Jump to content
Not connected, Your IP: 18.207.238.169

Search the Community

Showing results for tags 'routing'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Frequently asked questions
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP
    • Mirrors

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 20 results

  1. kbps

    BGP routing

    https://arstechnica.com/information-technology/2019/06/bgp-mishap-sends-european-mobile-traffic-through-china-telecom-for-2-hours/ Intersting article. Interested in what others think about this from the view point of Air users and Air themselves. Do Air have the ability to moniter their servers for an instance such as this? I presume it would show as increased ping times. What would be their course of action if a data center that they use were involved in something like this?
  2. Hello forum! I've used OpenVPN on Asus RT-N18U running DD-WRT over a year now. I made files up.sh to start and dn.sh to stop OpenVPN to get rid of GUI and later on to run them via ssh from lan. OpenVPN version got updated to 2.4 and I made the necessary changes to conf file and scripts. It ran without issues couple of months. However, last Thursday my VPN connection went down while I was just browsing the interwebs. OpenVPN log was filled with messages: Recursive routing detected, drop tun packet to [AF_INET]62.102.148.132:443. There's no difference if I set up OpenVPN via GUI or use only my scripts. I've tried both UDP and TCP protocols but the issue persists. Outcome is always the same. Since then I've contacted AirVPN support as I cannot fix this by myself. I don't have the skills for that and I've tried my everything. As you may notice I feel desperate. EDIT: Here was a zip-file including kernel and ip routing tables, scripts, openvpn.conf file and OpenVPN log. I've censored my IP-address and tun1 IP from the files. All I found out is that the router for some reason removes line 62.102.148.132 via 84.xx.xx.xx dev vlan2 from routing table. You can see the difference between before-error_ip-route.txt. and after-error_ip-route.txt. DD-WRT seems to think that the fastest route outside is only via tun1 as VPN endpoint IP is in the same location as tun1 IP-address. Just a guess, might be totally wrong. Then it removes the previously mentioned routing rule and creates a loop. If I use allow-recursive-routing option in OpenVPN configuration, after a while log begins to spam "UDP messages too big" or something like that. I hadn't done any changes to DD-WRT settings, configuration files or script files. Recursive routing just popped up from no where. Router is being used as a gateway and WiFi AP only. All I've done is I moved to a new apartment which has different IP-address provided by the same ISP. That might not affect anything, just FYI. I really hope someone could help me with this. Thanks. Update: Turns out my ISP assings new IP-address every 20 minutes and almost every service on DD-WRT restarts which makes everything kind of frustrating to config...
  3. On macOS, Eddie often fails reconnecting to AirVPN when recovering from sleeping mode. Either Eddie crashes completely or the routing checking fails.
  4. Hey all, This is my second Day with AirVPN. I'm merely testing the water so I've signed up for 3 days. Initially I was drawn by the famous Network Lock, however right now it seems to be causing me trouble. Anyway, here's what I want to do. I would like to use tunnel only on certain sites. Therefore, I have been using the "Routes" option in the Eddie preference tab. From there, I've set the "Note Specified Routes go:" to Outside of Tunnel. All the sites that I want to be accessing through the tunnel are added to the list with the Action "Inside the VPN Tunnel". Everything works as expected and I've been testing with Ipleak.net to make sure. From there, I noticed the little message that says "Ip in 'Outside of Tunnel' are also unlocked When Netowrk Lock is active'", which according to my understanding means that even with NL active, if a certain ip is set to be Outside the Tunnel, it will remain accesible. Correct me if I'm wrong. Therefore, with my current setup, every single site should still be accessible with NL on, and only the sites that are specifically listed to "Inside Tunnel" should lose their connection upon VPN failure. Correct? However, it seems that when I turn on NL. I lose Access to every single site, whether they be Inside or Outside the Tunnel. Is this a bug, or I'm I just massively misunderstanding this. I could go with regular windows Iptables, but I'd rather use Eddie as it's much more user friendly. Thanks in Advance!
