Jump to content
Not connected, Your IP: 44.201.131.213

Search the Community

Showing results for tags 'tor'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 83 results

  1. Hi everyone, I have million of questions and also looking for step by step guide. im running mac os x. I run Tor Bundle 1st, then start airvpn client in tor mode (pref->protocol->tor) and when i check my ip in Tor browser and firefox (all stock settings) i have 2 different stories: in Tor browser i have Tor exit node ip in firefox i have my exit vpn ip 1) so what is really happening? 2) does firefox go tor then to vpn? 3) how to check tor "stage" if it even happens(or i have to socks proxy localhost??) 4) why does tor browser "bypasses vpn"? 5) how to set everything go smooth? 6) is it possible to work is tor browser? Additional 6) how to avoid "VPN fingerprint" and "double ping" warnings when checking anonymity (i've read that ssl or ssh protocols should be used....but then i'm not able to use Tor?(i'm not able to choose 2 protocols at the same time in GUI) or how to add socks 5 proxy to the chain as an exit node while still using Tor as a 1 stage) Looking for your replies if you have a link to a "noob" manual, I would greatly appreciate it!!! (I wonder why there are no standard airvpn manual on how to do it step-by-step)
  2. Yesterday I was running airvpn over tor with socks5 (vip72). I had no issues, iplocation.net had my location pinned as the location of my socks5 proxy. But today I am running the same setup but iplocation.net still has my location pinned as the location of the airvpn server. ( we'll say airvpn server is somewhere in WA, and socks5 is somewhere in Texas) The only change I have made since yesterday is that I switched my DNS servers to Comodo rather than my ISP. Would this be enough to change the differing results?
  3. Good evening, my question is this. We know that it's possible to connect to AirVPN through TOR; for example, by using the address and the port given by Vidalia TOR. This produce a situation like that: TOR (Vidalia) > AirVPN (some server) > Internet AirVPN don't know the original IP and encrypt the contents, so, neither government or service provider can trace or retrieve data, also outside of an SSL (https) connection. Anyway, AirVPN know the IP where you want to connect and this last know your ip from a server of AirVPN. My question is this: what if I open a Tor Bundle Browser after connecting to AirVPN through TOR management by VIDALIA? It's a scheme like this: Tor (Vidalia) > AirVPN (some server) > Tor Browser Bundle > Internet I just see that it's possible, at least, on Linux Debian. Apparently, the data go through AirVPN in the Tor Bundle and so, also through VIDALIA. Maybe this is a more secured way of working? At least because Internet don't know the IP of AirVPN proxy, you can access to .onion website and the data are still encrypted by the VPN. Or I fall wrong in some points? Nobody try something like this? Thank you
  4. I'm having problems connecting tor -> vpn I'm quite flummoxed as to why considering when I first set it up it worked perfectly fine. I have barely touched the settings in the vpn and and problems connecting through tor started occurring after I switched to automatic protocol (which also worked fine and still does) and then back to using the tor protocol. When I test the tor protocol it tells me the test is successful however when I attempt to connect it gets stuck on checking authorization while flashing to connecting the the vpn server every few seconds and then back to checking authorization. I have left it running like this for probably over 15 minutes it just keeps flashing back and forth without connecting. I'm pretty stumped on how to solve this considering the test for the protocol comes back successful.
  5. Hi. I use AIRVPN and TOR browser. Normally i start TOR browser, once connected i then start up AIRVPN and thats all good. I am trying to work out how i get TOR to go through AIRVPN?. Yes i have read the connecting to TOR page many many times, but i simply don't understand the process. I have used the search feature in this forum, but when i search for 'tor' or 'tor setup' i get no search results, even though i have found TOR related posts. Can someone please help? Emily
  6. So I know this maybe over the top and a wee bit silly but what if you chained 2 VPNs together through virtualization (VPN 1 on host machine and VPN 2 on a virtual machine) but instead of running 1 virtual machine you installed a virtual machine inside of a virtual machine and installed VPN 2 inside that virtual machine thats installed inside the virtual machine then create another virtual machine seperate from the others and install pfsense and configure it and route the traffic through VM 2 (virtual machine inside the virtual machine) to VM 1 then back through the host? And of cousre run TOR too............ VPNception?
