [DHCP-serv: 10.50.255.254, lease-time: 31536000]. 2016.11.20 16:17:50 - OpenVPN > Successful ARP Flush on interface [6] {5A56F43F-C323-4E15-ACAB-2724F9D83812}. 2016.11.20 16:17:55 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.11.20 16:17:55 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:17:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.20 16:17:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:17:55 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:17:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.20 16:17:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:17:55 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:17:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.20 16:17:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:17:55 - Starting Management Interface. 2016.11.20 16:17:55 - OpenVPN > Initialization Sequence Completed. 2016.11.20 16:17:55 - DNS leak protection with packet filtering enabled.. 2016.11.20 16:17:55 - DNS of a network adapter forced (Intel® I211 Gigabit Network Connection, from manual (75.114.81.1,75.114.81.2) to 10.50.0.1)I 2016.11.20 16:17:55 - Flushing DNS! 2016.11.20 16:17:55 - Connected.. 2016.11.20 16:17:55 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.11.20 16:17:55 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.20 16:18:14 - OpenVPN > Connection reset, restarting [0]. 2016.11.20 16:18:14 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting. 2016.11.20 16:18:14 - OpenVPN > Restart pause, 5 second(s)! 2016.11.20 16:18:15 - Disconnecting. 2016.11.20 16:18:15 - Management - Send 'signal SIGTERM'. 2016.11.20 16:18:15 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.20 16:18:15 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2016.11.20 16:18:15 - OpenVPN > MANAGEMENT: Client disconnected. 2016.11.20 16:18:15 - OpenVPN > Assertion failed at misc.c:785 (es). 2016.11.20 16:18:15 - OpenVPN > Exiting due to fatal error. 2016.11.20 16:18:15 - Connection terminated.. 2016.11.20 16:18:15 - DNS of a network adapter restored to original settings (Intel® I211 Gigabit Network Connection, to 75.114.81.1,75.114.81.2). 2016.11.20 16:18:15 - DNS leak protection with packet filtering disabled.I 2016.11.20 16:18:18 - Checking authorization .... 2016.11.20 16:18:39 - IPv6 restored with packet filtering.! 2016.11.20 16:18:39 - Session terminated.. 2016.11.20 16:18:43 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookie. 2016.11.20 16:18:43 - Tor Test: Successful test. Tor Version: 0.2.8.7 (git-263088633a63982a)I 2016.11.20 16:18:58 - Session starting.. 2016.11.20 16:18:58 - IPv6 disabled with packet filtering.I 2016.11.20 16:18:58 - Checking authorization .... 2016.11.20 16:18:59 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:18:59 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:02 - Checking authorization .... 2016.11.20 16:19:03 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:03 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:06 - Checking authorization .... 2016.11.20 16:19:06 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:06 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:09 - Checking authorization .... 2016.11.20 16:19:10 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:10 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:13 - Checking authorization .... 2016.11.20 16:19:13 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:13 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:16 - Checking authorization .... 2016.11.20 16:19:17 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:17 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:20 - Checking authorization .... 2016.11.20 16:19:20 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:20 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:23 - Checking authorization .... 2016.11.20 16:19:24 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:24 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:27 - Checking authorization .... 2016.11.20 16:19:27 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:27 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:30 - Checking authorization .... 2016.11.20 16:19:31 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:31 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:34 - Checking authorization .... 2016.11.20 16:19:34 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:34 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:37 - Checking authorization .... 2016.11.20 16:19:38 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:38 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:41 - Checking authorization .... 2016.11.20 16:19:41 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:41 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:44 - Checking authorization .... 2016.11.20 16:19:45 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:45 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:48 - Checking authorization .... 2016.11.20 16:19:48 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:48 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:51 - Checking authorization .... 2016.11.20 16:19:52 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:52 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:55 - Checking authorization .... 2016.11.20 16:19:55 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:55 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:58 - Checking authorization .... 2016.11.20 16:19:59 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:59 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:20:02 - Checking authorization .... 2016.11.20 16:20:02 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:20:02 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:20:03 - Cancel requested.. 2016.11.20 16:20:03 - IPv6 restored with packet filtering.! 2016.11.20 16:20:03 - Session terminated.. 2016.11.20 16:20:28 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookie. 2016.11.20 16:20:28 - Tor Test: Successful test. Tor Version: 0.2.8.7 (git-263088633a63982a)I 2016.11.20 16:20:40 - Session starting.. 2016.11.20 16:20:40 - IPv6 disabled with packet filtering.I 2016.11.20 16:20:40 - Checking authorization ...! 2016.11.20 16:20:40 - Connecting to Hamal (Switzerland, Zurich). 2016.11.20 16:20:40 - SSL > 2016.11.20 16:20:40 LOG5[ui]: stunnel 5.37 on x86-pc-mingw32-gnu platform. 2016.11.20 16:20:40 - SSL > 2016.11.20 16:20:40 LOG5[ui]: Compiled/running with OpenSSL 1.0.2j 26 Sep 2016. 2016.11.20 16:20:40 - SSL > 2016.11.20 16:20:40 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2016.11.20 16:20:40 - SSL > 2016.11.20 16:20:40 LOG5[ui]: Reading configuration from file C:\Users\M3CHWARRI0R935\AppData\Local\AirVPN\feeb3a551e3656516314ff5af4689220b56f5540714f87b565aef88dc503e290.tmp.ssl. 2016.11.20 16:20:40 - SSL > 2016.11.20 16:20:40 LOG5[ui]: UTF-8 byte order mark not detected. 2016.11.20 16:20:40 - SSL > 2016.11.20 16:20:40 LOG6[ui]: Initializing service [openvpn]. 2016.11.20 16:20:40 - SSL > 2016.11.20 16:20:40 LOG5[ui]: Configuration successful. 2016.11.20 16:20:40 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016. 2016.11.20 16:20:40 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2016.11.20 16:20:40 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2016.11.20 16:20:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.11.20 16:20:41 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.20 16:20:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:20:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:20:41 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2016.11.20 16:20:41 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:10223 [nonblock]. 2016.11.20 16:20:41 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:10223. 2016.11.20 16:20:41 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2016.11.20 16:20:41 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:10223. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:58110. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG6[0]: s_connect: connecting 185.156.175.44:443. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG5[0]: s_connect: connected 185.156.175.44:443. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG5[0]: Service [openvpn] connected remote server from 192.168.0.2:58111. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG6[0]: SNI: sending servername: 185.156.175.44. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG6[0]: Peer certificate required. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG6[0]: CERT: Locally installed certificate matched. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG6[0]: Client certificate not requested. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG6[0]: SSL connected: new session negotiated. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption). 2016.11.20 16:20:41 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:10223, sid=68003b72 94079eda. 2016.11.20 16:20:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.20 16:20:41 - OpenVPN > Validating certificate key usage. 2016.11.20 16:20:41 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.20 16:20:41 - OpenVPN > VERIFY KU OK. 2016.11.20 16:20:41 - OpenVPN > Validating certificate extended key usage. 2016.11.20 16:20:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.20 16:20:41 - OpenVPN > VERIFY EKU OK. 2016.11.20 16:20:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.20 16:20:42 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.20 16:20:42 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:20:42 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.20 16:20:42 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:20:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.20 16:20:42 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:10223. 2016.11.20 16:20:44 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.20 16:20:45 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.8 255.255.0.0'. 2016.11.20 16:20:45 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.20 16:20:45 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.20 16:20:45 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.20 16:20:45 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.20 16:20:45 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.20 16:20:45 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.20 16:20:45 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=17 HWADDR=d0:17:c2:86:0d:25. 2016.11.20 16:20:45 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.20 16:20:45 - OpenVPN > open_tun, tt->ipv6=0. 2016.11.20 16:20:45 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5A56F43F-C323-4E15-ACAB-2724F9D83812}.tap. 2016.11.20 16:20:45 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.11.20 16:20:45 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.8/255.255.0.0 [sUCCEEDED]. 2016.11.20 16:20:45 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.8/255.255.0.0 on interface {5A56F43F-C323-4E15-ACAB-2724F9D83812} [DHCP-serv: 10.50.255.254, lease-time: 31536000]. 2016.11.20 16:20:45 - OpenVPN > Successful ARP Flush on interface [6] {5A56F43F-C323-4E15-ACAB-2724F9D83812}. 2016.11.20 16:20:50 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up. 2016.11.20 16:20:50 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:20:50 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=17]. 2016.11.20 16:20:50 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.11.20 16:20:50 - OpenVPN > Route addition fallback to route.exe. 2016.11.20 16:20:50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2016.11.20 16:20:50 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:20:50 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=6]. 2016.11.20 16:20:50 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.11.20 16:20:50 - OpenVPN > Route addition fallback to route.exe. 2016.11.20 16:20:50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2016.11.20 16:20:50 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:20:50 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=6]. 2016.11.20 16:20:50 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.11.20 16:20:50 - OpenVPN > Route addition fallback to route.exe. 2016.11.20 16:20:50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2016.11.20 16:20:50 - OpenVPN > C:\Windows\system32\route.exe ADD 185.156.175.44 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:20:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.20 16:20:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:20:50 - Starting Management Interface. 2016.11.20 16:20:50 - OpenVPN > Initialization Sequence Completed. 2016.11.20 16:20:50 - DNS leak protection with packet filtering enabled.. 2016.11.20 16:20:50 - DNS of a network adapter forced (Intel® I211 Gigabit Network Connection, from manual (75.114.81.1,75.114.81.2) to 10.50.0.1)I 2016.11.20 16:20:51 - Flushing DNSI 2016.11.20 16:20:51 - Checking routeI 2016.11.20 16:20:52 - Checking DNS! 2016.11.20 16:20:53 - Connected.. 2016.11.20 16:20:53 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.11.20 16:20:53 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.11.20 16:21:02 - Disconnecting. 2016.11.20 16:21:02 - Management - Send 'signal SIGTERM'. 2016.11.20 16:21:02 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.20 16:21:02 - SSL > 2016.11.20 16:21:02 LOG3[0]: readsocket: Connection reset by peer (WSAECONNRESET) (10054). 2016.11.20 16:21:02 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.156.175.44 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:21:02 - SSL > 2016.11.20 16:21:02 LOG5[0]: Connection reset: 14246 byte(s) sent to SSL, 31054 byte(s) sent to socket. 2016.11.20 16:21:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:21:02 - OpenVPN > C:\Windows\system32\route.exe DELETE 127.0.0.1 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:21:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:21:02 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:21:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:21:02 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:21:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:21:02 - OpenVPN > Closing TUN/TAP interface. 2016.11.20 16:21:02 - OpenVPN > SIGTERM[hard,] received, process exiting. 2016.11.20 16:21:02 - Connection terminated.. 2016.11.20 16:21:02 - DNS of a network adapter restored to original settings (Intel® I211 Gigabit Network Connection, to 75.114.81.1,75.114.81.2). 2016.11.20 16:21:02 - DNS leak protection with packet filtering disabled.. 2016.11.20 16:21:02 - IPv6 restored with packet filtering.! 2016.11.20 16:21:03 - Session terminated.! 2016.11.20 16:21:05 - Activation of Network Lock - Windows Filtering PlatformI 2016.11.20 16:21:06 - Session starting.. 2016.11.20 16:21:07 - IPv6 disabled with packet filtering.I 2016.11.20 16:21:07 - Checking authorization ...! 2016.11.20 16:21:07 - Connecting to Hamal (Switzerland, Zurich). 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG5[ui]: stunnel 5.37 on x86-pc-mingw32-gnu platform. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG5[ui]: Compiled/running with OpenSSL 1.0.2j 26 Sep 2016. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG5[ui]: Reading configuration from file C:\Users\M3CHWARRI0R935\AppData\Local\AirVPN\22d74ef001e6d4cdf488445fd0769db55489cc4aa318894a4790d18cf7b03661.tmp.ssl. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG5[ui]: UTF-8 byte order mark not detected. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG6[ui]: Initializing service [openvpn]. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG5[ui]: Configuration successful. 2016.11.20 16:21:07 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016. 2016.11.20 16:21:07 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2016.11.20 16:21:07 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2016.11.20 16:21:07 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.11.20 16:21:07 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.20 16:21:07 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:21:07 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:21:07 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:58156. 2016.11.20 16:21:07 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:58247 [nonblock]. 2016.11.20 16:21:07 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:58247. