Jump to content
Not connected, Your IP: 3.14.143.149

Staff

Staff
  • Content Count

    11048
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1867

Everything posted by Staff

  1. Hello! We're glad to inform you that Eddie developer has put this issue as a priority for the next Eddie release. Kind regards
  2. Hello! There are no particular issues on our side, the service is very good as usual. The problem must be somewhere either in your system, local network, router, or ISP... please feel free to open a ticker for further investigation. Kind regards
  3. You can read the regulation here: http://data.consilium.europa.eu/doc/document/ST-10788-2015-INIT/en/pdf
  4. Hello, it appears that there are some misunderstandings about the new regulation. In the worst case scenario, it just leaves the situation as it is already and has always been since years ago. But there are some interesting things for the citizen. Please read it before commenting! See also here: https://airvpn.org/topic/15717-possible-new-law-in-europe-about-vpns-and-torrents/?do=findComment&comment=33267 You can find the regulation in its current form here: http://data.consilium.europa.eu/doc/document/ST-10788-2015-INIT/en/pdf Move to that thread, please, this one is now locked. Feel free to explain how it is a bad thing for Net Neutrality instead of a (although small) step forward to it. Kind regards
  5. Anyway, it's important to know that Network Lock is important for other purposes, not only for leaks prevention in case of unexpected VPN disconection. In Windows 10, in particular, due to DNS new phantasmagorical implementation (nope, no global DNS in Windows... again... probably never...) Network Lock can play a key synergy role in DNS leaks prevention, and a key role under a very peculiar attack exploiting usage of Win 10 DNS and Eddie settings that one of our customers found and kindly informed us of. On top of that Network Lock prevents leaks due to processes binding to the physical interface (remember WebRTC for example) etc. etc. Kind regards
  6. Hi, actually throttling of p2p and VPN is what routinely occurs in the European Union. It is illegal, though, to do it if the customer has not been fully and clearly informed on the contract, please see here: https://airvpn.org/topic/10967-slow-airvpn-speeds-050mbs-down-or-less/?do=findComment&comment=15358 The new regulation is an additional and nice step forward to Net Neutrality, but it's still weak and actually it still allows various discriminations. However, when the regulation is in force, situation for the EU citizen will be better or equal to the current situation, not worse. Since years ISPs have put encrypted traffic to the slow lane. But since HTTP is being discarded more and more and HTTPS is becoming dominant in the World Wide Web, OpenVPN over SSL to port 443 has always been a perfect patch, because usually ISPs tend to treat pure TLS traffic to port 443 totally equivalent to HTTPS, which you can't throttle too much without impacting 100% of your customers. Kind regards
  7. Hello! The premise is wrong, there's no known such "weakness" in HMAC SHA1, in the sense that in HMAC SHA1, SHA1 collisions based attack is currently irrelevant. The article you linked refers to SHA1, not HMAC SHA1 (for a precise description of the reason, keep reading). See also for a quick, qualitative confirmation https://www.schneier.com/blog/archives/2005/02/sha1_broken.html : We'll say more, even HMAC MD5 can still be considered unaffected by collisions, see for example http://crypto.stackexchange.com/questions/9336/is-hmac-md5-considered-secure-for-authenticating-encrypted-data The article you linked in your other post talks about SHA1 used for digital signatures (of certificates or anything else). That's really a problem because real world attacks are estimated to be feasible in the near future (2017). Switching Data Channel packet authentication digest in our setup would be swift on our side, but would break compatibility with customers using OpenVPN/OpenSSL versions that can't support it. For this reason, we will carefully evaluate the switch, with no hurry. See here: