Jump to content
Not connected, Your IP: 34.238.190.122

Recommended Posts

HI there...i'm new to all this...but dnsleaktest show's my isp...and google servers...have been trying to fix...but not really sure what i'm doing...

Share this post


Link to post

HI there...i'm new to all this...but dnsleaktest show's my isp...and google servers...have been trying to fix...but not really sure what i'm doing...

Hello!

Can you please tell us your exact OS version?

Kind regards

Share this post


Link to post

hi my os is windows 7...im also using kaspersky pure...also at the bottom of the page,where the 3 boxes are, the middle 1 says not connected...but yesterday it said connected.

Share this post


Link to post

hi my os is windows 7...im also using kaspersky pure...also at the bottom of the page,where the 3 boxes are, the middle 1 says not connected...but yesterday it said connected.

Hello!

Maybe they are two distinct problems. Can you please send us your client logs? After you have tried a connection and the problem occurs, please right-click the Air client dock icon, select "Logs", click "Copy to clipboard" and paste in the forum message. Kaspersky might interfere if not configured properly, let's see if the logs can help in troubleshooting.

Kind regards

Share this post


Link to post

here is my clipboard...04/02/2013 - 17:38 SIGUSR1[soft,ping-restart] received, process restarting

04/02/2013 - 17:38 Restart pause, 2 second(s)

04/02/2013 - 17:38 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

04/02/2013 - 17:38 Socket Buffers: R=[8192->8192] S=[8192->8192]

04/02/2013 - 17:38 UDPv4 link local: [undef]

04/02/2013 - 17:38 UDPv4 link remote: [AF_INET]31.193.12.98:443

04/02/2013 - 17:39 [uNDEF] Inactivity timeout (--ping-restart), restarting

04/02/2013 - 17:39 SIGUSR1[soft,ping-restart] received, process restarting

04/02/2013 - 17:39 Restart pause, 2 second(s)

04/02/2013 - 17:39 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

04/02/2013 - 17:39 Socket Buffers: R=[8192->8192] S=[8192->8192]

04/02/2013 - 17:39 UDPv4 link local: [undef]

04/02/2013 - 17:39 UDPv4 link remote: [AF_INET]31.193.12.98:443

04/02/2013 - 17:40 [uNDEF] Inactivity timeout (--ping-restart), restarting

04/02/2013 - 17:40 SIGUSR1[soft,ping-restart] received, process restarting

04/02/2013 - 17:40 Restart pause, 2 second(s)

04/02/2013 - 17:40 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

04/02/2013 - 17:40 Socket Buffers: R=[8192->8192] S=[8192->8192]

04/02/2013 - 17:40 UDPv4 link local: [undef]

04/02/2013 - 17:40 UDPv4 link remote: [AF_INET]31.193.12.98:443

04/02/2013 - 17:41 [uNDEF] Inactivity timeout (--ping-restart), restarting

04/02/2013 - 17:41 SIGUSR1[soft,ping-restart] received, process restarting

04/02/2013 - 17:41 Restart pause, 2 second(s)

04/02/2013 - 17:41 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

04/02/2013 - 17:41 Socket Buffers: R=[8192->8192] S=[8192->8192]

04/02/2013 - 17:41 UDPv4 link local: [undef]

04/02/2013 - 17:41 UDPv4 link remote: [AF_INET]31.193.12.98:443

04/02/2013 - 17:42 [uNDEF] Inactivity timeout (--ping-restart), restarting

04/02/2013 - 17:42 SIGUSR1[soft,ping-restart] received, process restarting

04/02/2013 - 17:42 Restart pause, 2 second(s)

04/02/2013 - 17:43 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

04/02/2013 - 17:43 Socket Buffers: R=[8192->8192] S=[8192->8192]

04/02/2013 - 17:43 UDPv4 link local: [undef]