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG6[0]: s_connect: connecting 185.156.175.44:443. 2016.11.20 16:21:07 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2016.11.20 16:21:07 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:58247. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG5[0]: s_connect: connected 185.156.175.44:443. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG5[0]: Service [openvpn] connected remote server from 192.168.0.2:58157. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG6[0]: SNI: sending servername: 185.156.175.44. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG6[0]: Peer certificate required. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG6[0]: CERT: Locally installed certificate matched. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG6[0]: Client certificate not requested. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG6[0]: SSL connected: new session negotiated. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption). 2016.11.20 16:21:08 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:58247, sid=640a5d20 072a4038. 2016.11.20 16:21:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.20 16:21:08 - OpenVPN > Validating certificate key usage. 2016.11.20 16:21:08 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.20 16:21:08 - OpenVPN > VERIFY KU OK. 2016.11.20 16:21:08 - OpenVPN > Validating certificate extended key usage. 2016.11.20 16:21:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.20 16:21:08 - OpenVPN > VERIFY EKU OK. 2016.11.20 16:21:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.20 16:21:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.20 16:21:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:21:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.20 16:21:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:21:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.20 16:21:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:58247. 2016.11.20 16:21:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.20 16:21:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.8 255.255.0.0'. 2016.11.20 16:21:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.20 16:21:11 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.20 16:21:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.20 16:21:11 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.20 16:21:11 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.20 16:21:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.20 16:21:11 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=17 HWADDR=d0:17:c2:86:0d:25. 2016.11.20 16:21:11 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.20 16:21:11 - OpenVPN > open_tun, tt->ipv6=0. 2016.11.20 16:21:11 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5A56F43F-C323-4E15-ACAB-2724F9D83812}.tap. 2016.11.20 16:21:11 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.11.20 16:21:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.8/255.255.0.0 [sUCCEEDED]. 2016.11.20 16:21:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.8/255.255.0.0 on interface {5A56F43F-C323-4E15-ACAB-2724F9D83812} [DHCP-serv: 10.50.255.254, lease-time: 31536000]. 2016.11.20 16:21:11 - OpenVPN > Successful ARP Flush on interface [6] {5A56F43F-C323-4E15-ACAB-2724F9D83812}. 2016.11.20 16:21:16 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up. 2016.11.20 16:21:16 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:21:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.20 16:21:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:21:16 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:21:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.20 16:21:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:21:16 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:21:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.20 16:21:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:21:17 - OpenVPN > C:\Windows\system32\route.exe ADD 185.156.175.44 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:21:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.20 16:21:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:21:17 - Starting Management Interface. 2016.11.20 16:21:17 - OpenVPN > Initialization Sequence Completed. 2016.11.20 16:21:17 - DNS leak protection with packet filtering enabled.. 2016.11.20 16:21:17 - DNS of a network adapter forced (Intel® I211 Gigabit Network Connection, from manual (75.114.81.1,75.114.81.2) to 10.50.0.1)I 2016.11.20 16:21:17 - Flushing DNSI 2016.11.20 16:21:17 - Checking routeI 2016.11.20 16:21:18 - Checking DNS! 2016.11.20 16:21:18 - Connected.. 2016.11.20 16:21:18 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.11.20 16:21:18 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.20 16:22:07 - SSL > 2016.11.20 16:22:07 LOG6[cron]: Executing cron jobs. 2016.11.20 16:22:07 - SSL > 2016.11.20 16:22:07 LOG6[cron]: Cron jobs completed in 0 seconds! 2016.11.20 16:22:39 - Disconnecting. 2016.11.20 16:22:39 - Management - Send 'signal SIGTERM'. 2016.11.20 16:22:39 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.20 16:22:39 - SSL > 2016.11.20 16:22:39 LOG3[0]: readsocket: Connection reset by peer (WSAECONNRESET) (10054). 2016.11.20 16:22:39 - SSL > 2016.11.20 16:22:39 LOG5[0]: Connection reset: 118849 byte(s) sent to SSL, 691040 byte(s) sent to socket. 2016.11.20 16:22:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.156.175.44 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:22:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:22:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 127.0.0.1 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:22:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:22:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:22:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:22:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:22:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:22:39 - OpenVPN > Closing TUN/TAP interface. 2016.11.20 16:22:39 - OpenVPN > SIGTERM[hard,] received, process exiting. 2016.11.20 16:22:39 - Connection terminated.. 2016.11.20 16:22:40 - DNS of a network adapter restored to original settings (Intel® I211 Gigabit Network Connection, to 75.114.81.1,75.114.81.2). 2016.11.20 16:22:40 - DNS leak protection with packet filtering disabled.. 2016.11.20 16:22:40 - IPv6 restored with packet filtering.! 2016.11.20 16:22:40 - Session terminated.! 2016.11.20 16:22:41 - Deactivation of Network Lock. 2016.11.20 16:23:02 - Tor Test: Unable to communicate with Tor (Unable to find your Tor path.). Is Tor up and running?I 2016.11.20 16:23:29 - Session starting.. 2016.11.20 16:23:29 - IPv6 disabled with packet filtering.I 2016.11.20 16:23:29 - Checking authorization .... 2016.11.20 16:23:29 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:23:29 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:23:32 - Checking authorization .... 2016.11.20 16:23:33 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:23:33 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:23:36 - Checking authorization .... 2016.11.20 16:23:37 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:23:37 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:23:40 - Checking authorization .... 2016.11.20 16:23:40 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:23:40 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:23:42 - Cancel requested.. 2016.11.20 16:23:42 - IPv6 restored with packet filtering.! 2016.11.20 16:23:42 - Session terminated.
  6. I was connected to one of the VPN servers in sweden, and tried to check my bank account.... I got a malware warning (attached). ​Switched VPN server, and it went away. Not sure which server I was connected to, but it was in Sweden. Just a heads up!
  7. Just curious why Netherlands is the most used country aside from having the most servers. I always thought Sweden and Switzerland had better laws regarding privacy and filesharing. Could someone inform me of Netherlands benefits over other locations in Europe aside from having central peering? I mean, is there a non technical reason for it or is the peering the only thing that makes it preferable to other countries in Europe?