  5. Hi. I configured Eddie so that the IPs of certain websites are accessed only from outside the VPN tunnel. (Settings -> Routes) These routing rules work just fine, but as soon as I activate network lock I can't access the specified sites anymore. I can ping them, but I can't access them inside the browser. They basically get blocked. I tried multiple versions of Eddie (2.12.4, 2.11.15, 2.10.39, various protocols and ports and of course various websites. I also tried both methods for network lock (Windows Firewall & Windows Filtering Platform). I'm having this issue on both Windows 7 and Windows 10. Any ideas how to fix this? Anyone else having this problem? Please, if you have any idea at all on how to fix this, let me know. I really need both network lock and routing rules to work simultaneously.
  6. Hello, I'm using "OpenVPN Settings" on Android, because of an unfixed bug of Android which completely prevents me from using OpenVPN for Android. So I am sorry that I cannot use the recommended app. I created an "Android" config file in the client area, but my first problem is that "/sbin/ip" was not found: iproute was at "/system/bin/ip" instead. I figured out that adding `iproute /system/bin/ip` to my ovpn config file fixed this. Now the openvpn successfully connects either from terminal using `openvpn <filename.ovpn` or using OpenVPN Settings app. But, my browser is still going straight to the web from my mobile network. My IP address is still my normal IP address when I look it up, though OpenVPN logs appear normal and successfully connected. I have tried adding 'redirect-gateway' to the config file but it doesn't work. I would love some support making this connection successful and secure as I would like to use my phone through VPN only for some tasks. I have attached my logs. Thanks!
  7. I've configured the OpenVPN client on my DD-WRT flashed TP-Link router and been running this for a couple of weeks. But I've ran into a couple of issues, firstly when attempting to view or listen to content on my Plex server externally is not possible due to the constant buffering. The other is Netflix has detected I'm using a VPN\proxy and will not let me watch any content. I was wondering if it possible using iptables to force both devices out over the Internet without going over the VPN?
  8. You probably heard of GEMA, the german licensing agency for music content. And you may have heard them and YouTube arguing about licensing fees on YouTube in Germany. As a result YouTube agreed to prevent german IPs from viewing music videos and videos containing even fractions of licensed music. Personally I call this censorship for both viewers and artists/producers. I suggest to create a rule for routing YouTube traffic from all german servers to any server not located in Germany, if possible. Of course I can circumvent this by just connecting to another server outside Germany... but I'm mostly connected to german servers and connecting to another server just to watch one music video is not expedient in my opinion. You may ask: Why do you connect to german servers, then? They're the nearest to my real location and had the best ping results. Advantage for online games.The use of YouTube-only proxy addons like ProxTube is a valid option, though it's proxy servers are not reachable sometimes. But why should I use a tiny proxy service to circumvent blockades if I'm already using a proxy service to which I'm connected the whole time? And for which I pay? It's easier for me to just surf and see that it's running without any modifications, right?I'd really like to see such a routing option. I miss it. -- Being connected to certain servers might not show you the right version of YouTube. The reason isn't clear, it might be a geolocation bug. Following servers are prone to this: Aquilae, DE > Google UK/ITVelorum, DE > Google UK/ITCarinae, UK > Google TR
  9. Hi Is there any way I can add any custom directives to the ovpn.cfg file to route netflix related ip ranges through my ip address and not through the vpn tunnel? I currently have a dsl ac68u modem router combo, hence requesting help with the cfg file as merlin is not supported. Reason being for the selective routing is to bypass the proxy error popup. I hope someone can assist me! thanks!
