Jump to content
Not connected, Your IP: 18.191.237.79

Staff

Staff
  • Content Count

    10935
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1844

Everything posted by Staff

  1. The matter was related to the datacenter in the first inquiry, this is a shift of argument, ok. Can you please cite any piece of the law that would enforce any type of logging to a foreign company NOT providing telecommunication direct connectivity services and/or content delivery services, that can't access the servers, lines and machinery and that can't guarantee any data integrity and reliability due to unmonitored (by the foreign company) access to machinery, lines and external routers? If you can find this piece, then we will need a new legal advisor for Australia, so please feel free to answer as soon as possible. Kind regards
  2. Hello! That was fixed, thank you for the head-up. Kind regards
  3. How does this work with metadata retention in AU? Is your carrier not required to log every inbound and outbound packet?There is concern that correlation over a large number of such logs could unmask users. We based our decision on the Australia Attorney General's Department answers to FAQ about Data Retention in Australia. In particular, please see the answers to the frequently asked questions 1.4, 1.5 and 1.7. Relevant answers: Depending on the type of service offered, service providers may not be required to retain all of the six categories. [...] For example, if a service provider offers a wholesale service only, it is only required to retain the categories of data in the data set that are relevant to the provision of that wholesale service. [...] The data retention obligations do not require internet access service providers to keep data pertaining to the destination of a communication for internet access services. Kind regards
  4. UPDATE: SERVER WITHDRAWN https://airvpn.org/topic/21685-new-1-gbits-server-available-au/?do=findComment&comment=57099 Hello! We're very glad to inform you that a new 1 Gbit/s server located in Australia is available: Crux. The AirVPN client will show automatically the new server, while if you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 2018 UDP and TCP. Just like every other Air server, Crux supports OpenVPN over SSL and OpenVPN over SSH. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  5. Hello! With almost 200 servers, issues to at least one datacenter can occur multiple times during a year. It is really not necessary to overwhelm a forum or a Twitter account for each of these issues (except when the problem is a major problem, of course) because we have public real time servers monitor that serves the purpose better than anything else. Have a look at it, someone told us that it's spectacular. Click "Status" from our web site upper menu. You can even click each single server for detailed stats and history, with nice graphs, of that server. Kind regards
  6. It would be quite a different option. The difference would be that network would NOT be "locked" before and during connection, but yes, such an option appears theoretically possible, because the Tor circuit would remain "fixed" and never changed for the same OpenVPN stream. Kind regards
  7. Hello! Thank you very much. The problem is reproducible. Please let's continue here: https://airvpn.org/topic/21642-error-getting-response-stream-write-the-authentication-or-decryption-has-failed-sendfailure/ Kind regards
  8. Hello! Thank you very much. The problem is reproducible. Please let's move here: https://airvpn.org/topic/21642-error-getting-response-stream-write-the-authentication-or-decryption-has-failed-sendfailure/ Kind regards
  9. EDIT: THIS THREAD IS OUTDATED. THE ISSUE DOES NOT AFFECT ANYMORE EDDIE 2.12 AND LATER VERSIONS. This is a pending issue. It occurs only on some Linux distribution, probably related to Mono version. For example, in Debian 8.7.1 this error occurs when Eddie is installed as package, but it does not occur if you run Eddie portable edition. This issue is under investigation. Please be patient, in the meantime use the portable edition. UPDATE. Momentary workaround which fixes the issue: install the package mono-devel [sudo] apt-get install mono-devel [sudo] apt-get install libmono-system-core4.0-cil Kind regards
  10. This does not make sense. You are left with your Tor connection, so no leak occurs. Actually not, in this case if the OpenVPN connection goes down the routing table is restored by OpenVPN and the machine will not tunnel anything but the traffic of applications configured to connect over Tor. Network Lock is not implemented (because Eddie can't know BEFORE the connection to Tor is established the Tor guards IP addresses), so currently we do not have any pre-packaged solution to the issue, we're sorry. Kind regards
  11. @UncleHunto Thank you for the information. Can you also please specify your exact Manjaro version? Developers do have a testing Manjaro machine where this problem was solved since some version ago, during the beta testing. In the meantime, as you noted, you can safely disable DNS check. Kind regards
  12. Hello, it is of course possible running an additional OpenVPN daemon with tls-crypt directive (each OpenVPN daemon has a different configuration) and listening to some new port. The main issues we need to consider are how to make Configuration Generator and Eddie to make users not running OpenVPN 2.4 to NOT choose such options in a swift, friendly and clearly understandable way, and some other deployment problems. Nothing impossible or too difficult, but we need a careful plan, because anything wrong can lead to some serious troubles, considering that at any given time we have 13000 users connected, that Configuration Generator is used every hour by a remarkable amount of users, that a new Eddie is needed, and some other problems. Each and any of these problems must be analyzed. Anyway we confirm that we're interested in tls-crypt because we agree to repute that actually it can bypass some disruption techniques against OpenVPN. Kind regards
  13. Hello! Please makes sure, both on the system and router, that no packet filtering tool blocks ICMP. Also, please upgrade to Eddie 2.11.15. Kind regards
  14. Hello! Can you please send us the output of the command: sudo iptables-save issued just after the problem has occurred? Kind regards
  15. Hello! Have you downloaded the .pkg package or the .tar.gz tarball? Can you try to download the portable tar.gz, extract it on the Desktop and test again? Kind regards
