Jump to content
Not connected, Your IP: 13.58.200.78

LZ1

Members2
  • Content Count

    2089
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    82

Everything posted by LZ1

  1. That's a simple question with a potentially broad answer. Which "them" do you mean? The owners of the network can see a connected laptop, but with Air on, they can't see what you're doing online, which is the crucial thing. If you want to become more secure/private, then there's plenty of places you can read up on that. So in a sense, the name of your laptop is the least of your worries, but it can't hurt to change it if you're concerned. But how you manage your personal computers, is outside the scope of what Air is trying to do.
  2. SSL hides that you're using Air, thus making it harder to block . I don't know what they did. But it certainly seems like they're trying to filter out certain kinds of traffic. Enjoy.
  3. Please try using the SSH or SSL protocol on the guest network . Yes it's possible to block things on a network, using more or less elaborate techniques. It would be nice to see your logs when connecting to the guest network.
  4. Any you choose. Most would typically pick TCP 443, as UDP 443 is otherwise the default. But first please update your client .
  5. That's great, thank you. First of all, update your client to the latest stable or, if you prefer, experimental release . That client is from early last year. Then please try going to Eddies preferences>Protocols>Select TCP after unchecking "Automatic" and connecting to a new location. Then please tell us what happens.
  6. Hello! Yes please post any logs you can, as it's otherwise not possible for us to help . Are you using the Eddie client?
  7. Hello! It's not helpful to declare this, if you don't also at least state which Eddie you're experiencing this on . So I urge you all to upgrade to the experimental Eddie client and see how you do. Instructions can be found in my signature if you don't know how to download the experimental client. Then if you run into any problems, you can post about them in the feedback thread designed specifically for the experimental client and thus help make Eddie better. Thank you.
  8. As others said, you shouldn't be forwarding on your router. So make sure your router isn't forwarding anything, keep the port on this site you already forwarded and then ensure that port matches the one in your torrent client. Run Eddie. That should fix it. If unsure, you may also refer to some guides in the link in my signature, for more details on configuring a torrent client. It may also be beneficial if you use a newer torrent client, such as qBittorent. We will not soon forget this betrayal by our dearest Eddie and his accomplice
  9. Hello! Staff recently commented on something related to that.
  10. Hello! This list and perhaps site too, should be taken with a grain of salt, not least because: But it's still interesting to see the answers. Here's how AirVPN responded: 1. Do you keep ANY logs which would allow you to match an IP-address and a time stamp to a user of your service? If so, exactly what information do you hold and for how long? 1. No, we don’t. 2. What is the name under which your company is incorporated, and under which jurisdiction does your company operate? 2. The name of the company is Air and it is located in Italy. 3. What tools are used to monitor and mitigate abuse of your service, including limits of concurrent connections if these are enforced? 3. We do not use any monitoring or traffic inspection tools. We do associate a connections counter for each account to enforce the limit of five simultaneous connections per account. We also promptly investigate any service (website etc.) running behind our service to prevent phishing and other scams (malware spreading, bot controllers, etc) if we receive a complaint about them. However, checking those services after a complaint or a warning from a third-party does not require any traffic monitoring. 4. Do you use any external email providers (e.g. Google Apps), analytics, or support tools ( e.g Live support, Zendesk) that hold information provided by users? 4. Absolutely not. 5. In the event you receive a DMCA takedown notice or a non-US equivalent, how are these handled? 5. They are ignored. 6. What steps are taken when a court orders your company to identify an active or past user of your service? How would your company respond to a court order that requires you to log activity going forward? Has any of this ever happened? 6. The matter is handled by our law firm which explains to the competent authorities how our system works and why it is not possible to track a user “ex-post” when such identification requires access to traffic logs, which simply do not exist. We have so far not received any order trying to force us to “log activity going forward” and we would not be able to comply for strictly technical reasons. 