Jump to content
Not connected, Your IP: 100.26.179.196

Search the Community

Showing results for tags 'tor'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Frequently asked questions
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP
    • Mirrors

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 76 results

  1. I am on the new Eddie beta and i cannot connect via Tor when it is using a obfs bridge. The error reads that it cannot identify the first node in the established circuit. Is this a bug or does AirVPN only work over non obfuscated tor? Log is bellow I 2016.11.20 16:16:06 - Eddie client version: 2.11.7 / windows_x64, System: Windows, Name: Microsoft Windows NT 10.0.14393.0. 2016.11.20 16:16:06 - Reading options from C:\Users\M3CHWARRI0R935\AppData\Local\AirVPN\AirVPN.xml. 2016.11.20 16:16:06 - Data Path: C:\Users\M3CHWARRI0R935\AppData\Local\AirVPN. 2016.11.20 16:16:06 - App Path: C:\Program Files\AirVPN. 2016.11.20 16:16:06 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe. 2016.11.20 16:16:06 - Command line arguments (1): path="home". 2016.11.20 16:16:06 - Operating System: Microsoft Windows NT 10.0.14393.0I 2016.11.20 16:16:06 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2I 2016.11.20 16:16:06 - OpenVPN - Version: 2.3.13 - OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09 (C:\Program Files\AirVPN\openvpn.exe)I 2016.11.20 16:16:06 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)I 2016.11.20 16:16:06 - SSL - Version: stunnel 5.37 (C:\Program Files\AirVPN\stunnel.exe)! 2016.11.20 16:16:06 - Activation of Network Lock - Windows Filtering Platform! 2016.11.20 16:16:07 - Ready. 2016.11.20 16:16:07 - Updating systems & servers data ...I 2016.11.20 16:16:17 - Session starting.. 2016.11.20 16:16:17 - IPv6 disabled with packet filtering.I 2016.11.20 16:16:17 - Checking authorization .... 2016.11.20 16:17:03 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (curl: (7) Failed to receive SOCKS4 connect request ack., with 'socks' proxy and 'none' auth)W 2016.11.20 16:17:03 - Authorization check failed, continue anyway ({1])I 2016.11.20 16:17:03 - Cancel requested.. 2016.11.20 16:17:03 - IPv6 restored with packet filtering.! 2016.11.20 16:17:03 - Session terminated.! 2016.11.20 16:17:07 - Deactivation of Network LockI 2016.11.20 16:17:42 - Session starting.. 2016.11.20 16:17:42 - IPv6 disabled with packet filtering.I 2016.11.20 16:17:42 - Checking authorization ...! 2016.11.20 16:17:43 - Connecting to Hamal (Switzerland, Zurich). 2016.11.20 16:17:43 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016. 2016.11.20 16:17:43 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2016.11.20 16:17:43 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2016.11.20 16:17:43 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.11.20 16:17:43 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.20 16:17:43 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:17:43 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:17:43 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2016.11.20 16:17:43 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 [nonblock]. 2016.11.20 16:17:43 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:9150. 2016.11.20 16:17:45 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2016.11.20 16:17:45 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:9150. 2016.11.20 16:17:45 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:9150, sid=a30f1ab4 4d335e9d. 2016.11.20 16:17:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.20 16:17:46 - OpenVPN > Validating certificate key usage. 2016.11.20 16:17:46 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.20 16:17:46 - OpenVPN > VERIFY KU OK. 2016.11.20 16:17:46 - OpenVPN > Validating certificate extended key usage. 2016.11.20 16:17:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.20 16:17:46 - OpenVPN > VERIFY EKU OK. 2016.11.20 16:17:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.20 16:17:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.20 16:17:47 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:17:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.20 16:17:47 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:17:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.20 16:17:47 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:9150. 2016.11.20 16:17:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.20 16:17:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.8 255.255.0.0'. 2016.11.20 16:17:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.20 16:17:50 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.20 16:17:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.20 16:17:50 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.20 16:17:50 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.20 16:17:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.20 16:17:50 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=17 HWADDR=d0:17:c2:86:0d:25. 2016.11.20 16:17:50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.20 16:17:50 - OpenVPN > open_tun, tt->ipv6=0. 2016.11.20 16:17:50 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5A56F43F-C323-4E15-ACAB-2724F9D83812}.tap. 2016.11.20 16:17:50 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.11.20 16:17:50 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.8/255.255.0.0 [sUCCEEDED]. 2016.11.20 16:17:50 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.8/255.255.0.0 on interface {5A56F43F-C323-4E15-ACAB-2724F9D83812} [DHCP-serv: 10.50.255.254, lease-time: 31536000]. 2016.11.20 16:17:50 - OpenVPN > Successful ARP Flush on interface [6] {5A56F43F-C323-4E15-ACAB-2724F9D83812}. 2016.11.20 16:17:55 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2016.11.20 16:17:55 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:17:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.20 16:17:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:17:55 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:17:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.20 16:17:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:17:55 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:17:55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.20 16:17:55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:17:55 - Starting Management Interface. 2016.11.20 16:17:55 - OpenVPN > Initialization Sequence Completed. 2016.11.20 16:17:55 - DNS leak protection with packet filtering enabled.. 2016.11.20 16:17:55 - DNS of a network adapter forced (Intel® I211 Gigabit Network Connection, from manual (75.114.81.1,75.114.81.2) to 10.50.0.1)I 2016.11.20 16:17:55 - Flushing DNS! 2016.11.20 16:17:55 - Connected.. 2016.11.20 16:17:55 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.11.20 16:17:55 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.20 16:18:14 - OpenVPN > Connection reset, restarting [0]. 2016.11.20 16:18:14 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting. 2016.11.20 16:18:14 - OpenVPN > Restart pause, 5 second(s)! 2016.11.20 16:18:15 - Disconnecting. 2016.11.20 16:18:15 - Management - Send 'signal SIGTERM'. 2016.11.20 16:18:15 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.20 16:18:15 - OpenVpn Management > SUCCESS: signal SIGTERM thrown. 2016.11.20 16:18:15 - OpenVPN > MANAGEMENT: Client disconnected. 2016.11.20 16:18:15 - OpenVPN > Assertion failed at misc.c:785 (es). 2016.11.20 16:18:15 - OpenVPN > Exiting due to fatal error. 