  16. Hello! Not yet. Unfortunately, OpenVPN doesn't implement any fallback method about tls-crypt. This new directive must be used at both server-side and client-side, and if we do this we need to force customers to use OpenVPN 2.4 series and to re-download any profiles generated with Config Generator. Currently, OpenVPN 2.4 is neither on a lot of routers, nor in official repository (for example Debian derivatives). At change time zero, note that we would lose compatibility with 100% of our customers not using Eddie, and we would cut definitively out anybody who can't run OpenVPN 2.4. Needless to say that this would be a catastrophic scenario. Maybe we can configure special-purpose servers for this, actually this is under consideration. Kind regards
  17. Hello! Do you use uBlock or uBlock Origin? Can you also please specify exactly what gets blocked? Kind regards
  18. Hello! We're very glad to inform you that Eddie 2.11.15 stable has been released. Please see here: https://airvpn.org/topic/21629-eddie-21115-released/ We have therefore closed the beta testing for version 2.11 and we are going to lock this thread accordingly. Thanks so much to everyone who took part in the public beta testing. Kind regards AirVPN Staff
  19. Hello! We're very glad to inform you that a new Eddie Air client version has been released:2.11.15 Eddie 2.11 includes important bug fixes and many changes meeting users' requests and preferences. - Latest versions of OpenVPN (2.4) and stunnel (5.32), built with OpenSSL 1.0.2k - A new Network Lock method under Windows (Windows Firewall not used anymore) - A new IPv6 lock method under Windows - A new DNS lock method under Windows - Built with Mono 4 under GNU/Linux - New ports/protocols available - DPI-Aware UI under Windows. System fonts used both in Windows and GNU/Linux. - Very many bug fixes - And so many other internal changes and minor UI updates. 2.11 version is compatible with several Linux distributions. For very important notes about environments, please read here: https://airvpn.org/forum/35-client-software-platforms-environments Please read the changelog: https://airvpn.org/services/changelog.php?software=client&format=html Upgrade is strongly recommended. Just like previous versions, Eddie implements direct Tor support for OpenVPN over Tor connections. Eddie makes OpenVPN over Tor easily available to Linux and OS X users: no needs for Virtual Machines, middle boxes or other special configurations. Windows users will find a more friendly approach as well. This mode is not handled anymore as a generic connection to a socks proxy, but it is specifically designed for Tor and therefore solves multiple issues, especially in Linux and OS X, including the "infinite routing loop" problem (see for example http://tor.stackexchange.com/questions/1232/me-tor-vpn-how/1235#1235 ) As far as we know, Eddie is the first and currently the only OpenVPN wrapper that natively allows OpenVPN over Tor connections for multiple Operating Systems. https://airvpn.org/tor We recommend that you upgrade Eddie as soon as possible. Eddie 2.11 for GNU Linux can be downloaded here: https://airvpn.org/linux Eddie 2.11 for Windows can be downloaded here: https://airvpn.org/windows Eddie 2.11 for OS X Mavericks, Yosemite, El Capitan and macOS Sierra can be downloaded here: https://airvpn.org/macosx PLEASE NOTE: Eddie 2.11 package includes an OpenVPN version re-compiled by us from OpenVPN 2.4 source code with OpenSSL 1.0.2k for security reasons and to fix this bug: https://community.openvpn.net/openvpn/ticket/328 Eddie overview is available here: https://airvpn.org/software Eddie includes a Network Lock feature: https://airvpn.org/faq/software_lock Eddie 2.11.x is free and open source software released under GPLv3. GitHub repository https://github.com/AirVPN/airvpn-client Kind regards & datalove AirVPN Staff
  20. Nothing horrible, relax and don't let your computer dominate you. If you killed Eddie without grace, obviously you did not allow it to restore your previous system settings. If that happened, you can fix the issue in less than 20 seconds by re-running Eddie and shutting it down properly, or by flushing iptables rules and checking your DNS settings. Kind regards
  21. Hello! Thank you for your remarks. Can you please try again now? Kind regards
  22. Hello! Please proceed with Eddie 2.11.12 which will run just fine in Ubuntu 16: https://airvpn.org/topic/18625-eddie-211beta-available/ Kind regards
  23. For Mint 18 and Ubuntu 16.xx you need to install Eddie 2.11.12 because Eddie 2.10.3 is not compatible with Mono 4. Eddie 2.11.12 will be the new stable release very soon. Please see here to download it: https://airvpn.org/topic/18625-eddie-211beta-available/ Please take note that no ads are allowed in the forums and that the competitor you promote does NOT provide free and open source software for GNU/Linux, while we do. Our software runs perfectly on almost every single Linux distribution, even the less famous ones. About your complaints with network-manager-openvpn, we are not responsible for the bugs in it. We even recommend to NOT use it. If you only had read the documentation and the links sent to you in the courtesy e-mail you would have realized that. Stop advertising and trolling or your account will be banned from the forum. Kind regards
  24. It's very different in this case. Netflix can just allow only IP addresses that are assigned to residential ISPs, and this method is very effective for a centralized server that needs to filter inbound connections. From China, it is not applicable, because any end-service does NOT run on machines connected to residential ISPs. Enforcing the same block would be equivalent to shut down the whole Internet for any service outside (and several inside) China. Not that it's impossible, but the economic consequences would be catastrophic even for the establishment. China faces the opposite problem: block outbound connections to an arbitrary amount of servers, not inbound connections to a single service from an arbitrary amount of clients. This does not mean anyway that we do not expect that China will implement more sophisticated ways to disrupt connections to VPN servers abroad. Kind regards
  25. Hello! We're very glad to inform you that a new 1 Gbit/s server located in Spain is available: Eridanus. The AirVPN client will show automatically the new server, while if you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 2018 UDP and TCP. Just like every other Air server, Eridanus supports OpenVPN over SSL and OpenVPN over SSH. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
×
×
  • Create New...