Jump to content
Not connected, Your IP: 18.210.24.208

Search the Community

Showing results for tags 'tor'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Frequently asked questions
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP
    • Mirrors

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 76 results

  1. It seems someone has been running a Tor exit node on Lich and Rasalas servers. Over the past 24 hours I have been banned from a number of websites where Tor is forbidden. Anybody else having issues?
  2. Hello,As we know no VPNs even the safest VPNs like AirVPN or ProtonVPN? are really safe, in fact there is always the problem that none of us users really know if they keeps logs.My solution would be to host running a VPN on a rented VPS server in order to personally manage it.To do so I do not want to limit at something pre-compiled, such as "digital ocean", infact my plan is to run it in Softether host inside a VPS.The scheme should be so: Within a Windows Server VPS placed in some data center run VMware emulating another operating system, within this guest run Softether host app.Then connect via VPN tunnel from Softether host app to my real domestic PC. I just wonder if the VPS server owner or the VPS internet operator itself could actually trace the source back to my real PC even though ill establish a VPN tunnelling from softether to my actual pc. PS: The idea of ​​running everything inside a VM instead of into just the VPS itself is to make the Softether logs inaccessible to a potential attacker protecting them in a shell, plus mask the imei and the operation system.I look forward to understand if they (NSA or potential attackers) would have some way to track back the encrypted VPN connection from Softether to my current PC
  3. This is how I use Tor browser and based of my inspection of real time tcpdump I feel certain that it is Tor over VPN. I.e. My ISP can only see an OpenVPN tunnel and the AirVPN exit server knows the Tor entry node: I run openvpn in a terminal widow using only TLS encrypted AirVPN servers and the ovpn files are modified to include update-resolv-conf (repeatedly successfully tested at https://ipleak.net). I have IPv6 disabled in GRUB. After the OpenVPN tunnel is establish I open Tor Browser. If I run tcpdump monitoring my Ethernet adapter the only IP addresses I see are my local LAN IP and that of the AirVPN server it is connected to. My conclusion: My ISP cannot see the Tor traffic. If run tcpdump monitoring tun0 I can see the Tor traffic between the onion sites and the AirVPN assign public address only. I never see my local LAN IP. I just wanted an objective opinion from someone else: Am I correct in concluding I am running "Tor over VPN"?
  4. hi. as indicated in the topic... i set up auth. via a hashed password in torrc. i'm dead sure i'm copying same hash over to eddie (with the 16:prefix). one output only: Unable to communicate with Tor (515 Authentication failed: Password did not match HashedControlPassword *or* authentication cookie.). Is Tor up and running? Tor is detecting that control connection, but not complaining about auth issues (in the output). [notice] New control connection opened from 127.0.0.1.
  5. Hi! I've been a long-time AirVPN user and I love the service and the fact that it's run by people who truly believe in their mission and not as a commercial venture. I've been wondering if it might be a good thing to do to use a VM with another OS/browser, through another AirVpn server for websites that have access to my personal data. I've set the VM up, but it's not as fast as my host system, perhaps because I'm using an intergrated GPU? I'm not sure if inserting a dedicated GPU could improve performance (I have a good one lying around), but it still would be more hassle anyway to browse the Internet this way. Do you guys think it's worth it? Otherwise, are there any good and convenient methods to obfuscate your identity and avoid fingerprinting? Could using Torbrowser, for example, be a better solution? (I'm already using https://airvpn.org/topic/15769-how-to-harden-firefox-extreme-edition/?hl=fingerprinting this Firefox setup and I'm getting quite a low fingerprinting rating, btw) Thanks!
  6. Hi, I know that you can't use network lock in conjunction with the Tor over VPN feature, but I don't want to have to choose between extra anonymity and the scare of a possible leak. Is there anyway to use the Tor over VPN feature, while also using a killswitch? I've looked around the forums here and on other sites, but I haven't found anything useful or that actually worked. So how do other people find a way to use Tor over VPN with a kill switch type fail safe? I use a mac computer along with the eddie application.