2016.11.20 16:18:15 - Connection terminated.. 2016.11.20 16:18:15 - DNS of a network adapter restored to original settings (Intel® I211 Gigabit Network Connection, to 75.114.81.1,75.114.81.2). 2016.11.20 16:18:15 - DNS leak protection with packet filtering disabled.I 2016.11.20 16:18:18 - Checking authorization .... 2016.11.20 16:18:39 - IPv6 restored with packet filtering.! 2016.11.20 16:18:39 - Session terminated.. 2016.11.20 16:18:43 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookie. 2016.11.20 16:18:43 - Tor Test: Successful test. Tor Version: 0.2.8.7 (git-263088633a63982a)I 2016.11.20 16:18:58 - Session starting.. 2016.11.20 16:18:58 - IPv6 disabled with packet filtering.I 2016.11.20 16:18:58 - Checking authorization .... 2016.11.20 16:18:59 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:18:59 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:02 - Checking authorization .... 2016.11.20 16:19:03 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:03 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:06 - Checking authorization .... 2016.11.20 16:19:06 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:06 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:09 - Checking authorization .... 2016.11.20 16:19:10 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:10 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:13 - Checking authorization .... 2016.11.20 16:19:13 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:13 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:16 - Checking authorization .... 2016.11.20 16:19:17 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:17 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:20 - Checking authorization .... 2016.11.20 16:19:20 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:20 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:23 - Checking authorization .... 2016.11.20 16:19:24 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:24 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:27 - Checking authorization .... 2016.11.20 16:19:27 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:27 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:30 - Checking authorization .... 2016.11.20 16:19:31 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:31 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:34 - Checking authorization .... 2016.11.20 16:19:34 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:34 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:37 - Checking authorization .... 2016.11.20 16:19:38 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:38 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:41 - Checking authorization .... 2016.11.20 16:19:41 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:41 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:44 - Checking authorization .... 2016.11.20 16:19:45 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:45 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:48 - Checking authorization .... 2016.11.20 16:19:48 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:48 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:51 - Checking authorization .... 2016.11.20 16:19:52 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:52 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:55 - Checking authorization .... 2016.11.20 16:19:55 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:55 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:19:58 - Checking authorization .... 2016.11.20 16:19:59 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:19:59 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:20:02 - Checking authorization .... 2016.11.20 16:20:02 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:20:02 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:20:03 - Cancel requested.. 2016.11.20 16:20:03 - IPv6 restored with packet filtering.! 2016.11.20 16:20:03 - Session terminated.. 2016.11.20 16:20:28 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookie. 2016.11.20 16:20:28 - Tor Test: Successful test. Tor Version: 0.2.8.7 (git-263088633a63982a)I 2016.11.20 16:20:40 - Session starting.. 2016.11.20 16:20:40 - IPv6 disabled with packet filtering.I 2016.11.20 16:20:40 - Checking authorization ...! 2016.11.20 16:20:40 - Connecting to Hamal (Switzerland, Zurich). 2016.11.20 16:20:40 - SSL > 2016.11.20 16:20:40 LOG5[ui]: stunnel 5.37 on x86-pc-mingw32-gnu platform. 2016.11.20 16:20:40 - SSL > 2016.11.20 16:20:40 LOG5[ui]: Compiled/running with OpenSSL 1.0.2j 26 Sep 2016. 2016.11.20 16:20:40 - SSL > 2016.11.20 16:20:40 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2016.11.20 16:20:40 - SSL > 2016.11.20 16:20:40 LOG5[ui]: Reading configuration from file C:\Users\M3CHWARRI0R935\AppData\Local\AirVPN\feeb3a551e3656516314ff5af4689220b56f5540714f87b565aef88dc503e290.tmp.ssl. 2016.11.20 16:20:40 - SSL > 2016.11.20 16:20:40 LOG5[ui]: UTF-8 byte order mark not detected. 2016.11.20 16:20:40 - SSL > 2016.11.20 16:20:40 LOG6[ui]: Initializing service [openvpn]. 2016.11.20 16:20:40 - SSL > 2016.11.20 16:20:40 LOG5[ui]: Configuration successful. 2016.11.20 16:20:40 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016. 2016.11.20 16:20:40 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2016.11.20 16:20:40 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2016.11.20 16:20:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.11.20 16:20:41 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.20 16:20:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:20:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:20:41 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2016.11.20 16:20:41 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:10223 [nonblock]. 2016.11.20 16:20:41 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:10223. 2016.11.20 16:20:41 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2016.11.20 16:20:41 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:10223. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:58110. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG6[0]: s_connect: connecting 185.156.175.44:443. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG5[0]: s_connect: connected 185.156.175.44:443. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG5[0]: Service [openvpn] connected remote server from 192.168.0.2:58111. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG6[0]: SNI: sending servername: 185.156.175.44. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG6[0]: Peer certificate required. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG6[0]: CERT: Locally installed certificate matched. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG6[0]: Client certificate not requested. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG6[0]: SSL connected: new session negotiated. 2016.11.20 16:20:41 - SSL > 2016.11.20 16:20:41 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption). 2016.11.20 16:20:41 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:10223, sid=68003b72 94079eda. 2016.11.20 16:20:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.20 16:20:41 - OpenVPN > Validating certificate key usage. 2016.11.20 16:20:41 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.20 16:20:41 - OpenVPN > VERIFY KU OK. 2016.11.20 16:20:41 - OpenVPN > Validating certificate extended key usage. 