Jump to content
Not connected, Your IP: 3.16.51.237

Search the Community

Showing results for tags 'vm'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 13 results

  1. Okay so I'm trying to port forward plex and qbittorrent but testing it using Airvpn returns " Connection timed out (110) " and using https://www.yougetsignal.com/tools/open-ports/ tells me that both ports are closed. The setup I have is a bit complicated since Plex and Qbittorrent are running in docker along with an openvpn-client to connect to Airvpn. Docker is running in vm using Fedora CoreOS and the vm is running on a machine with a Fedora Server. I tried different ports, rebooting the machines and temporarily disabling the firewall on the vm and host but its still no working. Also, I'm behind a carrier grade nat but to my understanding that should not affect port forwarding using Airvpn, right? So not exactly sure were the problem is.
  2. Hello, I am running Ubuntu 18.04 with zerotier installed and using the eddie client(network lock enabled). Is there a way to have zerotier connected? Edit: Inside or outside airVPN would be fine.
  3. Hi everyone, I would like to set up a local webserver on a VM that is accessible through a public URL while sitting behind airvpn. Here is what I have got: QNAP NAS with Ubuntu 16.04 Server VM up and running (LAMP Server)PFSENSE Router that holds the openvpn connection to airvpn for all devices passing through the routerDnamic URL through https://www.dynu.com resolving to airvpn IP NOTE: I live in a restricted country where domains such as those of VPN providers are blocked (so I can't easily portforward and create a dynamic URL with a airvpn TLD.. QUESTION: is there a way I can have this setup work (and if so, how)? mydomain.com => AIRVPN => PFSENSE => VM (https and https, possibly also S/FTP and SSH) Most guides speak about the port forwarding with a URL that contains the airvpn domain name. I can't use that as mentioned above... Thanks for your support, I'll probably still need to setup the firewall rules on pfsense but that's the easier part I believe...
  4. Hi! I've been a long-time AirVPN user and I love the service and the fact that it's run by people who truly believe in their mission and not as a commercial venture. I've been wondering if it might be a good thing to do to use a VM with another OS/browser, through another AirVpn server for websites that have access to my personal data. I've set the VM up, but it's not as fast as my host system, perhaps because I'm using an intergrated GPU? I'm not sure if inserting a dedicated GPU could improve performance (I have a good one lying around), but it still would be more hassle anyway to browse the Internet this way. Do you guys think it's worth it? Otherwise, are there any good and convenient methods to obfuscate your identity and avoid fingerprinting? Could using Torbrowser, for example, be a better solution? (I'm already using https://airvpn.org/topic/15769-how-to-harden-firefox-extreme-edition/?hl=fingerprinting this Firefox setup and I'm getting quite a low fingerprinting rating, btw) Thanks!
  5. Hi everyone, I would like to have my digital ocean VM use a VPN for its outgoing http requests. I am using openVPN on Ubuntu 14.04.1 LTS (GNU/Linux 3.5.0-48-generic x86_64). Got the files AirVPN_Europe_TCP-53.ovpn ca.crt ta.key user.crt user.key in one directory. VPN is using TCP protocol on port 53. Also tried with UDP, same problem also copied the files to /etc/openvpn/ to try to run it via openvpn start. If I do that, I get the output: root@tr:/home# sudo service openvpn start * Starting virtual private network daemon(s)... ..but nothing happens. curl http://www.ipchicken.com still reveals the servers ip If I directly run root@tr:/etc/openvpn# sudo openvpn AirVPN_Europe_TCP-53.ovpn Thu Sep 18 09:42:35 2014 OpenVPN 2.3.2 i686-pc-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [iPv6] built on Feb 4 2014 Thu Sep 18 09:42:35 2014 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file Thu Sep 18 09:42:35 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Sep 18 09:42:35 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Sep 18 09:42:35 2014 Socket Buffers: R=[87380->131072] S=[87380->131072] Thu Sep 18 09:42:35 2014 Attempting to establish TCP connection with [AF_INET]95.211.186.65:53 [nonblock] Thu Sep 18 09:42:36 2014 TCP connection established with [AF_INET]95.211.186.65:53 Thu Sep 18 09:42:36 2014 TCPv4_CLIENT link local: [undef] Thu Sep 18 09:42:36 2014 TCPv4_CLIENT link remote: [AF_INET]95.211.186.65:53 Thu Sep 18 09:42:36 2014 TLS: Initial packet from [AF_INET]95.211.186.65:53, sid=d5ee74c0 46f1dcfd Thu Sep 18 09:42:36 2014 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Thu Sep 18 09:42:36 2014 Validating certificate key usage Thu Sep 18 09:42:36 2014 ++ Certificate has key usage 00a0, expects 00a0 Thu Sep 18 09:42:36 2014 VERIFY KU OK Thu Sep 18 09:42:36 2014 Validating certificate extended key usage Thu Sep 18 09:42:36 2014 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Thu Sep 18 09:42:36 2014 VERIFY EKU OK Thu Sep 18 09:42:36 2014 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org Thu Sep 18 09:42:37 2014 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Thu Sep 18 09:42:37 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Sep 18 09:42:37 2014 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Thu Sep 18 09:42:37 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Sep 18 09:42:37 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA Thu Sep 18 09:42:37 2014 [server] Peer Connection Initiated with [AF_INET]95.211.186.65:53 Thu Sep 18 09:42:39 2014 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Thu Sep 18 09:42:40 2014 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.9.0.1,comp-lzo no,route 10.9.