  7. I can get my AirVPN client to connect through Tor through Tor's default settings, but when I set up to use a Tor Bridge inside of Tor, the AirVPN client gives me an error about not being able to connect to Tor due to being unable to find my first Tor Node. Any idea how I can fix this issue?
  8. Hi peeps Can anyone tell me the pros and cons of Tor, and or Tor + vpn? For p2p usage please.
  9. Hi. I have small problem, I want to run airvpn over Tor, without network lock everything work fine and the connection is established. After Disconnecting and activating network lock and then Reconnect again --> checking autherization Fail I have tried several times, I'm using Tor 0.2.6.10 , Portable Eddie for debian. the following are some logs collected from Tor, eddie and iptables Eddie log Tor Log "note the time" Iptables -L output Any Ideas ? Is there anyway to activate network lock after connection get established ? Thanks,
  10. So far I am using VPN to download/upload torrents to private tracker. As soon as the AirVPN loses connenction for whatever reason, I have enabled the mechanism that shuts down the network to my macbook. Furthermore, I have confirured Vuze to start only when tun0 interface is available. I see also, that there are some people using proxy servers and TOR network, would this be benefitial from anonimity side of things in my case or not? I would like some links or discussion based on the topic's title Thanks
  11. Hi, I have Tor running on my router which IP is like 192.168.x.y I have the following details available: socks portTrans portDNS portI tried to pass it in Eddie2.9 parameters to get vpn over Tor https://airvpn.org/tor/ (first description). It is not working. Do you know if it is supposed to work this way, when Tor is running on the router? Thanks
  12. I'm using the AirVPN Linux client. I've followed the how-to for running AirVPN through Tor, which is: - start the Tor browser bundle - open AirVPN preferences and in "protocols" tab select "Tor" (if I run "test" here I get the error "515 Authentication failed. Password did not match HashedControlPassword *or* authentication cookie") - attempt to connect. Connection fails, and the last two lines of the error log show: - TOR Control authentication method: Cookie, from /var/run/tor/control.authcookie - Unable to communicate with TOR (Unable to find IP address of TOR first node of an established circuit.). Is TOR up and running? Yes, Tor is up and running. Any other ideas? Seems to be a problem with the cookie authentication but I'm not sure how to fix it.
  13. Good day, First of all I am running Ubuntu 14.04 on my laptop. What I want to achiev is to connect to tor via Airvpn. (That's the safest setup way, am I right?). Problems that I occure: To connect to Tor, I need to setup proxy in Airvpn client. Ant then use data in Tor configuration and achieve connection. Airvpn client without proxy setting works flawless. After I turn on proxy (socks5), I cant connect to server, I get reconnect loop, log: I 2015.03.09 11:03:54 - AirVPN client version: 2.8.8, System: Linux, Name: Ubuntu 14.10 \n \l, Architecture: x86 . 2015.03.09 11:03:54 - Reading options from /home/vibe/.airvpn/AirVPN.xml . 2015.03.09 11:03:56 - Data Path: /home/vibe/.airvpn . 2015.03.09 11:03:56 - App Path: /usr/lib/AirVPN . 2015.03.09 11:03:56 - Executable Path: /usr/lib/AirVPN/AirVPN.exe . 2015.03.09 11:03:56 - Command line arguments (1): path="/home/vibe/.airvpn" . 2015.03.09 11:03:57 - Operating System: Unix 3.16.0.23 - Linux Q 3.16.0-23-generic #31-Ubuntu SMP Tue Oct 21 18:00:35 UTC 2014 i686 i686 i686 GNU/Linux . 2015.03.09 11:03:57 - Updating systems & servers data ... I 2015.03.09 11:03:57 - OpenVPN Driver - Found I 2015.03.09 11:03:57 - OpenVPN - Version: OpenVPN 2.3.2 (/usr/sbin/openvpn) I 2015.03.09 11:03:57 - SSH - Version: OpenSSH_6.6.1p1 Ubuntu-8, OpenSSL 1.0.1f 6 Jan 2014 (/usr/bin/ssh) I 2015.03.09 11:03:57 - SSL - Version: stunnel 5.02 (/usr/bin/stunnel4) I 2015.03.09 11:03:57 - IPV6: Available ! 2015.03.09 11:03:57 - Ready . 2015.03.09 11:03:57 - Updating systems & servers data ..., 1° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:03:57 - Updating systems & servers data ..., 2° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:03:57 - Updating systems & servers data ..., 3° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:03:57 - Updating systems & servers data ..., 4° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:03:57 - Updating systems & servers data ..., 5° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:03:58 - Updating systems & servers data ..., 6° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:03:58 - Updating systems & servers data ..., 7° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:03:58 - Updating systems & servers data ..., 8° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) W 2015.03.09 11:03:58 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (CUrl is not installed on this system, and it's required for SOCKS proxy.) I 2015.03.09 11:04:49 - Session starting. I 2015.03.09 11:04:49 - Installing tunnel driver F 2015.03.09 11:04:50 - Only TCP protocol is allowed with a proxy. . 2015.03.09 11:04:58 - Updating systems & servers data ... . 