Jump to content
Not connected, Your IP: 3.149.231.235

Staff

Staff
  • Content Count

    10933
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1843

Everything posted by Staff

  1. Hello! Oh, yes, the problem is with www.elephanttube.com, not with elephanttube.com. They might have problems with their authoritative server, or maybe there's something else (see below), we'll look into the issue in the near future. In the meantime enter the following line in your hosts file to access the web site: 64.188.63.185 www.elephanttube.com $ dig @10.4.0.1 www.elephanttube.com ; <<>> DiG 9.8.4-rpz2+rl005.12-P1 <<>> @10.4.0.1 www.elephanttube.com ; (1 server found) ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 53240 ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;www.elephanttube.com. IN A ;; Query time: 262 msec ;; SERVER: 10.4.0.1#53(10.4.0.1) ;; WHEN: Wed Jul 29 14 :27:27 2015 ;; MSG SIZE rcvd: 38 Kind regards
  2. LOL, they're zeriouz hackars
  3. Hello, we don't think so, please elaborate: $ dig @10.4.0.1 elephanttube.com ; > DiG 9.8.4-rpz2+rl005.12-P1 > @10.4.0.1 elephanttube.com ; (1 server found) ;; global options: +cmd ;; Got answer: ;; ->>HEADER ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;elephanttube.com. IN A ;; ANSWER SECTION: elephanttube.com. 14 IN A 64.188.63.185 ;; Query time: 102 msec ;; SERVER: 10.4.0.1#53(10.4.0.1) ;; WHEN: Wed Jul 29 13:55:03 2015 ;; MSG SIZE rcvd: 50 Kind regards
  4. Hello, Eddie 2.10.1 Experimental is available, not yet "Stable". In the usual download page click "Other versions" and select "Experimental". We think that Eddie 2.10 will be promoted to "Stable" in a few days, if nothing goes wrong. Kind regards
  5. Hello, we have identified the problem. Can you try again and confirm that it works now ? Kind regards
  6. Hello, we have identified the problem. Can you try again and confirm that it works now ? Kind regards
  7. Hello! You can maybe discard those claims because: However it must be clarified which service was reachable in the system that was in the VPN and how you performed tests with that utility. Occasionally you may encounter a host which has somehow assigned itself an IP address in the 169.254.0.0/16 range. This is a particularly common symptom ofWindows machines which have been configured for DHCP but for whatever reason are unable to contact a DHCP server. When a host fails to dynamically acquire an address, it can optionally assign itself a link-local IPv4 address in accordance with RFC 3927. Microsoft's term for this is Automatic Private Internet Protocol Addressing (APIPA). http://packetlife.net/blog/2008/sep/24/169-254-0-0-addresses-explained/ Probably not meaningful in your case, you can ignore it, it should be just some "unconfigured" tunneling interface. 10.4.0.0/16 is in the range of the VPN IP addresses when you connect to our service to port 443 in UDP, see also https://airvpn.org/specs So, if that interface which is assigned an address in the range 10.4.0.0/16 is a physical interface, a conflict will arise when the tun adapter IP address is DHCP-pushed by our servers. In this case change connection port (for example, connect to port 80 in UDP). On the contrary, if that's the tun/tap interface, then it's all right. After that, an additional problem must be considered. If your system has multiple interfaces for multiple ISPs, it will have multiple gateways. This can become a major problem for OpenVPN and can also pose the question about how Plex binds to what. However, feel free to clarify, because that's not totally clear from your message: According to all of the above, it seems that the problem pertains only to Plex: traffic is tunneled and remote port forwarding appears to be working. OpenVPN logs and output of commands "ipconfig /all" and "route print" (while the system is allegedly connected to the VPN) can help. Kind regards
  8. Hello, if your ISP does not shape OpenVPN traffic, then direct UDP connections are the most efficient. An additional SSL/SSH tunnel adds packets, protocol and encryption overheads. On top of that OpenVPN is forced to work in TCP mode, which is significantly less efficient for how OpenVPN works. So, under a performance point of view only, OpenVPN over SSL/SSH should be used only when strictly necessary. Eddie usage is optional and we will never force our customers to use our software to connect to our service. That said, unless you have some very specific requirement that our client can't meet (in which case, we would be glad to know them), we don't see a good reason for which you should drop it. Eddie developer has made every effort to keep maximum flexibility, freedom and comfort with Eddie. It is very much configurable in every aspect. You can define your own custom directives and routes, you can run your own scripts or programs when various events occur (App Start, App End, Session Start, Session End, VPN Pre, VPN Up, VPN Down) and you can run it either with its GUI or in command line mode. You have also total control on DNS. Eddie adds a remarkable set of commodities that are specific to our service, features an exclusive "OpenVPN over Tor" mode and checks all VPN servers to provide you with meaningful ratings which help you pick the best VPN server for your node. Kind regards