  7. Hello, I am still a VPN newbie so I thought I would ask these questions on this forum to get a better idea of how the service works. Allow me to ask three of them: 1. Purely theoretically, if a law enforcement agency such as the FBI was suspecting somebody was using one of your servers for illegal purposes (whatever they may be), and sent you an official letter to share information about the usage of the VPN server in question at any given point in time (for example, the VPN server was used to access a Gmail account at a particular time, and the FBI would reach out to you and ask you who used that VPN server exactly at that time), how would AirVPN respond? Do you have, as a service provider, a legal obligation to respond to such requests? As far as I know, you do not keep any logs, so would there be any information that you would even be able to give to the law enforcement agency? I would really appreciate elaboration from you on how this scenario would play out. Not that I want to do anything illegal, it is just a theoretical question. 2. I read somewhere on the internet that if a VPN provider says they do not keep logs, it is often a false statement, and even if they do not keep logs, usually the upstream ISP of the VPN provider (the ISP through which the VPN servers are connected to the Internet) do keep logs. I would like to ask you what you think of this theory and whether it may represent a potential risk of logging. In other words, even if you do not keep any logs at all yourself, can it be a potential security risk that the upstream ISP you use for your servers does keep logs, and, as a result, could potentially give this logging information to potential law enforcement agencies? 3. If I use AirVPN over Tor, meaning I connect from my computer to the Tor network first and from there to the VPN server, will the Tor exit node periodically change in order to make the route more anonymous? Because if the Tor exit node did not change and an attacker was controlling both the guard (entry) Tor node I would be connecting to, as well as the Tor exit node that would be connecting to the VPN server, although the attacker would not be able to see the actual traffic, he would see the amount of bytes flowing through from one end to the other, and if the attacker also got control of, for example, the websites I would be visiting via the AirVPN server, he could correlate the amount of bytes flowing from my real IP to the entry node, then through to the exit node and finally to the destination server of the websites I would be visiting, thereby deanonymizing me. So that is why I am asking if the exit node changes when the traffic is routed through the AirVPN over Tor channel. If it does, I think I can feel safer?
  8. Hi, I am getting several alert entries in my pfsense firewall. There are connections denied to 4 different TOR relays in the US, Switzerland, Germany and the Netherlands. I never had these entries before so I am a bit worried. Example: AirVPN_LAN Source: 192.168.1.xxx:476xx Destination:176.10.104.240:443 Any ideas?
  9. Hi, Totally new to doing VPN over TOR. I'm just seeing what its like to set up. I'm using an iMac 27" macOS 10.13.3 & Eddie 2.12.4. I have Tor Browser installed and running fine, its connected to TOR. I followed the instructions on this page: https://airvpn.org/tor/ - In Preferences for Eddie Proxy/Tor>Type>Tor I clicked the test and Eddie indicates there is connectivity to Tor. Am I actually running the VPN through TOR as it is? See images. The Test indicates there is connectivity. But how do I know the VPN traffic is running through TOR? ipleak.net doesn't indicate any tor exit node. Any help or suggestion will be appreciated. Cheers.
  10. According toTails support This is the exact situation since I updated OpenVPN to 2.13.6 Is the fixed Tor entry guard AirVPN sponsored?
  11. Hello, maybe I'm too paranoid but nonetheless. I want to establish connection to AirVPN servers over Tor, so I open Eddie, go to preferences -> Proxy/Tor -> Type Tor and click Test button. It says that everything works fine. My question: when I will try to login into my account, will authorization be transmitted through Tor -> AirVPN or authorization request will be transmited directly to AirVPN servers (i.e. my home ip -> AirVPN)?
  12. I upgraded to 2.13.6 and since then I noticed the Tor entry node remains constant regardless of what I try. Shouldn't the Tor circuit "This browser" to first Tor node change whenever I request a new Tor circuit? Does this mean Tor browser does not go through AirVPN first? How can I fix this?