2015.03.09 11:04:58 - Updating systems & servers data ..., 1° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:04:58 - Updating systems & servers data ..., 2° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:04:58 - Updating systems & servers data ..., 3° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:04:58 - Updating systems & servers data ..., 4° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:04:58 - Updating systems & servers data ..., 5° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:04:58 - Updating systems & servers data ..., 6° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:04:58 - Updating systems & servers data ..., 7° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:04:58 - Updating systems & servers data ..., 8° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) W 2015.03.09 11:04:58 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (CUrl is not installed on this system, and it's required for SOCKS proxy.) I 2015.03.09 11:05:12 - Session starting. I 2015.03.09 11:05:12 - Installing tunnel driver I 2015.03.09 11:05:12 - Retrieving manifest W 2015.03.09 11:05:12 - Unable to retrieve systems & servers data. Continue anyway with the old data. . 2015.03.09 11:05:12 - Updating systems & servers data ... I 2015.03.09 11:05:12 - Checking authorization ... . 2015.03.09 11:05:12 - Updating systems & servers data ..., 1° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:12 - Updating systems & servers data ..., 2° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:12 - Checking authorization ..., 1° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:12 - Updating systems & servers data ..., 3° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:12 - Checking authorization ..., 2° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:12 - Updating systems & servers data ..., 4° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Checking authorization ..., 3° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Updating systems & servers data ..., 5° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Checking authorization ..., 4° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Updating systems & servers data ..., 6° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Checking authorization ..., 5° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Updating systems & servers data ..., 7° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Checking authorization ..., 6° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Updating systems & servers data ..., 8° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) W 2015.03.09 11:05:13 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (CUrl is not installed on this system, and it's required for SOCKS proxy.) . 2015.03.09 11:05:13 - Checking authorization ..., 7° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Checking authorization ..., 8° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) W 2015.03.09 11:05:13 - Authorization check failed, continue anyway ({1]) ! 2015.03.09 11:05:13 - Connecting to Grafias (Netherlands, Amsterdam) I 2015.03.09 11:05:13 - DNS of the system will be updated to VPN DNS (ResolvConf method) . 2015.03.09 11:05:13 - OpenVPN > OpenVPN 2.3.2 i686-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014 . 2015.03.09 11:05:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2015.03.09 11:05:13 - OpenVPN > NOTE: the current --script-security setting may allow this configuration to call user-defined scripts . 2015.03.09 11:05:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2015.03.09 11:05:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.03.09 11:05:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.03.09 11:05:13 - OpenVPN > Socket Buffers: R=[87380->131072] S=[16384->131072] . 2015.03.09 11:05:13 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 [nonblock] . 2015.03.09 11:05:13 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:9150 . 2015.03.09 11:05:13 - OpenVPN > socks_handshake: server asked for username/login auth but we were not provided any credentials . 2015.03.09 11:05:13 - OpenVPN > SIGTERM[soft,init_instance] received, process exiting ! 2015.03.09 11:05:13 - Disconnecting . 2015.03.09 11:05:13 - Connection terminated. I 2015.03.09 11:05:16 - Checking authorization ... . 2015.03.09 11:05:16 - Checking authorization ..., 1° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:16 - Checking authorization ..., 2° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:16 - Checking authorization ..., 3° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:16 - Checking authorization ..., 4° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:16 - Checking authorization ..., 5° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:16 - Checking authorization ..., 6° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:16 - Checking authorization ..., 7° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:16 - Checking authorization ..., 8° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) W 2015.03.09 11:05:16 - Authorization check failed, continue anyway ({1]) I 2015.03.09 11:05:16 - Cancel requested. ! 2015.03.09 11:05:16 - Session terminated. By the way how to access Tor line in Airvpn->Preferences->Protocols? Off problem topic question - would openvpn increase security or solve problem? (Sorry newbie) Have a nice day, amen1337 P.S.: Sorry for poor English
  14. On Ubuntu LTS, decided to dabble with Tor over AirVPN. Using Tor Browser Bundle 4.0.2. AirVPN connection tested with ipleak.net and dnsleaktest.com. IP address and Detected DNS Address match. No leak. Then launched TBB. Says I'm using Tor IP, but DNS address matches my ISP's, not AirVPN's. Is this due to a failure to configure AirVPN properly or Tor Browser Bundle? Thank you.
