Jump to content
Not connected, Your IP: 18.219.112.111

Search the Community

Showing results for tags 'high latency'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 3 results

  1. VPN Newbie Just installed Eddie on 2 Windows 7 Pro systems. One on cable in the city, one on a rural ASDL connection. System in the city is humming fine. Ping times typically under 70 ms. System in the boonies, not so much. BW seems ok, but not latency. Ping above 1500 ms with Eddie on. Under 70 with it off. My understanding is that this rural ISP does not support IPv6, but a geek told me that does not matter as AirVPN uses IPv4 for tunneling. Am I missing some setting option(s) to optimize Eddie with my rural system?
  2. i thought i had this issue figured out and was closed https://airvpn.org/topic/16427-high-latency-lost-connection-durring-hourly-tls-rekeying/?do=findComment&comment=35775 But, i have not had any issue for the last 7 month and have happily forgot the problems i had. But suddenly is it a issue again. I am loosing connection every hour during the TLS-rekeying where there is a drop in my connection for up to 6-10sec. I thought i was a issue with my router RT-ac66u with lack of CPU power. But the last 7-8 month hasnt there been any problems. So i can only conclude it isnt a client issue?! i have attached my log file during the TLS rekeying. see the timestamps 21.26.10 - 21.26.16 the 6 sec difference is a drop in connection. Jul 31 21:26:10 openvpn[11656]: TLS: soft reset sec=0 bytes=894520/-1 pkts=7903/0 Jul 31 21:26:10 openvpn[11656]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Jul 31 21:26:10 openvpn[11656]: Validating certificate key usage Jul 31 21:26:10 openvpn[11656]: ++ Certificate has key usage 00a0, expects 00a0 Jul 31 21:26:10 openvpn[11656]: VERIFY KU OK Jul 31 21:26:10 openvpn[11656]: Validating certificate extended key usage Jul 31 21:26:10 openvpn[11656]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Jul 31 21:26:10 openvpn[11656]: VERIFY EKU OK Jul 31 21:26:10 openvpn[11656]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org Jul 31 21:26:16 openvpn[11656]: Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key Jul 31 21:26:16 openvpn[11656]: Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key Jul 31 21:26:16 openvpn[11656]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Any ideas?
  3. Hi experts, i have a issue i wish to get enlightened a bit. Every time openvpn does a TLS rekeying once a hour. Do I lose connection for 5-6 sek, can you guys explane to me why this happens and what i can do to avoid this?? The system is a dual core 1300Mhz running linux those specs shouldnt be a problem.. I have add the logfile for the rekeying process. LOG: Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: Validating certificate key usage Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: ++ Certificate has key usage 00a0, expects 00a0 Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: VERIFY KU OK Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: Validating certificate extended key usage Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: VERIFY EKU OK Jan 3 21:25:00 -- daemon.notice ovpn-client[19xx]: VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org Jan 3 21:25:06 -- daemon.notice ovpn-client[19xx]: Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Jan 3 21:25:06 -- daemon.notice ovpn-client[19xx]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Jan 3 21:25:06 -- daemon.notice ovpn-client[19xx]: Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Jan 3 21:25:06 -- daemon.notice ovpn-client[19xx]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Jan 3 21:25:06 -- daemon.notice ovpn-client[19xx]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA Best Regards, TM
×
×
  • Create New...