http://cseweb.ucsd.edu/~mihir/papers/hmac-new.html Now, in spite of all of the above, let's take a conservative approach. SHA1 collisions can easily become real-world feasible within a couple of years. So, not later than 2017, we will (most probably) assist to the first time practical collision attacks breaking SHA1. In this scenario, let's imagine that someone can figure out how to turn that into a pre-image attack against HMAC, making both conditions 1 and 2 of the above cited paper NOT met. In this case, switching digest will be mandatory, because we would be in a scenario where the packet-injection resistance of OpenVPN would be potentially compromised. Therefore, in order not to cut out customers without any reasonable, valid reason, we will prepare a switch with no time pressure but with careful planning. EDIT: PRF = Pseudo Random Function Kind regards
  8. Hello, no, those points are all blatantly false. We don't understand how you could infer those from the .ovpn file, which on the contrary should have led you to opposite conclusions. Fist and foremost, AirPVN OpenVPN daemons operate in tls-mode. From the manual: That's exactly what it happens. Additionally, DH keys are 4096 bit. And that's what you see in the .ovpn file. An element that might have contributed to your confusion is that you don't see in the .ovpn file of your client the "tls-client" directive to enable TLS mode. That's because the directive "client" is used instead, which is expanded into "tls-client" + "pull". Again, reading the manual helps: You can easily check all of the above by looking at your OpenVPN client logs pertaining to a connection to any VPN server. You will see something like: ... - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key ... - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication ... - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key ... - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication ... - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA Enjoy AirVPN! Kind regards
  9. Website: http://www.ardmediathek.de/tv/Das-Erste/live?kanal=208 German TV channel Das Erste. Status: OK Native: NO Routing: All servers.
  10. Hello! Can you please try again now? Please note that share-online only allows one download per IP per a given period time. So, if someone downloads one file while connected to some VPN server, all the users connected to that VPN server will not be able to download anything during that period of time (presumably some hours). We don't know if this restriction applies to their Premium subscribers. As LazyLizard14 points out, their business practices are very questionable (please see the first message in this thread). Kind regards
  11. Hello! Please make sure that you're running client version 2.10.3. Select "AirVPN" -> "About" to check. Network Lock in Windows activates Windows Firewall so the feature can not be used in any way when a different firewall is active. Running two different firewalls may cause unpredictable behavior because (to put it briefly) you have two programs with same high privileges which compete to modify concurrently the OS packet filtering tables. Kind regards
  12. Hello! In our testing systems and according to a significant amount of independent reports, Network Lock works fine with Eddie 2.10.3 and Windows 10. Kind regards
  13. Hello, it's not specific to Linux, it's an OpenVPN directive, tls-cipher It accepts a list of TLS ciphers (with IANA and/or OpenSSL names format) that your client can accept for the Control Channel. If the directive is specified your OpenVPN will only try the listed ones (watch out, therefore). If you set only one, you will force that one (again, the server must support it too). Currently it's not necessary (for our service) if your OpenVPN version is 2.3.3 or higher, see our previous post. On the other hand, if your OpenVPN version is older than 2.3.3, you can't use TLS 1.2 DHE-RSA-AES256-GCM-SHA384 For a more precise explanation, please see directive tls-cipher in the OpenVPN manual Kind regards
  14. Hello, we have identified the problem. Can you try again and confirm that it works now ? Kind regards
  15. Staff