  15. The setup is: Air over TBB (Tor browser bundle) (Running TBB First, then airvpn over Tor) Is it possible to setup iptables in a way to drop any non vpn packets when connected Air over Tor? Or maybe drop any non tor & vpn packets?
  16. Ever heard of the NetFlow protocol? It's used to collect TCP/IP packet data and export them for later analysis. Developed by.. pause for effect.. Cisco! <3 And every Cisco router supports it. The reason why there's a vulnerabiliy which will never get closed? This is a conspiracy theory! Kill him! .. Er.. yeah. So, NetFlow. A few researchers at Columbia University recently published a paper in which they describe an attempt to use NetFlow against the TOR network. Well, not directly. Their goal is to evaluate "the effectiveness of using NetFlow data to perform practical traffic analysis attacks for identifying the source of anonymous communication", short and relevant version: "How effective is NetFlow when it comes to finding out the source of an anonymized connection with it?" Tested in-lab and in the network, "we had 100% success rate in determining the source of anonymous flows [in-lab]. When evaluating our attack with traffic going through the public Tor relay, we were able to detect the source in 81.4% cases. We observed about 12.2% false negatives and 6.4% false positives in our measurements." For everyone who wants to read the paper, here's the link. Let me know what you understand by source of an anonymous connection. Let's play a simplified taboo game: You must not use the term IP address because, well, that's not what is meant. If you want to know why, please proceed and read the answers.
  17. http://justsecurity.org/wp-content/uploads/2014/09/proposed-amendment-rule-41.pdf As I understand it, the FBI wants the authority of a world police and the (official) right to take down VPN users...
  18. The owner of one of the TOR directory servers himself confirmed he had seen the source code of XKeyscore and saw his server's IP hardcoded in there. The server is located in Nürnberg, Germany, and is called Gabelmoo. Id est: XKeyscore logged every attempt to access his server. Additionally, comments made in the source code show that everyone who is accessing the directory server is made an "extremist" - at least in the terminology of the NSA. In the source code the student hasn't seen any proof that TOR relay servers are exposed to the same risk. This task might be allotted to another application... Source#1 Source#2 excellent addition by sheivoko - the XKeyscore rules!
  19. "If you're using things like a single hop VPN to do things in a so-called "anonymous" way on the internet, you should probably stop." "When you are using certain VPNs, the NSA has special traffic flow analysis software, for example, that will mark you, put it into a database, and later when an analyst wants to compromise you, they can just pull it out of this database." Jacob Appelbaum in a talk that you can watch here: (watch from about 2:15 for these quotes) Unless there's a practical reason not to use Tor on top of your VPN connection, it's really best to use Tor (excellent though VPNs are for things that Tor cannot do).