  8. I want to run the VPN on my host machine while using a virtual machine (VM) Oracle VM Virtualbox to run my every day browsers and sites. I have tried my best today for several hours but I have had an extremely hard time setting it up. Some sites do not work properly. I am assuming this is a networking issue somewhere (host computer, VM settings, or router, or the VPN?). What needs to be done to get all the systems to work together? Symptoms are getting "localhost" white crash pages, sites not loading properly on the VM. I have tried also installing airvpn on the VM, but it does not connect (connection reset by peer or "Cannot login (An exception occurred during a WebClient request). Help is greatly appreciated!
  9. I've recently purchased AirVPN and set up the client for usage with two windows devices, however I'm having issues with one of my Linux systems. In the first instance, when trying to install the client via the package installer, I received the message: Error: Dependency is not satisfiable: "libmono-system-runtime2.0-cil" ... Since I couldn't use the installer, I downloaded the mobile client instead. Everything seemed to be running smoothly, except when I ran a check on ipleak.net, I found that my UK details were displayed along with the foreign IP from the VPN. My accurate location was also shown on the Google Maps image at the bottom of the screen. This is not the case with either of my windows devices. In the windows instances, the only addresses and locations shown are those coming from the VPN. Also, the ipleaks check reads: "AirVPN Exit Node: No." With both my windows devices, this section reads: "AirVPN Exit Node: Yes." Forgive me if I sound foolish, but I really am confused as to what the issue could be. Any help would be greatly appreciated.
  10. Is AirVPN vulnerable to a MiTM attack by sysadmins looking to throttle their clients? According to http://security.stackexchange.com/questions/53444/vpns-vulnerable-to-mitm-because-any-certificate-goes OpenVPN does not validate that the cert is correct, thus making it possible for ISPs, sysadmins etc, to trick the client to use a fake cert so they may monitor the connections contents. Is AirVPN safe from this?
  11. I just wrote a review on TN (torrentfreak.com) about AirVPN after reading a good article by Ernesto. The article talked about important features to look for in a VPN followed by a list of the top VPN's for 2016 they reviewed and asked questions to. AirVPN didn't even make the list which was really surprising me. They did get reviewed nicely, once I found that article. After noticing AirvPN on the sidebar in the user review section, I noticed it had 5 stars reviewed by the user at the end of TN's take. However, it was only reviewed by one other user. I decided to add to my opinion with a detailed review I'm posting below. I'm also going to provide a link to the original article I read and a link to where we can all add our reviews. Let's help get AirVPN put on the list; if not possibly the top 10 at the very least. Here is the link to the original article: https://torrentfreak.com/vpn-anonymous-review-160220/ Here is the link to where we can add to the review: https://torrentfreak.com/review/airvpn-reviews/ Below is review. Let me know what you think.
  12. Hi, I got an issue. When i enable Intel VT-x in my bios, the next time i boot my pc, AirVPN can't resolve the route. It does set the ip address correct on the TAP v9 adapter. in the 10.x.x.x range and it does set the dns correct on that adapter. My TAP v9 adapter doesn't get a default gateway. Normal? On my physical adapter(virtualized Hyper-V adapter) it does set the DNS correct, but my ip address is still the same (192.168.0.x). Is this normal? AirVPN does a correct dns flush on the adapters. then it goes on checking the route. and fails. theres a screenshot attached. I also dissabled IPv6 on all adapters. Do u need more info? I'll be happy to give. Any help is much appreciated. Thanks
  13. I was thinking about setting up a self hosted VPN for fun to use on my Pi. I was thinking about using the Canada location... I know the France location is considered very safe. It seems they don't care about torrent sites/trackers, regular BitTorrent traffic, etc. but there doesn't seem to be much info on this in their Canada location. Any input is appreciated!
  14. Two different topics in the same post since I can only make a single post a day. Sorry. First, what is the proper way to set the.ovpn configuration file in order to enable VPN through Tor? I have attempted using 127.0.0.1 as the SOCKS proxy but that has not worked. Maybe it has something to do with the control port? Second, I have been able to get Eddie started on CentOS 7, but for some reason, Eddie does not connect to any server. I used all default settings once, and then disabled DNS check. Posting relevant log below: I 2016.09.30 12:22:37 - Session starting. I 2016.09.30 12:22:38 - Checking authorization ... ! 2016.09.30 12:22:38 - Connecting to Gemma (Canada, Vancouver) . 2016.09.30 12:22:38 - OpenVPN > OpenVPN 2.3.12 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Aug 23 2016 . 2016.09.30 12:22:38 - OpenVPN > library versions: OpenSSL 1.0.1e-fips 11 Feb 2013, LZO 2.06 . 2016.09.30 12:22:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.09.30 12:22:38 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.09.30 12:22:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 12:22:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 12:22:38 - OpenVPN > Socket Buffers: R=[212992->262144] S=[212992->262144] . 2016.09.30 12:22:38 - OpenVPN > UDPv4 link local: [undef] . 2016.09.30 12:22:38 - OpenVPN > UDPv4 link remote: [AF_INET]##.##.###.###:443 . 2016.09.30 12:23:10 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2016.09.30 12:23:10 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.09.30 12:23:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2016.09.30 12:23:15 - Disconnecting . 2016.09.30 12:23:15 - Connection terminated. I 2016.09.30 12:23:16 - Cancel requested. ! 2016.09.30 12:23:16 - Session terminated. If any advancements have been made in either issues, I would greatly appreciate any news - even if it's bad news.
  15. On Aug 30, exactly a week ago, the Body of European Regulators for Electronic Communication, BEREC, launched their Guidelines on the Implementation by National Regulators of European Net Neutrality Rules. The original document is quite long. Those who decide to read it will come to many conclusions, two of them are these: You as a provider are not allowed to apply advertisement blocking in your network (before the traffic reaches your customers). You as a provider are therefore allowed to implement traffic management based on the category of traffic - wrote this way it's perfectly possible to throttle VPNs or BitTorrent.
