Jump to content
Not connected, Your IP: 216.73.216.40

Staff

Staff
  • Content Count

    11485
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    2021

Everything posted by Staff

  1. Hello! If the notice is not a hoax, then your traffic was not tunneled. Enable Network Lock to prevent any possible leak, including leaks caused by unexpected VPN disconnections and leaks caused by the torrent client itself when it is misconfigured (example: UPnP enabled, or any other option causing the software to bind to the physical network interface). https://airvpn.org/topic/9170-do-you-allow-p2p-how-can-i-optimize-performance-of-emule-and-bittorrent-with-airvpn/ https://airvpn.org/topic/12175-network-lock/ Kind regards
  2. Hello! A probable reason for the warning you get is that you have the same gateway for two different network interfaces. In such cases some OpenVPN versions will abort the connection phase. According to your description and to the fact that you have Network Lock enabled, we have no reasons to suspect that you can have any traffic leak outside the tunnel anyway. If you don't need two network interfaces with the same default gateway (in most cases there is no reason for that), the quickest way to get rid of the warning is just disabling the one that you don't need. For example, if you connect to your router via Ethernet, you can disable the WiFi card. Enjoy AirVPN! Kind regards
  3. Hello! Today we're starting AirVPN seventh birthday celebrations! From a two servers service located in one single tiny country providing a handful of Mbit/s, the baby has grown up to a wide infrastructure in 18 countries in three continents, providing now 197000 Mbit/s to tens of thousands people around the world. 2017 is an important year, not only because not all VPN services have flourished or even survived for seven years, but also because 2017 is the year we planned to enhance the growing child with full IPv6 support as well as tls-crypt obfuscation. Software related development will be powered up, with some very exciting news you will get in the next months. If you're curious to know something about a series of fortunate events which gave birth to AirVPN, have a look here: https://airvpn.org/aboutus To worthily celebrate Air's seventh birthday, we're glad to inform you that starting from now we will offer a 25% discount on all plans. Hurry up, celebrations as well as this special offer will end on June the 6th, 23:59:59 UTC! Kind regards and datalove AirVPN Staff
  4. Hello! Yes, the attacks you talk about, usually based on timing attacks in low latency networks, are not meant to be prevented by separate entry and exit-IP addresses. The correlation attacks which are prevented by separate entry and exit-IP addresses are different. When two nodes of a same VPN connect to each other via a public address which is also the VPN gateway public address they will start exchanging data in clear text outside the tunnel (this is quite obvious, check your routing table to understand exactly why). When that IP address is shared between the nodes connected to the VPN server, this opens up the way to a wide variety of correlation attacks to discover the real IP addresses of the nodes connected to a VPN server. The adversary does not need to control or wiretap all the relevant network segments, it just needs to enter the VPN as a normal user, forward ports remotely and study the proper way to start the attack on the target or targets (the attacker will need to convince the target or targets to connect to any of the services he/she controls behind the VPN). This is not an OpenVPN (or other VPN software) vulnerability, it's just how routing works. Incredibly, even nowadays you can find VPN services around the world which do not take care of all the above and, even more incredibly, famous "VPN reviews" sites do not even talk about this issue. Kind regards
  5. Hello! In 2015, full IPv6 support was planned for late 2017. We are confident we will respect this deadline, even though we have met unexpected OpenVPN bugs in handling IPv6 which have been and are slowing down the whole process remarkably. Kind regards
  6. Hello! Network Lock is a set of pf rules so if Eddie crashes Network Lock will remain active. Kind regards
  7. We wouldn't, why do you say so? Kind regards
  8. Hello! Disable any filter against UDP in the router packet inspection/filtering/QoS/whatever tool and keep your router firmware up to date. Note that we also support TCP but it would be a pity that you renounce to UDP, which is more efficient, for the requirements of a machine. Under a more philosophical point of view, you should put yourself in a position for which machines do what you want, not the other way around. Kind regards
  9. Hello! You don't need to log anything about the traffic content, type, source or destination to know how many simultaneous connections an account has established. You only need a counter for each account. Kind regards
  10. Hello, it's a wrong detection. When you connect to our VPN servers all of your traffic is wrapped in UDP by default. You can change protocol but UDP is the most efficient one due to how OpenVPN works. Kind regards
  11. This scenario resembles an attempted packet injection by some MITM analyzing traffic outside the VPN server (when it is not encrypted by OpenVPN). Again what you describe is impossible. OpenVPN has a packet authentication system which would have rejected the forged, injected packet. The most plausible explanation, if Network Lock was really enabled and firewall rules were not modified, is that it never happened and you misinterpreted something. If we discard this last explanation then the fact that your system is compromised must be taken into serious consideration. Kind regards
  12. Hello! Sorry, but that's simply not true. Also note that ping (ICMP) is not even at the transport layer (it's at the Internet layer). And please do not confuse incoming packets reaching one of your system ephemeral inbound ports as a consequence of an already opened socket etc., with incoming connections to a listening service (if any). Anyway you can have TCP incoming connections with remote port forwarding (you can also have UDP packets forwarded, so the system is not limited to incoming connections over TCP). By default, an Air VPN client has no forwarded ports, so it can not receive any incoming connection, and it can not receive forwarded UDP packets. It's physically impossible, if you have not forwarded remotely any port. You can remap any remotely forwarded port to any local port. If you receive unsolicited packets from the Internet and you have not forwarded any port in your account panel, such packets have reached your ISP-assigned IP address and have nothing to do with the VPN server. Do not forward ports in your router or keep Network Lock enabled to prevent that. Kind regards