  20. Hi, I've been using AirVPN over Tor for added security while browsing for a while without any issues. I recently updated my Tor browser to the latest version 3.6.2 and now AirVPN is not connecting. I haven't changed any settings so I'm not sure if the update requires a settings tweak? Or if it's something else. Here are the logs Sun Jun 15 15:34:16 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Apr 8 2014 Enter Management Password: Sun Jun 15 15:34:16 2014 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340 Sun Jun 15 15:34:16 2014 Need hold release from management interface, waiting... Sun Jun 15 15:34:17 2014 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340 Sun Jun 15 15:34:17 2014 MANAGEMENT: CMD 'state on' Sun Jun 15 15:34:17 2014 MANAGEMENT: CMD 'log all on' Sun Jun 15 15:34:17 2014 MANAGEMENT: CMD 'hold off' Sun Jun 15 15:34:17 2014 MANAGEMENT: CMD 'hold release' Sun Jun 15 15:34:17 2014 Control Channel Authentication: tls-auth using INLINE static key file Sun Jun 15 15:34:17 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Sun Jun 15 15:34:17 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Sun Jun 15 15:34:17 2014 Socket Buffers: R=[8192->8192] S=[8192->8192] Sun Jun 15 15:34:17 2014 Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 Sun Jun 15 15:34:17 2014 MANAGEMENT: >STATE:1402860857,TCP_CONNECT,,, Sun Jun 15 15:34:18 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:34:23 2014 MANAGEMENT: >STATE:1402860863,TCP_CONNECT,,, Sun Jun 15 15:34:24 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:34:29 2014 MANAGEMENT: >STATE:1402860869,TCP_CONNECT,,, Sun Jun 15 15:34:30 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:34:35 2014 MANAGEMENT: >STATE:1402860875,TCP_CONNECT,,, Sun Jun 15 15:34:36 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:34:41 2014 MANAGEMENT: >STATE:1402860881,TCP_CONNECT,,, Sun Jun 15 15:34:42 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:34:47 2014 MANAGEMENT: >STATE:1402860887,TCP_CONNECT,,, Sun Jun 15 15:34:48 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:34:53 2014 MANAGEMENT: >STATE:1402860893,TCP_CONNECT,,, Sun Jun 15 15:34:54 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:34:59 2014 MANAGEMENT: >STATE:1402860899,TCP_CONNECT,,, Sun Jun 15 15:35:00 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:35:05 2014 MANAGEMENT: >STATE:1402860905,TCP_CONNECT,,, Sun Jun 15 15:35:06 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:35:11 2014 MANAGEMENT: >STATE:1402860911,TCP_CONNECT,,, Sun Jun 15 15:35:12 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:35:17 2014 MANAGEMENT: >STATE:1402860917,TCP_CONNECT,,, Sun Jun 15 15:35:18 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:35:23 2014 MANAGEMENT: >STATE:1402860923,TCP_CONNECT,,, Sun Jun 15 15:35:24 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:35:29 2014 MANAGEMENT: >STATE:1402860929,TCP_CONNECT,,, Sun Jun 15 15:35:30 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:35:35 2014 MANAGEMENT: >STATE:1402860935,TCP_CONNECT,,, Sun Jun 15 15:35:36 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:35:41 2014 MANAGEMENT: >STATE:1402860941,TCP_CONNECT,,, Sun Jun 15 15:35:42 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:35:47 2014 MANAGEMENT: >STATE:1402860947,TCP_CONNECT,,, Sun Jun 15 15:35:48 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:35:53 2014 MANAGEMENT: >STATE:1402860953,TCP_CONNECT,,, Sun Jun 15 15:35:54 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:35:59 2014 MANAGEMENT: >STATE:1402860959,TCP_CONNECT,,, Sun Jun 15 15:36:00 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:36:05 2014 MANAGEMENT: >STATE:1402860965,TCP_CONNECT,,, Sun Jun 15 15:36:06 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:36:11 2014 MANAGEMENT: >STATE:1402860971,TCP_CONNECT,,, Sun Jun 15 15:36:12 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:36:15 2014 SIGTERM[hard,init_instance] received, process exiting Sun Jun 15 15:36:15 2014 MANAGEMENT: >STATE:1402860975,EXITING,init_instance,, Thanks for the help
  21. How do you configure the firewall (I'm wondering about both Comodo (Windows) and GUFW (Linux)) when using Air VPN over TOR? Or, are the firewall settings to prevent leaks the same as if I were just using Air VPN? Assuming I was fine with my ISP seeing that I'm using TOR, is there any reason to choose TOR over VPN instead of VPN over TOR? I read the TOR page on this site, but I just want to be sure there aren't cases in which I shouldn't choose VPN over TOR. I've heard some people talk about wanting to hide from their ISP the fact that they are using TOR. Why is this? Do some ISPs not tolerate their customers using TOR?