  16. ​Hi everyone ​ ​I have installed ESXI 6.0 on my home server and I am trying to access each host console, but when I open ssh tunnel to port 443, 902 and 903 with putty I still don't have control over the host's console. ​ is there any special rules that I have to add on my pfsense firewall to access the console on each host. ​ ​Thank you ​ ​ ​ ​EDIT: ​ ​with ubuntu terminal I get message : Privileged can only be forwarded by root ​I just add SUDO at the front so I can get root then message : Permission denied (publickey). ​Do I have to install ssh key pair for root and add public key to my access server? ​ ​EDIT: ​ ​I just generated a keys for root and logged in as root opened a ssh tunnel as root to ports 443,902 and 903 ​ ​ I can't login I've got this message "[object, Object] " ​Is anyone know how to fix that? ​
  17. Here is a vpn service that takes a very interesting approach to securing there users, please tell me what you think. https://www.deepdotweb.com/2016/07/26/introduction-i2vpn/
  18. Hello all, This is collection from different tutorials which I will refer here, but usually changed since some things changed. Setting up VPN on Synology is modified neolefort tutorial from here and reconnect script if from sundi which you can find here, which probably modified this script, plus my iptables for blocking Synology on router level when VPN fails. Other contributions: foobar666 - you no longer need to enter variables manually _sinnerman_ - fixed script for DS 6.1 I'm doing this mostly because I usually forget things I managed to solve after year or two, so this is way to have constant reminder how it was solved and also help others. 1. Get your certificates from AirVPN. Go to the https://airvpn.org/generator/ page to generate the configuration file. (1) SELECT the Advanced Mode (near top right of the page) (2) SELECT LINUX OS (3) Under "Protocols" section select one with protocol UDP and port 443 (at the time of writing, it was first in list). You can choose any combination of protocol/port, but then also change iptables accordingly if you are using failsafe script. (4) Under "Advanced - OpenVPN only" section (right part of page), select "Separate keys/certs from .ovpn file" and change OpenVPN version to "<2.4" (you don't need to do this if you are using DSM7 or newer) (5) SELECT 1 SERVER (refer to section "by single servers") OR COUNTRY OR ANYTHING ELSE YOU WANT In original tutorial, neolefort said to choose 1 server, because in that case you will get IP instead of xxx.airvpn.org domain. Choosing 1 server is safe because it doesn't need working DNS when you want to connect to VPN. If you choose anything else, you need working DNS on your router when establishing VPN connection. (6) Click "GENERATE" at the bottom. (7) Click on the ZIP button in order to download the AIRVPN configuration files and unzip them anywhere on your computer The ZIP archive should contain the following files: -AirVPN_XXXXX_UDP-443.ovpn -ca.crt -user.crt -user.key -ta.key 2. Setup AirVPN on Synology. In new DSM 6 it's much more easier since Synology developers allowed everything in GUI now. - Login as admin or with user from Administrator group. - Open Control panel. - Go "Network" and click on tab "Network Interface" - Click on button "Create" - "Create VPN profile" - Choose "OpenVPN (via importing .ovpn file) - Click "Advanced options" so it shows all options - Profile name: anything you want, but please keep is short and if you can without spaces " ", for example "AirVPN". - User name: LEAVE EMPTY (for DSM 7+ just put anything here) - Password: LEAVE EMPTY (for DSM 7+ just put anything here) - Import .ovpn file: click button and import your AirVPN_XXXXX_UDP-443.ovpn - CA certificate: click button and import your ca.crt - Client certificate: click button and import your user.crt - Client key: click button and import your user.key - Certificate revocation: LEAVE EMPTY - TLS-auth key: click button and import your ta.key - Click "Next" - Select all options, EXCEPT "Enable compression on the VPN link" (well, you can select that also if you really want, but don't ) Now you have working OpenVPN link on your Synology DS6+. You just need to start it from "Control panel" - "Network" - "Network Interface". EXTRAS!!! 3. Setting up external access to your Synology. First what you will notice is, "I CAN'T ACCESS MY SYNOLOGY FROM OUTSIDE OF MY LAN!!!!!!! OMG OMG OMG!!!!" I will not explain port fowards on your router here, if you don't know how to make one, learn! (1) You can port forward trough AirVPN webpage and access your Syno via VPN exit IP. This sometimes works, most of times it doesn't since Syno has some ports you cannot change. Anyway, change your default HTTP / HTTPS port on Syno to your forwarded AirVPN port and you should be fine. But forget about Cloudstation and similliar things. (2) If you want to access Syno via you ISP IP (WAN), then problem is, your Syno is receiving your connection, but it's replying trough VPN. That's a security risk and those connections get droped. But there is solution! - Access "Control panel" - "Network" - "General" - Click "Advanced Settings" button - Mark "Enable multiple gateways" and click "OK" and then "Apply" You're done! It's working now (if you forwarded good ports on your router). 4. Prevent leaks when VPN connection on Synology fails. There will be time, when you VPN will fail, drop, disconnect, and your ISP IP will become visible to world. This is one of ways you can prevent it, on router level. For this you need Tomato, Merlin, DD-WRT or OpenWRT firmware on your router. I will tell you steps for Tomato router. If you are using different firmware, then you need to learn alone how to input this code into your router. Since Shibby version 129 for ARM routers, syntax of iptables changed and depending on which version of iptables you are using, apply that code. - Login to your router (usually just by entering 192.168.1.1 into your browser, if your IP is different, find out which is your gateway IP). - Click on "Administration" - Click on "Scripts" - Choose tab "Firewall" For Shibby v129 for ARM and later (iptables 1.4.x) us this: #Use this order of commands because it executes in reverse order. #This command will execute last, it kills all UDP requests. iptables -I FORWARD -p udp -s 192.168.1.100 -j REJECT #This command will execute second and will block all TCP source ports except those needed for web access or services iptables -I FORWARD -p tcp -s 192.168.1.100 -m multiport ! --sports 5000,5001,6690 -j REJECT #This command will execute first and will ACCEPT connection to your VPN on destination port 443 UDP iptables -I FORWARD -p udp -s 192.168.1.100 -m multiport --dports 443 -j ACCEPT For earlier Shibby versions and later for MIPS routers: #Use this order of commands because it executes in reverse order. #This command will execute last, it kills all UDP requests. iptables -I FORWARD -p udp -s 192.168.1.100 -j REJECT #This command will execute second and will block all TCP source ports except those needed for web access or services iptables -I FORWARD -p tcp -s 192.168.1.100 -m multiport --sports ! 