Jump to content
Not connected, Your IP: 3.147.48.41

Staff

Staff
  • Content Count

    10933
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1843

Everything posted by Staff

  1. @rainmakerraw DarkRaven's problem was completely different, it had nothing to do with grayed out servers (it was related to the DNS push) and anyway it has been solved with Eddie 2.9.x. We know from a ticket, you could not know that. The problem you experience with Ubuntu 15.04 is not reproducible at the moment by us, we need to try again, is it with Eddie 2.8.8, 2.9 or both? Kind regards
  2. Hello! @DarkRaven Please provide to us more details, like @rainmakerraw explains.[EDIT: IGNORE, we see you provided details on the current ticket we are investigating] @rainmakerraw /usr/bin/airvpn is a simple bash script that launches Eddie. When launched, Eddie automatically detects if it needs to re-run itself with gksu/kdesu/etc. Eddie NEVER arrives to show the main window if it doesn't have the privileges to run openvpn. "Connect now" context menu is grayed only if nothing is selected, it's not related to privileges. Kind regards
  3. Your ISP knows you are connected to one IP but you are visible through another. Compare the entry IP in OpenVPN's log file with the exit IP displayed by ipleak.net for example. It will never be the same. Yes but like I said, it's very similar because it's the same server. like xx.xxx.xxx.x1 for the entry xx.xxx.xxx.x2 for the exit so it's easy to track a user if you have access to the exit and entry IP. Hello, not for all servers but yes, for several of them the IP addresses are in the same /24 subnet. There are relevant exceptions in our servers but anyway the correct approach is different, for this purpose it is much safer to run Tor after the connection to a VPN server has been established, especially when you can't afford that your ISP or government detects Tor usage by you. Kind regards
  4. Hello! Yes. You can "multi-hop" whenever you wish with AirVPN. Each account can establish up to FIVE simultaneous connections so you can multi-hop easily with a VM (connect the host to a VPN server, attach the VM to the host via NAT, connect the VM to a different VPN server). However "multi-hopping" on servers all owned by the same entity is a sub-optimal solution. A formidably stronger anonymity layer can be built just by multi-hopping with Tor, at least for TCP applications. Just connect to a VPN server then use Tor. Kind regards
  5. Hello! The cap you experienced on upload should have been caused by an anti-UDP flood system which was too strict. It has been de-activated by the dc now. Could you please test again now? Kind regards
  6. To be perfectly honest - this is the complete opposite of what I experienced. Mr. EdensSpire, which port do you need and for what reason? Hello! Actually ports reserved to inactive accounts are not released... we will investigate the issue soon. Kind regards
  7. Hello, they are not in the VPN servers. Kind regards
  8. Hello! As a first check, please compare your rules for port forwarding with those showed in the following guide: https://airvpn.org/topic/9270-how-to-forward-ports-in-dd-wrt-tomato-with-iptables Kind regards
  9. I am using 2.9.2 experimental No. I am always using NL and it is leaking as well. Hello! Can you please confirm that: - "Force DNS" is ticked - "Network Lock" is active - IPv6 is enabled - no firewall other than Windows Firewall is running and under these conditions you have DNS leaks in your Windows system with Eddie 2.9.2 Experimental? Can you send us the output of the command "ipconfig /all" (issued from a command prompt) while the system is connected to the VPN with the aforementioned settings? Kind regards
  10. Hello, what is your Operating System? Kind regards
  11. Sources please for AirVPN having the highest rated customer service. I'm not doubting, I would just like to read the review(s). I hope I don't offend the folks at AirVPN, but TorGuard seems to be inflexible about compromising on user experience and anonymity. Again, I hope I don't offend the AirVPN staff, but TorGuard offers a server(s) in Dallas and Las Vegas. Hello! We are finalizing an agreement for a couple of 1 Gbit/s servers in Dallas. Do you know whether TorGuard allows p2p there and/or in the USA? Yes, it's nice. Kind regards
  12. Hello! Does anybody else experience this problem with the new Sweden servers in upload? Kind regards
  13. Hello! With CoinBase and with Bitcoincodes you can transfer directly from your client to a BitCoin account, no need to open an account and/or keep a wallet with them. Do not forget that Bitcoin transactions are not "anonymous", but you can put a very strong anonymity layer simply by always running your client in Tor. Kind regards
  14. Hello! OpenVPN over Tor mode "works ONLY with AirVPN Client, because our software talks to Tor Control to detect and route correctly the guard(s) IP addresses. Otherwise an infinite connection loop occurs because communication between Tor and the guard node (the first node of each circuit) will fall back to the VPN (causing errors like Inactivity timeout, recv_socks_reply: TCP port read timeout expired: Operation now in progress, Assertion failed at misc.c:785)." (from https://airvpn.org/tor ). You should mimic the Air client behavior or you can connect Tor over OpenVPN, which is a configuration that's capable to provide a strong anonymity layer. In this case you just need to connect to a VPN server and then use Tor. All the applications using Tor will have their traffic tunneled over Tor over OpenVPN. Kind regards