2016.11.20 16:20:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.20 16:20:41 - OpenVPN > VERIFY EKU OK. 2016.11.20 16:20:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.20 16:20:42 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.20 16:20:42 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:20:42 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.20 16:20:42 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:20:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.20 16:20:42 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:10223. 2016.11.20 16:20:44 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.20 16:20:45 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.8 255.255.0.0'. 2016.11.20 16:20:45 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.20 16:20:45 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.20 16:20:45 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.20 16:20:45 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.20 16:20:45 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.20 16:20:45 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.20 16:20:45 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=17 HWADDR=d0:17:c2:86:0d:25. 2016.11.20 16:20:45 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.20 16:20:45 - OpenVPN > open_tun, tt->ipv6=0. 2016.11.20 16:20:45 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5A56F43F-C323-4E15-ACAB-2724F9D83812}.tap. 2016.11.20 16:20:45 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.11.20 16:20:45 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.8/255.255.0.0 [sUCCEEDED]. 2016.11.20 16:20:45 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.8/255.255.0.0 on interface {5A56F43F-C323-4E15-ACAB-2724F9D83812} [DHCP-serv: 10.50.255.254, lease-time: 31536000]. 2016.11.20 16:20:45 - OpenVPN > Successful ARP Flush on interface [6] {5A56F43F-C323-4E15-ACAB-2724F9D83812}. 2016.11.20 16:20:50 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up. 2016.11.20 16:20:50 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:20:50 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=17]. 2016.11.20 16:20:50 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.11.20 16:20:50 - OpenVPN > Route addition fallback to route.exe. 2016.11.20 16:20:50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2016.11.20 16:20:50 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:20:50 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=6]. 2016.11.20 16:20:50 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.11.20 16:20:50 - OpenVPN > Route addition fallback to route.exe. 2016.11.20 16:20:50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2016.11.20 16:20:50 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:20:50 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=6]. 2016.11.20 16:20:50 - OpenVPN > Route addition via IPAPI failed [adaptive]. 2016.11.20 16:20:50 - OpenVPN > Route addition fallback to route.exe. 2016.11.20 16:20:50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem. 2016.11.20 16:20:50 - OpenVPN > C:\Windows\system32\route.exe ADD 185.156.175.44 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:20:50 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.20 16:20:50 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:20:50 - Starting Management Interface. 2016.11.20 16:20:50 - OpenVPN > Initialization Sequence Completed. 2016.11.20 16:20:50 - DNS leak protection with packet filtering enabled.. 2016.11.20 16:20:50 - DNS of a network adapter forced (Intel® I211 Gigabit Network Connection, from manual (75.114.81.1,75.114.81.2) to 10.50.0.1)I 2016.11.20 16:20:51 - Flushing DNSI 2016.11.20 16:20:51 - Checking routeI 2016.11.20 16:20:52 - Checking DNS! 2016.11.20 16:20:53 - Connected.. 2016.11.20 16:20:53 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.11.20 16:20:53 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info! 2016.11.20 16:21:02 - Disconnecting. 2016.11.20 16:21:02 - Management - Send 'signal SIGTERM'. 2016.11.20 16:21:02 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.20 16:21:02 - SSL > 2016.11.20 16:21:02 LOG3[0]: readsocket: Connection reset by peer (WSAECONNRESET) (10054). 2016.11.20 16:21:02 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.156.175.44 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:21:02 - SSL > 2016.11.20 16:21:02 LOG5[0]: Connection reset: 14246 byte(s) sent to SSL, 31054 byte(s) sent to socket. 2016.11.20 16:21:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:21:02 - OpenVPN > C:\Windows\system32\route.exe DELETE 127.0.0.1 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:21:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:21:02 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:21:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:21:02 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:21:02 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:21:02 - OpenVPN > Closing TUN/TAP interface. 2016.11.20 16:21:02 - OpenVPN > SIGTERM[hard,] received, process exiting. 2016.11.20 16:21:02 - Connection terminated.. 2016.11.20 16:21:02 - DNS of a network adapter restored to original settings (Intel® I211 Gigabit Network Connection, to 75.114.81.1,75.114.81.2). 2016.11.20 16:21:02 - DNS leak protection with packet filtering disabled.. 2016.11.20 16:21:02 - IPv6 restored with packet filtering.! 2016.11.20 16:21:03 - Session terminated.! 2016.11.20 16:21:05 - Activation of Network Lock - Windows Filtering PlatformI 2016.11.20 16:21:06 - Session starting.. 2016.11.20 16:21:07 - IPv6 disabled with packet filtering.I 2016.11.20 16:21:07 - Checking authorization ...! 2016.11.20 16:21:07 - Connecting to Hamal (Switzerland, Zurich). 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG5[ui]: stunnel 5.37 on x86-pc-mingw32-gnu platform. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG5[ui]: Compiled/running with OpenSSL 1.0.2j 26 Sep 2016. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG5[ui]: Reading configuration from file C:\Users\M3CHWARRI0R935\AppData\Local\AirVPN\22d74ef001e6d4cdf488445fd0769db55489cc4aa318894a4790d18cf7b03661.tmp.ssl. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG5[ui]: UTF-8 byte order mark not detected. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG6[ui]: Initializing service [openvpn]. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG5[ui]: Configuration successful. 2016.11.20 16:21:07 - OpenVPN > OpenVPN 2.3.13 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Nov 10 2016. 2016.11.20 16:21:07 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2016.11.20 16:21:07 - OpenVPN > library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09. 2016.11.20 16:21:07 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.11.20 16:21:07 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.20 16:21:07 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:21:07 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:21:07 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:58156. 2016.11.20 16:21:07 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:58247 [nonblock]. 2016.11.20 16:21:07 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:58247. 2016.11.20 16:21:07 - SSL > 2016.11.20 16:21:07 LOG6[0]: s_connect: connecting 185.156.175.44:443. 2016.11.20 16:21:07 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2016.11.20 16:21:07 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:58247. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG5[0]: s_connect: connected 185.156.175.44:443. