Jump to content
Not connected, Your IP: 100.26.179.196

Search the Community

Showing results for tags 'tor'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Frequently asked questions
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP
    • Mirrors

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 76 results

  1. Hi peeps Can anyone tell me the pros and cons of Tor, and or Tor + vpn? For p2p usage please.
  2. Hi. I have small problem, I want to run airvpn over Tor, without network lock everything work fine and the connection is established. After Disconnecting and activating network lock and then Reconnect again --> checking autherization Fail I have tried several times, I'm using Tor 0.2.6.10 , Portable Eddie for debian. the following are some logs collected from Tor, eddie and iptables Eddie log Tor Log "note the time" Iptables -L output Any Ideas ? Is there anyway to activate network lock after connection get established ? Thanks,
  3. So far I am using VPN to download/upload torrents to private tracker. As soon as the AirVPN loses connenction for whatever reason, I have enabled the mechanism that shuts down the network to my macbook. Furthermore, I have confirured Vuze to start only when tun0 interface is available. I see also, that there are some people using proxy servers and TOR network, would this be benefitial from anonimity side of things in my case or not? I would like some links or discussion based on the topic's title Thanks
  4. Hi, I have Tor running on my router which IP is like 192.168.x.y I have the following details available: socks portTrans portDNS portI tried to pass it in Eddie2.9 parameters to get vpn over Tor https://airvpn.org/tor/ (first description). It is not working. Do you know if it is supposed to work this way, when Tor is running on the router? Thanks
  5. I'm using the AirVPN Linux client. I've followed the how-to for running AirVPN through Tor, which is: - start the Tor browser bundle - open AirVPN preferences and in "protocols" tab select "Tor" (if I run "test" here I get the error "515 Authentication failed. Password did not match HashedControlPassword *or* authentication cookie") - attempt to connect. Connection fails, and the last two lines of the error log show: - TOR Control authentication method: Cookie, from /var/run/tor/control.authcookie - Unable to communicate with TOR (Unable to find IP address of TOR first node of an established circuit.). Is TOR up and running? Yes, Tor is up and running. Any other ideas? Seems to be a problem with the cookie authentication but I'm not sure how to fix it.
  6. Good day, First of all I am running Ubuntu 14.04 on my laptop. What I want to achiev is to connect to tor via Airvpn. (That's the safest setup way, am I right?). Problems that I occure: To connect to Tor, I need to setup proxy in Airvpn client. Ant then use data in Tor configuration and achieve connection. Airvpn client without proxy setting works flawless. After I turn on proxy (socks5), I cant connect to server, I get reconnect loop, log: I 2015.03.09 11:03:54 - AirVPN client version: 2.8.8, System: Linux, Name: Ubuntu 14.10 \n \l, Architecture: x86 . 2015.03.09 11:03:54 - Reading options from /home/vibe/.airvpn/AirVPN.xml . 2015.03.09 11:03:56 - Data Path: /home/vibe/.airvpn . 2015.03.09 11:03:56 - App Path: /usr/lib/AirVPN . 2015.03.09 11:03:56 - Executable Path: /usr/lib/AirVPN/AirVPN.exe . 2015.03.09 11:03:56 - Command line arguments (1): path="/home/vibe/.airvpn" . 2015.03.09 11:03:57 - Operating System: Unix 3.16.0.23 - Linux Q 3.16.0-23-generic #31-Ubuntu SMP Tue Oct 21 18:00:35 UTC 2014 i686 i686 i686 GNU/Linux . 2015.03.09 11:03:57 - Updating systems & servers data ... I 2015.03.09 11:03:57 - OpenVPN Driver - Found I 2015.03.09 11:03:57 - OpenVPN - Version: OpenVPN 2.3.2 (/usr/sbin/openvpn) I 2015.03.09 11:03:57 - SSH - Version: OpenSSH_6.6.1p1 Ubuntu-8, OpenSSL 1.0.1f 6 Jan 2014 (/usr/bin/ssh) I 2015.03.09 11:03:57 - SSL - Version: stunnel 5.02 (/usr/bin/stunnel4) I 2015.03.09 11:03:57 - IPV6: Available ! 2015.03.09 11:03:57 - Ready . 