04/02/2013 - 17:43 UDPv4 link remote: [AF_INET]31.193.12.98:443

04/02/2013 - 17:44 [uNDEF] Inactivity timeout (--ping-restart), restarting

04/02/2013 - 17:44 SIGUSR1[soft,ping-restart] received, process restarting

04/02/2013 - 17:44 Restart pause, 2 second(s)

04/02/2013 - 17:44 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

04/02/2013 - 17:44 Socket Buffers: R=[8192->8192] S=[8192->8192]

04/02/2013 - 17:44 UDPv4 link local: [undef]

04/02/2013 - 17:44 UDPv4 link remote: [AF_INET]31.193.12.98:443

04/02/2013 - 17:45 [uNDEF] Inactivity timeout (--ping-restart), restarting

04/02/2013 - 17:45 SIGUSR1[soft,ping-restart] received, process restarting

04/02/2013 - 17:45 Restart pause, 2 second(s)

04/02/2013 - 17:45 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

04/02/2013 - 17:45 Socket Buffers: R=[8192->8192] S=[8192->8192]

04/02/2013 - 17:45 UDPv4 link local: [undef]

04/02/2013 - 17:45 UDPv4 link remote: [AF_INET]31.193.12.98:443

04/02/2013 - 17:46 [uNDEF] Inactivity timeout (--ping-restart), restarting

04/02/2013 - 17:46 SIGUSR1[soft,ping-restart] received, process restarting

04/02/2013 - 17:46 Restart pause, 2 second(s)

04/02/2013 - 17:46 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

04/02/2013 - 17:46 Socket Buffers: R=[8192->8192] S=[8192->8192]

04/02/2013 - 17:46 UDPv4 link local: [undef]

04/02/2013 - 17:46 UDPv4 link remote: [AF_INET]31.193.12.98:443

04/02/2013 - 17:47 [uNDEF] Inactivity timeout (--ping-restart), restarting

04/02/2013 - 17:47 SIGUSR1[soft,ping-restart] received, process restarting

04/02/2013 - 17:47 Restart pause, 2 second(s)

04/02/2013 - 17:47 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

04/02/2013 - 17:47 Socket Buffers: R=[8192->8192] S=[8192->8192]

04/02/2013 - 17:47 UDPv4 link local: [undef]

04/02/2013 - 17:47 UDPv4 link remote: [AF_INET]31.193.12.98:443

04/02/2013 - 17:47 Disconnecting...

04/02/2013 - 17:47 SIGTERM received, sending exit notification to peer

04/02/2013 - 17:47 SIGTERM[hard,] received, process exiting

04/02/2013 - 17:47 Disconnected.

04/02/2013 - 17:47 Login...

04/02/2013 - 17:47 Login success.

04/02/2013 - 17:47 Contacting service...

04/02/2013 - 17:47 Connecting...

04/02/2013 - 17:47 OpenVPN 2.3.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [iPv6] built on Jan 8 2013

04/02/2013 - 17:47 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

04/02/2013 - 17:47 Socket Buffers: R=[8192->8192] S=[8192->8192]

04/02/2013 - 17:47 UDPv4 link local: [undef]

04/02/2013 - 17:47 UDPv4 link remote: [AF_INET]31.193.12.74:443

04/02/2013 - 17:47 TLS: Initial packet from [AF_INET]31.193.12.74:443, sid=925726ae c3e1ca6e

04/02/2013 - 17:47 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

04/02/2013 - 17:47 VERIFY OK: nsCertType=SERVER

04/02/2013 - 17:47 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

04/02/2013 - 17:47 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

04/02/2013 - 17:47 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

04/02/2013 - 17:47 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

04/02/2013 - 17:47 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

04/02/2013 - 17:47 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

04/02/2013 - 17:47 [server] Peer Connection Initiated with [AF_INET]31.193.12.74:443

04/02/2013 - 17:47 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

04/02/2013 - 17:47 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.32.206 10.4.32.205'