7. Is BitTorrent and other file-sharing traffic allowed on all servers? If not, why? 7. Yes, BitTorrent (just like any other protocol) is allowed on all servers without any re-routing. 8. Which payment systems/providers do you use? Do you take any measures to ensure that payment details can’t be linked to account usage or IP-assignments? 8. Nowadays we use Coinpayments, BitPay, PayPal and Avangate. We accept a wide variety of cryptocurrencies and several credit cards. We also planned to accept payments in Bitcoin (and some other cryptocurrency) directly in late 2018, with no need for any third party payment processor, which anyway does not require any personal data to complete a transaction. We do not keep any information about account usage and/or IP address assignments, so there can’t be any correlation with any payment. As usual a customer needs to consider that any payment via a credit card or PayPal will be recorded for an indefinite amount of time by the respective financial companies. We also accept cryptocurrencies inherently designed to provide a strong layer of anonymity. 9. What is the most secure VPN connection and encryption algorithm you would recommend to your users? 9. We recommend only and exclusively OpenVPN. A proper configuration must include TLS mode, Perfect Forward Secrecy, 4096 bit Diffie-Hellmnn keys, and at least 2048 bit (preferably 4096 bit) RSA keys. About the channels ciphers, AES-256 both on the Control Channel and the Data Channel is an excellent choice, while digests like HMAC SHA (when you don’t use an AED cipher such as AES-GCM) for authentication of packets are essential to guarantee integrity (preventing for example injection of forged packets in the stream), both on the Control and the Data channels. Our service provides all of the above. About Elliptic Curve Cryptography, since it is finally of public domain that at least one random number generator (Dual_EC_DRBG) had a backdoor, and that an NSA program did exist with the aim to implement backdoors in some curves and then have exactly those curves recommended by NIST, momentarily we would suggest to drop ECC completely, just to stay on the safe side and according to Bruce Schneier’s considerations. 10. Do you provide tools such as “kill switches” if a connection drops and DNS leak protection? 10. Yes, of course. They are integrated in our free and open source software “Eddie” released under GPLv3. Anyway, usage of our software is not mandatory to access our service, so we also provide guides to prevent any kind of traffic leaks outside the VPN “tunnel” on a variety of systems. 11. Do you have physical control over your VPN servers and network or are they outsourced and hosted by a third party (if so, which ones)? Do you use your own DNS servers? (if not, which servers do you use?) 11. The VPN server management is never outsourced. Even the IPMI, which has proven to be the source of extremely dangerous vulnerabilities, is patched and access-restricted by the AirVPN core management persons only. The Air company does not own datacenters. Owning a datacenter would put Air in a vulnerable position in the scenario described in your question number 6 (second part: court order to start logging traffic). 12. What countries are your servers physically located? Do you offer virtual locations? 12. We do not offer “virtual” locations. No IP address geo-location trick, hidden re-routing or any other trick is ever performed. We do not use Virtual Servers at all. Currently, we have physical (bare metal) servers really located in the following countries: Austria, Belgium, Bulgaria, Canada, Czech Republic, Germany, Hong Kong, Japan, Latvia, Lithuania, Netherlands, Norway, Romania, Singapore, Spain, Sweden, Switzerland, Ukraine, United Kingdom, United States. What do you think? I think it's curious how many answer number 1 with some sort of "No we don't track users" and then when you get to number 4, they say "But we use XYZ Google system".
  11. Hello! Could you please clarify: - Where you're forwarding your ports. Are you doing this only on your router, through the Air site or both? - Why are you forwarding your ports. Is it for torrenting for example? If so, then ensure no settings there are changing; such as if ports are set to automatically change. - Are you running Air from your router or through a regular client like Eddie? Thankyou.
  12. Could you tell us what Operating System version you're using? Is this address seen in the IP or DNS box, on ipleak.net? Are you running any third-party firewall software? One possible scenario is that you're on Windows with a third-party program interfering with Network Locks firewall settings. Hence we need more details. If you're actually experiencing leaks, then we would really like some logs and/or system reports from you.