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG5[0]: Service [openvpn] connected remote server from 192.168.0.2:58157. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG6[0]: SNI: sending servername: 185.156.175.44. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG6[0]: Peer certificate required. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG6[0]: CERT: Locally installed certificate matched. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG6[0]: Client certificate not requested. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG6[0]: SSL connected: new session negotiated. 2016.11.20 16:21:08 - SSL > 2016.11.20 16:21:08 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption). 2016.11.20 16:21:08 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:58247, sid=640a5d20 072a4038. 2016.11.20 16:21:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.20 16:21:08 - OpenVPN > Validating certificate key usage. 2016.11.20 16:21:08 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.20 16:21:08 - OpenVPN > VERIFY KU OK. 2016.11.20 16:21:08 - OpenVPN > Validating certificate extended key usage. 2016.11.20 16:21:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.20 16:21:08 - OpenVPN > VERIFY EKU OK. 2016.11.20 16:21:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.20 16:21:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.20 16:21:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:21:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.20 16:21:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.20 16:21:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.20 16:21:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:58247. 2016.11.20 16:21:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.20 16:21:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.8 255.255.0.0'. 2016.11.20 16:21:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.20 16:21:11 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.20 16:21:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.20 16:21:11 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.20 16:21:11 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.20 16:21:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.20 16:21:11 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=17 HWADDR=d0:17:c2:86:0d:25. 2016.11.20 16:21:11 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.20 16:21:11 - OpenVPN > open_tun, tt->ipv6=0. 2016.11.20 16:21:11 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5A56F43F-C323-4E15-ACAB-2724F9D83812}.tap. 2016.11.20 16:21:11 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.11.20 16:21:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.8/255.255.0.0 [sUCCEEDED]. 2016.11.20 16:21:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.8/255.255.0.0 on interface {5A56F43F-C323-4E15-ACAB-2724F9D83812} [DHCP-serv: 10.50.255.254, lease-time: 31536000]. 2016.11.20 16:21:11 - OpenVPN > Successful ARP Flush on interface [6] {5A56F43F-C323-4E15-ACAB-2724F9D83812}. 2016.11.20 16:21:16 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up. 2016.11.20 16:21:16 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:21:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.20 16:21:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:21:16 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:21:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.20 16:21:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:21:16 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:21:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4. 2016.11.20 16:21:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:21:17 - OpenVPN > C:\Windows\system32\route.exe ADD 185.156.175.44 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:21:17 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2016.11.20 16:21:17 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.11.20 16:21:17 - Starting Management Interface. 2016.11.20 16:21:17 - OpenVPN > Initialization Sequence Completed. 2016.11.20 16:21:17 - DNS leak protection with packet filtering enabled.. 2016.11.20 16:21:17 - DNS of a network adapter forced (Intel® I211 Gigabit Network Connection, from manual (75.114.81.1,75.114.81.2) to 10.50.0.1)I 2016.11.20 16:21:17 - Flushing DNSI 2016.11.20 16:21:17 - Checking routeI 2016.11.20 16:21:18 - Checking DNS! 2016.11.20 16:21:18 - Connected.. 2016.11.20 16:21:18 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.11.20 16:21:18 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.20 16:22:07 - SSL > 2016.11.20 16:22:07 LOG6[cron]: Executing cron jobs. 2016.11.20 16:22:07 - SSL > 2016.11.20 16:22:07 LOG6[cron]: Cron jobs completed in 0 seconds! 2016.11.20 16:22:39 - Disconnecting. 2016.11.20 16:22:39 - Management - Send 'signal SIGTERM'. 2016.11.20 16:22:39 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.20 16:22:39 - SSL > 2016.11.20 16:22:39 LOG3[0]: readsocket: Connection reset by peer (WSAECONNRESET) (10054). 2016.11.20 16:22:39 - SSL > 2016.11.20 16:22:39 LOG5[0]: Connection reset: 118849 byte(s) sent to SSL, 691040 byte(s) sent to socket. 2016.11.20 16:22:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 185.156.175.44 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:22:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:22:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 127.0.0.1 MASK 255.255.255.255 192.168.0.1. 2016.11.20 16:22:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:22:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:22:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:22:39 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.11.20 16:22:39 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2016.11.20 16:22:39 - OpenVPN > Closing TUN/TAP interface. 2016.11.20 16:22:39 - OpenVPN > SIGTERM[hard,] received, process exiting. 2016.11.20 16:22:39 - Connection terminated.. 2016.11.20 16:22:40 - DNS of a network adapter restored to original settings (Intel® I211 Gigabit Network Connection, to 75.114.81.1,75.114.81.2). 2016.11.20 16:22:40 - DNS leak protection with packet filtering disabled.. 2016.11.20 16:22:40 - IPv6 restored with packet filtering.! 2016.11.20 16:22:40 - Session terminated.! 2016.11.20 16:22:41 - Deactivation of Network Lock. 2016.11.20 16:23:02 - Tor Test: Unable to communicate with Tor (Unable to find your Tor path.). Is Tor up and running?I 2016.11.20 16:23:29 - Session starting.. 2016.11.20 16:23:29 - IPv6 disabled with packet filtering.I 2016.11.20 16:23:29 - Checking authorization .... 2016.11.20 16:23:29 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:23:29 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:23:32 - Checking authorization .... 2016.11.20 16:23:33 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:23:33 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:23:36 - Checking authorization .... 2016.11.20 16:23:37 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:23:37 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:23:40 - Checking authorization .... 2016.11.20 16:23:40 - Tor Control authentication method: Cookie, from E:\Tor Browser\Browser\TorBrowser\Data\Tor\control_auth_cookieE 2016.11.20 16:23:40 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running?I 2016.11.20 16:23:42 - Cancel requested.. 2016.11.20 16:23:42 - IPv6 restored with packet filtering.! 2016.11.20 16:23:42 - Session terminated.
