Jump to content
Not connected, Your IP: 18.224.52.108

Staff

Staff
  • Content Count

    11048
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1867

Everything posted by Staff

  1. Hello, very well! Glad to know it. Kind regards
  2. @psychlops What a smart definition of wild overselling they do have! BTW, once overselling is decided for whatever reason, this method is probably much better than discriminations against protocols. A protocol-agnostic "load balance" is surely much less destructive (or even not destructive at all) for Net Neutrality. Kind regards
  3. Hello! When DNS queries are tunneled, they are not intercepted by Network Lock firewall rules and that's totally correct, because any traffic in the tunnel is allowed. Besides, tunneled DNS queries are not DNS leak by definition and are not harmful to your privacy. Another option, though, is that your system queries your router DNS (and obviously Network Lock rules allow communication with the router) and your router queries your ISP DNS. In this case privacy can be harmed. So it's important to understand the causes. What is your Operating System? Kind regards
  4. Hello! We're glad and proud to inform you that the new client Eddie 2.9 is almost ready to be released. In the meantime, you might like to test Eddie 2.9 Experimental, which is already available. Eddie 2.9 Experimental has already passed successfully the alpha testing and has almost completed beta testing. You're very welcome to test it, if you feel a little adventurous: the version you find available for download is also a very serious 2.9 release candidate. In order to download it, after you have entered the download page for your system click "Other versions" and click "Experimental". This version includes bug fixes, important changes and many options required by you. Here is the changelog: https://airvpn.org/services/changelog.php?software=client&format=html [new] Windows - Option to disable IPv6[new] OS X - Option to disable IPv6[new] Network Lock option for Private network[new] Network Lock option for ping[new] Options to use custom DNS servers[new] UI - Command-line in logs tab[change] New explicit option for Network Lock activation when client starts up[new] UI - Network Lock icon on top-right corner[bugfix] Whitelist/Blacklist no more reverted with 'Refresh servers' button[change] SSL local certificate verification[bugfix] VPN Up script bugfix[bugfix] Windows - XP TAP driver detection[change] Windows - DNS Force & Check active by default[change] Windows - DNS Force occurs now after the VPN connection is established, not before[bugfix] Windows - DNS Force also on TAP interface.[bugfix] Linux - Network Lock via ip6tables blocks IPv6[change] UI - Misc layout improvements[change] UI - GitHub link in About[change] OS X - PF rules changes[change] Linux - iptables rules changes[change] UI - New advanced tab for DNS[change] New method to Check DNS[change] Disabled auto-redirect auth for security reasons[change] Authentication for AirVPN credentials through POST requests, to avoid issue with long-url[change] Authentication servers connections through IP addresses only, to avoid DNS detectionKind regards
  5. Hello! A VPN server in Australia is not planned at all, but we will have a micro-routing server in the near future for some Australian geo-restricted services. Kind regards
  6. Hello! Eddie runs on Mavericks and Yosemite only, while previous OS X versions should run Tunnelblick. Kind regards
  7. Hello! It can't be related to the attacks you refer to (they just did not involve VPN servers). Does anybody else experience the same with Comcast? Kind regards
  8. Hello! We regret to inform you that AirVPN is no more welcome in Leaseweb USA. On April the 1st, Leaseweb USA will terminate any agreement with us. Therefore, the following servers: Andromedae Arrakis Electra Kuma Librae Sirius will be canceled. We have been working to find equal or better replacements and we have had success so far. In the last few days we have added five new 1 Gbit/s servers in Miami and in Los Angeles as you have already seen. Furthermore, we're still working to reach an agreement with an additional provider, so we are confident that we will be able to enlarge infrastructure in the near future in different USA locations. Kind regards and datalove AirVPN Staff
  9. Hello! We're very glad to inform you that two new 1 Gbit/s servers located in the USA are available: Acamar and Cursa. The AirVPN client will show automatically the new servers, while if you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 2018 UDP and TCP. Just like every other Air server, Acamar and Cursa support OpenVPN over SSL and OpenVPN over SSH. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  10. Hello, first of all let's see the frontend servers blocking problem. What is the output of commands (issued from a command line interface): ping airvpn.org ping 95.211.138.143 ping auth.airvpn.org ping 54.93.175.114 Kind regards
