-
Content Count
11483 -
Joined
... -
Last visited
... -
Days Won
2021
Everything posted by Staff
-
Hello, although Eddie can run swiftly on a wide variety of GNU/Linux distributions, Fedora 23 needs some additional work, we're sorry. Nothing too complex anyway. Please see: https://airvpn.org/topic/11572-fedora/ Kind regards
-
ANSWERED No Server Available - Error Message
Staff replied to Iron_Mike's topic in Troubleshooting and Problems
Hello, the problem appears completely different: . 2016.06.04 23:03:09 - Updating systems & servers data ... . 2016.06.04 23:11:24 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (Unable to connect to the remote server) This issue is known in 2.9.2 (2.9.2 is not fully compatible with Windows 8.1 and 10, and one of the potential problems is exactly this). Before anything else, please upgrade to Eddie 2.10.3, and re-send the logs if the problem persists (if the client is still blocked, it's worth checking any packet filtering tool). Kind regards -
ANSWERED No Server Available - Error Message
Staff replied to Iron_Mike's topic in Troubleshooting and Problems
The whole issue affected the systems for just 10 minutes or even less but if you disabled Eddie auto servers refresh you need to manually refresh the servers list to re-populate it. Kind regards -
ANSWERED No Server Available - Error Message
Staff replied to Iron_Mike's topic in Troubleshooting and Problems
Your account is connected to some VPN server, so we assume that the problem is solved for you too, can you confirm? General note: the whole issue affected the systems for just 10 minutes or even less but if you disabled Eddie auto servers refresh you need to manually refresh the servers list to re-populate it. Kind regards -
ANSWERED No Server Available - Error Message
Staff replied to Iron_Mike's topic in Troubleshooting and Problems
Try to click the "Refresh" button in "Servers" tab. Thanks. -
ANSWERED No Server Available - Error Message
Staff replied to Iron_Mike's topic in Troubleshooting and Problems
The issue is now resolved. Thank you for your patience. -
Hello! Today we're starting AirVPN sixth birthday celebrations! From a two servers service located in one tiny country providing a handful of Mbit/s in 2010, the baby has grown up to a wide infrastructure in 16 countries in three continents with 165 VPN dedicated servers and several secondary servers aimed to additional services, providing now up to 156900 Mbit/s to tens of thousands persons around the world. The number of available VPN servers since the last birthday has almost doubled. An outstanding growth that makes us very proud! If you're curious to know something about a series of fortunate events which gave birth to AirVPN, have a look here: https://airvpn.org/aboutus To worthily celebrate Air's sixth birthday, we're glad to inform you that starting from now we are offering a 25% discount on all plans. Hurry up, celebrations as well as this special offer will end on June the 12th, 23:59:59 UTC! Kind regards and datalove AirVPN Staff
-
This is a one year old thread revived by a lot of people. The discount you can see was applied on the 2015 birthday, the 5th birthday. But fear not and stay tuned, 6th birthday is coming. Kind regards
-
Yes. Kind regards
-
Hello, querying VPN DNS is essential for the micro-routing system, while Netflix native applications versions >=3.7.2 will try to bypass your system DNS. That's the reason of the issue. See for example http://forums.whirlpool.net.au/archive/2342149 for some suggestions. Kind regards
-
Hello! During May the 30th, starting from 4 AM CEST and approximately for 11 hours, the main web site was down due to a DDoS attack. Secondary frontend servers and VPN services were not affected. While the DDoS was ongoing we received ransom requests to stop the attack which we obviously ignored as we always do. We solved the issue after the first 10-11 hours, although the attack persisted. On May 31st the attackers desisted, probably after they could see that their attack had been ineffective for several hours. We apologize for the inconvenience. Kind regards AirVPN Staff
-
Hello, considering that the relevant re-ordering problem with UDP is handled with good efficiency by OpenVPN, that OpenVPN is very resistant to UDP replay attacks and that fragmentation problem can in most cases be handled with no need of TCP, use UDP whenever possible (but see a very special case at the end of this message). Wrapping normally weights much more than anything else in performance considerations. Just to make an example, see TCP over TCP: http://sites.inka.de/bigred/devel/tcp-tcp.html You can clearly see the advantages of UDP over TCP (instead of TCP over TCP). We have also some more considerations in the FAQ section. Leaving apart considerations on performance, however, you should also take into account this (see in particular the OpenVPN manual quoted excerpt): https://airvpn.org/topic/3773-pls-help-strange-logs/?do=findComment&comment=3784 Therefore, in the very particular case for which you need very high security on an UDP or non-IP flow between your node and the VPN server we would say that you had better wrap it into TCP, not UDP (i.e. connect to the VPN in TCP). Kind regards
-
Any system can't in general run two firewalls simultaneously. You would have two programs with high privileges competing to modify concurrently the OS network filtering table. This is obviously absurd and will lead to unpredictable behavior. Running a firewall different than Windows Firewall is in several cases a bad idea on Windows 7 and later versions. You might enlarge the system surface attack not to mention potential and unwanted interference with various networking usages. Windows Firewall from Windows 7 and later versions has improved a lot and currently does packet filtering just like any other 3rd party tool. Kind regards
-
Windows 10 AirVPN client not working
Staff replied to Boosted's topic in Troubleshooting and Problems
The log is attached. Please jump to https://airvpn.org/topic/17037-cannot-log-on-to-any-servers/?do=findComment&comment=38862 Kind regards -
Hello! We're very glad to inform you that a new 1 Gbit/s server located in Ukraine is available: Alcor. The AirVPN client will show automatically the new server, while if you use the OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 2018 UDP and TCP. Just like every other Air server, Alcor supports OpenVPN over SSL and OpenVPN over SSH. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
-
Network Lock DNS Leaks (with default settings)