5000,5001,6690 -j REJECT #This command will execute first and will ACCEPT connection to your VPN on destination port 443 UDP iptables -I FORWARD -p udp -s 192.168.1.100 -m multiport --dports 443 -j ACCEPT Port TCP 5000 = HTTP for for Synology web access (change to your if it's not default) Port TCP 5001 = HTTPS for for Synology web access (change to your it's not default) Port TCP 6690 = Cloud Station port Port UDP 443 = AirVPN connection port which you defined in step 1 of this tutorial. If you are using TCP port, then you need to change "-p udp" to "-p tcp" in that line. If you need more ports, just add them separated by comma ",". If you want port range, for example 123,124,125,126,127, you can add it like this 123:127. Change IP 192.168.1.100 to your Synology LAN IP. Be careful NOT TO assign those ports to your Download Station on Synology. This isn't perfect, you can still leak your IP through UDP 443, but since torrent uses mostly TCP, those chances are minimal. If you use TCP port for VPN, then those chances increase. If you really want to be sure nothing leaks even on UDP 443 (or your custom port), you need to choose 1 (ONE) AirVPN server. You need to find that server entry IP and change last IPTABLES rule to something like this: iptables -I FORWARD -p udp -s 192.168.1.100 -d 123.456.789.123 -m multiport --dports 443 -j ACCEPT Where 123.456.789.123 is AirVPN server entry IP. This will allow UDP 443 only for that server, rest will be rejected by router. These are all my opinions, from my very limited knowledge, which may be right and may be wrong. 5. Auto reconnection when VPN is down. Since when you made your VPN connection on your Synology, you checked "Reconnect" option, Syno will try to reconnect automaticly when connection fails. But in some cases, your network will be offline long enough and Syno will stop trying to reconnect, or will hang with VPN connection established, but not working. In those cases you can use this auto reconnect script. This is reconnect script. Just select all script text and copy it. #VPN Check script modified Sep 11, 2016 #Script checks if VPN is up, and if it is, it checks if it's working or not. It provides details like VPN is up since, data #received/sent, VPN IP & WAN IP. #If VPN is not up it will report it in the log file and start it #Change LogFile path to your own location. #Save this script to file of your choosing (for example "synovpn_reconnect"). Store it in one of your Synology shared folders and chmod it: "chmod +x /volume1/shared_folder_name/your_path/synovpn_reconnect" #Edit "/etc/crontab" and add this line without quotes for starting script every 10 minutes: "*/10 * * * * root /volume1/shared_folder_name/your_path/synovpn_reconnect" #After that restart cron with: "/usr/syno/sbin/synoservicectl --restart crond" #!/bin/sh DATE=$(date +"%F") TIME=$(date +"%T") VPNID=$(grep "\[.*\]" /usr/syno/etc/synovpnclient/openvpn/ovpnclient.conf | cut -f 2 -d "[" | cut -f 1 -d "]") VPNNAME=$(grep conf_name /usr/syno/etc/synovpnclient/openvpn/ovpnclient.conf | cut -f 2 -d "=") LogFile="/volume1/filmovi/Backup/airvpn/check_airvpn_$DATE.log" PUBIP=$(curl -s -m 5 icanhazip.com) #PUBIP=$(curl -s -m 5 ipinfo.io/ip) #PUBIP=$(curl -s -m 5 ifconfig.me) CHECKIP=$(echo $PUBIP | grep -c ".") start_vpn() { echo "VPN is down. Attempting to (re)start now." >> $LogFile # /usr/syno/bin/synovpnc kill_client --protocol=openvpn --name=$VPNNAME /usr/syno/bin/synovpnc kill_client /bin/kill `cat /var/run/ovpn_client.pid` 2>/dev/null sleep 35 echo 1 > /usr/syno/etc/synovpnclient/vpnc_connecting echo conf_id=$VPNID > /usr/syno/etc/synovpnclient/vpnc_connecting echo conf_name=$VPNNAME >> /usr/syno/etc/synovpnclient/vpnc_connecting echo proto=openvpn >> /usr/syno/etc/synovpnclient/vpnc_connecting /usr/syno/bin/synovpnc reconnect --protocol=openvpn --name=$VPNNAME >> $LogFile } sleep 6 echo "======================================" >> $LogFile echo "$DATE $TIME" >> $LogFile if ifconfig tun0 | grep -q "00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00" then if [ "$CHECKIP" == 1 ] then IPADDR=$(/sbin/ifconfig tun0 | grep 'inet addr' | cut -d: -f2 | awk '{print $1}') RXDATA=$(/sbin/ifconfig tun0 | grep "bytes:" | cut -d: -f2 | awk '{print $1,$2,$3}') TXDATA=$(/sbin/ifconfig tun0 | grep "bytes:" | cut -d: -f3 | awk '{print $1,$2,$3}') UPTIME=$(cat /var/log/messages | grep "$IPADDR" | awk '{print $1}' | tail -1) UPTIME=$(date -d"$UPTIME" +"%Y/%m/%d %H:%M:%S") echo "VPN is up since: $UPTIME" >> $LogFile echo "Session Data RX: $RXDATA" >> $LogFile echo "Session Data TX: $TXDATA" >> $LogFile echo "VPN IP is: $IPADDR" >> $LogFile echo "WAN IP is: $PUBIP" >> $LogFile else start_vpn fi else start_vpn fi exit 0 (1) Login to you Synology DSM web interface as admin. - As admin go to "Control panel" - "Task Scheduler" (you need to enable advanced mode in top right corner of control panel for this) - Click "Create" button near top of page, then select "Scheduled Task" and then "User-defined script" (2) New popup window will open. - under "Task:" enter task name - under "User:" select "root" if it's not already selected - switch to "Schedule" tab and select how often you want this task to run, my settings are: - "Run of following days" - "Daily" - "First run time" - 00:00 - "Frequency" - "Every 10 minutes" - "Last run time" - 23:50 - switch to "Task settings" tab - paste script you copied into empty box under "User-defined script" title - press OK and you're done I tested this on DSM 6.2.2 and it works without problems for now. Still, I'm keeping old instructions in next post, if someone wants to do it like that. Tip: If you don't want logfile, you can comment out those lines, or remove ">> $LogFile" code from whole script. That's all. If you entered everything correctly, you should be fine and ready to go! Comments are welcome. If you find mistakes, please correct me.