04/02/2013 - 17:47 OPTIONS IMPORT: timers and/or timeouts modified

04/02/2013 - 17:47 OPTIONS IMPORT: LZO parms modified

04/02/2013 - 17:47 OPTIONS IMPORT: --ifconfig/up options modified

04/02/2013 - 17:47 OPTIONS IMPORT: route options modified

04/02/2013 - 17:47 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

04/02/2013 - 17:47 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

04/02/2013 - 17:47 open_tun, tt->ipv6=0

04/02/2013 - 17:47 TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{D9CEE414-2C6B-4ED6-97EC-ECC97B392C2E}.tap

04/02/2013 - 17:47 TAP-Windows Driver Version 9.9

04/02/2013 - 17:47 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.32.206/255.255.255.252 on interface {D9CEE414-2C6B-4ED6-97EC-ECC97B392C2E} [DHCP-serv: 10.4.32.205, lease-time: 31536000]

04/02/2013 - 17:47 Successful ARP Flush on interface [16] {D9CEE414-2C6B-4ED6-97EC-ECC97B392C2E}

04/02/2013 - 17:47 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

04/02/2013 - 17:47 C:\Windows\system32\route.exe ADD 31.193.12.74 MASK 255.255.255.255 192.168.0.1

04/02/2013 - 17:47 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

04/02/2013 - 17:47 Route addition via IPAPI succeeded [adaptive]

04/02/2013 - 17:47 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.32.205

04/02/2013 - 17:47 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

04/02/2013 - 17:47 Route addition via IPAPI succeeded [adaptive]

04/02/2013 - 17:47 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.32.205

04/02/2013 - 17:47 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

04/02/2013 - 17:47 Route addition via IPAPI succeeded [adaptive]

04/02/2013 - 17:47 C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.32.205

04/02/2013 - 17:47 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

04/02/2013 - 17:47 Route addition via IPAPI succeeded [adaptive]

04/02/2013 - 17:47 Initialization Sequence Completed

04/02/2013 - 17:47 Starting Management Interface...

04/02/2013 - 17:47 Checking...

04/02/2013 - 17:48 Retrieve statistics...

04/02/2013 - 17:48 Connected.

04/02/2013 - 18:07 Disconnecting...

04/02/2013 - 18:07 SIGTERM received, sending exit notification to peer

04/02/2013 - 18:07 C:\Windows\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.32.205

04/02/2013 - 18:07 Route deletion via IPAPI succeeded [adaptive]

04/02/2013 - 18:07 C:\Windows\system32\route.exe DELETE 31.193.12.74 MASK 255.255.255.255 192.168.0.1

04/02/2013 - 18:07 Route deletion via IPAPI succeeded [adaptive]

04/02/2013 - 18:07 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.32.205

04/02/2013 - 18:07 Route deletion via IPAPI succeeded [adaptive]

04/02/2013 - 18:07 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.32.205

04/02/2013 - 18:07 Route deletion via IPAPI succeeded [adaptive]

04/02/2013 - 18:07 Closing TUN/TAP interface

04/02/2013 - 18:07 SIGTERM[hard,] received, process exiting

04/02/2013 - 18:07 Disconnected.

04/02/2013 - 18:07 Login...

04/02/2013 - 18:08 The remote server returned an error: (502) Bad Gateway.

04/02/2013 - 18:08 Login...

04/02/2013 - 18:08 Login success.

04/02/2013 - 18:08 Contacting service...

04/02/2013 - 18:08 Connecting...