  2. I am a total noob. I am connected to air vpn and the internet seems to be functioning fine. I did look through the "how to" threads and found them to be very helpful. But....since I am still a noob I need further assistance. -How do I use the service correctly? I'm using safari, normally. Do I need to do anything extra? If airvpn is functioning properly are all my internet activities through safari scrambled? Do I need to do the RNS thing? Should I only use safari? Do I need to do anything special when using Tor? I am aware that I cannot torrent through tor? -When I do the ipleak test my IP address does not come up. It confirms the server I selected. Is there anything else I should be looking for? I'm also slightly bewildered about the "Network Lock" function. Should I be using it? -I am primarily using a vpn to torrent. If I pass my ipleak test is there anything else I need to do to remain anonymous? Am I good to go at that point? I was planning on using Pirate Bay on safari. is that a good combination? I'm pretty sure I changed the port correctly. when looking at my speeds they spike and drop down to zero. Is this the standard for speed I should be expecting? I tried a test torrent and a 15 song album took about 5 minutes. I haven't done any torrenting in about 8 years so I'm unsure if that is normal. I would like to optimize my torrent speeds, though. Is there anything a noob like myself could do to optimize my speeds through qbittorrent? I apologize if this post is redundant or annoying. Thanks in advance to any and all for help/advice. Here are my logs..hope it is formatted correctly. [spoiler]I 2017.01.28 12:07:00 - AirVPN client version: 2.10.3 / x86, System: OSX, Name: 10.12.1 / x64 . 2017.01.28 12:07:00 - Reading options from /Users/austincarstens/.airvpn/AirVPN.xml. 2017.01.28 12:07:00 - Data Path: /Users/austincarstens/.airvpn. 2017.01.28 12:07:00 - App Path: /Applications/AirVPN.app/Contents/MacOS. 2017.01.28 12:07:00 - Executable Path: /Applications/AirVPN.app/Contents/MacOS/AirVPN. 2017.01.28 12:07:00 - Command line arguments (0):. 2017.01.28 12:07:00 - Updating systems & servers data .... 2017.01.28 12:07:00 - Operating System: Unix 16.1.0.0 - Darwin Austins-MacBook-Pro.local 16.1.0 Darwin Kernel Version 16.1.0: Wed Oct 19 20:31:56 PDT 2016; root:xnu-3789.21.4~4/RELEASE_X86_64 x86_64I 2017.01.28 12:07:00 - OpenVPN Driver - ExpectedI 2017.01.28 12:07:00 - OpenVPN - Version: OpenVPN 2.3.8 (/Applications/AirVPN.app/Contents/MacOS/openvpn)I 2017.01.28 12:07:00 - SSH - Version: OpenSSH_7.2p2, LibreSSL 2.4.1 (/usr/bin/ssh)I 2017.01.28 12:07:00 - SSL - Version: stunnel 5.17 (/Applications/AirVPN.app/Contents/MacOS/stunnel)I 2017.01.28 12:07:00 - Session starting.I 2017.01.28 12:07:00 - IPv6 disabled on network adapter (Wi-Fi)I 2017.01.28 12:07:00 - IPv6 disabled on network adapter (Bluetooth PAN)I 2017.01.28 12:07:00 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2017.01.28 12:07:34 - Checking authorization .... 2017.01.28 12:07:40 - Systems & servers data update completed! 2017.01.28 12:07:47 - Connecting to Alderamin (Austria, Vienna). 2017.01.28 12:07:47 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2017.01.28 12:07:47 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2017.01.28 12:07:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2017.01.28 12:07:47 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2017.01.28 12:07:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.28 12:07:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.28 12:07:47 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2017.01.28 12:07:47 - OpenVPN > UDPv4 link local: [undef]. 2017.01.28 12:07:47 - OpenVPN > UDPv4 link remote: [AF_INET]185.9.19.106:443. 2017.01.28 12:07:47 - OpenVPN > TLS: Initial packet from [AF_INET]185.9.19.106:443, sid=fc042afa fd763760. 2017.01.28 12:07:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2017.01.28 12:07:47 - OpenVPN > Validating certificate key usage. 2017.01.28 12:07:47 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2017.01.28 12:07:47 - OpenVPN > VERIFY KU OK. 2017.01.28 12:07:47 - OpenVPN > Validating certificate extended key usage. 2017.01.28 12:07:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2017.01.28 12:07:47 - OpenVPN > VERIFY EKU OK. 2017.01.28 12:07:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alderamin, emailAddress=info@airvpn.org. 2017.01.28 12:07:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.28 12:07:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.28 12:07:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2017.01.28 12:07:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2017.01.28 12:07:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2017.01.28 12:07:50 - OpenVPN > [Alderamin] Peer Connection Initiated with [AF_INET]185.9.19.106:443. 2017.01.28 12:07:52 - OpenVPN > SENT CONTROL [Alderamin]: 'PUSH_REQUEST' (status=1). 2017.01.28 12:07:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.13.73 255.255.0.0'. 2017.01.28 12:07:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2017.01.28 12:07:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2017.01.28 12:07:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2017.01.28 12:07:52 - OpenVPN > OPTIONS IMPORT: route options modified. 2017.01.28 12:07:52 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2017.01.28 12:07:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2017.01.28 12:07:52 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2017.01.28 12:07:52 - OpenVPN > Opened utun device utun1. 2017.01.28 12:07:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2017.01.28 12:07:52 - OpenVPN > /sbin/ifconfig utun1 delete. 2017.01.28 12:07:52 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2017.01.28 12:07:52 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2017.01.28 12:07:52 - OpenVPN > /sbin/ifconfig utun1 10.4.13.73 10.4.13.73 netmask 255.255.0.0 mtu 1500 up. 2017.01.28 12:07:52 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.13.73 255.255.0.0. 2017.01.28 12:07:52 - OpenVPN > add net 10.4.0.0: gateway 10.4.13.73. 2017.01.28 12:07:52 - OpenVPN > /sbin/route add -net 185.9.19.106 192.168.0.1 255.255.255.255. 2017.01.28 12:07:52 - OpenVPN > add net 185.9.19.106: gateway 192.168.0.1. 2017.01.28 12:07:52 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2017.01.28 12:07:52 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2017.01.28 12:07:52 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2017.01.28 12:07:52 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2017.01.28 12:07:52 - Starting Management Interface. 2017.01.28 12:07:52 - OpenVPN > Initialization Sequence CompletedI 2017.01.28 12:07:52 - DNS of a network adapter forced (Wi-Fi)I 2017.01.28 12:07:53 - DNS of a network adapter forced (Bluetooth PAN)I 2017.01.28 12:07:53 - DNS of a network adapter forced (Thunderbolt Bridge)I 2017.01.28 12:07:53 - Flushing DNSI 2017.01.28 12:07:53 - Checking routeI 2017.01.28 12:07:55 - Checking DNS! 2017.01.28 12:07:56 - Connected.. 2017.01.28 12:07:56 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2017.01.28 12:07:56 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info [/spoiler]
  3. Hello, How do i setup AirVPN over Tor, if dont want to use Eddie, but only the ovpn files and Tor? Also, do you have some n00b-friendly help how to do that on Whonix (their article on that https://www.whonix.org/wiki/Tunnels/Connecting_to_Tor_before_a_VPN is frighteningly complicated) Thank you in advance
  4. Hello! I'm currently using Linux Mint 18 and would like to configure my system to use VPN over TOR (PC->TOR->VPN). How would I go about doing this? I'm using OpenVPN via terminal with UFW for a network lock. My UFW Config: [AIRVPN SRVR IP] 443/udp ALLOW OUT Anywhere Anywhere ALLOW OUT Anywhere on tun0 Anywhere (v6) ALLOW OUT Anywhere (v6) on tun0 Added to .ovpn configuration to prevent DNS leak: script-security 2 up /etc/openvpn/update-resolv-conf down /etc/openvpn/update-resolv-conf Thanks!