  10. I believe that passing as few hops as possible on the Internet is a good thing in terms of privacy, security and stability. So I was thinking about developing a setup where I would route traffic to IPs in to country X to the VPN exit node in country X, and traffic to country Y to a VPN exit node in country Y, and so on... This could easily be setup in a router like pfSense etc. I would love to hear your reflections/comments on the security and privacy in such a setup. BR
  11. Hi, Earlier today my airvpn was working fine and was happily connected to a server. However the program froze on my mac and had to force quit it. After force quitting and several fresh installs of the latest software and downgrading to 2.9 I still cannot connect to any of the servers. After a quick check of the log I believe the problem is a routing problem. Please advise. My log: I 2016.02.09 16:19:27 - Session starting.I 2016.02.09 16:19:27 - IPv6 disabled on network adapter (Bluetooth DUN)I 2016.02.09 16:19:27 - IPv6 disabled on network adapter (Ethernet)I 2016.02.09 16:19:27 - IPv6 disabled on network adapter (FireWire)I 2016.02.09 16:19:27 - IPv6 disabled on network adapter (Wi-Fi)I 2016.02.09 16:19:27 - IPv6 disabled on network adapter (Bluetooth PAN)I 2016.02.09 16:19:27 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2016.02.09 16:19:27 - Checking authorization ...! 2016.02.09 16:19:28 - Connecting to Kocab (Netherlands, Alblasserdam). 2016.02.09 16:19:28 - OpenVPN > OpenVPN 2.3.6 x86_64-apple-darwin14.0.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Jan 12 2015. 2016.02.09 16:19:28 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08. 2016.02.09 16:19:28 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3105. 2016.02.09 16:19:28 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.02.09 16:19:28 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.02.09 16:19:28 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.02.09 16:19:28 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]. 2016.02.09 16:19:28 - OpenVPN > UDPv4 link local: [undef]. 2016.02.09 16:19:28 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.180:443. 2016.02.09 16:19:28 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.180:443, sid=382d8973 37e6acb8. 2016.02.09 16:19:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.02.09 16:19:28 - OpenVPN > Validating certificate key usage. 2016.02.09 16:19:28 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.02.09 16:19:28 - OpenVPN > VERIFY KU OK. 2016.02.09 16:19:28 - OpenVPN > Validating certificate extended key usage. 2016.02.09 16:19:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.02.09 16:19:28 - OpenVPN > VERIFY EKU OK. 2016.02.09 16:19:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.02.09 16:19:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.02.09 16:19:30 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.02.09 16:19:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.02.09 16:19:30 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.02.09 16:19:30 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA. 2016.02.09 16:19:30 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.180:443. 2016.02.09 16:19:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.02.09 16:19:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.17.73 255.255.0.0'. 2016.02.09 16:19:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.02.09 16:19:32 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.02.09 16:19:32 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2016.02.09 16:19:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.02.09 16:19:32 - OpenVPN > route: writing to routing socket: File exists. 2016.02.09 16:19:33 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.02.09 16:19:33 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.02.09 16:19:33 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.02.09 16:19:33 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2016.02.09 16:19:33 - OpenVPN > Opened utun device utun1. 2016.02.09 16:19:33 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.02.09 16:19:33 - OpenVPN > /sbin/ifconfig utun1 delete. 2016.02.09 16:19:33 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2016.02.09 16:19:33 - OpenVPN > /sbin/ifconfig utun1 10.4.17.73 10.4.17.73 netmask 255.255.0.0 mtu 1500 up. 2016.02.09 16:19:33 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.17.73 255.255.0.0. 2016.02.09 16:19:33 - OpenVPN > add net 10.4.0.0: gateway 10.4.17.73: File exists. 2016.02.09 16:19:33 - OpenVPN > /sbin/route add -net 213.152.162.180 10.10.16.1 255.255.255.255. 2016.02.09 16:19:33 - OpenVPN > add net 213.152.162.180: gateway 10.10.16.1. 2016.02.09 16:19:33 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.02.09 16:19:33 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2016.02.09 16:19:33 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.02.09 16:19:33 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2016.02.09 16:19:33 - Starting Management Interface. 