2015.03.09 11:03:57 - Updating systems & servers data ..., 1° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:03:57 - Updating systems & servers data ..., 2° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:03:57 - Updating systems & servers data ..., 3° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:03:57 - Updating systems & servers data ..., 4° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:03:57 - Updating systems & servers data ..., 5° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:03:58 - Updating systems & servers data ..., 6° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:03:58 - Updating systems & servers data ..., 7° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:03:58 - Updating systems & servers data ..., 8° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) W 2015.03.09 11:03:58 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (CUrl is not installed on this system, and it's required for SOCKS proxy.) I 2015.03.09 11:04:49 - Session starting. I 2015.03.09 11:04:49 - Installing tunnel driver F 2015.03.09 11:04:50 - Only TCP protocol is allowed with a proxy. . 2015.03.09 11:04:58 - Updating systems & servers data ... . 2015.03.09 11:04:58 - Updating systems & servers data ..., 1° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:04:58 - Updating systems & servers data ..., 2° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:04:58 - Updating systems & servers data ..., 3° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:04:58 - Updating systems & servers data ..., 4° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:04:58 - Updating systems & servers data ..., 5° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:04:58 - Updating systems & servers data ..., 6° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:04:58 - Updating systems & servers data ..., 7° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:04:58 - Updating systems & servers data ..., 8° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) W 2015.03.09 11:04:58 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (CUrl is not installed on this system, and it's required for SOCKS proxy.) I 2015.03.09 11:05:12 - Session starting. I 2015.03.09 11:05:12 - Installing tunnel driver I 2015.03.09 11:05:12 - Retrieving manifest W 2015.03.09 11:05:12 - Unable to retrieve systems & servers data. Continue anyway with the old data. . 2015.03.09 11:05:12 - Updating systems & servers data ... I 2015.03.09 11:05:12 - Checking authorization ... . 2015.03.09 11:05:12 - Updating systems & servers data ..., 1° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:12 - Updating systems & servers data ..., 2° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:12 - Checking authorization ..., 1° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:12 - Updating systems & servers data ..., 3° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:12 - Checking authorization ..., 2° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:12 - Updating systems & servers data ..., 4° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Checking authorization ..., 3° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Updating systems & servers data ..., 5° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Checking authorization ..., 4° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Updating systems & servers data ..., 6° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Checking authorization ..., 5° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Updating systems & servers data ..., 7° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Checking authorization ..., 6° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Updating systems & servers data ..., 8° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) W 2015.03.09 11:05:13 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (CUrl is not installed on this system, and it's required for SOCKS proxy.) . 2015.03.09 11:05:13 - Checking authorization ..., 7° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:13 - Checking authorization ..., 8° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) W 2015.03.09 11:05:13 - Authorization check failed, continue anyway ({1]) ! 2015.03.09 11:05:13 - Connecting to Grafias (Netherlands, Amsterdam) I 2015.03.09 11:05:13 - DNS of the system will be updated to VPN DNS (ResolvConf method) . 2015.03.09 11:05:13 - OpenVPN > OpenVPN 2.3.2 i686-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Dec 1 2014 . 2015.03.09 11:05:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2015.03.09 11:05:13 - OpenVPN > NOTE: the current --script-security setting may allow this configuration to call user-defined scripts . 2015.03.09 11:05:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2015.03.09 11:05:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.03.09 11:05:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.03.09 11:05:13 - OpenVPN > Socket Buffers: R=[87380->131072] S=[16384->131072] . 2015.03.09 11:05:13 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 [nonblock] . 