  22. Hi, I got a problem when connecting the AirVPN clinet through the Tor Browser Bundle 3.5.4 (Windows). First, I got the following error message: Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 TCP connection established with [AF_INET]127.0.0.1:9150 socks_handshake: server asked for username/login auth but we were not provided any credentials SIGTERM[soft,init_instance] received, process exiting Failed to start. So I have replaced the port setting in the torrc-defaults file to: SOCKSPort 127.0.0.1:9150 PreferSOCKSNoAuth Now the error message looks like this: Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 TCP connection established with [AF_INET]127.0.0.1:9150 recv_socks_reply: Socks proxy returned bad reply SIGTERM[soft,init_instance] received, process exiting Failed to start. What should I do now?
  23. Trying to use AirVPN with Tor Browser Bundle as outlined at https://airvpn.org/tor/ connecting always fails with error "socks_handshake server asked for username/login auth but we were not provided any credentials" when using the configuration generator I select configuration mode: Direct, protocol TCP, port 443. In the proxy block username/login was not asked for, greyed out. Can you help please? I opened an account at AirVPN specifically for purpose of using Tor to connect to your servers. Why is Tor asking for credentials?
  24. Hello, new user here. I'd like to get some opinions on using: A: Tor over AirVPN B: AirVPN over Tor Now, I've heard some rumors circulating that Tor has some anonyminity issues, so I'm kind of nervous to put my IP through Tor. However, I like the idea of using an SSH/SSL tunnel to connect to an AirVPN server, so any information sent through Tor will be encrypted. From a security standpoint (cookies/session management), option B has to be the way to go. On the otherhand, if Https is used, option A seems the best. Also, Tor uses the Https Everywhere extension, so that's an added bonus, but still it's not applicable 100% of the time. So I guess I'd just like to know what your preference is and why?
  25. Hello and thank you in advance for any help with this. I have never ran a Tor relay before, but I would like to try to enable a "middle-man" relay through my VPN connection if it is possible. I am trying to configure the Tor "middle-man" relay using my /etc/tor/torrc file and iptables.rules file. (I have not edited the TBB torrc) My torrc is configured like this below: AutomapHostsOnResolve 1 AutomapHostsSuffixes .exit,.onion SocksPort 9050 TransPort 9040 DNSPort 9053 ##Tor-middleman Nickname ************(my secert name) ORPort 9001 DirPort 9030 BandwidthRate 256 KB # Throttle traffic to 20KB/s BandwidthBurst 4096 KB # But allow bursts up to 50KB/s ExitPolicy reject *:* and my current iptables.rules that work with AirVPN and TBB/Tor/Privoxy are: $ iptables -L -n --line-numbers Chain INPUT (policy DROP) num target prot opt source destination 1 icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 recent: SET name: ping_limiter side: source mask: 255.255.255.255 2 DROP icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 recent: UPDATE seconds: 4 hit_count: 6 name: ping_limiter side: source mask: 255.255.255.255 3 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 4 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED 5 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 6 DROP all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID 7 UDP udp -- 0.0.0.0/0 0.0.0.0/0 ctstate NEW 8 TCP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 ctstate NEW 9 REJECT udp -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable 10 REJECT tcp -- 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset 11 REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-proto-unreachable Chain FORWARD (policy DROP) num target prot opt source destination Chain OUTPUT (policy ACCEPT) num target prot opt source destination Chain TCP (1 references) num target prot opt source destination Chain UDP (1 references) num target prot opt source destination ----------------------------------------------------------------------------- $ iptables -t nat -L -n --line-numbers Chain PREROUTING (policy ACCEPT) num target prot opt source destination Chain INPUT (policy ACCEPT) num target prot opt source destination Chain OUTPUT (policy ACCEPT) num target prot opt source destination Chain POSTROUTING (policy ACCEPT) num target prot opt source destination If there is an easy way to do this then please let me know what I should do with ports-forward, iptables.rules, and torrc. thanks. ------------------------------------------------------------------- EDITED: I decided to edit this cause I added too much confusing info. So to keep things simple, I don't know if I need ports forwarded or if I just need some new iptables rules to make things work. (or both) Currently my Tor Browser Bundle (TBB) works on port 9150 and 9151 over my VPN connection and so does my Tor/Privoxy connection using Socks4a for port 9050 and 8118. When running both tor instances I have 6 EntryGuards to start. When I configure the "middle-man" relay in my linux /etc/tor/torrc file I get about 20-80 more ESTABLISHED connection with the original 6 ESTABLISHED EntryGuards. But after a few minutes I only have the original 6 EntryGuards as ESTABLISHED connections when using the netstat command.
×
×
  • Create New...