Jump to content
Not connected, Your IP: 34.204.194.190

Search the Community

Showing results for tags 'freebsd'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Frequently asked questions
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP
    • Mirrors

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 5 results

  1. Hey guys, I really love the VPN service you are offering, it is way more professional than any of your competitives which I've tested so far. I want to use your VPN to anonymize the internet traffic for four of my FreeNAS jails. Every jail is an independent virtual instance of FreeBSD. Unfortunately if you want to add a plugin (something like transmission or sabnzbd) in FreeNAS it creates one jail for one application, so I have to connect four instances of openvpn to your servers. My problem is that you only accept three connections per account, how can I bundle the network traffic of those 4 jails to one openvpn connection? Thank you very much in advance for your answer, cephyr
  2. I have installed OpenVPN client on my FreeBSD file server at home. I've used 'other' config file and it's working fine, I can ssh out to my work servers, browse the web and all that good stuff, my external IP is obviously the open AirVPN assigned to my vpn connection. tun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> metric 0 mtu 1500 options=80000<LINKSTATE> inet6 fe80::214:d1ff:fe1d:3bbb%tun0 prefixlen 64 scopeid 0x6 inet 10.4.12.51 --> 10.4.0.1 netmask 0xffff0000 I've forwarded two ports, one for torrents, and one for ssh. Neither port is working. For example, I've setup 56602 for torrents. I've started transmission, and it's listening on the port in question: # netstat -an | grep 56602tcp6 0 0 *.56602 *.* LISTENtcp4 0 0 10.4.12.51.56602 *.* LISTENudp4 0 0 10.4.12.51.56602 *.* # lsof -p 52166 | grep 56602transmiss 52166 transmission 9u IPv4 0xfffff8001e4e8c00 0t0 TCP 10.4.12.51:56602 (LISTEN)transmiss 52166 transmission 10u IPv6 0xfffff8003f3fe000 0t0 TCP *:56602 (LISTEN)transmiss 52166 transmission 11u IPv4 0xfffff8000e44d580 0t0 UDP 10.4.12.51:56602 I do see incoming packets on tun0: # tcpdump -i tun0 port 56602... 18:06:06.853682 IP ********.56966 > 10.4.12.51.56602: Flags , seq 644910569, win 8192, options [mss 1352,nop,wscale 2,nop,nop,sackOK], length 018:06:07.132328 IP ********.53676 > 10.4.12.51.56602: Flags , seq 2949838881, win 8192, options [mss 1352,nop,nop,sackOK], length 0...18:06:06.759788 IP ********.18848 > 10.4.12.51.56602: UDP, length 2018:06:06.820983 IP ********.58101 > 10.4.12.51.56602: UDP, length 20... But nothing going back from my host (I've replaced actual ips with '********'). My firewall is open: # ipfstat -i | grep 56602pass in quick on tun0 inet from any to 10.4.12.51/32 port = 56602 Any ideas on what I am doing wrong?
  3. I installed openvpn on FreeBSD 10.1 and the DNS isn't working. I put these lines in rc.conf: openvpn_enable="YES" openvpn_if="tun" openvpn_configfile="/usr/local/etc/openvpn/[whatever].ovpn" I copied the .ovpn file to /usr/local/etc/openvpn. When I reboot, openvpn starts fine. I don't have a firewall on the system. Did I forget to do something?
  4. This post describes how to accept OpenVPN servers DNS push on Linux, OpenBSD, FreeBSD and some other POSIX-compliant OS when: resolvconf package OR openresolv package is installedOpenVPN is run directly (i.e. NOT through any OpenVPN GUI/wrapper such as network-manager)OpenVPN version is 2.1 or higherWarning: the specified "update-resolv-conf" script path refers to many Linux distributions and OpenVPN package installation, but NOT to all of them. Please check the correct path of the mentioned file before proceeding (for example: it could be /usr/share/openvpn instead of /etc/openvpn). If the script is not on your system, you'll need to create it. See the typical script here: https://wiki.archlinux.org/index.php/OpenVPN#DNS Important: in the same above linked page, note that if you have a system based on systemd you might need some important modifications: Add to your OpenVPN configuration file(s), either in field "Custom Directives" of the Configuration Generator or by editing the configuration directly, the following lines: script-security 2 up /etc/openvpn/update-resolv-conf down /etc/openvpn/update-resolv-conf In this way update-resolv-conf will record the DNS push and through resolvconf or openresolv will modify the nameserver accordingly. When OpenVPN quits, update-resolv-conf restores the previous nameserver line(s). Kind regards
  5. In order to prevent leaks on *BSD and Mac OS X systems with pf, please see this guide by jessez: https://airvpn.org/topic/1713-win-mac-bsd-block-traffic-when-vpn-disconnects/page-2?do=findComment&comment=2532 Thank you very much jessez! Kind regards
×
×
  • Create New...