2015.03.09 11:05:13 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:9150 . 2015.03.09 11:05:13 - OpenVPN > socks_handshake: server asked for username/login auth but we were not provided any credentials . 2015.03.09 11:05:13 - OpenVPN > SIGTERM[soft,init_instance] received, process exiting ! 2015.03.09 11:05:13 - Disconnecting . 2015.03.09 11:05:13 - Connection terminated. I 2015.03.09 11:05:16 - Checking authorization ... . 2015.03.09 11:05:16 - Checking authorization ..., 1° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:16 - Checking authorization ..., 2° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:16 - Checking authorization ..., 3° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:16 - Checking authorization ..., 4° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:16 - Checking authorization ..., 5° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:16 - Checking authorization ..., 6° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:16 - Checking authorization ..., 7° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) . 2015.03.09 11:05:16 - Checking authorization ..., 8° try failed (CUrl is not installed on this system, and it's required for SOCKS proxy., with 'socks' proxy and 'none' auth) W 2015.03.09 11:05:16 - Authorization check failed, continue anyway ({1]) I 2015.03.09 11:05:16 - Cancel requested. ! 2015.03.09 11:05:16 - Session terminated. By the way how to access Tor line in Airvpn->Preferences->Protocols? Off problem topic question - would openvpn increase security or solve problem? (Sorry newbie) Have a nice day, amen1337 P.S.: Sorry for poor English
  7. On Ubuntu LTS, decided to dabble with Tor over AirVPN. Using Tor Browser Bundle 4.0.2. AirVPN connection tested with ipleak.net and dnsleaktest.com. IP address and Detected DNS Address match. No leak. Then launched TBB. Says I'm using Tor IP, but DNS address matches my ISP's, not AirVPN's. Is this due to a failure to configure AirVPN properly or Tor Browser Bundle? Thank you.
  8. The setup is: Air over TBB (Tor browser bundle) (Running TBB First, then airvpn over Tor) Is it possible to setup iptables in a way to drop any non vpn packets when connected Air over Tor? Or maybe drop any non tor & vpn packets?
  9. Ever heard of the NetFlow protocol? It's used to collect TCP/IP packet data and export them for later analysis. Developed by.. pause for effect.. Cisco! <3 And every Cisco router supports it. The reason why there's a vulnerabiliy which will never get closed? This is a conspiracy theory! Kill him! .. Er.. yeah. So, NetFlow. A few researchers at Columbia University recently published a paper in which they describe an attempt to use NetFlow against the TOR network. Well, not directly. Their goal is to evaluate "the effectiveness of using NetFlow data to perform practical traffic analysis attacks for identifying the source of anonymous communication", short and relevant version: "How effective is NetFlow when it comes to finding out the source of an anonymized connection with it?" Tested in-lab and in the network, "we had 100% success rate in determining the source of anonymous flows [in-lab]. When evaluating our attack with traffic going through the public Tor relay, we were able to detect the source in 81.4% cases. We observed about 12.2% false negatives and 6.4% false positives in our measurements." For everyone who wants to read the paper, here's the link. Let me know what you understand by source of an anonymous connection. Let's play a simplified taboo game: You must not use the term IP address because, well, that's not what is meant. If you want to know why, please proceed and read the answers.
  10. http://justsecurity.org/wp-content/uploads/2014/09/proposed-amendment-rule-41.pdf As I understand it, the FBI wants the authority of a world police and the (official) right to take down VPN users...
  11. The owner of one of the TOR directory servers himself confirmed he had seen the source code of XKeyscore and saw his server's IP hardcoded in there. The server is located in Nürnberg, Germany, and is called Gabelmoo. Id est: XKeyscore logged every attempt to access his server. Additionally, comments made in the source code show that everyone who is accessing the directory server is made an "extremist" - at least in the terminology of the NSA. In the source code the student hasn't seen any proof that TOR relay servers are exposed to the same risk. This task might be allotted to another application... Source#1 Source#2 excellent addition by sheivoko - the XKeyscore rules!