04/02/2013 - 18:08 OpenVPN 2.3.0 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [iPv6] built on Jan 8 2013

04/02/2013 - 18:08 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

04/02/2013 - 18:08 Socket Buffers: R=[8192->8192] S=[8192->8192]

04/02/2013 - 18:08 UDPv4 link local: [undef]

04/02/2013 - 18:08 UDPv4 link remote: [AF_INET]46.165.208.70:443

04/02/2013 - 18:08 TLS: Initial packet from [AF_INET]46.165.208.70:443, sid=529295a8 5b84e675

04/02/2013 - 18:08 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

04/02/2013 - 18:08 VERIFY OK: nsCertType=SERVER

04/02/2013 - 18:08 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

04/02/2013 - 18:08 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

04/02/2013 - 18:08 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

04/02/2013 - 18:08 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

04/02/2013 - 18:08 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

04/02/2013 - 18:08 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

04/02/2013 - 18:08 [server] Peer Connection Initiated with [AF_INET]46.165.208.70:443

04/02/2013 - 18:08 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

04/02/2013 - 18:08 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.19.18 10.4.19.17'

04/02/2013 - 18:08 OPTIONS IMPORT: timers and/or timeouts modified

04/02/2013 - 18:08 OPTIONS IMPORT: LZO parms modified

04/02/2013 - 18:08 OPTIONS IMPORT: --ifconfig/up options modified

04/02/2013 - 18:08 OPTIONS IMPORT: route options modified

04/02/2013 - 18:08 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

04/02/2013 - 18:08 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

04/02/2013 - 18:08 open_tun, tt->ipv6=0

04/02/2013 - 18:08 TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{D9CEE414-2C6B-4ED6-97EC-ECC97B392C2E}.tap

04/02/2013 - 18:08 TAP-Windows Driver Version 9.9

04/02/2013 - 18:08 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.19.18/255.255.255.252 on interface {D9CEE414-2C6B-4ED6-97EC-ECC97B392C2E} [DHCP-serv: 10.4.19.17, lease-time: 31536000]

04/02/2013 - 18:08 Successful ARP Flush on interface [16] {D9CEE414-2C6B-4ED6-97EC-ECC97B392C2E}

04/02/2013 - 18:08 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

04/02/2013 - 18:08 C:\Windows\system32\route.exe ADD 46.165.208.70 MASK 255.255.255.255 192.168.0.1

04/02/2013 - 18:08 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

04/02/2013 - 18:08 Route addition via IPAPI succeeded [adaptive]

04/02/2013 - 18:08 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.19.17

04/02/2013 - 18:08 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

04/02/2013 - 18:08 Route addition via IPAPI succeeded [adaptive]

04/02/2013 - 18:08 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.19.17

04/02/2013 - 18:08 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

04/02/2013 - 18:08 Route addition via IPAPI succeeded [adaptive]

04/02/2013 - 18:08 C:\Windows\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.19.17

04/02/2013 - 18:08 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

04/02/2013 - 18:08 Route addition via IPAPI succeeded [adaptive]

04/02/2013 - 18:08 Initialization Sequence Completed

04/02/2013 - 18:08 Starting Management Interface...

04/02/2013 - 18:08 Checking...

04/02/2013 - 18:09 Retrieve statistics...

04/02/2013 - 18:09 Connected.

04/02/2013 - 19:08 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

04/02/2013 - 19:08 VERIFY OK: nsCertType=SERVER

04/02/2013 - 19:08 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

04/02/2013 - 19:08 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

04/02/2013 - 19:08 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

04/02/2013 - 19:08 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

04/02/2013 - 19:08 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

04/02/2013 - 19:08 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

04/02/2013 - 20:08 TLS: tls_process: killed expiring key

04/02/2013 - 20:08 TLS: soft reset sec=0 bytes=312699215/0 pkts=448916/0

04/02/2013 - 20:08 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

04/02/2013 - 20:08 VERIFY OK: nsCertType=SERVER

04/02/2013 - 20:08 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

04/02/2013 - 20:08 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

04/02/2013 - 20:08 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

04/02/2013 - 20:08 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

04/02/2013 - 20:08 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

04/02/2013 - 20:08 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

Share this post


Link to post

The best way I found to fix this is on the client level and I've never had another leak. Click Local Area Connection > Properties > Internet Protocol Version 4(TCP/IPv4) > Properties > Select "Use the following DNS server addresses" > Preferred DNS server 8:8:8:8 > Alternate DNS Server 8:8:4:4. These are google DNS servers are seem to be the fastest for me. Hope this helps.