  5. Hi fellas, I have a problem here. I'm running a WIN machine, and I connect to Internet using a AVP over TOR, so, if I use TOR BROWSER its use a TOR NODE and myip it gonna show its a TOR. When I use firefox, trnasmission or another program, myip shows the one assigned by AVP. So, it's all fine at this point. I'm trying to use WHONIX on a VirtualBox VM, so that way, I can use TOR BROWSER on the VM and get thru the AVP over TOR to the internet, and get in the end in myip the AVP assigned ip. But, when I try myip on TOR BROWSER, inside the Virtualbox VM, its reflect the TOR NODE IP. Can you help me to figure out what to do to fix this? Thanks.
  6. Came across this article today. I think AirVPN runs Tor nodes, right? https://www.whonix.org/blog/combining-tor-vpn-proxy-can-make-less-anonymous "Tor avoids using more than one relay belonging to the same operator in the circuits it is building." ...but Tor isn't aware that my first connection to the internet is over VPN. So if Air is my first hop, and Air is also operating an exit that I connect to; they've become the first and last hop. This could expose Air users to correlation attacks. "It is possible to host Tor relays [any… bridges, entry, middle or exit] behind VPNs or tunnel-links. For example, there are VPN providers that support VPN port forwarding. This is an interesting way to contribute to Tor while not exposing oneself to too much legal risk. Therefore, there can be situations, where a VPN or other tunnel-link and a Tor relays could be hosted by the same operator, in the same network or even on the same IP."
  7. Two different topics in the same post since I can only make a single post a day. Sorry. First, what is the proper way to set the.ovpn configuration file in order to enable VPN through Tor? I have attempted using 127.0.0.1 as the SOCKS proxy but that has not worked. Maybe it has something to do with the control port? Second, I have been able to get Eddie started on CentOS 7, but for some reason, Eddie does not connect to any server. I used all default settings once, and then disabled DNS check. Posting relevant log below: I 2016.09.30 12:22:37 - Session starting. I 2016.09.30 12:22:38 - Checking authorization ... ! 2016.09.30 12:22:38 - Connecting to Gemma (Canada, Vancouver) . 2016.09.30 12:22:38 - OpenVPN > OpenVPN 2.3.12 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Aug 23 2016 . 2016.09.30 12:22:38 - OpenVPN > library versions: OpenSSL 1.0.1e-fips 11 Feb 2013, LZO 2.06 . 2016.09.30 12:22:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2016.09.30 12:22:38 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2016.09.30 12:22:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 12:22:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2016.09.30 12:22:38 - OpenVPN > Socket Buffers: R=[212992->262144] S=[212992->262144] . 2016.09.30 12:22:38 - OpenVPN > UDPv4 link local: [undef] . 2016.09.30 12:22:38 - OpenVPN > UDPv4 link remote: [AF_INET]##.##.###.###:443 . 2016.09.30 12:23:10 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2016.09.30 12:23:10 - OpenVPN > SIGTERM received, sending exit notification to peer . 2016.09.30 12:23:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2016.09.30 12:23:15 - Disconnecting . 2016.09.30 12:23:15 - Connection terminated. I 2016.09.30 12:23:16 - Cancel requested. ! 2016.09.30 12:23:16 - Session terminated. If any advancements have been made in either issues, I would greatly appreciate any news - even if it's bad news.
  8. The Stop Mass Hacking Act (S. 2952, H.R. 5321), which has bipartisan support, is composed of a single sentence: "To prevent the proposed amendments to rule 41 
of the Federal Rules of Criminal Procedure from taking effect." Wyden's bill attempts to stop the upcoming changes to Rule 41, set to take effect in less than 90 days. https://blog.torproject.org/blog/fbis-quiet-plan-begin-mass-hacking Here is a list of Senators' phone numbers (calling is much more effective than email for this purpose): http://www.senate.gov/general/contact_information/senators_cfm.cfm?OrderBy=state
  9. In the latest alpha of Tor the change log notes. "includes a new timing backend that we hope to use for better support for traffic padding" https://blog.torproject.org/blog/new-alpha-release-tor-0291-alpha Comments on this future patch.