  15. Hello! It's possible, yes. For example, you might be querying your ISP DNS with queries over IPv6 over IPv4, or just over IPv6. Network Lock (even if IPv6 remains enabled) should prevent that, can you confirm? Maybe it is some problem in 2.8RC1. which, although candidate, then never became the final version.What about 2.8.8 stable or 2.9.2 Experimental? Kind regards
  16. Hello, it looks correct, that service allows access only to UK IP addresses. Kind regards
  17. EDIT: SERVER WITHDRAWN ON 16-JUN-2016. Reason: major hardware failure. Hello! We're very glad to inform you that six, new 1 Gbit/s servers located in Sweden are available: Acubens, Beid, Cumeisa, Nodus, Pherkad and Rastaban. The AirVPN client will show automatically the new servers, while if you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 2018 UDP and TCP. Just like every other Air server, Acubens, Beid, Cumeisa, Nodus, Pherkad and Rastaban support OpenVPN over SSL and OpenVPN over SSH. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  18. Hello, good that the main problem is solved. Probably OpenVPN logs can explain what goes wrong when trying to execute update-resolv-conf script. Kind regards
  19. Hello! It could be a DNS problem. Maybe the nameservers you have in /etc/resolv.conf can't be accessed through the VPN servers. If so, this is a very minor problem: your traffic is tunneled but your system can't resolve names. Check for names resolution and connectivity to discern the case, for example (from a command line interface): ping -c 4 8.8.8.8 ping -c 4 10.4.0.1 ping -c 4 google.com (if in doubt copy and paste the output of those commands). resolvconf is available for Arch Linux, right? If so, please see here: https://airvpn.org/topic/9608-how-to-accept-dns-push-on-linux-systems-with-resolvconf For a quick test, please edit (as root) the /etc/resolv.conf file while the system is connected to a VPN server, and add the following line: nameserver 10.4.0.1 then check whether names are resolved. Kind regards
  20. Hello! As you may have been noticed, Zaurak is down and has been down since 9 days ago. Zaurak is not reachable in any way. All of our contact attempts with the datacenter support staff have failed so far. We receive automated replies as a receipt confirmation of our tickets, then nothing. The official web site of the housing company is reachable as usual, as well as the customers administrative panel. Unfortunately, although we understand that situation in Kiev might pose problems to business and connectivity, we repute that it would have been reasonable to expect at least some feedback after nine days. We will keep you informed. We are also planning to find an alternative Ukraine datacenter to replace the current one, in an attempt to remain with at least a server in Ukraine. We apologize for the inconvenience and we are confident that you understand that we have no control on this incident. Kind regards AirVPN Staff
  21. Hello! 1) Packets injection by ISPs normally have the only purpose to force advertisements to you. More sinister purposes could be sought by different entities. https://en.wikipedia.org/wiki/Packet_injection 2) Unfortunately not. It is not trivial to prove packet injection. 3) We leave answers to this questions to software developers. 4) OpenVPN is extremely resistant to replay attacks and it can be used whenever end-to-end validation and encryption is not available. Otherwise, end-to-end encryption and validation normally makes replay attacks impossible to succeed. With OpenVPN, you can add (as already written both by you and us) an additional security layer, i.e. using OpenVPN with TCP as transport layer (see also the manual piece quoted here: https://airvpn.org/topic/3773-pls-help-strange-logs/?do=findComment&comment=3784 ). Kind regards
  22. Hello! A replay attack can come from someone inside the ISP network, not necessarily by the ISP personnel or network configuration. There's nothing to laugh about, if they do it again tell them that even giant ISPs like Comcast inject packets for marketing purposes or any other reason: https://www.techdirt.com/articles/20140908/07191228453/comcast-using-packet-injection-to-push-its-own-ads-via-wifi-apparently-oblivious-to-security-concerns.shtml The problem with many ISPs attacking their own customers with packet injection began at least EIGHT years ago: https://www.eff.org/wp/detecting-packet-injection so the person who laughed when you reported your case has provided a strong proof of his/her utter incompetence. Description you provide in point 1 is interesting. If it was packet injection attempt you would exactly experience that. What is your ISP (don't tell if you don't wish so)? Kind regards
  23. I don't blame anyone here because a vast amount of users are more than satisfied with their speed (hrrhrr, including me ), and some of them subscribed to 100 Mbit plans (unfortunately, not including me ). I was pointing at those who fail to reach these speeds. One particular case highly interests me because that person downloaded with full speed on Linux and failed to do so on Windows. So I assume reasoned this shaping thing has something to do with Windows, it's (TCP/IP stack) (default) configuration, the hardware drivers and/or the driver's configuration. Going to drill down on that... Hello! Have you seen this: https://airvpn.org/topic/13652-eddie-udp-443-on-windows-vs-linux/?do=findComment&comment=27068 ? Kind regards
  24. Hello! Problem solved, can you try again? Kind regards
  25. Hello! Problem is under investigation by the competent person. CoinBase warned about a "wrong payment" (the paid BTC amount does not match the required amount) but let us check about this claim. Kind regards
×
×
  • Create New...