  12. "If you're using things like a single hop VPN to do things in a so-called "anonymous" way on the internet, you should probably stop." "When you are using certain VPNs, the NSA has special traffic flow analysis software, for example, that will mark you, put it into a database, and later when an analyst wants to compromise you, they can just pull it out of this database." Jacob Appelbaum in a talk that you can watch here: (watch from about 2:15 for these quotes) Unless there's a practical reason not to use Tor on top of your VPN connection, it's really best to use Tor (excellent though VPNs are for things that Tor cannot do).
  13. Hi, I've been using AirVPN over Tor for added security while browsing for a while without any issues. I recently updated my Tor browser to the latest version 3.6.2 and now AirVPN is not connecting. I haven't changed any settings so I'm not sure if the update requires a settings tweak? Or if it's something else. Here are the logs Sun Jun 15 15:34:16 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Apr 8 2014 Enter Management Password: Sun Jun 15 15:34:16 2014 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340 Sun Jun 15 15:34:16 2014 Need hold release from management interface, waiting... Sun Jun 15 15:34:17 2014 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340 Sun Jun 15 15:34:17 2014 MANAGEMENT: CMD 'state on' Sun Jun 15 15:34:17 2014 MANAGEMENT: CMD 'log all on' Sun Jun 15 15:34:17 2014 MANAGEMENT: CMD 'hold off' Sun Jun 15 15:34:17 2014 MANAGEMENT: CMD 'hold release' Sun Jun 15 15:34:17 2014 Control Channel Authentication: tls-auth using INLINE static key file Sun Jun 15 15:34:17 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Sun Jun 15 15:34:17 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Sun Jun 15 15:34:17 2014 Socket Buffers: R=[8192->8192] S=[8192->8192] Sun Jun 15 15:34:17 2014 Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 Sun Jun 15 15:34:17 2014 MANAGEMENT: >STATE:1402860857,TCP_CONNECT,,, Sun Jun 15 15:34:18 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:34:23 2014 MANAGEMENT: >STATE:1402860863,TCP_CONNECT,,, Sun Jun 15 15:34:24 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:34:29 2014 MANAGEMENT: >STATE:1402860869,TCP_CONNECT,,, Sun Jun 15 15:34:30 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:34:35 2014 MANAGEMENT: >STATE:1402860875,TCP_CONNECT,,, Sun Jun 15 15:34:36 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:34:41 2014 MANAGEMENT: >STATE:1402860881,TCP_CONNECT,,, Sun Jun 15 15:34:42 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:34:47 2014 MANAGEMENT: >STATE:1402860887,TCP_CONNECT,,, Sun Jun 15 15:34:48 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:34:53 2014 MANAGEMENT: >STATE:1402860893,TCP_CONNECT,,, Sun Jun 15 15:34:54 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:34:59 2014 MANAGEMENT: >STATE:1402860899,TCP_CONNECT,,, Sun Jun 15 15:35:00 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:35:05 2014 MANAGEMENT: >STATE:1402860905,TCP_CONNECT,,, Sun Jun 15 15:35:06 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:35:11 2014 MANAGEMENT: >STATE:1402860911,TCP_CONNECT,,, Sun Jun 15 15:35:12 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:35:17 2014 MANAGEMENT: >STATE:1402860917,TCP_CONNECT,,, Sun Jun 15 15:35:18 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:35:23 2014 MANAGEMENT: >STATE:1402860923,TCP_CONNECT,,, Sun Jun 15 15:35:24 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:35:29 2014 MANAGEMENT: >STATE:1402860929,TCP_CONNECT,,, Sun Jun 15 15:35:30 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:35:35 2014 MANAGEMENT: >STATE:1402860935,TCP_CONNECT,,, Sun Jun 15 15:35:36 