volkerpispers 1 Posted ... Hello =)SInce im havingh issues with my regular VPN provider PerfectPrivacy i just got the 1 euro trial here.One thing im wondering about; on PP they had an option to protect you against the such called DNS Leak, does the Airvpn Client takes anti DNS Leak actions too?Sorry for my rather bad english :S Have a nice day Share this post Link to post
stupidcats 14 Posted ... Hey there, AirVPN does provide support for DNS leaks.. It's called "Network lock". You can activate it by going to "Preferences" then "Advanced" and finally "Network Lock" in the AirVPN client. Share this post Link to post
volkerpispers 1 Posted ... Hey Epsilon, thanks for you8r answer!I found it, however should i choose ''automatic'' or ''windows firewall'' ? Share this post Link to post
SlyFox 10 Posted ... You are on windows correct? I would also recommend you go to Eddie Client, Advanced --> General, and select "Force DNS" "Check if tunnel use air dns" and "check if tunnel works" After, visit ipleak.net to check you are OK. Share this post Link to post
volkerpispers 1 Posted ... Windows yes!I did all you said and this is the result: Your IP Address103.10.197.187Hong Kong Pacswitch Colocation & Datacentre - AirVPN Server (Exit) Wed, 19 Nov 2014 21:30:59 +0000 Detected DNS Address 103.10.197.187Hong Kong Pacswitch Colocation & Datacentre - AirVPN Server (Exit) I suppose this is correct? Another thing,ive read that my ISP can see that im using a VPN,however i can avoid this by ''laying an SSL tunnel around the regular VPN Tunnel'' Is that possible here too? Share this post Link to post
Guest JWW Posted ... You are on windows correct? I would also recommend you go to Eddie Client, Advanced --> General, and select "Force DNS" "Check if tunnel use air dns" and "check if tunnel works" After, visit ipleak.net to check you are OK. SlyFox's post is the correct answer to prevent DNS leaks. Network Lock is used to ensure that no IPv4 connection to the internet is possible if the VPN disconnects (unless you specify exceptions). Share this post Link to post
Guest JWW Posted ... Another thing,ive read that my ISP can see that im using a VPN,however i can avoid this by ''laying an SSL tunnel around the regular VPN Tunnel'' Is that possible here too? Your DNS looks good. Yes, your ISP may well be able to see that you're using a VPN. If you believe that your ISP is throttling your connection for that reason or if you want to prevent that possibility you can use an SSL tunnel. It's easy to set up - read here https://airvpn.org/ssl/ You may suffer a performance hit but, in my case, it's the only way I can achieve good speeds as my ISP does throttle. Share this post Link to post
Staff 9972 Posted ... Windows yes!I did all you said and this is the result:Your IP Address103.10.197.187Hong Kong Pacswitch Colocation & Datacentre - AirVPN Server (Exit) Wed, 19 Nov 2014 21:30:59 +0000 Detected DNS Address 103.10.197.187Hong Kong Pacswitch Colocation & Datacentre - AirVPN Server (Exit) I suppose this is correct? Another thing,ive read that my ISP can see that im using a VPN,however i can avoid this by ''laying an SSL tunnel around the regular VPN Tunnel'' Is that possible here too? Hello! The screenshot shows that there are no DNS leaks from your Windows machine. In order to activate OpenVPN over SSL, in our client Eddie go to "AirVPN" -> "Preferences" -> "Protocol", select "SSL Tunnel - Port 443", click "Save" and connect to a VPN server. Kind regards 1 rickjames reacted to this Share this post Link to post
volkerpispers 1 Posted ... So it worked good =)Ive changed the settings in order to activate OpenVPN over SSL.However im wondering, is there any possibility to see if it actually worked, like a website test for IP/DNS? Also i just noticed, after installing the SSL tunnel suddenly IP leak shows me that im a TOR exit node and an AIR VPN node.However im not running torIs that normal? Thx for all the answers! Share this post Link to post
Guest JWW Posted ... So it worked good =)Ive changed the settings in order to activate OpenVPN over SSL.However im wondering, is there any possibility to see if it actually worked, like a website test for IP/DNS? Also i just noticed, after installing the SSL tunnel suddenly IP leak shows me that im a TOR exit node and an AIR VPN node.However im not running torIs that normal? Thx for all the answers! Yes, that's normal. The server you're connected to happens to be a TOR exit node which it's telling you. Doesn't mean you're using TOR. If you go to the Stats tab in the AirVPN client and scroll down you should see 'VPN Protocol - SSL' Share this post Link to post
volkerpispers 1 Posted ... Thx JWW thats good to hear !So by now i should have everything together.I was proceeding this way, using chromee without VPN to server the internet revealing my real identity.I thaught its not a good idea to use the same browser when using a VPNMy thaughts were the following:When i surf on a site with mandatory registration it is possible that they log and store IPs.So if i browse the site logged in without VPN and afterwards logged in with VPN the Site owner, if he logs and stores IPs, is able to identify me, right?So i proceded to use another browser and no accounts Opera/firefox, with any plugins deactivted, no java(-script) nor flash playerNow in firefox there is the option to open a new tab in privacy mode, so that no data is locally stored from any Traffic in that tab.My question is, can/will firefox access any data (cookies,saved paswords etc) from chrome which brings me back to the initial problem.And if FF does so, is there any way to stop that? Share this post Link to post
volkerpispers 1 Posted ... Since i have enabled SSL i do3es not show my real IP in client area anymore lol. How that? i thaught thats only possible when im using me->TOR->VPN->WEBBut im not using tor Share this post Link to post