  11. Hello! We need a clarification, please. If you kill ungracefully Eddie (from Task Manager, or forcing closure in the shutdown process etc), then the Network Lock will not be active at the subsequent Eddie start because Eddie detects an "Unexpected crash" (by checking a log line). In this case, the behavior you describe is expected, but we are thinking about specific options to modify it. If you shut down Eddie properly, then close the system, and at the subsequent boot of the system and autostart of Eddie you see that Network Lock is not active, then this would be a bug, but we can't reproduce it in any way. Can you please clarify according to the above considerations at your convenience? Kind regards
  12. There was an electric issue in the ISP, but at end of the issue servers remain in stall without trigger our alarms. Now four of six servers are up correctly. We are investigating.
  13. Hello! Thank you! Feel free to open a ticket if we want to investigate together on the causes of the crash. A forum in which we put the results of our tests under various environments (among which many Linux distributions) is https://airvpn.org/forum/35-client-software-platforms-environments Kind regards
  14. Hello, watch out, the correct address is 10.4.0.1 Kind regards
  15. Hello! There are no DNS leaks on Linux. Even if your system queries your ISP DNS, the queries are tunneled and ISP nameservers see them coming from our VPN servers... assuming that the VPN connection is really working, though. Complete client logs and content of /etc/resolv.conf while the system is in the VPN could provide clues. Kind regards
  16. Hello! LZO compression is not used, but the directive "comp-lzo" must be on both sides, otherwise the connection can fail, Once the directive is on both OpenVPN sides, the OpenVPN that performs the push (the server) can override it. Kind regards
  17. Hello! It's normal. The tunnel is actually established and working before the client finishes all the initial procedures. Routes checking, DNS checking and other management stuff is obviously performed after initialization sequence by OpenVPN is completed. Kind regards
  18. Hello, that's because airvpn.org IP address is allowed by "Network Lock". Kind regards
  19. Hello! Your test shows that port 88 is open on the VPN server, not necessarily on your system (actually the definitions given by "port scanners" web sites are not accurate, they do not take into account that a system can be behind a NAT on a shared public IP address). Packets to port 88 are not forwarded to VPN clients. Kind regards
  20. Hello! It is described here: https://airvpn.org/tor in the "TOR Control Authentication" paragraph. Kind regards
  21. Hello! We're very glad to inform you that three new 1 Gbit/s servers located in the USA are available: Merope, Alkes and Sabik. The AirVPN client will show automatically the new servers, while if you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 2018 UDP and TCP. Just like every other Air server, Merope, Alkes and Sabik support OpenVPN over SSL and OpenVPN over SSH. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  22. Hello! We're very glad to inform you that four new 1 Gbit/s servers located in the Netherlands are available: Anser, Chara, Matar and Phaet. The AirVPN client will show automatically the new servers, while if you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 2018 UDP and TCP. Just like every other Air server, Anser, Chara, Matar and Phaet support OpenVPN over SSL and OpenVPN over SSH. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. These servers are meant to replace old servers Lyra and Leonis as well which will be dismissed at the end of March. Lyra and Leonis are glorious, veteran servers and it's time to tell them goodbye due to the increased bandwidth requirements in the Netherlands. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  23. Hello! We're very glad to inform you that a new 100 Mbit/s server located in Latvia are available: Shaula. The AirVPN client will show automatically the new server, while if you use the OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 2018 UDP and TCP. Just like every other Air server, Shaula support OpenVPN over SSL and OpenVPN over SSH. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Kind regards and datalove AirVPN Team
  24. Hello! Clarification: the attack was and is directed against our infrastructure, but it was not against VPN servers. Kind regards
  25. Hello! If you use the France server to access services restricted to France IP addresses, we could add them in the micro-routing to try to make them accessible from all VPN servers. If so, feel free to give us a list of such services (with URLs). Kind regards
×
×
  • Create New...