Jump to content
Not connected, Your IP: 3.15.221.222

Staff

Staff
  • Content Count

    10933
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1843

Everything posted by Staff

  1. Hello! Here: http://www.sparklabs.com/support/preventing_network_and_dns_traffic_leaks/ we can read "We are currently working on adding a feature to Viscosity to easily block traffic leaks from occurring. We hope to have such a feature available in a future version of Viscosity, however please be aware that this is not something that will be available soon." Has this Viscosity feature been added so the web page is not updated? If so, can you point us to a technical description of this feature? Kind regards
  2. Hello! It's a feature. Network Lock is meant to be active only while Eddie is running (and of course if it crashes). If you wish Network Lock permanently set: - activate Network Lock - copy iptables rules (we're assuming you're running some Linux version) - shut down Eddie - make the previously copied iptables rules permanent Alternatively (for any system) set your firewall rules to block everything while Eddie is NOT running. When you activate Network Lock, you will be able to communicate with VPN servers and local network. When you shut down Eddie, "block everything" rules will be restored and your machine will be again unable to reach any network. However it might be a good idea to implement a function which mimics Android "seamless tunnel" (in practice a permanent Network Lock), we'll think about it. Kind regards
  3. Hello, about OpenVPN over Tor and Tor over OpenVPN please see https://airvpn.org/tor The person you cite was probably talking about OpenVPN over Tor. With our free and open source client Eddie for Linux you can connect OpenVPN over Tor without any middle-box or VM. OpenVPN over Tor is supported natively by Eddie, as far as we know it is the first and currently only open source OpenVPN wrapper for Linux and OS X with this feature. Kind regards
  4. Hello, if you have any additional issue please do not hesitate to open a ticket. Address the ticket to the sales department. Kind regards
  5. Hello, if not rejected, normally 30 minutes - 48 hours according to availability and other factors. Furthermore, trial requests might be not processed during non-working days. If one is in a hurry to test the service we provide a 1 EUR plan, which is even refundable. Kind regards
  6. Hello, use Bitcoin if you need a much higher privacy in payments. Use Bitcoin behind Tor if you wish to add an anonymity layer to Bitcoin. Kind regards
  7. Hello! localhost can't be resolved. Can you please provide us with the output of the following commands (issued from any shell): dig localhost file -b /etc/hosts Kind regards
  8. Did you try out the portable version? I had a similar (?) problem after switching from SUSE 13.1 to 13.2 a while ago. Using the portable version helped. The other version is not working with openSUSE 13.2. The portable version of Eddie 2.8 seems to be working fine with SUSE and Arch Linux. Hello! First, if the message Your current backend does not support installing files is displayed, simply try to re-click the .rpm file, it seems an OpenSUSE bug: https://forums.opensuse.org/showthread.php/502259-Current-Backend-does-not-support AirVPN installs correctly but doesn't start. There is another bug in another package, called "libgdiplus". Run from terminal: ln -s /usr/lib64/libgdiplus.so.0 /usr/lib64/libgdiplus.soto fix it. We have updated the OpenSUSE topic: https://airvpn.org/topic/11573-opensuse/ Kind regards
  9. Sorry, there was an issue in the compilation building system, related only to Linux editions. It's fixed now, please re-download. Sorry.
  10. Hello! We're very glad to inform you that a new Eddie Air client version has been released: 2.8. Please read the changelog: https://airvpn.org/services/changelog.php?software=client&format=html 2.8 version is compatible with several Linux distributions. For very important notes about environments, please read here: https://airvpn.org/forum/35-client-software-platforms-environments Eddie 2.8 includes very many bug fixes and changes meeting users' requests and preferences. Upgrade is strongly recommended. Just like previous version 2.7, it also implements direct Tor support for OpenVPN over Tor connections. Finally, Eddie makes OpenVPN over Tor easily available to Linux and OS X users: no needs for Virtual Machines, middle boxes or other special configurations. Windows users will find a more friendly approach as well. The logic of the connection of OpenVPN over Tor has been completely rewritten. This mode is not handled anymore as a generic connection to a socks proxy, but it is specifically designed for Tor and therefore solves multiple issues, especially in Linux and OS X, including the "infinite routing loop" problem (see for example http://tor.stackexchange.com/questions/1232/me-tor-vpn-how/1235#1235 ) As far as we know, Eddie is the first and currently the only OpenVPN wrapper that natively allows OpenVPN over Tor connections for multiple Operating Systems. https://airvpn.org/tor We recommend that you upgrade Eddie as soon as possible. Eddie 2.8 for Linux can be downloaded here: https://airvpn.org/linux Eddie 2.8 for Windows can be downloaded here: https://airvpn.org/windows Eddie 2.8 for OS X Mavericks and Yosemite only can be downloaded here: https://airvpn.org/macosx PLEASE NOTE: Eddie 2.8 package includes an OpenVPN version re-compiled by us with OpenSSL 1.0.1k for security reasons and to fix this bug: https://community.openvpn.net/openvpn/ticket/328 Eddie overview is available here: https://airvpn.org/software Eddie includes a Network Lock feature: https://airvpn.org/faq/software_lock Eddie 2.8 is free and open source software released under GPLv3 Kind regards & datalove AirVPN Staff