  10. VIRTUAL MACHINES AND VPN This is a quick short guide to anyone wanting to use VPN over a virtual machine, and also how to use TOR and VPN in a virtual machine. REQUIREMENTS 1. Virtualization software such as: Oracle VM Virtualbox (Free) https://www.virtualbox.org/ VM Ware Workstation (Proffesional Software) http://www.vmware.com/uk/products/workstation.html Windows Virtual PC (Freeware but can only install systems for Windows XP and up) https://www.microsoft.com/en-us/download/details.aspx?id=3702 These are the three most popular options for virtualization software. I personally recommend using Virtualbox if you don't want to pay a lot of money for VM Ware, although it is packed with features and is probably the most advanced virtualization software on the market, hence why it is used by professionals and large companies. 2. An ISO image of the operating system you'd like to use. If you want general purpose virtualization, such as testing applications, I recommend Windows. If you want to use TOR, refer to the TOR section down below. 3. A decent computer. What you will be basically doing is running a computer inside your computer. Yeah I know, Inception, right? Anyway, you should have a decent computer for this, and I recommend minimum of 8gb of RAM. You should also have a decent CPU as it will also affect the performance of the virtual machine. 4. A VPN. If you are on this forum you should be using Air, but this should work with any properly configured VPN. CONFIGURATION I won't go through the set up and installation of a operating system in a virtual machine in this guide because there are plenty of resources out there that explain how to do this. Make sure you are connected to your VPN on your host machine (The computer you are running the virtual machine on). Once you have your virtual machine configured, be it Linux or Windows or any operating system, the essential thing you need to do is switch your virtual machines network adapter to use NAT. It is absolutely essential that you do this, otherwise your true IP address will be used by the virtual machine. Bridged modes simply use your network adapter hardware directly, which reveals your real IP. The NAT (Network Address Translation) mode uses your host operating system's IP address, and if your VPN is configured properly it will mean the virtual machine is using the exact same VPN connection your computer is using. USING TOR IN A VIRTUAL MACHINE If you want to use TOR in a virtual machine, you have two options. You can either use the TOR Browser like in a regular computer, running it on Windows or Linux, whatever your choice may be. I personally recommend using Tails, an operating system designed for anonymity and usage of TOR. TAILS Tails is a live operating system designed for anonymity and privacy, and is released under the GNU/GPL license. All of the source code of the applications that tails uses that are not taken directly from upstream Debian packages are available on their git repositories, they have a guide here: https://tails.boum.org/contribute/git/ The great thing about tails is that it is crammed with programs and features for anonymity, security and privacy. It has email clients, tools for public keys and GPG, disguising the operating system as Windows 8 if you want to use it in public places, instant messaging clients, and many, many more. So now that you know what Tails is, you probably can't wait to get it. The best part is that it is a live operating system, and you don't need to install it. Tails homepage: https://tails.boum.org/ They also made a great installation guide if you want to install Tails to a usb stick: https://tails.boum.org/install/ To use tails in a virtual machine, they have made a guide here: https://tails.boum.org/doc/advanced_topics/virtualization/virtualbox/ (The steps for virtualbox in Linux are pretty much the exact same as in Windows) MAKE SURE YOU USE NAT IN THE TAILS VIRTUAL MACHINE Hope you found this guide useful, and don't forget to send it to friends to help them use the internet privately, and securely
  11. Hi guys, ​ ​Just want to firstly say thank you for the services you provide. I just have a few questions that I would like some discussion on if possible. My setup for using Tor through Airvpn's client is a s follows, my OS is Ubuntu, Mate, Mint or Windows as the base OS which I use to connect the VPN. I then use VMware or virtual box, mostly virtual box due to it not being proprietary to launch a fully contained Tails instance from an .ISO file without persistence, which I then use to connect to Tor. In the Eddie client I have Network lock active at all times, I remove the default gateway and even block ping and the private network access. I have however noticed that if you use DHCP, the default route is reconfigured after a few minutes even though network lock has removed it. I switched to static addressing and this issue hasn’t come up since. I am not sure if you are aware of this. I use this setup because Tor and Eddie's network lock feature isn’t compatible as yet and I do not like the idea of using the VPN without it. I would just like to know any views on this setup and any suggestions on improving security even further. ​ ​I also stumbled on this new feature in Firefox network.dns.blockdotonion, a new preference setting introduced in Firefox 45.0. Any thoughts on this? Why would they want to block .onion dns queries or dns results?
  12. What if the initial connection to the VPN server was established over a hidden service? Wouldn't this be a more elegant and secure solution to VPN over TOR?
  13. Running OSX and using latest AirVPN client (eddie), and latest version of Tor Browser. When you configure the AirVPN client to connect via TOR first then the VPN (TOR ---> VPN) and the TOR browser is configured to "censorship" mode (i.e. use obfs proxy) the VPN client does not work: 2016.05.17 19:43:52 - Tor Control authentication method: Cookie, from /Applications/TorBrowser.app/TorBrowser/Data/Tor/control_auth_cookie W 2016.05.17 19:43:53 - Unable to communicate with Tor (Unable to find IP address of Tor first node of an established circuit.). Is Tor up and running? However, when you connect straight to TOR network without using censorship mode the VPN works fine. Can you please fix.
  14. Here I am with a technical problem with the setup "AIR VPN over TOR". This is working absolutely fine, I have installed TOR, opened TOR browser, then connected to AIR VPN client - right now my Entry IP is from TOR, and Exit IP is from AIR VPN server - this is exactly what I wanted and achieved, so no problem here. However, when the VPN connection gone down suddenly and it was trying to reconnect, my firefox browser showing IP from my local ISP, it means I am exposed already! I tried "Network lock", but it's not working with "VPN over TOR" setup. I then checked the guide page here https://airvpn.org/tor/ and found this "Warning: not compatible with Network Lock at the moment." Therefore, this setup currently is not full proof and giving a false sense of security. VPN disconnection is very common, and in that case, it will expose my true-identity any time without any notice. This only thing making all this setup absolutely vulnerable, yet you recommended this. In the guide you said, by this setup, my true IP won't be revealed even to you, but you forgot that if VPN gets disconnected, my true ip will be revealed to all other site/software which is consistently using data. Tell me what to do to make it full proof totally Waiting for your prompt reply, thanks.
  15. Hey guys, I've been searching this for a couple of hours now and I've also checked the forum quite thoroughly for the answer to my problem but it sems no one else has this problem. Just in case, apologies if the question's being repeated. So I've been using TorGuard in conjunction with TorBrowser for some time now but I want to be able to access restricted sites with my TorBrowser and after some research, I found that so far, 2 of the best VPNs that can work together with TorBrowser to still use Tor but use the VPN service as the exit node are AirVPN and BolehVPN. I chose AirVPN and it seemed simple to do on the page https://airvpn.org/tor/ Heres the problem. When I start up AirVPN first then the TorBrowser and navigate to ipleak.net, it shows the TorBrowser IP address as the end node and the Tor Exit Node is green and the AirVPN Exit Node is red. AirVPNs method seems so simple and straight-forward which is why it confuses me how this isnt working. For it to work, I should be seeing the Public Exit IP from AirVPN on ipleak.net as my IP address and the AirVPN Exit Node should be green. Thanks for any help.