Share this post


Link to post

When connected to air leaktest doesn't show your ip. period. It never does actually.

IF it shows your ISP's DNS servers, just set the DNS servers in windows to 8.8.8.8 4.4.4.4 or something like that, then you'll get google all the way.

When connecting to air I get google dns anyway and nothing wrong with that. When not connected to air I use the comodo secure DNS... though I think there might be faster ones out there

I haven't set ANY special rules for Air either, since my connection with Air almost never drops. Maybe you should run Airvpn.exe as admin... I always do. Otherwise the dns flush and stuff might not work...

Share this post


Link to post

i managed to fix it so that box for connection is green, but dnsleak test still shows my ip...

Hello!

A guide to prevent any leak (including DNS leaks and leaks in case of unexpected VPN disconnection) for Windows with Comodo firewall:

https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=3405&Itemid=142

If you just want to prevent DNS leaks, you can either follow the guide in http://dnsleaktest.com or force the following DNS in your physical network card (ethernet and/or wireless):

10.4.0.1 as primary (preferred) DNS

10.5.0.1 as secondary (alternate) DNS

In the above case please consider that your system will not be able to resolve names when disconnected from the VPN, therefore you'll need to edit your hosts file to add the resolution for airvpn.org in order to allow connection in case you use the Air client (future release of the Air client will adopt a different approach which will solve this issue and will be much more aggressive against censorship). See the above guide for more details about the hosts file.

Kind regards

Share this post


Link to post

just noticed that i have a suspicious network showing up on my network zone after installing air vpn.... 169.254.173.230/16...and shows 10.4.27.182/30 as disconnected...and when i delete 169 it just shows up again...i have no other machines in my network, just my home pc. also in network and sharing centre, the internet is greyed out..saying not connected..but plainly i am as i write this...any suggestions??

Share this post


Link to post

i managed to fix the dnsleaktest...working ok now...only showing google servers...but i'm concerned about my network set up as it shows multiple networks,other, home and public..firstly it shows other network (unidentified public) , connected to internet, my ethernet card is on local network....and says its connected,then directly below it shows on local network 169.254.173.230/16 (local area connection) and its greyed out (disconnected).then on below that on local network tap-windows adapter v9 showing connected,then directly below it shows 10.4.27.182/30 (local area connection 2) and its greyed out (disconnected)..i think this is NOT how air vpn should show up on my network...any ideas??

Share this post


Link to post

just noticed that i have a suspicious network showing up on my network zone after installing air vpn.... 169.254.173.230/16...and shows 10.4.27.182/30 as disconnected...and when i delete 169 it just shows up again...i have no other machines in my network, just my home pc.

Hello!

There's no such thing as an Air installation (the Air client is portable). If you noticed that after OpenVPN installation on the TAP-Win32 Adapter, it's probably just fine. 169.254.0.0/16 are the link local addresses in IPv4, they are only used to assign IP addresses to network interfaces when no external, stateful mechanism of address configuration (such as DHCP) exists (typically before the DHCP push from our OpenVPN server).

also in network and sharing centre, the internet is greyed out..saying not connected..but plainly i am as i write this...any suggestions??

The parameters with which Windows tries to determine if an Internet connection works or not are not reliable and can easily result in false messages. A typical example is when you block DNS queries outside the tunnel to prevent DNS leaks. When unable to resolve names, Windows will show you that you're disconnected from the Internet, while it is obviously false.

Kind regards

Share this post


Link to post

hi...well i changed my dns on local area connection IPv4 to comodo dns servers...but what about the TAP adapter? 10.4.27.182/30 will i change them to comodo dns also? or keep original?

Share this post


Link to post

hi...well i changed my dns on local area connection IPv4 to comodo dns servers...but what about the TAP adapter? 10.4.27.182/30 will i change them to comodo dns also? or keep original?

Hello!