2016.02.09 16:19:33 - OpenVPN > Initialization Sequence CompletedI 2016.02.09 16:19:33 - DNS of a network adapter forced (Bluetooth DUN)I 2016.02.09 16:19:33 - DNS of a network adapter forced (Ethernet)I 2016.02.09 16:19:33 - DNS of a network adapter forced (FireWire)I 2016.02.09 16:19:33 - DNS of a network adapter forced (Wi-Fi)I 2016.02.09 16:19:33 - DNS of a network adapter forced (Bluetooth PAN)I 2016.02.09 16:19:33 - DNS of a network adapter forced (Thunderbolt Bridge)I 2016.02.09 16:19:33 - Flushing DNSI 2016.02.09 16:19:33 - Checking routeE 2016.02.09 16:19:34 - Routing checking failed.. 2016.02.09 16:19:34 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3105! 2016.02.09 16:19:34 - Disconnecting. 2016.02.09 16:19:34 - Management - Send 'signal SIGTERM'. 2016.02.09 16:19:34 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.02.09 16:19:34 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.02.09 16:19:34 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.02.09 16:19:39 - OpenVPN > /sbin/route delete -net 213.152.162.180 10.10.16.1 255.255.255.255. 2016.02.09 16:19:39 - OpenVPN > delete net 213.152.162.180: gateway 10.10.16.1. 2016.02.09 16:19:39 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.02.09 16:19:39 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1. 2016.02.09 16:19:39 - Connection terminated.I 2016.02.09 16:19:39 - DNS of a network adapter restored to original settings (Bluetooth DUN). 2016.02.09 16:19:39 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.02.09 16:19:39 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1. 2016.02.09 16:19:39 - OpenVPN > Closing TUN/TAP interfaceI 2016.02.09 16:19:39 - DNS of a network adapter restored to original settings (Ethernet). 2016.02.09 16:19:39 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exitingI 2016.02.09 16:19:39 - DNS of a network adapter restored to original settings (FireWire)I 2016.02.09 16:19:39 - DNS of a network adapter restored to original settings (Wi-Fi)I 2016.02.09 16:19:39 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2016.02.09 16:19:39 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2016.02.09 16:19:41 - Cancel requested.I 2016.02.09 16:19:41 - IPv6 restored on network adapter (Bluetooth DUN)I 2016.02.09 16:19:41 - IPv6 restored on network adapter (Ethernet)I 2016.02.09 16:19:41 - IPv6 restored on network adapter (FireWire)I 2016.02.09 16:19:41 - IPv6 restored on network adapter (Wi-Fi)I 2016.02.09 16:19:41 - IPv6 restored on network adapter (Bluetooth PAN)I 2016.02.09 16:19:41 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2016.02.09 16:19:41 - Session terminated.
  12. I have installed and got AirVPN working great on Windows 10. I have a Plex media server on the same pc but the Plex remote connection goes through the VPN. I want it to go outside the VPN and all other traffic on the pc go through the VPN. I have been able to get Plex to connect when the VPN is disconnected and I have also been able to get Plex to connect while VPN is connected but traffic goes through the VPN. I want to be able to connect to the VPN but all Plex traffic to travel outside the VPN. I need help!
  13. Having trouble connecting. First the route check times out. Then, if I disable the "check if tunnel works" in the preferences, the DNS check times out. If I disable the DNS check, I can get a connection to a server, but the connection doesn't work (no internet). Been using AirVPN for a while and never had this problem. It worked yesterday, and I've made no changes. What's up? I 2015.12.03 10:16:27 - Session starting. I 2015.12.03 10:16:27 - IPv6 disabled on network adapter (Bluetooth DUN) I 2015.12.03 10:16:27 - IPv6 disabled on network adapter (Wi-Fi) I 2015.12.03 10:16:28 - IPv6 disabled on network adapter (Bluetooth PAN) I 2015.12.03 10:16:28 - IPv6 disabled on network adapter (Thunderbolt Bridge) I 2015.12.03 10:16:28 - Checking authorization ... ! 2015.12.03 10:16:28 - Connecting to Atik (Netherlands, Alblasserdam) . 2015.12.03 10:16:28 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 13 2015 . 2015.12.03 10:16:28 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2015.12.03 10:16:28 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101 . 2015.12.03 10:16:28 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2015.12.03 10:16:28 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.12.03 10:16:28 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.12.03 10:16:28 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072] . 2015.12.03 10:16:28 - OpenVPN > UDPv4 link local: [undef] . 2015.12.03 10:16:28 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.9:443 . 2015.12.03 10:16:28 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.9:443, sid=952cdddf af993acb . 2015.12.03 10:16:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2015.12.03 10:16:28 - OpenVPN > Validating certificate key usage . 