Jump to content
Not connected, Your IP: 54.198.139.112
l&D79&NnpfJ_

ANSWERED A note to the Air staff, and to the Administrators of this service.

Recommended Posts

Hello, this is a note to the Air staff, and to the Administrators of this service.

 

I've moved to your network from another very popular VPN provider.

Your client looks quite promising, however there are a couple things I need to know, and I will list them below.

 

It's worth noting the following:

 

• I'm running Windows 7 x64 on a fully encrypted machine, with a 100Mbps direct PPPoE connection, no router. 

• I use Bit Defender Internet Security 2016 which comes with all the bells and whistles.

• I am adequately protected against WebRTC leaks.

 

I have tried various servers to test the reliability of the connection, and of the client in general.

A few things to note plus a couple of questions about Eddie and the reliability of your service:

 

DNS Leaks:

Upon checking the connection using your website IPLeak.NET, I have consistently experienced DNS leaks discovering my ISP, on servers from multiple countries except for Sweden, Switzerland and Latvia, which were consistently reliable with no leaks. The hardware didn't change and no settings were changed in the operating system or on the ISP's PPPoE connection in between server switching. All applications that would use the internet were closed before disconnecting and re-launched upon switching to a new server. 

 

What would be the explanation for consistently experiencing DNS leaks on so many of your servers?

 

Network Lock:

A tour of your client Eddie, revealed that Network Lock relies heavily on Windows Firewall. Considering I'm probably not the only one using a fully featured internet security suite (Bit Defender Internet Security 2016), which has its own firewall, Windows Firewall is therefore inactive (deactivated by Bit Defender to prevent conflicts).

 

How does your client handle the situation where one of your customers is using an Internet Security suite, and as such, Windows Firewall being inactive in the context? Are there specific settings and/or Firewall rules that I can create and use with Bit Defender's Firewall to tailor it around Eddie's Network Lock, and seal the gaps, as Windows Firewall would do, or is Eddie's Network Lock limited to Windows Firewall only?

 

Would enabling Network Lock which in turn enables Windows Firewall, conflict with the second Firewall, thus compromising Firewall integrity?

There's a mode in the Network Lock section of the client called "Automatic" but it's not clear how Automatic is defined in the context. Does this mean that it works with the Internet Security suite Firewall or something else? What does the Automatic mode do specifically? 

 

Tor Exit Node:

On some of the servers (predominantly Netherlands), the Tor Exit Node indicator is lit green when checking with your service at IPLeak.NET. On other servers it isn't. What are the mechanics behind this?

Share this post


Link to post

ipleak.net is made by the AirVPN team. I don't want to answer the other questions, since i dont know much about AirVPN.

Share this post


Link to post

 

DNS Leaks:
Upon checking the connection using your website IPLeak.NET, I have consistently experienced DNS leaks discovering my ISP, on servers from multiple countries except for Sweden, Switzerland and Latvia, which were consistently reliable with no leaks. The hardware didn't change and no settings were changed in the operating system or on the ISP's PPPoE connection in between server switching. All applications that would use the internet were closed before disconnecting and re-launched upon switching to a new server. 
 
 
Hello,
 
"DNS queries leaks" are not directly related to VPN servers, It's a phenomenon which can occur in presence of flawed DNS implementation. For example, Windows lacks the concept of global DNS and system process svchost.exe will rely on every and each DNS server on all the network interfaces to send out DNS queries.
 
Anyway, our client will take care of Windows DNS leaks, or you can just do it yourself with our guides (see the "How-To" section). It takes just a minute.
 
 

 

Network Lock:
A tour of your client Eddie, revealed that Network Lock relies heavily on Windows Firewall. Considering I'm probably not the only one using a fully featured internet security suite (Bit Defender Internet Security 2016), which has its own firewall, Windows Firewall is therefore inactive (deactivated by Bit Defender to prevent conflicts).
 
 
Between very few good tools, hundreds of junk HIPS, firewalls and packet filtering tools are available for Windows. Eddie developer designed Eddie with plug-ins for the Network Lock features. Anybody can create a plug-in for any piece of junk or valuable tool available for Windows. Our solutions proposes Windows Firewall because it's available on every system, because it does not add the risk to get uninvited junk, and because it is not realistic and not worth the effort for us to design plug-ins for all the existing filtering tools (most of which are junkware).
 
 

 

 
How does your client handle the situation where one of your customers is using an Internet Security suite, and as such, Windows Firewall being inactive in the context? Are there specific settings and/or Firewall rules that I can create and use with Bit Defender's Firewall to tailor it around Eddie's Network Lock, and seal the gaps, as Windows Firewall would do, or is Eddie's Network Lock limited to Windows Firewall only?
 
Yes, Network Lock available plug-ins for Windows are (as far as we know) currently only for Windows Firewall. Please take the rules set by Network Lock and translate them into your firewall. You might also take the Comodo guide as an example (again, it's in the "How-To" forum). Alternatively get rid of your firewall and use the Windows Firewall.
 

 

 
Would enabling Network Lock which in turn enables Windows Firewall, conflict with the second Firewall, thus compromising Firewall integrity?
 
Yes. It's not a matter of integrity, it's just that you would have two programs with high privileges competing to modify concurrently the OS packet filtering tables. The outcome is unpredictable.
 
Kind regards

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...