If you wish to tunnel DNS queries to Comodo, set Comodo DNS in your TAP adapter.

Using non-VPN DNS ours prevents you to access VPN internal services (currently only speedtest.air) and also prevents you to access geo-discriminatory services from all servers (for example, if you wish to access BBC iPlayer from servers NOT located in the UK you must use our DNS).

Kind regards

Share this post


Link to post

thanks for your reply...very useful....could you give the air dns servers please for the tap adapter..will use those,many thanks...

Share this post


Link to post

thanks for your reply...very useful....could you give the air dns servers please for the tap adapter..will use those,many thanks...

Hello!

It's already pushed by the OpenVPN server: 10.x.0.1 (see also here for more details: https://airvpn.org/specs ).

10.4.0.1 is anyway accessible regardless of the port your system connects to.

Kind regards

Share this post


Link to post

on local area connection IPv4 for tap adapter i changed it to use comodo servers...but want to change it back to air servers...would i set it to 10.4.0.1/10.9.0.1 or obtain DNS servers automatically....MANY THANKS.

Share this post


Link to post

on local area connection IPv4 for tap adapter i changed it to use comodo servers...but want to change it back to air servers...would i set it to 10.4.0.1/10.9.0.1 or obtain DNS servers automatically....MANY THANKS.

Hello!

Check "obtain DNS servers automatically".

Kind regards

Share this post


Link to post

I had a leak as well, it seems that i was too trusting of the software to work correctly.

Share this post


Link to post

Feature request:

Could you please implement dnsleaktest.com's DNS leak fix into your client?

http://www.dnsleaktest.com/how-to-fix-a-dns-leak.php

It temporary removes DNS servers from the primary network adapter, and that works extremely well. Very convenient, too.

Hello!

Yes, it is planned on client version 2. The client v2 has been extensively developed and should enter the testing phase in the first half of April.

Kind regards

Share this post


Link to post

i managed to fix it so that box for connection is green, but dnsleak test still shows my ip...

Hello!

A guide to prevent any leak (including DNS leaks and leaks in case of unexpected VPN disconnection) for Windows with Comodo firewall:

https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=3405&Itemid=142

If you just want to prevent DNS leaks, you can either follow the guide in http://dnsleaktest.com or force the following DNS in your physical network card (ethernet and/or wireless):

10.4.0.1 as primary (preferred) DNS

10.5.0.1 as secondary (alternate) DNS

In the above case please consider that your system will not be able to resolve names when disconnected from the VPN, therefore you'll need to edit your hosts file to add the resolution for airvpn.org in order to allow connection in case you use the Air client (future release of the Air client will adopt a different approach which will solve this issue and will be much more aggressive against censorship). See the above guide for more details about the hosts file.

Kind regards

I just signed up and am trying to stop dns leaks, i followed the above advice but leaktest shows google dns servers.

which name would the airvpn servers show?

Share this post


Link to post

I just signed up and am trying to stop dns leaks, i followed the above advice but leaktest shows google dns servers.

which name would the airvpn servers show?

Hello!

Perfect, you have no DNS leaks.

Just for your information, an internal Air team discussion pertaining to drop Google DNS in our service is ongoing.

Kind regards

Share this post


Link to post

I just signed up and am trying to stop dns leaks, i followed the above advice but leaktest shows google dns servers.

which name would the airvpn servers show?

Hello!

Perfect, you have no DNS leaks.

Just for your information, an internal Air team discussion pertaining to drop Google DNS in our service is ongoing.

Kind regards

OK,actually , i used the google servers after leaking , but even using dnsleak.exe my isp stil leaked ( yes i flushed), so now i use Airvpn dns , which in effect is google, my dns is ( up til now) not leaking anymore.

I find this odd, but,hey, it is the result which counts !

One other thing ,i set 46.105.19.36 airvpn.org in the host, but i have no connection without vpn, i understood this should not be so ?

When i have some time i'll look at the Comodo solution.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...