Staff replied to sir_trackmenot's topic in General & Suggestions
This is unexpected, unless you query a DNS server that's running inside your local network, for example in your router. In this case you can't blame Network Lock, it's a fault in your own configuration, because Network Lock purpose is ALLOWING anything from and to your router. Easily fixable anyway in a few seconds. Those rules are applied ONLY if "Allow LAN/private" is ticked. It's a customer's free choice. Note: if "Allow LAN" is unticked, Network Lock will anyway allow communications to your router/upstream device, and DHCP negotiations, obviously. How to set the default setting is a difficult choice involving software design so we based the choice on the feedback we have received during years and an overwhelming majority of users want this option enabled. Please see here for further details: https://airvpn.org/faq/software_lock/ Kind regards -
Suspicious activities in background of Eddie (AirVPN client version)
Staff replied to Freedom777's topic in Off-Topic
@Freedom777 Since you failed to provide any proof sustaining your claims and since you persisted in writing claims completely unsupported by evidence, your account can't write anymore in our forums. Our forums are meant to provide the community with support from the community itself, it is NOT a place for anything else, not even freedom of expression. We provide tons of other tools to exercise freedom of expression: we run Tor nodes, we offer free access to activists to VPN services, we offer option to run web sites behind our servers and more. Therefore, these forums must remain clean and functional to the technical support activity community-to-community. We will take all the necessary actions to accomplish this purpose. Kind regards -
Of course. The re-activation was performed and then the account was suspended again for further infringements. In the meantime the user refused the re-activation in any case, but that's irrelevant as you correctly notice. Kind regards
-
Suspicious activities in background of Eddie (AirVPN client version)
Staff replied to Freedom777's topic in Off-Topic
Exactly, and that will not be tolerated. Thread stands anyway for a while, waiting for documentation supporting the claims. -
Suspicious activities in background of Eddie (AirVPN client version)
Staff replied to Freedom777's topic in Off-Topic
Hello, our client pings all VPN servers to assign a rating from your node which includes round trip time. Ping is based on ICMP. Our VPN servers are inside datacenters owned or operated by some of the companies you cite. The option can be disabled, but it is normally quite useful. In absence of a documented justification for the claims you wrote, they must be considered defamatory and your message will soon be deleted. These forums are aimed to community support from the community and must remain crap-free. Kind regards -
Hello and welcome! That's because authentication is not based on username/password but on certificates/keys. user.crt is the client certificate while ca.crt is the CA certificate. They are embedded in the .ovpn file(s). To generate split files please tick "Advanced Mode" > "Separate certs/keys from .ovpn files" in the CG. Kind regards
-
ANSWERED Is there a wishlist for ciphers and hashes to add?
Staff replied to OmniNegro's topic in Eddie - AirVPN Client
Unfortunately there are two good reasons... Eddie is an OpenVPN frontend. It has tons of additional commodities but the core security of the tunneling, connection and packets handling (and more) remains to OpenVPN/OpenSSL/PolarSSL. Forking OpenVPN to support something different would be a paramount task, not to mention the huge security risks related to the operation... Kind regards -
ANSWERED Is there a wishlist for ciphers and hashes to add?
Staff replied to OmniNegro's topic in Eddie - AirVPN Client
Hello, to make it realistic, you should keep the wish list limited to OpenVPN supported digests and ciphers only... Kind regards -
Hello, no, there is no such logging at all. The case is different when an attack is brought against an Air server. When an Air server is attacked, the attacking IP address(es) may be logged to defend the server (although it could be perfectly useless in case the IP addresses are spoofed), this is quite ordinary and has nothing to do with traffic logging, customers IP logging etc., which is not performed as usual. In the exceptional case in which an Air server is attacked by a customer connected to an Air server (either the same server or a different server), then of course we have a very unexpected option to locate easily the attacking source and mitigate or solve the attack. The investigation starts because an Air server is attacked, not for some other reason. It's physically impossible that the activities you describe can configure an attack to an Air server (VPN server, web server...). You can imagine the surprise to see that someone attacks the very same infrastructure he/she is connected to. Apparently it makes no sense, so it is possible that the attacking system is infected (as we said to the attacker) or this behavior has been followed only to fabricate a case, who knows. Kind regards
-
Hello, we're very patient when our systems are attacked, but patience is not a synonym of stupidity. The redacted ticket history is quite self-explaining, as well as the language you have used. Here it's just worth mentioning that if you attack an Air VPN server from another Air VPN server you will face consequences. Your behavior can also be configured as a criminal infringement in most, if not all, European Union countries. Even if you come from a country where such attacks are not covered in the legal framework, you must anyway comply to the Terms of Service you accepted. If you don't, face the consequences and go elsewhere. We have moved this thread in "Off Topic" because we find that it does not find place in any other forum of ours. Please note that your message is also recorded in case of any criminal prosecution against you from any action initiated by us or any other attacked entity, since you have been so dumb to make your potentially criminal infringements partially public. EDIT: we confirm that customers traffic is not logged and that there are no traffic limits. However, if a VPN server is attacked, it's the VPN server itself that takes countermeasures and can of course log IP addresses of the attacker(s). This case is quite unique since an Air VPN server has been attacked by your system through another AirVPN server. Kind regards