  13. In the latest version of Tor Browser, traffic analysis resistance has been added, which makes Passive website fingerprinting attacks harder for an attacker. Tor Browser 7.0.6 is released Connections between clients and relays now send a padding cell in each direction every 1.5 to 9.5 seconds (tunable via consensus parameters). This padding will not resist specialized eavesdroppers, but it should be enough to make many ISPs' routine network flow logging less useful in traffic analysis against Tor users. Padding is negotiated using Tor's link protocol, so both relays and clients must upgrade for this to take effect. Clients may still send padding despite the relay's version by setting ConnectionPadding 1 in torrc, and may disable padding by setting ConnectionPadding 0 in torrc. Padding may be minimized for mobile users with the torrc option ReducedConnectionPadding. Implements Proposal 251 and Section 2 of Proposal 254; closes ticket 16861. Relays will publish 24 hour totals of padding and non-padding cell counts to their extra-info descriptors, unless PaddingStatistics 0 is set in torrc. These 24 hour totals are also rounded to multiples of 10000.​tor-0317-now-released
  14. Hi, id like to: vpn -> tor in a vm but, i cant connect to tor, its stucked at: Establishing a tor circuit or: connecting to tor maybe i should allow it in address allowed?
  15. dear community, I've read through https://airvpn.org/tor/ twice, studied some other materials and one thing is still not clear to me. I hope you can help me out here. I want to do my best to make my desired activity with as much privacy as possible. I don't care if my ISP sees Tor traffic, so I chose VPN over Tor. I've followed the guide here https://airvpn.org/tor/ and set my Tor and AirVPN windows client accordingly. I don't need use network lock, because I run a clean VM just for this. "Test" button in AIrVPN's settings says my Tor config is alright. So what I do: Start Tor, start airVPN, connect VPN. As described in the guide: What I would expect is, that when I use Tor browser to browse sites, my traffic goes through Tor AND through VPN. This doesn't happen, also when I browse with Tor, I don't see the traffic numbers in AirVPN client move. Alright. Question: how do I access the site then, when I want to be covered in a way, that there is: ME -> Tor -> VPN -> site, rather than ME -> Tor -> site and ignore the VPN? I can't just open another Tor browser (it won't allow me). What am I not getting here? When I open firefox/chrome of course I have VPN's public IP, whether the traffic goes through Tor I don't know, I guess it is, but I want to browse the sensitive site with Tor.
  16. Hi guys! I set up my Windows 7 PC by this instruction: https://airvpn.org/topic/3405-windows-comodo-prevent-leaks/. It's a nice HOW-TO guide and i'm very grateful for it, but is there any similar guide to add TOR before my VPN connection? I tried to find some info on this forum, but I couldn't. So, if anybody knows links to HOW-TO guides please give it to me. Thank you! P.S. - I know about Eddie, but i really want to set up it with OpenVPN.
  17. Using Windows 10 here. I'm trying to use VPN over Tor, but it's not working! My exit IP is the Tor one and i don't know what to do, since i already followed this: https://airvpn.org/tor/ I'm already with Tor marked in the connection mode, so i test and it says ok, and then i save it. I do this with the Tor Browser already open. I've also already read the "Tor Control Authentication" section of the link above and checked the Torrc file. And there is already the "ControlPort 9151" and the "CookieAuthentication1" writted. In the article above, it also says that i should run from a terminal some kind of code, but it looks like something for Linux distributions. What should I do?
  18. Hey, everyone: I've read some material on Tor on this website, but still not sure if I should be using Tor with AirVPN or not. Does it enhance my security and anonymity if I do? Is it just better to use AirVPN? Seems like just using a VPN is more straightforward and less complicated (which is always a plus for me, since I'm not very knowledgeable regarding networking technologies). What are your thoughts?
  19. music5

    tor

    hi all, could somebody/anybody tell me how the set up for channeling TOR thru AIRVPN. looked in forums and can't find s............ thanks in advance.