  19. Came across this article today. I think AirVPN runs Tor nodes, right? https://www.whonix.org/blog/combining-tor-vpn-proxy-can-make-less-anonymous "Tor avoids using more than one relay belonging to the same operator in the circuits it is building." ...but Tor isn't aware that my first connection to the internet is over VPN. So if Air is my first hop, and Air is also operating an exit that I connect to; they've become the first and last hop. This could expose Air users to correlation attacks. "It is possible to host Tor relays [any… bridges, entry, middle or exit] behind VPNs or tunnel-links. For example, there are VPN providers that support VPN port forwarding. This is an interesting way to contribute to Tor while not exposing oneself to too much legal risk. Therefore, there can be situations, where a VPN or other tunnel-link and a Tor relays could be hosted by the same operator, in the same network or even on the same IP."
  20. Hello, I'm connected to the VPN after not synchronize MS OneNote or wiring Account.
  21. Hello ! ​Some have asked me how they can help out. How To Help AirVPN Succeed​ So here's some ways I propose how: ​Help new people. It's very easy to feel intimidated, due to the high level of technical knowledge displayed. Especially by the l33t Staff account. ​But don't just help them. Make them feel welcome. A very complex solution to this, is to say "Welcome" when they post their first posts. How about posting your review of AirVPN; a nice good solid long review, telling others how AirVPN is so good you want to visit Italy, etc. etc. ​Post your "logs" in spoiler tags, when you need help with something. See my signature for how to do so. Some logs are super long, so it helps. Ask & discuss the features of other VPNs & help make us all smarter. Where did you come from? Where are you going? What is love? etc. ​Make a guide/how-to about something you care about. Heck, even if it's just a nice index of useful programs/software, for instance. Post comments on review sites & tell them why they're wrong! Lol no, just use facts instead;) . Be charming & factual, like Zorro! Video reviews are especially great, as the ones which are highest on the youtube lists I'm seeing, are like your kindergarten pics! ANCIENT! ​Go to your Client Area and use your "Referral" code to invite more friends to the service & profit from it yourself too. Can't let Air get lonely! ​Go to threads like this & see if you can contribute with a new language or spread the word about it. Got any Arabic-speaking friends hmm? ​Answer questions that you're able to answer, in all of the sub-forums. With time, you become more knowledgeable . ​Find projects that you think Air should support.This way, your Air sub helps many more projects! Make sure they are in-line with Airs "mission". Help AirVPN test out new versions of their software. ​Be creative and find positive ways to add to the service; I'll be the first to admit Air doesn't give many tips lol. So don't feel bad. ​​ ​​ How To Make Your Forum Posts More Appealing(Mini Styleguide) Why is presentation important? Because this is a technical forum. So we read a lot. It's easier to get help, solve a problem & share knowledge when things are presented well.​ All codes on this forum, usually at least, follow the same formula: there's a "start" tag and an "end" tag. End tags are showed by a slash: /. ​Remember to close things off correctly, or it can ruin your entire post, if you forget either a [ or a ] character. ​Note: When you want to make an index, you currently have to "Reserve" a spot, by posting blank posts to your own guide, so that you can link to these posts after you finish editing them. This way, you can eventually create an index. Very useful if your guide or post is very long.​ ​ Some useful codes: ​Links can be long, ugly, annoying & broken by linebreaks. So make it easy for everyone by making clickable words. Critical for a stylish guide & helpful posts. You can link directly to individual posts by clicking the # in the top right corner of the post you want to copy. Just click and then copy the link. [url=https://airvpn.org/]This can be clicked[/url] ​[url=https://airvpn.org/topic/18339-guide-to-getting-started-links-for-advanced-users/?p=43734]This links to my other guide[/url] ​Result: This can be clicked ​This links to my other guide ​ ​ ​ ​ ​ ​Style headings in your posts, for much-better-looking management of paragraphs. It doesn't go past h3. [h1=This Is The Biggest Heading][/h1] [h2=This Is The Second Biggest Heading][/h2] [h3=This Is The Third Biggest Heading][/h3] ​Result: ​ This Is The Biggest Heading This Is The Second Biggest Heading This Is The Third Biggest Heading​ ​ ​ ​These tags are the most flashy available on the forums and are naturally excellent at bringing attention to the most important things. ​[info]Did you know Eddie likes to read logs?[/info] ​[warning]Warning! If You mention Netflix One more time...[/warning] ​[error]Error! AirVPN can no longer handle "ICANN"s nonsense[/error] ​Result: ​ ​ Did you know Eddie likes to read logs?​ Warning! If You mention Netflix One more time...​ Error! AirVPN can no longer handle "ICANN"s nonsense​ ​​ ​ Spoiler Alert! This is the most holy of the holy tags in existence. The mighty spoiler tag! Used to not spoil your viewers mood both during guides & when you post a 3 page logfile. ​ ​[spoiler]This has been spoiled[/spoiler] Result: ​ ​ This has been spoiled. Omg spoilerception!​​ ​ ​ ​The rightbox is useful for adding information which perhaps isn't critical or which is perhaps especially interesting, info-box style. [rightbox]This box is right. You're not. [/rightbox] ​Result: ​ ​ This box is right. You're not. ​ ​ ​​ ​The hr, horizontal-rule, is a special tag which isn't closed. It's good for breaking things up, as I've been doing. It's also especially boring. [hr] Result: ​ ​ ​​ ​ ​Other Formatting & Posting Tips: ​Use lists like this one. Either bulleted or not. You click the button in the interface, under the "Font" and "Size" buttons. To the left of the smiley.​Right above the place you "Attach Files", you can click on "View Auto Saved Content", in case you need to reload something you lost.​In the top right corner, you can check a box that lets you Follow your own topic. But you can also make a poll.​Under the smiley in the interface, you can click the <> sign. Then in the biggest box, you can write code, so that others can see it while its inactive, like in this guide.​On the same line as the Smiley, in the inteface, there's a button next to "Font" on the left, called "Special BBcode", that you can refer to, for more codes.​If a piece of text is a part of a link, you can unlink it and make it normal text again, by clicking the "unlink" button, to the left of the <> code button, in the interface.​ ​ ​ I'll give a medal or something to the first person who can make the Staff account "lol" publicly. Quantum computing is possible, so this must be too! ​Do you have any other ideas? If so, please feel free to post them :]. ​ ​Questions are always welcome. Don't be afraid of asking! *^__^* ​ ​Thank you!