  13. Hello! We are working to provide full IPv6 support and IPv6 is already configured in various VPN servers, so in ipleak.net DNS fields you will see both VPN DNS server IPv4 and IPv6 addresses. Kind regards
  14. Hello! It can't come from the VPN server because incoming packets are not forwarded to clients, except those directed to the remotely forwarded port (to the proper client VPN IP address). By default no inbound port is forwarded to a client. Kind regards
  15. That's a normal DNS query respecting the system settings. It has nothing to do with DNS leaks. A DNS leak is a totally different thing which affects only Windows (which does not have a DNS implementation, lacking the concept of global DNS). Kind regards
  16. Hello! AirVPN is the 4th OSTIF top donor: https://ostif.org/top-ostif-donors/ We contributed specifically for the OpenVPN audit. We're glad to see that the audit completed quickly and that no serious security vulnerabilities have been found client-side. Even server-side, the only two security issues are not particularly worrying. A denial of service can be triggered by a client sending at least 196 GB in a certain way, while another denial of service can be caused by having the tls-auth key. Let's remember anyway that the bug bounty remains open. Our upgrade schedules sever-side remain unchanged, as well as Air client software release cycle. Each new release of our software is packaged with the latest OpenVPN version and keep in mind that you can configure the software to use any OpenVPN version you prefer. Kind regards
  17. Hello! This is impossible. There are no DNS leaks on GNU/Linux. The error message seems quite explicative, you don't have the permission necessary to save the file. Please make sure to edit the file with root privileges. Kind regards
  18. No. See also https://curia.europa.eu/jcms/upload/docs/application/pdf/2016-12/cp160145en.pdf for any doubt. No, it's false. It's not the first time that this "reviewer" posts false and potentially defamatory claims against AirVPN, and probably not in good faith as shown in the following post: https://airvpn.org/topic/19586-a-review-on-another-site/?do=findComment&comment=48971 As you can see, the "reviewer" does not hesitate to perform low level tricks (replacing a lie with another lie, stating that a fact is "an opinion of his") when he's nailed down to his lies with incontrovertible facts. The site also includes tons of mistakes about AirVPN, all of them damaging us, stating lower features than those that we really provide. Just to make a few examples, in the table it says that e-mail address is required (false), that we have 138 VPN servers (meaning that the web site has not been updated for a very long time, because we offer 205 servers currently) and some other "horrors" which hint to a bad combination of technical incompetence and lack of good faith. They are all dedicated servers with dedicated ports and IPMI etc. access restricted to VPN or a specific, limited pool of addresses. Kind regards
  19. Hello! We're very glad to inform you that a new 1 Gbit/s server located in Singapore is available: Triangulum. The AirVPN client will show automatically the new server, If you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP. Just like every other Air server, Triangulum supports OpenVPN over SSL and OpenVPN over SSH. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  20. Hello, if you run Windows 10 "Creator" please see https://airvpn.org/topic/22650-windows-10-creator-update-airvpn-dns-slow/ Kind regards
  21. We need to partially fix the support team statement here, we're sorry. Some of the data you enter, including the name, but NOT including the credit card number, is transmitted by the credit card processor to the Air management only (and not to employees or other persons, obviously). Kind regards
  22. DNS leaks on GNU/Linux are impossible because they do not exist. A DNS leak is a DNS query sent in clear text (not in the tunnel) against the custom settings of the machine. It is a definition specifically created for Windows, which does not have a DNS implementation (it lacks the concept of global DNS so it sends out DNS queries to any DNS server of any network interface, even in random order in latest Windows 10 "Creator") and it makes no sense to extend it on systems with a proper DNS implementation and which respect settings. That said, we see that you already found a possible reason for the issue (which is quite a different thing than a DNS leak). Please update this thread at your convenience to report whether it solved the problem or not. Kind regards
  23. Hello! The same base frequency is not by itself an issue provided that you use different channels that do not overlap the slice frequency. Each channel has normally a 20 MHz slice frequency. Unfortunately every channel overlaps with "near" channels, so if you experience issues you might need some trial-and-error procedure. However, the problem is treated here for a more scientific approach. Also, some useful tools are suggested. You can find additional articles facing the problem more properly for your country (the example article is specific to UK) through a web search engine. http://www.expertreviews.co.uk/networks/1401371/how-to-extend-wi-fi-range-increase-speed-and-fix-problems/page/0/1 EDIT: an additional nice article https://www.howtogeek.com/197268/how-to-find-the-best-wi-fi-channel-for-your-router-on-any-operating-system/ Kind regards
  24. Hello! We're very glad to inform you that a new 1 Gbit/s server located in the United States is available: Aquila. It is located in Fremont, California. The AirVPN client will show automatically the new server, If you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP. Just like every other Air server, Aquila supports OpenVPN over SSL and OpenVPN over SSH. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  25. Hello! Can you please try again now? Kind regards
×
×
  • Create New...