  16. Hi everbody, I wanna use VPN over TOR but there is no Internet traffic after successfully VPN connection. Besides VPN connection disconnects almost after 1 minute because of TCP connection timeout. I've configured proxies from Advanced section of NetworkManager and I'm using SOCKS protocol as proxy type. I'm using Linux OS and NetworkManager to manage my network interfaces and VPN connections. My OpenVPN version is 2.3.0. I've already read this manuel but I couldn't find any solution. Is there any suggestion to overcome this problem? https://airvpn.org/tor/ Solution: - Use Eddie client, - Enable control port and cookie authentication in your torrc file as described at this URL https://airvpn.org/tor/ - Set Tor as connection mode in AirVPN -> Preferences, don't use TCP + Socks Proxy as me (my first mistake) - Be careful with the port numbers; because default port numbers in manuel and Eddie client are respectively 9150 and 9151 but in my torrc file they are 9050, 9051 and it's very easy to overlook for example my situation. (my second mistake) - You can export ovpn configuration file which is special for "VPN over TOR" from Eddie client, so you can use that file to connect VPN from command line using openvpn command. For me it's more easy than using Eddie client.
  17. Using AirVPN with Tor ALL the time... I am a new AirVPN client and at first I was confused while getting started had to watch a you tube tutorial. I had used Nord VPN and a couple others but ther were way to slow and sloppy. But after using AirVPN for a couple days I think I found the best VPN for my needs. woo-hoo This makes more sense to me. I do have one quick question and would love feedback... I use Tor almost everyday and now that I have AirVPN I was wondering what is the best way to use the both together. Do I download the tor bundle every time? Or is there a way to haveit preset? What do you fellow users do and what have you found works the fastest, the most consistent and how much anonymity do you think you have if buying?not selling items from DNM? Any feedback is much appreciated.
  18. Here's the simple problem that I don't know how to fix. I'm trying to use VPN over Tor (User -> Tor -> VPN -> Net). It works fine but I also don't want any traffic to leak so I need to use the network lock. If I activate the network lock, Tor can't connect to the Tor network. That means the AirVPN software can't connect to the VPN service because it needs to route through Tor first and that can't happen because the network lock prevents Tor from establishing a circuit. What to do? ​
  19. Hi everyone, I have million of questions and also looking for step by step guide. im running mac os x. I run Tor Bundle 1st, then start airvpn client in tor mode (pref->protocol->tor) and when i check my ip in Tor browser and firefox (all stock settings) i have 2 different stories: in Tor browser i have Tor exit node ip in firefox i have my exit vpn ip 1) so what is really happening? 2) does firefox go tor then to vpn? 3) how to check tor "stage" if it even happens(or i have to socks proxy localhost??) 4) why does tor browser "bypasses vpn"? 5) how to set everything go smooth? 6) is it possible to work is tor browser? Additional 6) how to avoid "VPN fingerprint" and "double ping" warnings when checking anonymity (i've read that ssl or ssh protocols should be used....but then i'm not able to use Tor?(i'm not able to choose 2 protocols at the same time in GUI) or how to add socks 5 proxy to the chain as an exit node while still using Tor as a 1 stage) Looking for your replies if you have a link to a "noob" manual, I would greatly appreciate it!!! (I wonder why there are no standard airvpn manual on how to do it step-by-step)
  20. Yesterday I was running airvpn over tor with socks5 (vip72). I had no issues, iplocation.net had my location pinned as the location of my socks5 proxy. But today I am running the same setup but iplocation.net still has my location pinned as the location of the airvpn server. ( we'll say airvpn server is somewhere in WA, and socks5 is somewhere in Texas) The only change I have made since yesterday is that I switched my DNS servers to Comodo rather than my ISP. Would this be enough to change the differing results?
  21. Good evening, my question is this. We know that it's possible to connect to AirVPN through TOR; for example, by using the address and the port given by Vidalia TOR. This produce a situation like that: TOR (Vidalia) > AirVPN (some server) > Internet AirVPN don't know the original IP and encrypt the contents, so, neither government or service provider can trace or retrieve data, also outside of an SSL (https) connection. Anyway, AirVPN know the IP where you want to connect and this last know your ip from a server of AirVPN. My question is this: what if I open a Tor Bundle Browser after connecting to AirVPN through TOR management by VIDALIA? It's a scheme like this: Tor (Vidalia) > AirVPN (some server) > Tor Browser Bundle > Internet I just see that it's possible, at least, on Linux Debian. Apparently, the data go through AirVPN in the Tor Bundle and so, also through VIDALIA. Maybe this is a more secured way of working? At least because Internet don't know the IP of AirVPN proxy, you can access to .onion website and the data are still encrypted by the VPN. Or I fall wrong in some points? Nobody try something like this? Thank you
  22. I'm having problems connecting tor -> vpn I'm quite flummoxed as to why considering when I first set it up it worked perfectly fine. I have barely touched the settings in the vpn and and problems connecting through tor started occurring after I switched to automatic protocol (which also worked fine and still does) and then back to using the tor protocol. When I test the tor protocol it tells me the test is successful however when I attempt to connect it gets stuck on checking authorization while flashing to connecting the the vpn server every few seconds and then back to checking authorization. I have left it running like this for probably over 15 minutes it just keeps flashing back and forth without connecting. I'm pretty stumped on how to solve this considering the test for the protocol comes back successful.
  23. Hi. I use AIRVPN and TOR browser. Normally i start TOR browser, once connected i then start up AIRVPN and thats all good. I am trying to work out how i get TOR to go through AIRVPN?. Yes i have read the connecting to TOR page many many times, but i simply don't understand the process. I have used the search feature in this forum, but when i search for 'tor' or 'tor setup' i get no search results, even though i have found TOR related posts. Can someone please help? Emily
  24. So I know this maybe over the top and a wee bit silly but what if you chained 2 VPNs together through virtualization (VPN 1 on host machine and VPN 2 on a virtual machine) but instead of running 1 virtual machine you installed a virtual machine inside of a virtual machine and installed VPN 2 inside that virtual machine thats installed inside the virtual machine then create another virtual machine seperate from the others and install pfsense and configure it and route the traffic through VM 2 (virtual machine inside the virtual machine) to VM 1 then back through the host? And of cousre run TOR too............ VPNception?
  25. I can get my AirVPN client to connect through Tor through Tor's default settings, but when I set up to use a Tor Bridge inside of Tor, the AirVPN client gives me an error about not being able to connect to Tor due to being unable to find my first Tor Node. Any idea how I can fix this issue?
×
×
  • Create New...