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.9.0.254 10.9.0.253' Thu Sep 18 09:42:40 2014 OPTIONS IMPORT: timers and/or timeouts modified Thu Sep 18 09:42:40 2014 OPTIONS IMPORT: LZO parms modified Thu Sep 18 09:42:40 2014 OPTIONS IMPORT: --ifconfig/up options modified Thu Sep 18 09:42:40 2014 OPTIONS IMPORT: route options modified Thu Sep 18 09:42:40 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Thu Sep 18 09:42:40 2014 ROUTE_GATEWAY 178.62.192.1/255.255.192.0 IFACE=eth0 HWADDR=04:01:28:70:e1:01 Thu Sep 18 09:42:40 2014 TUN/TAP device tun0 opened Thu Sep 18 09:42:40 2014 TUN/TAP TX queue length set to 100 Thu Sep 18 09:42:40 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 Thu Sep 18 09:42:40 2014 /sbin/ip link set dev tun0 up mtu 1500 Thu Sep 18 09:42:40 2014 /sbin/ip addr add dev tun0 local 10.9.0.254 peer 10.9.0.253 Thu Sep 18 09:42:40 2014 /sbin/ip route add 95.211.186.65/32 via 178.62.192.1 Thu Sep 18 09:42:40 2014 /sbin/ip route add 0.0.0.0/1 via 10.9.0.253 Thu Sep 18 09:42:40 2014 /sbin/ip route add 128.0.0.0/1 via 10.9.0.253 Write failed: Broken pipe After that the VM is just completely down / frozen and I need to restart it. Really no clue on whats going wrong here and have been on this for hours. Any idea?
  6. I want to run the VPN on my host machine while using a virtual machine (VM) Oracle VM Virtualbox to run my every day browsers and sites. I have tried my best today for several hours but I have had an extremely hard time setting it up. Some sites do not work properly. I am assuming this is a networking issue somewhere (host computer, VM settings, or router, or the VPN?). What needs to be done to get all the systems to work together? Symptoms are getting "localhost" white crash pages, sites not loading properly on the VM. I have tried also installing airvpn on the VM, but it does not connect (connection reset by peer or "Cannot login (An exception occurred during a WebClient request). Help is greatly appreciated!
  7. VIRTUAL MACHINES AND VPN This is a quick short guide to anyone wanting to use VPN over a virtual machine, and also how to use TOR and VPN in a virtual machine. REQUIREMENTS 1. Virtualization software such as: Oracle VM Virtualbox (Free) https://www.virtualbox.org/ VM Ware Workstation (Proffesional Software) http://www.vmware.com/uk/products/workstation.html Windows Virtual PC (Freeware but can only install systems for Windows XP and up) https://www.microsoft.com/en-us/download/details.aspx?id=3702 These are the three most popular options for virtualization software. I personally recommend using Virtualbox if you don't want to pay a lot of money for VM Ware, although it is packed with features and is probably the most advanced virtualization software on the market, hence why it is used by professionals and large companies. 2. An ISO image of the operating system you'd like to use. If you want general purpose virtualization, such as testing applications, I recommend Windows. If you want to use TOR, refer to the TOR section down below. 3. A decent computer. What you will be basically doing is running a computer inside your computer. Yeah I know, Inception, right? Anyway, you should have a decent computer for this, and I recommend minimum of 8gb of RAM. You should also have a decent CPU as it will also affect the performance of the virtual machine. 4. A VPN. If you are on this forum you should be using Air, but this should work with any properly configured VPN. CONFIGURATION I won't go through the set up and installation of a operating system in a virtual machine in this guide because there are plenty of resources out there that explain how to do this. Make sure you are connected to your VPN on your host machine (The computer you are running the virtual machine on). Once you have your virtual machine configured, be it Linux or Windows or any operating system, the essential thing you need to do is switch your virtual machines network adapter to use NAT. It is absolutely essential that you do this, otherwise your true IP address will be used by the virtual machine. Bridged modes simply use your network adapter hardware directly, which reveals your real IP. The NAT (Network Address Translation) mode uses your host operating system's IP address, and if your VPN is configured properly it will mean the virtual machine is using the exact same VPN connection your computer is using. USING TOR IN A VIRTUAL MACHINE If you want to use TOR in a virtual machine, you have two options. You can either use the TOR Browser like in a regular computer, running it on Windows or Linux, whatever your choice may be. I personally recommend using Tails, an operating system designed for anonymity and usage of TOR. TAILS Tails is a live operating system designed for anonymity and privacy, and is released under the GNU/GPL license. All of the source code of the applications that tails uses that are not taken directly from upstream Debian packages are available on their git repositories, they have a guide here: https://tails.boum.org/contribute/git/ The great thing about tails is that it is crammed with programs and features for anonymity, security and privacy. It has email clients, tools for public keys and GPG, disguising the operating system as Windows 8 if you want to use it in public places, instant messaging clients, and many, many more. So now that you know what Tails is, you probably can't wait to get it. The best part is that it is a live operating system, and you don't need to install it. Tails homepage: https://tails.boum.org/ They also made a great installation guide if you want to install Tails to a usb stick: https://tails.boum.org/install/ To use tails in a virtual machine, they have made a guide here: https://tails.boum.org/doc/advanced_topics/virtualization/virtualbox/ (The steps for virtualbox in Linux are pretty much the exact same as in Windows) MAKE SURE YOU USE NAT IN THE TAILS VIRTUAL MACHINE Hope you found this guide useful, and don't forget to send it to friends to help them use the internet privately, and securely