  22. VIRTUAL MACHINES AND VPN This is a quick short guide to anyone wanting to use VPN over a virtual machine, and also how to use TOR and VPN in a virtual machine. REQUIREMENTS 1. Virtualization software such as: Oracle VM Virtualbox (Free) https://www.virtualbox.org/ VM Ware Workstation (Proffesional Software) http://www.vmware.com/uk/products/workstation.html Windows Virtual PC (Freeware but can only install systems for Windows XP and up) https://www.microsoft.com/en-us/download/details.aspx?id=3702 These are the three most popular options for virtualization software. I personally recommend using Virtualbox if you don't want to pay a lot of money for VM Ware, although it is packed with features and is probably the most advanced virtualization software on the market, hence why it is used by professionals and large companies. 2. An ISO image of the operating system you'd like to use. If you want general purpose virtualization, such as testing applications, I recommend Windows. If you want to use TOR, refer to the TOR section down below. 3. A decent computer. What you will be basically doing is running a computer inside your computer. Yeah I know, Inception, right? Anyway, you should have a decent computer for this, and I recommend minimum of 8gb of RAM. You should also have a decent CPU as it will also affect the performance of the virtual machine. 4. A VPN. If you are on this forum you should be using Air, but this should work with any properly configured VPN. CONFIGURATION I won't go through the set up and installation of a operating system in a virtual machine in this guide because there are plenty of resources out there that explain how to do this. Make sure you are connected to your VPN on your host machine (The computer you are running the virtual machine on). Once you have your virtual machine configured, be it Linux or Windows or any operating system, the essential thing you need to do is switch your virtual machines network adapter to use NAT. It is absolutely essential that you do this, otherwise your true IP address will be used by the virtual machine. Bridged modes simply use your network adapter hardware directly, which reveals your real IP. The NAT (Network Address Translation) mode uses your host operating system's IP address, and if your VPN is configured properly it will mean the virtual machine is using the exact same VPN connection your computer is using. USING TOR IN A VIRTUAL MACHINE If you want to use TOR in a virtual machine, you have two options. You can either use the TOR Browser like in a regular computer, running it on Windows or Linux, whatever your choice may be. I personally recommend using Tails, an operating system designed for anonymity and usage of TOR. TAILS Tails is a live operating system designed for anonymity and privacy, and is released under the GNU/GPL license. All of the source code of the applications that tails uses that are not taken directly from upstream Debian packages are available on their git repositories, they have a guide here: https://tails.boum.org/contribute/git/ The great thing about tails is that it is crammed with programs and features for anonymity, security and privacy. It has email clients, tools for public keys and GPG, disguising the operating system as Windows 8 if you want to use it in public places, instant messaging clients, and many, many more. So now that you know what Tails is, you probably can't wait to get it. The best part is that it is a live operating system, and you don't need to install it. Tails homepage: https://tails.boum.org/ They also made a great installation guide if you want to install Tails to a usb stick: https://tails.boum.org/install/ To use tails in a virtual machine, they have made a guide here: https://tails.boum.org/doc/advanced_topics/virtualization/virtualbox/ (The steps for virtualbox in Linux are pretty much the exact same as in Windows) MAKE SURE YOU USE NAT IN THE TAILS VIRTUAL MACHINE Hope you found this guide useful, and don't forget to send it to friends to help them use the internet privately, and securely
  23. Hello, I was wondering, is it possible to buy more simultaneous connections to a single account? I'd rather keep all VPN Payments under one account as i dont fancy buying 3 month subscriptions on multiple accounts lol
  24. Hello ! When a website is blocked or things aren't working so well somehow, that sucks. But posting a new topic will not automatically help. So before posting a new thread/topic, I recommend that you try these things first, to help yourself and everyone else out: Things To Try First Try check out the AirVPN Route Checking tool. Put the name of the website, such as www.netflix.com into the search field. Click search. Then refresh the page & look at the HTTP column.Try and change the server that you're using; especially to servers from other countries, rather than just servers from the same country you were first connected to, as sometimes the servers of 1 country are all having issues. Especially if the Route Checking tool shows a red color in the HTTP colum or codes like 403. The HTTP Codes mean different things.Try check out ipleak.net and make sure that the IP & DNS address fields only show 1 address each: those from AirVPN. Otherwise your ISP could be blocking you.For Windows, try going to your Control Panel>>Internet Connections>>Change Adapter Settings>>Right Click each adapter>>Properties>>Untick IPv6>>Click Ok. Similar steps for MacOS/Linux.Try use the AirVPN forum search field in the top right corner, to see if a similar thread exists already. It's better and easier if all the same posts are in the same thread.Try click the "Most Viewed" button, on the horizontal blue line, under the black "Start New Topic" button, in order to see the most viewed threads easily & quickly.Try and check that your ISP or country isn't listed here. Because these ISPs block various things.Try and check if the website is listed here. Sites listed here should be automatically unblocked, regardless of which server you use. (This is called "Micro-routing").Try and see if the content you want, is available via a torrent site, if you wish. You could then use qBittorent to download it using P2P technology, which AirVPN fully allows. (Not all VPNs do) Does AirVPN Care About Blocked Sites? Yes! AirVPN Staff routinely reply to all kinds of different threads on these forums. This includes replies to threads about Netflix. Moderators do too!However due to there being a lot of new threads, they don't always reply to each one. Especially if the thread already exists; such as the many threads about Netflix.This is why it's important to keep all posts about the same website, in the same threads, instead of just making a new thread, which won't get any attention.But the problem is, that AirVPN or even any other VPN provider, can't always do anything about blocks. That's the truth. Because sites like Netflix actively try to block VPNs.It's in AirVPNs Mission Statement to fight all kinds of blocks or attempts at censorship; so it's not because Air isn't trying to fix things. When You Post A Thread, Consider This If you absolutely have to post, then please include: a link to the blocked website, the AirVPN server you used, any error messages you got & any replies from support staff from the blocked site.You get bonus points if you also tell us that you already tried the route checking tool and other things listed in the first section. . Double the bonus if you post in an existing thread instead.Posting also doesn't guarantee that the problem will be fixed. But if you follow the suggestions here, then you will make fixing the problem both quicker and easier for Air & everyone else :]. If you have questions or suggestions, please do not be afraid of posting them here or sending me a PM. If you're new to VPNs, then please feel free to check out my New User guide. Please do provide feedback on this thread if it helped you or is missing something! Thank you for reading !
  25. What if the initial connection to the VPN server was established over a hidden service? Wouldn't this be a more elegant and secure solution to VPN over TOR?
×
×
  • Create New...