Jump to content
Not connected, Your IP: 18.223.239.15

Staff

Staff
  • Content Count

    11336
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1948

Everything posted by Staff

  1. DNS leaks do not exist in GNU/Linux. The argument you're talking about has nothing to do with DNS leaks. It may be relevant or not but please do not confuse it with DNS leaks. Once and for all let's stop this fantastic and totally imaginary idea of DNS leaks on GNU/Linux. Any other topic or message with such a fantasy tale will be deleted. Kind regards
  2. Hello! When you run Eddie in a terminal, specify -netlock option to activate Network Lock. See Eddie manual. From the GUI, click the very big "Activate Network Lock" button in the middle of the main window to activate Network Lock. You can also tell Eddie to activate Network Lock at startup in preferences. Frankly we have no idea on how to make Network Lock easier to activate. Kind regards
  3. No, we were not contacted. We contacted the author of the article as we said, and he kindly answered. We will be waiting for the information we required and we will keep you posted. Kind regards
  4. Hello, we can't reproduce the presumed issue in any way. As far as we can see it does not exist. We have never been contacted by the author. We have anyway written to the author of the article for clarifications and explanations. We will keep you posted. Kind regards
  5. Hello! In the real time servers monitor, which you can access by clicking "Status" from our web site upper menu, you can see the real location of each server. We never perform geo-location tricks to advertise hundreds of fake location which would potentially pose routing and security issues too. Kind regards
  6. Hello! The ip6tables rules are very simple and we find it strange, or even impossible, that ip6tables is malfunctioning on your system. Can you please send us a screenshot about the presumed DNS leak? We start to suspect that you see the VPN DNS IPv6 address, not the one assigned to your machine by your ISP. Kind regards
  7. Hello! 1) Please make sure to run Eddie 2.12.4 (latest stable release). Old versions might be not fully compatible with openSUSE 13.2 2) Please make sure to enable Network Lock which will block IPv6 packets via ip6tables We are confident to respect the late 2017 planned deadline for full IPv6 support on the vast majority of our VPN servers. Kind regards
  8. Hello! We inform you that we will not be accepting BTC starting from July the 31st, late afternoon UTC, due to the proposed changes and likely implementations in the Bitcoin network. As soon as the transition ends and the network gets "stable", we will re-accept Bitcoin payments. EDIT: we started to accept Bitcoin again since Aug the 1st. Kind regards and datalove AirVPN Staff
  9. Hello! It depends on Google Safe Browsing. YOUR detected IP address (in this case that VPN server exit-IP address) is evaluated by Google which returns a warning considering our VPN server IP address as a source of malicious activity. Chrome does not proceed. Google Safe Browsing listed even Google DNS as a dangerous source of malicious activity and malware before we spread this funny information a couple of weeks ago. We are observed. Kind regards
  10. Hello! Various prepaid cards emitted in the USA can only be used to purchase goods and services in the USA and few other countries. Maybe that's the reason of the issue. Kind regards
  11. Hello! Please follow the "News and announcement" forum. We will keep you updated. And don't worry, only good news will be coming. Kind regards
  12. curl.exe is essential to Eddie. If your system can't run it, you can't use Eddie effectively. Does the same happen with Eddie 2.13.3beta, which includes an updated curl version? Kind regards All exes which come with airvpn do the same thing. (Except Airvpn and Cli) Same thing on the experimental version. Hello! Do you mean that curl, stunnel and plink all crash in your system? Kind regards
  13. Thank you very much for this warning: unfortunately we were never contacted by the authors about this problem, and we are going to investigate in the nearest future. We will keep you posted. Kind regards
  14. curl.exe is essential to Eddie. If your system can't run it, you can't use Eddie effectively. Does the same happen with Eddie 2.13.3beta, which includes an updated curl version? Kind regards
  15. Hello, if you don't run Eddie (our client software), you need to take care yourself of IPv6. IPv6 full support in AirVPN is planned for the end of 2017. If you run Eddie you are protected from IPv6 leaks, except on GNU/Linux. Just enable Network Lock and you are protected against IPv6 leaks in Linux as well. That's all. Kind regards
  16. Hello, if the length of the data to decrypt is invalid a possible cause is that curl could not download the mentioned data at all. Usually we see that this problem is caused by a firewall in the customer's system blocking curl, as you all should have already seen clearly from the log. Kind regards
  17. Hello, just for readers' information, you can route specific IP addresses outside the VPN tunnel with Eddie, the Air client software, as well. Kind regards
  18. Thank you. Confirmed and fixed, can you please try again now? Kind regards
  19. Hello! In 2015, full IPv6 support was planned for late 2017. We are confident we will respect this deadline. All important OpenVPN-related issues have been solved, including a major OpenVPN bug which has been fixed internally, by our development team. Most (but not all) of our providers already gave us full IPv6 connectivity. Kind regards
  20. Hello, ufw is an iptables frontend. Network Lock does not disable ufw in itself, but definitely modifies your filtering rules by invoking iptables. If you need your custom rules in every situation you should not use Network Lock. Kind regards
  21. Hello! We're sorry, fatal typo. Fixed in 2.13.x Kind regards
  22. Hello, thanks. That was fixed in Eddie 2.12.x. Kind regards
  23. This is a directive aimed to prevent DNS leaks, so it is a Windows-only directive. Anyway superfluous in systems like GNU/Linux where DNS leaks do not exist. @doomced One of the possible solutions for your case is exactly described in the article that you already posted. However, you should not use network-manager-openvpn, because it could break your script to accept DNS push. We would recommend that you either run Eddie or OpenVPN directly. Kind regards
  24. Hello! You need to have them accepted. The fact that the problem is sporadic makes it not relevant: you will not notice any slow down. However, if the amount of dropped packets rises, you will see a dramatic slow down up to a complete halt of the traffic flow to/from the VPN server. At the moment we don't know why LittleSnitch drops a packet only now and then. Kind regards
×
×
  • Create New...