Jump to content
Not connected, Your IP: 18.216.110.39

Staff

Staff
  • Content Count

    10933
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1843

Everything posted by Staff

  1. Hello! Thank you! Feel free to open a ticket if we want to investigate together on the causes of the crash. A forum in which we put the results of our tests under various environments (among which many Linux distributions) is https://airvpn.org/forum/35-client-software-platforms-environments Kind regards
  2. Hello, watch out, the correct address is 10.4.0.1 Kind regards
  3. Hello! There are no DNS leaks on Linux. Even if your system queries your ISP DNS, the queries are tunneled and ISP nameservers see them coming from our VPN servers... assuming that the VPN connection is really working, though. Complete client logs and content of /etc/resolv.conf while the system is in the VPN could provide clues. Kind regards
  4. Hello! LZO compression is not used, but the directive "comp-lzo" must be on both sides, otherwise the connection can fail, Once the directive is on both OpenVPN sides, the OpenVPN that performs the push (the server) can override it. Kind regards
  5. Hello! It's normal. The tunnel is actually established and working before the client finishes all the initial procedures. Routes checking, DNS checking and other management stuff is obviously performed after initialization sequence by OpenVPN is completed. Kind regards
  6. Hello, that's because airvpn.org IP address is allowed by "Network Lock". Kind regards
  7. Hello! Your test shows that port 88 is open on the VPN server, not necessarily on your system (actually the definitions given by "port scanners" web sites are not accurate, they do not take into account that a system can be behind a NAT on a shared public IP address). Packets to port 88 are not forwarded to VPN clients. Kind regards
  8. Hello! It is described here: https://airvpn.org/tor in the "TOR Control Authentication" paragraph. Kind regards
  9. Hello! We're very glad to inform you that three new 1 Gbit/s servers located in the USA are available: Merope, Alkes and Sabik. The AirVPN client will show automatically the new servers, while if you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 2018 UDP and TCP. Just like every other Air server, Merope, Alkes and Sabik support OpenVPN over SSL and OpenVPN over SSH. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  10. Hello! We're very glad to inform you that four new 1 Gbit/s servers located in the Netherlands are available: Anser, Chara, Matar and Phaet. The AirVPN client will show automatically the new servers, while if you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 2018 UDP and TCP. Just like every other Air server, Anser, Chara, Matar and Phaet support OpenVPN over SSL and OpenVPN over SSH. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. These servers are meant to replace old servers Lyra and Leonis as well which will be dismissed at the end of March. Lyra and Leonis are glorious, veteran servers and it's time to tell them goodbye due to the increased bandwidth requirements in the Netherlands. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  11. Hello! We're very glad to inform you that a new 100 Mbit/s server located in Latvia are available: Shaula. The AirVPN client will show automatically the new server, while if you use the OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 2018 UDP and TCP. Just like every other Air server, Shaula support OpenVPN over SSL and OpenVPN over SSH. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Kind regards and datalove AirVPN Team
  12. Hello! Clarification: the attack was and is directed against our infrastructure, but it was not against VPN servers. Kind regards
  13. Hello! If you use the France server to access services restricted to France IP addresses, we could add them in the micro-routing to try to make them accessible from all VPN servers. If so, feel free to give us a list of such services (with URLs). Kind regards
  14. Hello! This sounds strange: can you re-check since when you started to get the warning? There was and there is no attack against the VPN servers. The attack is against other parts of the infrastructure. See also other messages by us in the thread. Kind regards
  15. Hello! The vulnerabilities rated with Severity "High" do not affect our system (due to an upgrade which was already performed in January). Additionally, our OpenSSL is not vulnerable to some "Moderate" issues. We will probably upgrade OpenSSL to close the "Low" and one "Moderate" vulnerabilities, which anyway are not really exploitable on our systems as far as we can see at the moment. Kind regards
  16. Hello! It's unrelared, that's just some mess in the stats system. Kind regards
  17. Hello! We have continued to work and you should now not get anymore the 503 error. Feel free of course to report any anomaly. We are still monitoring and we confirm that the situation was and is under control, although an apparently different problem arose, which has been anyway fixed in a matter of minutes. EDIT: error 503 may still occasionally occur. You can safely ignore it. Kind regards
  18. Hello! Do you mean that you get a 503 error more often than every 60 minutes? By the way, if you find it annoying, go to "AirVPN" -> "Preferences" -> "Advanced" and in the "Servers list update every" combo box select "Never". Remember to set it back to "Automatic" or "Every one hour" when you wish to update servers list (or remember to update it manually with the little button in the "Servers" tab). Kind regards I was getting it every couple of minutes like the person who started this thread. It seems to have stopped now. Thanks for the tip and good luck stopping the attack (b*****ds!). Hello and thank you! The attack seems completely under control since hours (fingers crossed). Kind regards
  19. Hello! Do you mean that you get a 503 error more often than every 60 minutes? By the way, if you find it annoying, go to "AirVPN" -> "Preferences" -> "Advanced" and in the "Servers list update every" combo box select "Never". Remember to set it back to "Automatic" or "Every one hour" when you wish to update servers list (or remember to update it manually with the little button in the "Servers" tab). Kind regards
  20. Hello! You might be experiencing "error 503" ONLY from inside a VPN server, so you can safely ignore it, it's not vital to update often VPN servers data & rating when you're already inside a VPN server. On the contrary you should NOT get that error when you're not connected to a VPN server. During time we will probabiy lift some limits we have now forced to mitigate the attack (which is still fully ongoing but should not affect in any way service availability). Kind regards
  21. Hello! Please follow the issue here: https://airvpn.org/topic/13861-cannot-retrieve-systems-server-data The problem has been mitigated, you should now experience no major problems. Kind regards
  22. Hello, those pop-up messages are correct because they notify a real problem, but in this case the repeated notifications make actually poor sense. It will be fixed in the next client release. In the meantime you can just disable client pop-up messages (even though it is now not necessary). Kind regards
  23. Hello! Please open a ticket at your convenience. From your description it should be an unrelated problem. Kind regards
  24. Hello! The problem has been strongly mitigated. You should now be able to use the service normally. @luminoso That page reports issues on the VPN servers. Kind regards
×
×
  • Create New...