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:35:41 2014 MANAGEMENT: >STATE:1402860941,TCP_CONNECT,,, Sun Jun 15 15:35:42 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:35:47 2014 MANAGEMENT: >STATE:1402860947,TCP_CONNECT,,, Sun Jun 15 15:35:48 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:35:53 2014 MANAGEMENT: >STATE:1402860953,TCP_CONNECT,,, Sun Jun 15 15:35:54 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:35:59 2014 MANAGEMENT: >STATE:1402860959,TCP_CONNECT,,, Sun Jun 15 15:36:00 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:36:05 2014 MANAGEMENT: >STATE:1402860965,TCP_CONNECT,,, Sun Jun 15 15:36:06 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:36:11 2014 MANAGEMENT: >STATE:1402860971,TCP_CONNECT,,, Sun Jun 15 15:36:12 2014 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Sun Jun 15 15:36:15 2014 SIGTERM[hard,init_instance] received, process exiting Sun Jun 15 15:36:15 2014 MANAGEMENT: >STATE:1402860975,EXITING,init_instance,, Thanks for the help
  14. How do you configure the firewall (I'm wondering about both Comodo (Windows) and GUFW (Linux)) when using Air VPN over TOR? Or, are the firewall settings to prevent leaks the same as if I were just using Air VPN? Assuming I was fine with my ISP seeing that I'm using TOR, is there any reason to choose TOR over VPN instead of VPN over TOR? I read the TOR page on this site, but I just want to be sure there aren't cases in which I shouldn't choose VPN over TOR. I've heard some people talk about wanting to hide from their ISP the fact that they are using TOR. Why is this? Do some ISPs not tolerate their customers using TOR?
  15. Hi, I got a problem when connecting the AirVPN clinet through the Tor Browser Bundle 3.5.4 (Windows). First, I got the following error message: Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 TCP connection established with [AF_INET]127.0.0.1:9150 socks_handshake: server asked for username/login auth but we were not provided any credentials SIGTERM[soft,init_instance] received, process exiting Failed to start. So I have replaced the port setting in the torrc-defaults file to: SOCKSPort 127.0.0.1:9150 PreferSOCKSNoAuth Now the error message looks like this: Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 TCP connection established with [AF_INET]127.0.0.1:9150 recv_socks_reply: Socks proxy returned bad reply SIGTERM[soft,init_instance] received, process exiting Failed to start. What should I do now?
  16. Trying to use AirVPN with Tor Browser Bundle as outlined at https://airvpn.org/tor/ connecting always fails with error "socks_handshake server asked for username/login auth but we were not provided any credentials" when using the configuration generator I select configuration mode: Direct, protocol TCP, port 443. In the proxy block username/login was not asked for, greyed out. Can you help please? I opened an account at AirVPN specifically for purpose of using Tor to connect to your servers. Why is Tor asking for credentials?
  17. Hello, new user here. I'd like to get some opinions on using: A: Tor over AirVPN B: AirVPN over Tor Now, I've heard some rumors circulating that Tor has some anonyminity issues, so I'm kind of nervous to put my IP through Tor. However, I like the idea of using an SSH/SSL tunnel to connect to an AirVPN server, so any information sent through Tor will be encrypted. From a security standpoint (cookies/session management), option B has to be the way to go. On the otherhand, if Https is used, option A seems the best. Also, Tor uses the Https Everywhere extension, so that's an added bonus, but still it's not applicable 100% of the time. So I guess I'd just like to know what your preference is and why?