  8. So I know this maybe over the top and a wee bit silly but what if you chained 2 VPNs together through virtualization (VPN 1 on host machine and VPN 2 on a virtual machine) but instead of running 1 virtual machine you installed a virtual machine inside of a virtual machine and installed VPN 2 inside that virtual machine thats installed inside the virtual machine then create another virtual machine seperate from the others and install pfsense and configure it and route the traffic through VM 2 (virtual machine inside the virtual machine) to VM 1 then back through the host? And of cousre run TOR too............ VPNception?
  9. Basically BitBox (Browser in the Box) is a VirtualBox VM with a reduced Debian Linux installation in which a Firefox or Chrome browser is started directly after it's launch. The developer company Sirrix AG is based in Saarbrücken, Germany, and didn't intend to provide maximum anonymity. Instead, they focused on maximum security. You can easily install your favorite anonymity addons and browse (more or less) secure and (more or less) anonymous. BitBox on sirrix.com BitBox download from sirrix.com Video about BitBox by german YouTuber SemperVideo
  10. Hello AirVPN community, I've been lurking a few months, recently subscribed to the service here and am still learning/experimenting with different configurations. This forum btw, is one of the big reasons I decided to go with AirVPN, so kudos to the community and staff for developing a great knowledge base here. On to my question: I'm trying to route traffic from my Virtual box VM out the VPN interface without having to force ALL host traffic out the VPN. My setup: I followed Nadre's wonderful Traffic splitting guide in order to setup utorrent traffic to go out the VPN interface while the rest of my host(windows 7) traffic goes out the regular LAN interface and it's working marvously. My next goal is to run tails in virtual box and route all traffic from that VM out the VPN. The solution i'm looking for has the following goals: Host traffic goes out the non-vpn interface (check)uTorrent traffic goes out the VPN interface (check)Tails VM traffic goes out the VPN interface while maintaing the two above requirements.I've pondered over some way to use the host routing table to accomplish this, but haven't com up with anything. Virtual Box has a NAT bind option, but it is not currently working from what i gathered from the virtual box forums. I did find another post that claims that what i'm looking to do isn't possible but someone did detail a way to do it with a secondary vm acting as a router. While I could do this, i'd rather not put the extra strain on my host for just day to day stuff unless it's absolutely neccessary. Does anyone around here have a better way to accomplish this without the secondary VM? Thanks!
  11. I thought I would pose this question here as I cannot find a clean answer searching online. I run AirVPN via my Tomato router and it works great. I have a computer on my LAN that serves as a host for a VirtualBox guest VM that runs my torrent client. Both the host computer and guest VM run Windows 7. I would like to allow the guest VM to only have Internet access and have no access at all to either the host computer or the rest of the LAN. Does anyone know how I would do that? Much thanks!
  12. Hi guys! I'm currently using the 3 day paid package and tinkering a bit with my VPN setup. I am looking into the popular topic of separating different traffic types or applications with the use of a vpn gateway. I've already read topics like https://airvpn.org/topic/9923-tor-over-airvpn-vs-airvpn-with-tor/ , https://airvpn.org/topic/9609-blocking-non-vpn-traffic-with-windows-firewall/ and similar and I was wondering (hopefully this won't be a too noobish question), if instead of configuring the Windows firewall (like it would be in my case) it would be more feasible to just run the airVPN Client inside a Linux VM, inside VMPlayer or VirtualBox and the like. I'm putting possible performance issues and the security concerns of the host OS aside. What kind of OS, or which Linux distro i guess, could be used for this configuration? So with the final setup, I could use my host OS for my "normal" activities" and the VMwith encrypted drives for torrenting, unlocking youtube vids etc. and if i feel the need to encrypt all traffic, I could just power off the VM and use the client on the host. Thanks in advance for your input!
  13. Hello all, I am currently connected to Air vpn, then running a virtual machine. I am also running tor on the vm, but I am not sure if the traffic from tor is being routed through my vpn...any input is so very much appreciated..I am at a loss for tech skills here. Thank you all.
×
×
  • Create New...