Jump to content


Member Since 04 Jun 2010
Online Last Active Today, 09:26 AM

Posts I've Made

In Topic: Airvpn over Tor connection connecting as Tor over Airvpn

Yesterday, 08:44 PM

However, when I test what my ip address is from the tor browser, it returns the tor exit node address, not the airvpn server address.  And when I try another browser, which is not proxied through tor, the ip address returned is that of the airvpn server address.





That's just fine. When OpenVPN is connected to Tor, and you use another application which is configured to connect to Tor, that application traffic will be tunneled over Tor only. You can see the reason by looking at the routing table and the gateways of your system. On a qualitative level, let's say that an application configured to connect to Tor proxy locally will connect to Tor proxy locally, it has no way to route the traffic on the tun interface to reach the VPN gateway which can be reached only over OpenVPN over Tor (OpenVPN connects to Tor proxy locally as well).


In https://airvpn.org/tor you can see the above depicted in the first picture.


If you need Tor over OpenVPN, connect OpenVPN directly to a VPN server, then use Tor. All the applications configured to connect to Tor will have their traffic tunneled over Tor over OpenVPN.


Kind regards

In Topic: VPN browser extension?

Yesterday, 08:09 PM



The browser extensions you mention configure your browser to tunnel its traffic, and only its own, over some SOCKS or HTTPS proxy. Normally it has nothing to do with entering a Virtual Private Network and should not be considered a reliable method to build an anonymity layer, not even a weak one, because all the other traffic (system traffic, other applications traffic, traffic generated by plug-ins too in some cases) will not be tunneled.


On top of the above some technical challenges and concerns about DNS pre-fetching and more in general about the fact that DNS queries will not be tunneled anyway in some systems (Windows) under not uncommon circumstances must be taken into account.


So the whole matter seems outside AirVPN scope, as AirVPN service is meant primarily as a privacy enhancing service through an anonymity layer which aims to not let any single packet go out to the Internet with your "real" IP address AND to send to the Internet packets with an IP address that's even different than the IP address of the VPN server you connect to (a very important feature that is often overlooked and which is not offered by many VPNs, and that anyway can't be offered by a proxy).


It might be a service for other purposes, but it does not seem aimed to create any anonymity layer of any kind and/or to the purpose  AirVPN is meant for.


Kind regards

In Topic: Slow speeds

19 July 2018 - 12:29 PM

Thanks for the reply. I set send/receive to 512.


No VPN: 395-415 Mb/s

UDP 443: 10 Mb/s

TCP 443: 20-25 Mb/s

UDP 1194: 15-25 Mb/s


I've also tried multiple servers, Netherlands included, and none were over 33% capacity. It seems like VPNs just don't like me. lol. I tried Nord too and had the same speed issues.



Hello! You are capped through traffic shaping. either enforced by yourself (check any filtering tool on your router and system) or more likely by your ISP.


Note how TCP is faster than UDP. This makes no sense in an agnostic network because OpenVPN is much faster in UDP, so it's a strong clue hinting to traffic shaping.


Test an "OpenVPN over SSL" connection to port 443 (a good approximation of HTTPS so to say), or a tls-crypt featured connection to entry-IP 3 or 4 to see whether they can mitigate or bypass the throttling techniques. Also consider to change ISP if possibile.


You can change connection mode in Eddie Preferences > Protocols. Remember to click "Save" and restart a connection each time you change setting to apply the change onto OpenVPN.


Kind regards

In Topic: Slow speeds

19 July 2018 - 12:24 PM



An additional information for those who need larger buffers when using Eddie: you can enter custom directives rcvbuf and sndbuf in "Preferences" > "OVPN Directives" custom directives field. Click "Save" after you have entered them and restart a connection to apply the change onto OpenVPN.


The syntax is:

rcvbuf receive_buffer_size

sndbf send_buffer_size


where receive_buffer_size and send_buffer_size are in bytes.




rcvbuf 1048576


will tell OpenVPN to create a 1 MB (1048575 bytes) receive socket buffer.


Kind regards

In Topic: Eddie IPv6 WebRTC leak on Linux

18 July 2018 - 07:45 PM



We would like to investigate, your specific case is interesting. Your node is behind DSLite stack, with only IPv6 connection (IPv4 is encapsulated in IPv6), but you appear to have only IPv4 in the tunnel.


Can you post a system report taken just after the problem has occurred to check Eddie settings (in particular about how it must handle IPv6)? "Logs" > life belt icon > copy all > paste into your message.


Kind regards

Servers online. Online Sessions: 13449 - BW: 43160 Mbit/sYour IP: Access.