  11. Correct. Just to add a side note that might be liked by Moony, after one connects OpenVPN over Tor, then he/she can also tunnel UDP from other applications. UDP packets are tunneled over TCP by OpenVPN, and everything is tunneled over Tor. Kind regards
  12. Hello! In "AirVPN" -> "Preferences" -> "Routes" set the option "Not specified routes go:" to "Inside VPN tunnel". We repeat, INSIDE (because you want that all the other traffic different than "mail traffic" goes inside the tunnel). Then add the IP address(es) that you wish OUTSIDE the tunnel, i.e. IP address(es) of your IMAP, SMTP etc. servers, in the big box (by pressing the button "+"). You can not specify host names, but only host IP addresses. Click "Save" and start a connection with a VPN server. Note that routes outside the VPN tunnel will never be blocked by Network Lock. Kind regards
  13. Thank you JasonBourne. Please upgrade to 2.8.6, still available as "Experimental". Kind regards
  14. Hello! Yes, in some cases. To prevent that just activate "Network Lock" in the client. Kind regards
  15. Hello, it looks more like a DNS issue. Which DNS servers are queried when you use the new router? What is the Operating System of the device which tries a connection to a VPN server (is it OS X)? What is the software that you run to connect? Can we see the whole logs of this software taken after the problem has occurred? Kind regards
  16. Warning, the action is implemented with a NOT operator in Eddie. "NOT specified routes", for the customer's purposes, must go inside the VPN tunnel. The customer just wishes to have the traffic for a couple of IP addresses outside the tunnel, all the other traffic must flow inside. This is the most common request and that's the logic behind the implementation of an option with a 'NOT' in Eddie. Kind regards
  17. Hello! This will be fixed soon. Network Lock is not a default setting in 2.7, you need to enable it in 'Preferences', 'Advanced'. In 2.8 it's enabled by default. Kind regards
  18. Hello! Please see here: https://airvpn.org/tor Eddie version 2.7 or higher is required. Kind regards
  19. Hello! You need to insert the directive "reneg-sec" in your OpenVPN client configuration (see below a paste from the OpenVPN manual). Detailed instructions vary according to the client or OpenVPN wrapper you're running. With our client Eddie you can insert the directive in "AirVPN" -> "Preferences" -> "Advanced" -> "OVPN directives". Enter "reneg-sec 1800" in the left box reserved to additional directives, click "Save" and start a connection with a VPN server. Kind regards --reneg-sec n Renegotiate data channel key after n seconds (default=3600). When using dual-factor authentication, note that this default value may cause the end user to be challenged to reauthorize once per hour. Also, keep in mind that this option can be used on both the client and server, and whichever uses the lower value will be the one to trigger the renegotiation. A common mistake is to set --reneg-sec to a higher value on either the client or server, while the other side of the connection is still using the default value of 3600 seconds, meaning that the renegotiation will still occur once per 3600 seconds. The solution is to increase --reneg-sec on both the client and server, or set it to 0 on one side of the connection (to disable), and to your chosen value on the other side.
  20. Hello! Wrong TLS cipher: TLS-DHE-RSA-WITH-AES-256-CBC-SHA256 Try with "None". If it does not work try with "TLS-DHE-RSA-WITH-AES-128-CBC-SHA". Both are wrong as well but for some bug in several DD-WRT builds either the first OR the second work. Kind regards
  21. Hello! Bug fixed. However, we would recommend that you use JSON, PHP or XML. Text format is not optimally readable. Kind regards
  22. Hello, that's expected and correct when OpenVZ is not set up correctly, it's not OpenVPN fault. Please see here to solve: https://community.openvpn.net/openvpn/ticket/324 Kind regards
  23. Hello! Can you please elaborate on that? Kind regards
  24. Hello! > 1. The upload speeds are fast (which also encrypt using tunnel and openvpn processes) You're right, that shows that the bottleneck is not in the CPU. But if it was your ISP to throttle, you could not reach higher performance on the host. With OpenVPN over SSL, the symptoms point to a bottleneck caused by VMWare. If the VM is attached via NAT to the host, maybe the problem is there. What happens in bridge mode? Kind regards
×
×
  • Create New...