  20. There is a great app allows users to easily anonymously share files using Tor. Comments? https://onionshare.org And it is open source. https://github.com/micahflee/onionshare
  21. Protonmail launched a Tor Hidden Service, any comments or questions? https://protonmail.com/blog/tor-encrypted-email/ onion link https://protonirockerxow.onion Onion server Certificate should be verified before logging in. Sha256 D6:D5:26:07:F9:5F:41:D3:92:AD:EE:59:CE:29:AB:E0:B3:E8:2F:30:EA:1E:6B:8F:9D:12:09:42:F0:35:BB:65
  22. I am a total noob. I am connected to air vpn and the internet seems to be functioning fine. I did look through the "how to" threads and found them to be very helpful. But....since I am still a noob I need further assistance. -How do I use the service correctly? I'm using safari, normally. Do I need to do anything extra? If airvpn is functioning properly are all my internet activities through safari scrambled? Do I need to do the RNS thing? Should I only use safari? Do I need to do anything special when using Tor? I am aware that I cannot torrent through tor? -When I do the ipleak test my IP address does not come up. It confirms the server I selected. Is there anything else I should be looking for? I'm also slightly bewildered about the "Network Lock" function. Should I be using it? -I am primarily using a vpn to torrent. If I pass my ipleak test is there anything else I need to do to remain anonymous? Am I good to go at that point? I was planning on using Pirate Bay on safari. is that a good combination? I'm pretty sure I changed the port correctly. when looking at my speeds they spike and drop down to zero. Is this the standard for speed I should be expecting? I tried a test torrent and a 15 song album took about 5 minutes. I haven't done any torrenting in about 8 years so I'm unsure if that is normal. I would like to optimize my torrent speeds, though. Is there anything a noob like myself could do to optimize my speeds through qbittorrent? I apologize if this post is redundant or annoying. Thanks in advance to any and all for help/advice. Here are my logs..hope it is formatted correctly. [spoiler]I 2017.01.28 12:07:00 - AirVPN client version: 2.10.3 / x86, System: OSX, Name: 10.12.1 / x64 . 2017.01.28 12:07:00 - Reading options from /Users/austincarstens/.airvpn/AirVPN.xml. 2017.01.28 12:07:00 - Data Path: /Users/austincarstens/.airvpn. 2017.01.28 12:07:00 - App Path: /Applications/AirVPN.app/Contents/MacOS. 2017.01.28 12:07:00 - Executable Path: /Applications/AirVPN.app/Contents/MacOS/AirVPN. 2017.01.28 12:07:00 - Command line arguments (0):. 2017.01.28 12:07:00 - Updating systems & servers data .... 2017.01.28 12:07:00 - Operating System: Unix 16.1.0.0 - Darwin Austins-MacBook-Pro.local 16.1.0 Darwin Kernel Version 16.1.0: Wed Oct 19 20:31:56 PDT 2016; root:xnu-3789.21.4~4/RELEASE_X86_64 x86_64I 2017.01.28 12:07:00 - OpenVPN Driver - ExpectedI 2017.01.28 12:07:00 - OpenVPN - Version: OpenVPN 2.3.8 (/Applications/AirVPN.app/Contents/MacOS/openvpn)I 2017.01.28 12:07:00 - SSH - Version: OpenSSH_7.2p2, LibreSSL 2.4.1 (/usr/bin/ssh)I 2017.01.28 12:07:00 - SSL - Version: stunnel 5.17 (/Applications/AirVPN.app/Contents/MacOS/stunnel)I 2017.01.28 12:07:00 - Session starting.I 2017.01.28 12:07:00 - IPv6 disabled on network adapter (Wi-Fi)I 2017.01.28 12:07:00 - IPv6 disabled on network adapter (Bluetooth PAN)I 2017.01.28 12:07:00 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2017.01.28 12:07:34 - Checking authorization .... 2017.01.28 12:07:40 - Systems & servers data update completed! 2017.01.28 12:07:47 - Connecting to Alderamin (Austria, Vienna). 2017.01.28 12:07:47 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2017.01.28 12:07:47 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.01.28 12:07:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.01.28 12:07:47 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.01.28 12:07:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.28 12:07:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.28 12:07:47 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2017.01.28 12:07:47 - OpenVPN > UDPv4 link local: [undef]. 2017.01.28 12:07:47 - OpenVPN > UDPv4 link remote: [AF_INET]185.9.19.106:443. 2017.01.28 12:07:47 - OpenVPN > TLS: Initial packet from [AF_INET]185.9.19.106:443, sid=fc042afa fd763760. 2017.01.28 12:07:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.01.28 12:07:47 - OpenVPN > Validating certificate key usage. 2017.01.28 12:07:47 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.01.28 12:07:47 - OpenVPN > VERIFY KU OK. 2017.01.28 12:07:47 - OpenVPN > Validating certificate extended key usage. 