  13. Hello! There's no WebRTC leak if you use Network Lock. But it's possible that if you're using ipleak.net, that you're interpreting the results as being a leak, when they're not. If you go to ipleak.net and scroll to the bottom of the page, there's also instructions on how to disable WebRTC in your browser. You could also install uBlock Origin and set its preferences to do the same thing. Otherwise yes, you will certainly need to supply some proof that you're still leaking when Network Lock is turned on, as that's a baseless claim otherwise, to the say the least . You can also read a number of prior topics on the issue: https://airvpn.org/topic/14306-webrtc-leaks-solved/ https://airvpn.org/topic/13519-webrtc-vulnerability/
  14. Welcome, I see you're new. We can't help you with any of that, if you don't supply any information to us . So I can only recommend that you either share your Eddie logs, try the Beta Eddie client or both. For information on how to do that, you're welcome to follow the link in my signature, to the new user guide. There's also no DNS leaks on Linux.
  15. Hello! Welcome! Do you mean the port-forwarding page? There's already a link to it in Eddie's menu and it leads here. At least in the experimental 2.14.2 client
  16. Hello! It's for those kinds of reasons that Network Manager isn't recommended. Would Eddie CLI Edition be of interest? Or running Air through your router perhaps? Or OpenVPN directly.
  17. Alright that allows us something to work with. I would be interested in seeing if it still happened while using Eddie, honestly. But I doubt you would want to try that. It's just that some people keep connecting to the same one automatically. So they add the randomize option to stop that. I don't think it's necessarily based on least traffic only, but I'm not 100% sure regarding the config files. (For Eddie it's explained here.) Which usually indicates it's a problem from the individual user. I'm not familiar with the client you're using, so it's a little tricky to help you. As before, my first inclination would be to suggest trying Eddie, to see if it can be isolated to a specific client. If it could, that would help explain why you may be the only one experiencing this issue at the moment. You said this issue had been going on for years, as well as that you had been using that client for years. So to me, there's something to look into there. It was just so you could check for yourself how different servers are keeping up. Any technical logs may also be of use.
  18. If you can, do you mind sharing how it was fixed? In case it's useful to others . Thank you.
  19. Oh hey Staff I thought this was interesting. From 2013: A lot apparently changed in Japan then! I'm curious as to what entities changed between 2013-2018. Are there any interesting details to share? At any rate, good stuff .
  20. Hello! I assume that's a question and not a statement. You can refer to the Guides section, in the link in my signature, for how to set up torrenting. You may also check ipleak.net, where you can also download test torrents, to check your IP is an Air IP and not your own. But this thread is really old already and thus as Staff said, some things changed. Locked.
  21. Hello! You can try one or all of these: Try Menus>Preferences>Protocols>TCP protocol. For this you can try restarting the client. Shut it down through its own menus and then open it again. For this you can try going to Eddie Menu>Preferences>DNS>Uncheck "Check Air DNS". As well as Preferences>Advanced>Uncheck "Check if Air Tunnel works". You don't always need to uncheck both, but it's worth a try if you can't connect. If none of that works, you can check the link in my signature for where to find the experimental Eddie client to download and try . I hope this helps.
  22. Hello! It would be great if we had more information to go on. What platform are you on? You speak of profiles and that makes me wonder if you're on mobile. In which case there's ways to make it randomize which locations are connected to. While if you were using Eddie, it would be helpful to see your logs, in case something is going on in that regard. Did you for example try different Eddie Protocols? If you suspect your ISP may be to blame, then try SSL or SSH please. TCP can also fix issues that UDP can't handle. You can see Airs infrastructure with the Ping Matrix and other tabs. In most cases, it's an error on the users side. Likewise you can read about how Eddie chooses where to connect. You're most welcome to open a support ticket. Just remember that support staff follow an Italian timezone, if you feel you don't get an instant reply. But they're competent, certainly. . Otherwise you'll frequently see the Staff account posting on the forums and that qualifies for "tech people", so yes. But they don't post in all threads, naturally. It's certainly possible you're a minority . As I said initially, more information on your setup could be useful. For example, we don't know if you mean "slow" in a torrenting context, web-browsing context or whatnot.
  23. Hello! Please check here. It may also be beneficial to use the experimental client while you're there.
×
×
  • Create New...