  9. Hello, please click "Enter" from the upper menu of our web site then click the icon matching your system to access instructions and download page for that system. Please read the courtesy e-mail for an executive summary of our service. We also recommend that you read answers to FAQ. To hide Tor usage to your ISP connect to a VPN server. Once the connection is established use Tor. Kind regards
  10. Maybe. We'll check the AAAA record. EDIT: yes. The problem has now been fixed. Within the TTL at the latest everything should be all right. Kind regards
  11. Impossible, ipleak.net does not even run Apache. The web site was and is working just fine. You must have landed or be landing to somewhere else. Kind regards
  12. Hello! Probably it's just resolvconf not installed in Dynamic Mode or some similar issue. Check here: https://airvpn.org/topic/14141-ubuntu-1504-potential-issue/?do=findComment&comment=27239 If so, it occurs only on some Ubuntu 15.xx upgraded with a dist-upgrade. Infrequent issue, but it is not caused by Eddie. Kind regards
  13. Perhaps a possible explanation is a VPN using a Data Channel cipher such as 128 bit BF-CBC, while Air uses AES-256-CBC. Since BF-CBC 128 requires less computational power than AES-256 (except during re-keying, that's slower with Blowfish) the resulting performance difference with consumers' routers CPUs can be significant. We have not implemented BF for some security concerns (a class of keys is particularly weak, 64 bit blocks are used - which can be a potential problem for users exchanging in a VPN big amounts of data - >32 GB in one session, not unusual with several customers of our) and Schneier himself (Blowfish creator) eight years ago recommended to not use Blowfish anymore. See also http://crypto.stackexchange.com/questions/1098/is-blowfish-strong-enough-for-vpn-encryption (in particular, answer by "poncho"). Kind regards
  14. Hello, yes, try to use "mssfix" directive (you can insert it in "AirVPN" -> "Preferences" -> "Advanced" -> "OVPN directives"). Try different mssfix values (1400, 1350, 1300...) because the Witch code is still unripe so it provides many many false positives. See also https://translate.google.com/translate?sl=ru&tl=en&js=y&prev=_t&hl=ru&ie=UTF-8&u=http%3A%2F%2Fhabrahabr.ru%2Fpost%2F216295%2F&edit-text= Kind regards
  15. Hello! Please shut the software down properly (menu "AirVPN" -> "Exit" then confirm). Kind regards
  16. Hello! In this case you can block all traffic to the Internet. When Network Lock is activated, only tunneled traffic is allowed. When Network Lock is inactive, no traffic is allowed at all. Kind regards
  17. Hello, actually, if you run Eddie it's recommended that you do it from inside Eddie. You can do that in "AirVPN" -> "Preferences" -> "Advanced" -> "DNS" - do not forget to disable DNS check. Kind regards
  18. Hello, at the moment if you don't want to use micro-routing please query any DNS server that's not the VPN DNS server. About Netflix Canada, unfortunately it blocks our Canada servers, so we have decided that US Netflix from CA servers is better than no Netflix at all. Kind regards
  19. Hello, the logs are quite clear: 19700101 00:01:23 N VERIFY ERROR: depth=1 error=certificate is not yet valid We confirm that on Jan 1, 1970, our certificate is not valid. Kind regards
  20. Hello, first of all, if you just want the click-and-go solution just use the Windows Firewall and click "Network Lock" button on our Windows client Eddie, which is also free and open source. See here: https://airvpn.org/topic/12175-network-lock Eddie implements Network Lock even for OS X and Linux, of course. These guides come from the community and we are very happy about them because they provide alternative, community-driven solutions, instead of centralized solutions proposed by ourselves (which are anyway available). We kindly ask you to get documentation before you write in our public forums. You will contribute to forum cleanness and readability and will avoid to write foolishness like the quoted sentence. Kind regards
  21. Hello, thank you for your feedback. Server will be withdrawn in a few days. Kind regards
  22. Hello, the server entry-IP address is wrong: 20150722 08:29:28 I UDPv4 link remote: [AF_INET]10.4.0.1:443 That's a private IP address. Please see here and determine the correct entry-IP address: https://airvpn.org/topic/14378-how-can-i-get-vpn-servers-entry-ip-addresses Kind regards
  23. Hello! In any way we deem appropriate and according to the law. Any, according to the law. Kind regards
  24. Hello, we act just like any other hosting provider in this case. Please see also https://airvpn.org/topic/7181-clarification-of-your-monitoring-policies/?do=findComment&comment=29972 Kind regards
×
×
  • Create New...