Guest JWW Posted ... You don't have to use TOR to mask your real IP. If you are connected to Air your public IP is the one allocated by the VPN server you're connected to, so of course that's what you see in the client area. That IP is anonymous and is in no way publicly linked to your real one so regardless of what you were doing & how you were connected before you connected to the VPN, your ISP cannot link the AIR provided IP to you. It's good practice in any case to clear the cache etc.. before changing connection methods. Chrome provides the ability clear all cookies and site data when you close the browser anyway, or you could use CCleaner between sessions. On top of that you are now using SSL so all the ISP sees is encrypted traffic. FF doesn't use Chrome data and vice-versa. FYI, Chrome has a 'privacy mode' called 'Incognito' - https://support.google.com/chrome/answer/95464 Share this post Link to post
volkerpispers 1 Posted ... Alright thats cool =)I now moved to my 2nd flat for 10 days and on here i have DNS leaks D:When connected to a netherland Server the IP is correctly netherlandhowever im getting 3 DNS Reports, 2 of em revealing my identityYour IP Address95.211.138.225Netherlands LeaseWeb B.V. - AirVPN Server (Exit) Thu, 20 Nov 2014 21:23:35 +0000 Detected DNS AddressNow whenever i try to connect to a german or Netherlands server it redirects me to riguel NL server O_O Its getting spooky Privacy.nopeLuxembourg Entreprise des Postes et Telecommunications - Residential Privacy.nopeLuxembourg Entreprise des Postes et Telecommunications - Residential 95.211.138.225Netherlands LeaseWeb B.V. - AirVPN Server (Exit) If you are now connected to a VPN and between the detected DNS you see your ISP DNS, then your system is leaking DNS requests Edit: I solved t it using ipconfig /flushdns so all good ^.^ Edit: When reloading the page its showing my ISPs DNS again =(Hm, when im realoding it sometimes show Air VPN dns then it shows my ISPs dns again. different results when reloading the site Share this post Link to post
Gollum 0 Posted ... Is ipleak.net the best test, because I've found that it would not show leaks that are present when running both GRC's and dns-oarc's tests. Sidenote: I was getting leaks, but having now unchecked the IPv6 option in both my main network adapter and the TAP adapter, there doesn't appear to be any leaks showing so far. I've read elsewhere that this step only disables IPv6 on my LAN interfaces and connections, but does not disable IPv6 on tunnel interfaces or the IPv6 loopback interface. I would have to make a change in the Windows registry in order to disable the IPv6 on tunnel interfaces. Is this necessary, if my DNS leaks have stopped? If so, happy days and I will now extend my subscription (currently using the 3 day plan to test the service). Share this post Link to post
SlyFox 10 Posted ... Gollum are you sure that grc was showing leaks that ipleak wasnt? Because grc will often show one or two of the airvpn backup servers: (54.225.156.17, compute-1.amazonaws.com) Share this post Link to post
Gollum 0 Posted ... Gollum are you sure that grc was showing leaks that ipleak wasnt? Because grc will often show one or two of the airvpn backup servers: (54.225.156.17, compute-1.amazonaws.com)Both GRC and dns-oarc tests revealed 5 results. Two from my ISP, two backup air servers and the main air server I'm connected to. Ipleak would only show the main air server I was connected to. I ran 4 different tests. The extended test from https://www.dnsleaktest.com/, http://ipleak.net/, https://www.dns-oarc.net/oarc/services/dnsentropy and https://www.grc.com/dns/dns.htm. The last two were still showing leaks that the first two didn't until I disabled IPv6 in both my primary and the TAP adapter settings. Now no leaks are showing for any of the tests. Share this post Link to post
zimwebob 7 Posted ... In addition to what others have suggested you could also download DNSCrypt.Basically, you put it in a folder somewhere and run the GUI, show hidden adapters and check everything in the list, choose a server (non-OpenDNS, non-IPv6), and after testing, choose "Install as Service." You can then close the GUI, and the service will run these settings automatically when you start up. Make sure you set your primary network adapter DNS server to 127.0.0.1 and allow dnscrypt-proxy.exe outbound through your firewall if applicable.This way even if there IS a DNS leak, it will still be falling back on encrypted DNS that doesn't leak your real IP. Share this post Link to post
Andy Wirus 0 Posted ... What I did was to manually configure the dns addresses for my wifi/Local Area Network adapter. This is what you can try: Method 1 (cmd): Type the following into cmd: ipconfig /flushdns netsh interface IPv4 set dnsserver "Wi-Fi" static 8.8.8.8 both (8.8.8.8 is google dns server, or 1.1.1.1 which is cloudflare dns server) To revert back: ipconfig /flushdns netsh interface IPv4 set dnsserver "Wi-Fi" dhcp Or if you are using openvpn, type the following into the configuration file: block-outside-dns Method 2 (control panel): Go to control panel (win+r, then type in control panel) Click Network and Internet --> Network and Sharing Center --> Change adapter settings Right click on Wifi, or the virtual adapter you are connected to (NOTE: this does not work for IKEv2 WAN miniports, I tried) Click properties Navigate to the tab called "Internet Protocol Version 4 (TCP/IPv4)" or something like that, and click properties You will probably see the settings obtaining a DNS address automatically. We don't want that, so click on the "use the following DNS server addresses". For google, enter 8.8.8.8 as preferred DNS server, and 8.8.4.4 as alternate DNS server. For cloudflare, enter 1.1.1.1 as preferred server, and 1.0.0.1 as alternate DNS server Click ok, and you should be set Hope I helped Share this post Link to post