Jump to content

Using AirVPN with Tor
do NOT use AirVPN server as Tor Exit Node.

We are already funding exit and relay nodes. If people employs AirVPN servers as exit-nodes, our servers are marked as proxy and other customers will encounter ban issues. Thanks.

This connection mode works ONLY with AirVPN Client, because our software talks to Tor Control to detect and route correctly the guard(s) IP addresses. Otherwise an infinite connection loop occurs because communication between Tor and the guard node (the first node of each circuit) will fall back to the VPN (causing errors like Inactivity timeout, recv_socks_reply: TCP port read timeout expired: Operation now in progress, Assertion failed at misc.c:785). Warning: not compatible with Network Lock at the moment.




Tor Control authentication

AirVPN client needs access to Tor Control to works properly. To check if it already works, use the Test button in Preferences > Mode
With the default Tor Browser Bundle (that has Control Port and Cookie authentication enabled by default), AirVPN will automatically works.
In other environments, some configuration in torrc (probably under /etc/tor/torrc) may be required. First of all, ensure that ControlPort is enabled
ControlPort 9151
Now you have two choices.

Using Tor over AirVPN

If you wish to connect over Tor over AirVPN: All the applications configured to connect over Tor will connect over Tor over AirVPN. All the applications not configured for Tor will simply connect over the VPN.


Please note that, with the above setup, if you connect to our web site with a Tor configured browser, our web server will see your Tor exit node IP address, so the site will display a red bottom box, as if you were not connected to an Air server.
Servers online. Online Sessions: 15503 - BW: 66280 Mbit/sYour IP: Access.