2015.12.03 10:16:28 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2015.12.03 10:16:28 - OpenVPN > VERIFY KU OK . 2015.12.03 10:16:28 - OpenVPN > Validating certificate extended key usage . 2015.12.03 10:16:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2015.12.03 10:16:28 - OpenVPN > VERIFY EKU OK . 2015.12.03 10:16:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2015.12.03 10:16:29 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.12.03 10:16:29 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.12.03 10:16:29 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2015.12.03 10:16:29 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2015.12.03 10:16:29 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2015.12.03 10:16:29 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.9:443 . 2015.12.03 10:16:31 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2015.12.03 10:16:31 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.22.155 255.255.0.0' . 2015.12.03 10:16:31 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2015.12.03 10:16:31 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2015.12.03 10:16:31 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2015.12.03 10:16:31 - OpenVPN > OPTIONS IMPORT: route options modified . 2015.12.03 10:16:31 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2015.12.03 10:16:31 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2015.12.03 10:16:31 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy . 2015.12.03 10:16:31 - OpenVPN > Opened utun device utun1 . 2015.12.03 10:16:31 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2015.12.03 10:16:31 - OpenVPN > /sbin/ifconfig utun1 delete . 2015.12.03 10:16:31 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2015.12.03 10:16:31 - OpenVPN > route: writing to routing socket: File exists . 2015.12.03 10:16:31 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2015.12.03 10:16:31 - OpenVPN > /sbin/ifconfig utun1 10.4.22.155 10.4.22.155 netmask 255.255.0.0 mtu 1500 up . 2015.12.03 10:16:32 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.22.155 255.255.0.0 . 2015.12.03 10:16:32 - OpenVPN > add net 10.4.0.0: gateway 10.4.22.155: File exists . 2015.12.03 10:16:32 - OpenVPN > /sbin/route add -net 213.152.161.9 10.0.1.1 255.255.255.255 . 2015.12.03 10:16:32 - OpenVPN > add net 213.152.161.9: gateway 10.0.1.1 . 2015.12.03 10:16:32 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0 . 2015.12.03 10:16:32 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1 . 2015.12.03 10:16:32 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0 . 2015.12.03 10:16:32 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1 . 2015.12.03 10:16:32 - Starting Management Interface . 2015.12.03 10:16:32 - OpenVPN > Initialization Sequence Completed I 2015.12.03 10:16:32 - DNS of a network adapter forced (Bluetooth DUN) I 2015.12.03 10:16:32 - DNS of a network adapter forced (Wi-Fi) I 2015.12.03 10:16:32 - DNS of a network adapter forced (Bluetooth PAN) I 2015.12.03 10:16:32 - DNS of a network adapter forced (Thunderbolt Bridge) I 2015.12.03 10:16:32 - Flushing DNS I 2015.12.03 10:16:32 - Checking route W 2015.12.03 10:17:22 - The request timed out ! 2015.12.03 10:17:22 - Disconnecting . 2015.12.03 10:17:22 - Management - Send 'signal SIGTERM' . 2015.12.03 10:17:22 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2015.12.03 10:17:22 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2015.12.03 10:17:22 - OpenVPN > SIGTERM received, sending exit notification to peer . 2015.12.03 10:17:27 - OpenVPN > /sbin/route delete -net 213.152.161.9 10.0.1.1 255.255.255.255 . 2015.12.03 10:17:27 - OpenVPN > delete net 213.152.161.9: gateway 10.0.1.1 . 2015.12.03 10:17:27 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0 . 2015.12.03 10:17:27 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1 . 2015.12.03 10:17:27 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0 . 2015.12.03 10:17:27 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1 . 2015.12.03 10:17:27 - OpenVPN > Closing TUN/TAP interface . 2015.12.03 10:17:27 - Connection terminated. . 2015.12.03 10:17:27 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting I 2015.12.03 10:17:27 - DNS of a network adapter restored to original settings (Bluetooth DUN) I 2015.12.03 10:17:27 - DNS of a network adapter restored to original settings (Wi-Fi) I 2015.12.03 10:17:27 - DNS of a network adapter restored to original settings (Bluetooth PAN) I 2015.12.03 10:17:27 - DNS of a network adapter restored to original settings (Thunderbolt Bridge) I 2015.12.03 10:17:28 - Cancel requested. I 2015.12.03 10:17:28 - IPv6 restored on network adapter (Bluetooth DUN) I 2015.12.03 10:17:28 - IPv6 restored on network adapter (Wi-Fi) I 2015.12.03 10:17:28 - IPv6 restored on network adapter (Bluetooth PAN) I 2015.12.03 10:17:28 - IPv6 restored on network adapter (Thunderbolt Bridge) ! 2015.12.03 10:17:28 - Session terminated.
