Jump to content
Not connected, Your IP: 3.15.150.178

Search the Community

Showing results for tags 'ip block'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 1 result

  1. I am concerned about leaking IPs when torrenting, among other things, and I decided to use WaterRoof on my osx 10.6. I flushed previous rules and imported the airvpn-ipfw-ruleset from jesees post. Looking around WaterRoof I realised that this deals with ipv4. a)IPV6 When I pressed on the ipv4/ipv6 button that reveals the ipv6 rules, no rules are present. I tried to import again in this tab but rules are not imported here. So it seems rules are working for ipv4 only. b)Dynamic rules All the above has to do with static rules. Looking around I discovered there is window to add dynamic rules. Should I import the rules there too? c)Connections inspector I opened the connections inspector window and there are 7 rules that apparently are "root processes". Should I block any of these? What are these and how can i tell if they are factory made or "planted" there by someone? d)Application Icon /monitor I cannot seem to find any way to monitor if the waterproof application (and the rules) are running, like a menu bar icon. Is there something I am missing? e)little snitch Is WaterRoof compatible with little snitch? f)ITunnelblick In the advanced settings of the configuration there is the option "Route all traffic through the VPN". I had the impression that that was happening anyway. What is its role? (is there any good place with information regarding the proper configuration of Tunnelblick - for not very technical people?) Any help greatly appreciated. p.s. I am not so much into technical stuff so a "kill switch" (for killing the connection during a possible (probable?) disconnection from AirVPN) would be very helpful for people like me. Many thanks. p.s.2 After using these rules i cannot connect neither to the internet to airvpn. add 01000 allow log udp from 192.168.0.0/16 to 94.75.228.29 dst-port 53 keep-state add 01002 allow log udp from 192.168.0.0/16 to 62.141.58.13 dst-port 53 keep-state add 01004 allow log udp from 192.168.0.0/16 to 87.118.100.175 dst-port 53 keep-state add 01006 allow log udp from 192.168.0.0/16 to 87.118.104.203 dst-port 53 keep-state add 01008 allow log udp from 192.168.0.0/16 to 87.118.109.2 dst-port 53 keep-state add 02000 allow ip from 192.168.0.0/16 to 46.165.208.65 keep-state add 02004 allow ip from 192.168.0.0/16 to 95.211.169.3 keep-state add 02008 allow ip from 192.168.0.0/16 to 178.248.29.132 keep-state add 02012 allow ip from 192.168.0.0/16 to 108.59.8.147 keep-state add 02016 allow ip from 192.168.0.0/16 to 69.163.36.66 keep-state add 02020 allow ip from 192.168.0.0/16 to 89.149.226.185 keep-state add 02024 allow ip from 192.168.0.0/16 to 146.185.25.170 keep-state add 02028 allow ip from 192.168.0.0/16 to 62.212.85.65 keep-state add 02032 allow ip from 192.168.0.0/16 to 85.17.123.26 keep-state add 02036 allow ip from 192.168.0.0/16 to 95.211.98.154 keep-state add 04000 allow ip from 127.0.0.1 to any add 05000 allow log ip from 10.0.0.0/8 to any add 05002 allow log ip from any to 10.0.0.0/8 add 65534 deny log ip from any to any p.s.3 I flushed the waterroof rules and my connection was re-established. Are the above rules correct?
×
×
  • Create New...