2017.01.28 12:07:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.01.28 12:07:47 - OpenVPN > VERIFY EKU OK. 2017.01.28 12:07:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alderamin, emailAddress=info@airvpn.org. 2017.01.28 12:07:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.28 12:07:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.28 12:07:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.28 12:07:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.28 12:07:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.01.28 12:07:50 - OpenVPN > [Alderamin] Peer Connection Initiated with [AF_INET]185.9.19.106:443. 2017.01.28 12:07:52 - OpenVPN > SENT CONTROL [Alderamin]: 'PUSH_REQUEST' (status=1). 2017.01.28 12:07:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.13.73 255.255.0.0'. 2017.01.28 12:07:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.01.28 12:07:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.01.28 12:07:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.01.28 12:07:52 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.01.28 12:07:52 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.01.28 12:07:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.01.28 12:07:52 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2017.01.28 12:07:52 - OpenVPN > Opened utun device utun1. 2017.01.28 12:07:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.01.28 12:07:52 - OpenVPN > /sbin/ifconfig utun1 delete. 2017.01.28 12:07:52 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2017.01.28 12:07:52 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2017.01.28 12:07:52 - OpenVPN > /sbin/ifconfig utun1 10.4.13.73 10.4.13.73 netmask 255.255.0.0 mtu 1500 up. 2017.01.28 12:07:52 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.13.73 255.255.0.0. 2017.01.28 12:07:52 - OpenVPN > add net 10.4.0.0: gateway 10.4.13.73. 2017.01.28 12:07:52 - OpenVPN > /sbin/route add -net 185.9.19.106 192.168.0.1 255.255.255.255. 2017.01.28 12:07:52 - OpenVPN > add net 185.9.19.106: gateway 192.168.0.1. 2017.01.28 12:07:52 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.01.28 12:07:52 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2017.01.28 12:07:52 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.01.28 12:07:52 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2017.01.28 12:07:52 - Starting Management Interface. 2017.01.28 12:07:52 - OpenVPN > Initialization Sequence CompletedI 2017.01.28 12:07:52 - DNS of a network adapter forced (Wi-Fi)I 2017.01.28 12:07:53 - DNS of a network adapter forced (Bluetooth PAN)I 2017.01.28 12:07:53 - DNS of a network adapter forced (Thunderbolt Bridge)I 2017.01.28 12:07:53 - Flushing DNSI 2017.01.28 12:07:53 - Checking routeI 2017.01.28 12:07:55 - Checking DNS! 2017.01.28 12:07:56 - Connected.. 2017.01.28 12:07:56 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.01.28 12:07:56 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info [/spoiler]
  23. Hey guys, i'm brand new to Air vpn and vpn's in general, and I can't figure out how to run the vpn through tor. I am trying to figure out how to get the signal chain to look like this (Computer+vpn encription---->tor----->vpn----->internet. I have tried changing the settings in vpn under preferences to the tor connection option, it says connection successful, but then when I look up my ip through tor it shows the tor exit node ip meaning that anybody can see i'm using tor. Any tips would be great.
  24. Hello, I am not able to use AirVPN when using obfs4 bridges in Tor. I have found these threads on the topic, but none of them seem to give a conclusive solution: TOR (obfs) & AirVPN not workingTor with obfs4 - can't connect to airvpnI am running the latest 64-bit version of Eddie (2.11.10) and Tor 6.0.8 on Windows x64. I have been very careful to check that IP and ports in Tor network settings (Options --> Advanced --> Network --> Settings) match the ones in the "Proxy/Tor" section of Eddie preferences. Eddie log: I 2017.01.14 03:26:55 - Session starting. . 2017.01.14 03:26:55 - IPv6 disabled with packet filtering. I 2017.01.14 03:26:55 - Checking authorization ... . 2017.01.14 03:26:56 - Tor Control authentication method: Cookie, from C:\Users\<username>\Documents\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookie E 2017.01.14 03:26:56 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running? I 2017.01.14 03:26:59 - Cancel requested. . 2017.01.14 03:26:59 - IPv6 restored with packet filtering. . 2017.01.14 03:26:59 - Flushing DNS ! 2017.01.14 03:27:07 - Session terminated. Tor Log: ... 14/01/2017 03:26:56.000 [NOTICE] New control connection opened from 127.0.0.1. ​... As soon as I disable obfs4 bridges, AirVPN and Tor work flawlessly (Using AirVPN with Tor) I actually run out of options and any help would be appreciated. Thanks.
×
×
  • Create New...