Jump to content


Photo

Tor exit node is set automatically after April 2014 AirVPN Major System Update (but only under Linux)

AirVPN system update Ubuntu 14.04 LTS 64-bit Windows 8.1 Pro 64-bit Tor exit node ipleak.net Comodo Firewall

Best Answer Staff, 20 April 2014 - 08:01 PM

Hello!

It implies that the VPN server has been listed as a TOR exit-node in the TOR exit-nodes list. This is caused by the fact that someone is running a TOR exit-node from behind our server (the exit-IP of the VPN server is shared). Since AirVPN does not discriminate against any protocol or application and we strictly comply to the broadest definition of Net Neutrality, this is not forbidden. Of course this does NOT mean in any way that you're in the TOR network.

Kind regards

Go to the full post


  • Please log in to reply
2 replies to this topic

#1 Marcus.Aurelius

Marcus.Aurelius

    Member

  • Members
  • PipPip
  • 10 posts

Posted 20 April 2014 - 07:56 PM

Hi!

 

After April 2014 AirVPN Major System Update I downloaded AirVPN Client v. 1.92 and generated new configurations for both Windows and Linux. However, when I am connected to AirVPN servers under Ubuntu 14.04 LTS Trusty Tahr 64-bit, ipleak.net reveals that Tor exit node is set along with AirVPN exit node, despite the fact that Tor application is not even installed. When Windows 8.1 Pro 64-bit is in use, Tor exit node doesn't exist. I checked the connection a few times with either Comodo Firewall turned on and off. My Comodo Firewall is configured to prevent leaks according to AirVPN articles.

 

In short, what does it mean? Does my connection (under Windows) lack some recently added additional layer of protection? If yes, how to turn it on. Have I to change Comodo Firewall configuration? If yes, tell me how, please.

 

Thank you for your responses.



#2 Staff

Staff

    Advanced Member

  • Staff
  • PipPipPip
  • 7796 posts

Posted 20 April 2014 - 08:01 PM   Best Answer

Hello!

It implies that the VPN server has been listed as a TOR exit-node in the TOR exit-nodes list. This is caused by the fact that someone is running a TOR exit-node from behind our server (the exit-IP of the VPN server is shared). Since AirVPN does not discriminate against any protocol or application and we strictly comply to the broadest definition of Net Neutrality, this is not forbidden. Of course this does NOT mean in any way that you're in the TOR network.

Kind regards



#3 giganerd

giganerd

    I shall have no title

  • Members2
  • PipPipPip
  • 2687 posts
  • LocationGermany

Posted 21 April 2014 - 05:01 PM

Hello!

It implies that the VPN server has been listed as a TOR exit-node in the TOR exit-nodes list. This is caused by the fact that someone is running a TOR exit-node from behind our server (the exit-IP of the VPN server is shared). Since AirVPN does not discriminate against any protocol or application and we strictly comply to the broadest definition of Net Neutrality, this is not forbidden. Of course this does NOT mean in any way that you're in the TOR network.

Kind regards

 

One side question: Which list(s) does ipleak.net use in order to identify TOR exit-nodes?


Always remember:
There's a guide to AirVPN,

Amazon IPs are not dangerous here,
running TOR exits is discouraged,

using spoilers for your logs helps us read your thread.

~ Furthermore, I propose that your paranoia is to be destroyed. ~

Instead of writing me a personal mail, consider contacting me via XMPP at gigan3rd@xmpp.airvpn.org or join the lounge@conference.xmpp.airvpn.org. I might read the mail too late whereas I'm always available on XMPP ;)






Similar Topics Collapse


1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users

Servers online. Online Sessions: 14129 - BW: 52342 Mbit/sYour IP: 54.197.24.206Guest Access.