  14. Hello folks, I have setup my Netgear R6250 with DD-WRT, and OpenVPN connecting to AirVPN. This is all well and good, but now I'd like to somehow be able to choose which traffic is inside or outside the tunnel, either by source IP/subnet, port, destination host, or some other way. A GUI to accomplish this would be wonderful, but not essential. I am open to adding additional devices to perform such functions if that's necessary. I've read many (many many) myriad forum posts and wikis offering differing, conflicting ways to accomplish this using DNSMasq, iptables, Policy based routing, Source based routing, pfSense, and apple pie (I made one of these up). I think much of this is due to the various versions of dd-wrt available, the wonderful various options available to the power user to configure the way they want it, and that there's several different approaches that may or may not work on any given hardware. What that equals for me is confusion. Its my intention to set this up, and document the process in a way that's easy to follow, and add my own experiences to those already floating on the intertubes. Ideally I'd accomplish it with just some dd-wrt trickery. So far the solutions I've found have been written with a specific setup in mind that I'm unable to adapt to my setup, or they just didn't work (or I didn't understand them). It'd be great if we can talk through it together, and rejoice together in our shared insight and accomplishment.
  15. On the routes option of the VPN program for Windows 2.8.8, there is an option for "Not specified routes go:" and the only way I can get my WD live media players to see the computer that has the VPN running on it is to set this option to "Outside the VPN" My Question is, does this compromise the point of the vpn for p2p (I have Vuze binded to the VPN connection, and the port forwarded) or to anything I look at via Firefox on the computer? Or better still do you know of how I would need to have this set up to run the above option as "Inside the VPN Tunnel" and allow the WD live players to see my FTFS network shares on the PC that has the VPN running. Many thanks for your help... On the routes option of the VPN program, there is an option for "Not specified routes go:" and the only way I can get my WD live media players to see the computer that has the VPN running on it is to set this option to "Outside the VPN" My Question is, does this compromise the point of the vpn for p2p (I have Vuze binded to the VPN connection, and the port forwarded) or to anything I look at via Firefox on the computer? Or better still do you know of how I would need to have this set up to run the above option as "Inside the VPN Tunnel" and allow the WD live players to see my FTFS network shares on the PC that has the VPN running. Many thanks for your help...
  16. Hi everyone, I know there have been speculatory threads on VM in the past, but I wanted to post some findings in case anyone finds them useful. I have a 152Mbps connection from VM in the UK and have noticed the following: Using the Superhub 2 and OpenVPN (443, UDP) gives a hard cap around 3MB/sec over ethernetUsing the Superhub 2 and OpenVPN (443, UDP) gives full speed on 5GHz wifiUsing an old PC running pfSense beta with the Superhub 2 in modem only mode removes the 'cap' and allows full speeds regardless of connection method I had been very frustrated by the 3MB/sec limit, especially when downloading torrents over OpenVPN (port 443, UDP or TCP) using a cat6e desktop PC. The limit applied in Windows and Linux equally and I'd eventually tracked down the issue to the Superhub 2. After switching into modem only mode and connecting through the pfSense box, I was able to get full speed regardless of the OS, and connection method (wireless or ethernet). Having switched back temporarily to the Superhub 2 in router mode (to set up a media streamer on the TV) I once again encountered the cap when downloading a Linux torrent (Elementary OS Freya Beta 1). This time I was running Eddie rather than OpenVPN GUI so I switched the connection to SSL Tunnel 443 and voila - full speeds! So either VM are throttling OpenVPN connections, or there's a bug in the SH2 which interferes with the handling of OpenVPN connections. Given VM's history of throttling and capping I would generally suspect the former to be true. However, I have noticed that even with normal OpenVPN connections (443, UDP) I get full speed over wifi but the cap returns when switching to ethernet. It seems the SH2 has (yet another) bug or issue in routing OpenVPN connections, and changing its firewall settings etc has no effect. Anyone on VM experiencing issues with low speeds would probably see good results from switching to the SSL tunnel. I'd be interested to hear back from anyone else having problems with their SH to see if this helps others. I could always stick to the pfSense box of course, but it's an old desktop which uses a lot of energy compared to a small consumer router box. My network isn't complicated enough to warrant the pfSense box unless it's essential - which now, with the SSL tunnel, it isn't.