  18. Hello and thank you in advance for any help with this. I have never ran a Tor relay before, but I would like to try to enable a "middle-man" relay through my VPN connection if it is possible. I am trying to configure the Tor "middle-man" relay using my /etc/tor/torrc file and iptables.rules file. (I have not edited the TBB torrc) My torrc is configured like this below: AutomapHostsOnResolve 1 AutomapHostsSuffixes .exit,.onion SocksPort 9050 TransPort 9040 DNSPort 9053 ##Tor-middleman Nickname ************(my secert name) ORPort 9001 DirPort 9030 BandwidthRate 256 KB # Throttle traffic to 20KB/s BandwidthBurst 4096 KB # But allow bursts up to 50KB/s ExitPolicy reject *:* and my current iptables.rules that work with AirVPN and TBB/Tor/Privoxy are: $ iptables -L -n --line-numbers Chain INPUT (policy DROP) num target prot opt source destination 1 icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 recent: SET name: ping_limiter side: source mask: 255.255.255.255 2 DROP icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 recent: UPDATE seconds: 4 hit_count: 6 name: ping_limiter side: source mask: 255.255.255.255 3 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 4 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED 5 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 6 DROP all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID 7 UDP udp -- 0.0.0.0/0 0.0.0.0/0 ctstate NEW 8 TCP tcp -- 0.0.0.0/0 0.0.0.0/0 tcp flags:0x17/0x02 ctstate NEW 9 REJECT udp -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable 10 REJECT tcp -- 0.0.0.0/0 0.0.0.0/0 reject-with tcp-reset 11 REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-proto-unreachable Chain FORWARD (policy DROP) num target prot opt source destination Chain OUTPUT (policy ACCEPT) num target prot opt source destination Chain TCP (1 references) num target prot opt source destination Chain UDP (1 references) num target prot opt source destination ----------------------------------------------------------------------------- $ iptables -t nat -L -n --line-numbers Chain PREROUTING (policy ACCEPT) num target prot opt source destination Chain INPUT (policy ACCEPT) num target prot opt source destination Chain OUTPUT (policy ACCEPT) num target prot opt source destination Chain POSTROUTING (policy ACCEPT) num target prot opt source destination If there is an easy way to do this then please let me know what I should do with ports-forward, iptables.rules, and torrc. thanks. ------------------------------------------------------------------- EDITED: I decided to edit this cause I added too much confusing info. So to keep things simple, I don't know if I need ports forwarded or if I just need some new iptables rules to make things work. (or both) Currently my Tor Browser Bundle (TBB) works on port 9150 and 9151 over my VPN connection and so does my Tor/Privoxy connection using Socks4a for port 9050 and 8118. When running both tor instances I have 6 EntryGuards to start. When I configure the "middle-man" relay in my linux /etc/tor/torrc file I get about 20-80 more ESTABLISHED connection with the original 6 ESTABLISHED EntryGuards. But after a few minutes I only have the original 6 EntryGuards as ESTABLISHED connections when using the netstat command.
  19. Hello, Is anyone else getting a positive Tor detection on Canopus (NL)? And if so, howcome with this server? https://check.torproject.org/ OpenVPN Direct Protocol: TCP Port: 443
  20. According to https://dan.me.uk/tornodes Velorum's exit IP is a TOR exit node. Therefore access to dan.me.uk is restricted. Please stop running TOR exit nodes!!..
  21. I've readed almost every post in this forum about it and outside too but didn't managed to resolve. The problem is, i select Socks at config on AirVpn; Host : 127.0.0.1; Port 9150, then i start Tor, select the socks5 put the host and port and connect. But when i try to connect the AirVpn (Using TCP) it gives me this error everytime. 20/12/2013 - x:21 Login... 20/12/2013 - x:21 Login success. 20/12/2013 - x:21 Contacting service... 20/12/2013 - x:21 Connecting... 20/12/2013 - x:21 OpenVPN 2.3.2 i686-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [iPv6] built on Aug 22 2013 20/12/2013 - x:21 Socket Buffers: R=[8192->8192] S=[8192->8192] 20/12/2013 - x:21 Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 20/12/2013 - x:21 TCP connection established with [AF_INET]127.0.0.1:9150 20/12/2013 - x:21 socks_handshake: server asked for username/login auth but we were not provided any credentials 20/12/2013 - x:21 SIGTERM[soft,init_instance] received, process exiting 20/12/2013 - x:21 Failed to start.