    UK - Virgin

    We cross-checked the reports of dozens of our customers with Virgin Media UK, asking them to resolve "airvpn.org" on two of Virgin DNS servers. Since all the reports matched exactly throughout one year, we can safely assume that the reports are reliable. It is also worth mentioning that DNS poisoning of airvpn.org is intermittent, and when contacted directly about the issue, Virgin Media responded to us that it was a technical problem, totally unintentional. How are we supposed to know? All in all even the cyber workers of the government of China are interested in our web site, not only with DNS poisoning but also IP blocking. Who knows, maybe it's really just an obscure technical error that re-occurs periodically. Kind regards
  16. Hello, the Data Channel cipher for packets authentication is HMAC SHA (edit: note that there is no GCM support for the data channel yet... it will be probably implemented in OpenVPN 2.4). Perhaps your libraries do not support DHE-RSA-AES256-GCM-SHA384 with TLS 1.2 (also listed as "TLS-DHE-RSA-WITH-AES-256-GCM-SHA384" in OpenVPN 2.3.8). In this case use "TLS-DHE-RSA-WITH-AES-256-CBC-SHA". Edit: note that there is absolutely no rational reason to rush to SHA384 and drop HMAC SHA1 which is NOT vulnerable to SHA collisions. We often read (even in our forum) a confusion pertaining to SHA1 vulnerabilities, which are thought (with an unexplainable mistake) to be extended to HMAC SHA1. See also here: https://crypto.stackexchange.com/questions/26510/why-is-hmac-sha1-still-considered-secure Back to the Control Channel, which is the subject of this topic. By default, OpenVPN 2.3.3 or higher will first choose TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 if available, over TLS-DHE-RSA-WITH-AES-256-CBC-SHA, so if you needed an explicit directive for the first, very probably your system does not support it. So, at the end of the day, you normally do not need any additional directive, OpenVPN will pick automatically the best cipher between those available both in your and our systems. See also "openvpn --show-tls". One more edit: please see also here https://security.stackexchange.com/questions/92638/openvpn-cipher-vs-tls-cipher , in particular: Kind regards
  17. Hello! Ok, anyway, if you prefer so, probably you have noticed that since some weeks ago you can use (provided that your OpenVPN and OpenSSL or PolarSSL supports it) the following TLS cipher: DHE-RSA-AES256-GCM-SHA384 with TLS 1.2. The RSA keys are of course the same (4096 bit) as well as DH keys (4096 bit). If you feel that HMAC SHA1 is not adequate for the Control Channel (but we see no reasons for that) you can use the above cipher. Kind regards
  18. Hello! The boxes are displayed on most, if not all, of our web site pages. This is a very light one https://airvpn.org/aboutus Kind regards
  19. @just-me & others Hello! It looks like Eddie behaves correctly and properly. By default, it appears that Windows Firewall is disabled in your system. When you enable Network Lock in Eddie, it activates the firewall. You can see here that your firewall was disabled and Eddie enables it: ! 2015.10.15 22:47:17 - Activation of Network Lock - Windows Firewall ... . 2015.10.15 22:47:21 - Shell of 'cmd.exe','/c netsh firewall set notifications mode=disable profile=DOMAIN' done sync in 218 ms . 2015.10.15 22:47:21 - Shell of 'cmd.exe','/c netsh advfirewall set private state on' done sync in 219 ms . 2015.10.15 22:47:21 - Shell of 'cmd.exe','/c netsh firewall set notifications mode=disable profile=STANDARD' done sync in 218 ms . 2015.10.15 22:47:22 - Shell of 'cmd.exe','/c netsh advfirewall set public state on' done sync in 219 ms . 2015.10.15 22:47:22 - Shell of 'cmd.exe','/c netsh firewall set notifications mode=disable profile=CURRENT' done sync in 218 ms . 2015.10.15 22:47:24 - Shell of 'cmd.exe','/c netsh advfirewall firewall delete rule name=all' done sync in 1903 ms . 2015.10.15 22:47:24 - Shell of 'cmd.exe','/c netsh advfirewall firewall add rule name="AirVPN - ICMP V4" dir=in action=allow protocol=icmpv4' done sync in 172 ms ... ... Then, when you either disable Network Lock or shut down Eddie, Eddie restores the firewall to its previous state (which was DISABLED): ! 2015.10.16 07:43:40 - Deactivation of Network Lock . 2015.10.16 07:43:42 - Shell of 'cmd.exe','/c netsh advfirewall set domain firewallpolicy ,' done sync in 1498 ms . 2015.10.16 07:43:42 - Shell of 'cmd.exe','/c netsh advfirewall set private firewallpolicy ,' done sync in 171 ms . 2015.10.16 07:43:42 - Shell of 'cmd.exe','/c netsh advfirewall set public firewallpolicy ,' done sync in 188 ms . 2015.10.16 07:43:44 - Shell of 'cmd.exe','/c netsh advfirewall import "C:\Users\Anon\AppData\Local\AirVPN\winfirewall_rules_backup.wfw"' done sync in 1669 ms . 2015.10.16 07:43:44 - Shell of 'cmd.exe','/c netsh advfirewall set domain state off' done sync in 218 ms . 2015.10.16 07:43:45 - Shell of 'cmd.exe','/c netsh advfirewall set private state off' done sync in 234 ms . 2015.10.16 07:43:46 - Shell of 'cmd.exe','/c netsh advfirewall set public state off' done sync in 1279 ms Kind regards
  20. Hello! If you had Network Lock enabled in our Air client, you have always prevented "WebRTC leaks", as well as any other packet out of the tunnel sent by any process binding to your physical network card. https://airvpn.org/faq/software_lock/ Kind regards
  21. Hello! We remind you that we use 4096 bit keys for DH and unique primes on each VPN server. Kind regards
  22. Hello, in several cases it's not enough that a second firewall is disabled. Conflicts can arise anyway according to our experience with Comodo and Windows Firewall. Kind regards
  23. Hello! We inform you that a rack relocation of servers Aquilae, Tauri and Velorum (DE) will occur during the night between October the 19th and the 20th (UTC). We will shut the servers down at: 10-19-15 21.00 UTC We expect to bring the servers back on line approximately at: 10-20-15 05.00 UTC Kind regards AirVPN Staff
  24. In this case there is a pinned topic on this very same forum. Kind regards
  25. Hello, probably it has nothing to do with Network Lock feature. It's not unusual that public WiFi hot spots block UDP. Maybe that's the cause of the problem. Try a connection in TCP, or even "SSL Tunnel - Port 443" to see whether it solves the problem. In Eddie you can change connection mode in "AirVPN" -> "Preferences" -> "Protocols". Kind regards
×
×
  • Create New...