  17. Hey I got a problem. When i connect to a vpn server, it says connected. but im still using my ISP IP instead of the IP of the VPN Server... How do i fix this? These are my machine details: Operating System Version: Microsoft Windows Server 2012 Datacenter Hardware information: HP ProLiant ML110 G6 Processors: Intel® Xeon® CPU X3430 @2.40GHz Installed Memory (RAM): 24GB Installed Roles: AD DSDHCPDNSFile and Storage ServicesHyper-VIIS 8.0IPAMNAPRemote AccessWDSLog: http://pastebin.com/43UnP5Ci SOLVED: This message is the answer!: Awesome StaffAdvanced Member Staff5013 postsPosted Yesterday, 11:40 PM Hello! The tun/tap interface (the virtual network card used by OpenVPN) does not come up. Please try to run our client Eddie, which includes some additional code which tries to force the interface up. If the client attempt does not work, please follow all the steps described here: https://airvpn.org/t...2012/#entry8321 Kind regards
  18. Hi, I have just become aware of the MPLS protocol. Can someone give me a rough idea of how that could interact with Open VPN and if using an MPLS enabled router would be a good thing for Open VPN users? Thanks
  19. This is my setup: I got 2 machines, a dedicated server machine and a normal laptop. The server is running Windows Server 2012 Datacenter The server has 6 NICs (Network Interface Connections). Ethernet 1 has a internet connection to my ISP router which i do not have login access to. Ethernet 5 (also functions as Mgnt) is connected to my laptop. The setup that i have is that any traffic from/to the laptop on Ethernet 5 goes through Ethernet 1. (a basic NAT setup.) The server translates the private ip from Ethernet 5 to the public ip on Ethernet 1. This works without problems. Heres the problem: When i connect to an airVPN Server, the laptop loses its internet access.. I want the laptop to be able to access internet. It doesnt matter if thats through AirVPN or directly with the real IP. That doesnt matter at all. The only thing that matters is an internet connection that the laptop can use.
  20. Hello AirVPN community, I've been lurking a few months, recently subscribed to the service here and am still learning/experimenting with different configurations. This forum btw, is one of the big reasons I decided to go with AirVPN, so kudos to the community and staff for developing a great knowledge base here. On to my question: I'm trying to route traffic from my Virtual box VM out the VPN interface without having to force ALL host traffic out the VPN. My setup: I followed Nadre's wonderful Traffic splitting guide in order to setup utorrent traffic to go out the VPN interface while the rest of my host(windows 7) traffic goes out the regular LAN interface and it's working marvously. My next goal is to run tails in virtual box and route all traffic from that VM out the VPN. The solution i'm looking for has the following goals: Host traffic goes out the non-vpn interface (check)uTorrent traffic goes out the VPN interface (check)Tails VM traffic goes out the VPN interface while maintaing the two above requirements.I've pondered over some way to use the host routing table to accomplish this, but haven't com up with anything. Virtual Box has a NAT bind option, but it is not currently working from what i gathered from the virtual box forums. I did find another post that claims that what i'm looking to do isn't possible but someone did detail a way to do it with a secondary vm acting as a router. While I could do this, i'd rather not put the extra strain on my host for just day to day stuff unless it's absolutely neccessary. Does anyone around here have a better way to accomplish this without the secondary VM? Thanks!
×
×
  • Create New...