  22. Hi All, Sorry for my splurge of posts over the past couple of days, just trying to get my head round all of this! Anyway, I am having some issues when trying to change my IP on Tor. What I have done so far: Generated the config for OpenVPN with my selected country of choice, and have set it to use "Socks" and Port 9150. Successfully loaded that config file into the correct part of the OpenVPN folder. Launch Tor and then navigate to IPChicken to see the IP of the exit node (I think). Connect to the VPN using OpenVPN. Reload the IPChicken page. It shows the same IP address.​What have I missed out? Have I done something wrong? Thanks for any help!
  23. I used to run a non-exit Tor relay when I used Riseup VPN and had no problems. However, with AirVPN I get the error message: [Mon 9. Sep 13:53:18 2013] Server Port Reachability Test Failed - Your relay's server port is not reachable by other Tor clients. This can happen if you are behind a router or firewall that requires you to set up port forwarding. If <Air IP>:443 is not your correct IP address and server port, please check your relay's configuration. Can I use the port forwarding feature on this website to solve this problem? I'd like to support the Tor network. Can I use that same port to speed up my torrenting? Do I do that by entering the number of the port into uTorrent's settings?
  24. Hi, Running Mac OS X 10.8.4, I have managed to install and get all kinds of combinations to work with AirVPN's Virginis server - UDP, TCP and even SSH and SSL, across various ports and what-not. Running TOR over VPN works fine too. However, the one big roadblock I've hit is running VPN over TOR via the SOCKS proxy. I've tried it with Tunnelblick and Viscosity, without luck, and despite trying all sorts of workarounds. The problem is this: The VPN will connect to the TOR proxy, and all will appear well. But there is simply no through-connection to the Internet. Pinging doesn't work. Browsers hang. After a while, the connection times out, the VPN client disconnects, and tries again. Some log files to illustrate: Viscosity's log looks like this ===== Aug 28 21:45:13: Viscosity Mac 1.4.4 (1138) Aug 28 21:45:13: Viscosity OpenVPN Engine Started Aug 28 21:45:13: Running on Mac OS X 10.8.4 Aug 28 21:45:13: --------- Aug 28 21:45:13: Checking reachability status of connection... Aug 28 21:45:13: Connection is reachable. Starting connection attempt. Aug 28 21:45:15: OpenVPN 2.3.2 i386-apple-darwin [sSL (OpenSSL)] [LZO] [PKCS11] [MH] [iPv6] built on Jun 7 2013 Aug 28 21:45:14: Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 [nonblock] Aug 28 21:45:17: TCP connection established with [AF_INET]127.0.0.1:9150 Aug 28 21:45:18: TCPv4_CLIENT link local: [undef] Aug 28 21:45:18: TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:9150 Aug 28 21:45:35: [server] Peer Connection Initiated with [AF_INET]127.0.0.1:9150 Aug 28 21:45:38: TUN/TAP device /dev/tun0 opened Aug 28 21:45:38: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 Aug 28 21:45:38: /sbin/ifconfig tun0 delete Aug 28 21:45:38: NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure Aug 28 21:45:38: /sbin/ifconfig tun0 10.5.8.118 10.5.8.117 mtu 1500 netmask 255.255.255.255 up Aug 28 21:45:38: Initialization Sequence Completed Aug 28 21:46:39: [server] Inactivity timeout (--ping-restart), restarting Aug 28 21:46:39: SIGUSR1[soft,ping-restart] received, process restarting Aug 28 21:46:40: Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 [nonblock] Aug 28 21:46:41: TCP connection established with [AF_INET]127.0.0.1:9150 Aug 28 21:46:44: TCPv4_CLIENT link local: [undef] Aug 28 21:46:44: TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:9150 ... ad infinitum ===== Using Network Utility to ping Yahoo.com during this time leads to nothing. It picks up as soon as the above connection times out. Trying to get to a website using Google Chrome just leads to a "Resolving host" message and then the "This webpage is not available" message. ====== Ping has started… ping: cannot resolve yahoo.com: Unknown host ====== Tor configuration file looks like this: ====== # If non-zero, try to write to disk less frequently than we would otherwise. AvoidDiskWrites 1 # Store working data, state, keys, and caches here. DataDirectory ../../Contents/Resources/Data/Tor GeoIPFile ../../Contents/Resources/Data/Tor/geoip # Where to send logging messages. Format is minSeverity[-maxSeverity] # (stderr|stdout|syslog|file FILENAME). Log notice stdout # Bind to this address to listen to connections from SOCKS-speaking # applications. SocksListenAddress 127.0.0.1 SocksPort 9150 ControlPort 9151 ===== And finally, the config file of the connection as exported by Viscosity (minus the certs & keys): ============ #-- Config Auto Generated By Viscosity --# #viscosity startonopen false #viscosity dhcp true #viscosity dnssupport true #viscosity name TOR-AirVPN_CH-Virginis_TCP-443 remote 46.19.137.114 443 tcp-client pull comp-lzo adaptive ns-cert-type server ca ca.crt redirect-gateway def1 nobind cert cert.crt tls-client dev tun key key.key socks-proxy 127.0.0.1 9150 cipher AES-256-CBC resolv-retry infinite ============ I've seen this problem raised on the main TOR thread but not resolved, so hoping somebody can figure this out. Thanks!
  25. Hi I'm trying to use transparent proxying Tor over VPN on Debian latest x64 and standard OpenVPN client with port 2018 configuration file generated from Air client area. My problem is that I will either be reduced to an intermittent connection or no connection after a few (simultaneous?) requests. I can connect to the VPN, and get a page in the terminal with "wget" or "curl" without problems. If I then open my browser (latest Firefox) and try to load a page, it may load without issues, it may take over a minute to load, or it may not load at all. During this time, the previously working wget and curl, don't work. I also can't resolve hostnames (using Tor's DNSPort). It may start working again a while later, and then I will try to load a site that has a lot of content, and it will stop working again. Maybe it will stop working entirely. The solution is to disconnect from the VPN and reconnect. Nothing is shown in Tor log, VPN log (connecting is normal), or system logs. Another problem is that UDP traffic will still go through. I can connect to a UDP service and the VPN IP is shown, but I want it blocked entirely. My iptables rules, which may be incorrect, I'm not experienced with them: #!/bin/sh iptables -F iptables -t nat -F iptables -t nat -A OUTPUT -m owner --uid-owner 110 -j RETURN iptables -t nat -A OUTPUT -p udp --dport 53 -j REDIRECT --to-ports 53 iptables -t nat -A OUTPUT -d 192.168.0.0/24 -j RETURN iptables -t nat -A OUTPUT ! -o lo -p tcp -m tcp -m owner ! --uid-owner 110 -j REDIRECT --to-ports 9040 iptables -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT iptables -A OUTPUT -m owner --uid-owner 110 -j ACCEPT iptables -A OUTPUT -p icmp -j DROP iptables -A INPUT -p icmp -j DROP iptables -A INPUT -i tun0 -p udp -j RETURN iptables -A OUTPUT -o tun0 -p udp -j RETURN iptables -A INPUT -i lo -p udp -j RETURN iptables -A OUTPUT -o lo -p udp -j RETURN iptables -A INPUT -p udp -s 192.168.0.0/24 -j RETURN iptables -A OUTPUT -p udp -d 192.168.0.0/24 -j RETURN iptables -A INPUT -p udp ! --source-port 2018 -j DROP iptables -A OUTPUT -p udp ! --destination-port 2018 -j DROP ip6tables -F ip6tables -t nat -F ip6tables -A INPUT -j DROP ip6tables -A OUTPUT -j DROP Thanks in advance.
×
×
  • Create New...