Jump to content
Not connected, Your IP: 216.73.216.40

Staff

Staff
  • Content Count

    11483
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    2021

Everything posted by Staff

  1. Hello! Yes, you posted it in "General & Suggestions" and we moved it here to "Reviews", a more appropriate location since it compares AirVPN with PIA. It is more likely that it gets higher visibility here, not there, and you can see that actually the debate has become hot. We like and we reserve the right to move any thread in any forum section to make the forum more readable. At same time, we are pleased to see that this forum has become an attractive place for several PIA customers. Interestingly, this thread is showing some important information that PIA customers might like to consider carefully. We show it because we have it. It's a matter of transparency. It is not logged: it is showed in real time and stays in RAM until the client disconnects. Note that contrarily to some of our competitors, we don't keep keys, user data etc. on the VPN servers. All the data are kept in backend servers which never communicates directly with clients, frontends or VPN servers. However, it is obvious that the VPN server knows the IP address a client connection is coming from: how would it communicate with the client otherwise? This is how the Internet works. Additionally, you can hide your real IP address to our VPN servers, by connecting OpenVPN over a proxy (even Tor). And our client Eddie implements all of these options. It is the only free and open source VPN software that allows with a click a connection of OpenVPN over Tor even in OS X and Linux, with no requirements for any additional setup (except running Tor, of course), Virtual Machine etc. Not only these features are not implemented in our competitors software, but in most cases our competitors software, including PIA software, is closed source. Hiding to the user data (that any VPN service has) could be a trick to attract less technically skilled persons, or even gullible people. It can be a marketing strategy. We don't like it and it is not compliant with our mission. https://airvpn.org/mission If you share the connection with people you blindly trust, your concern is deeply illogical. But from your words it seems that you share your account with people you don't completely trust. In this case, with AirVPN you can share your account with other people and keep control of your account: you just need to provide keys and certificates to the other persons, and keep your password for yourself. Inviolability of your Data Channel encryption is guaranteed by Diffie-Hellman exchange. In this way other people can connect to VPN servers but can't access your user control panel, can't change the password to gain total control of your panel etc. If they occupy all of your slots, you can even force a disconnection to free the slots. They can't forward ports, only you can, so that you can keep under control the most dangerous situations (example: an illegal web site "hosted" behind a VPN server). This is not possible with PIA and this is important with our service, because we have implemented a dynamic remote port forwarding system (with DDNS if you need it) which is "light-years ahead" than PIA system. Anyway, it is important to underline that the account holder will be held responsible for any action of anyone using that account (assuming that PIA ToS allows this practice). Note: As of 2017 AirVPN now supports 5 connections per account. But this has NOT changed our commitment to minimum allocated bandwidth. About 5 connections instead of 3, this is also a consequence of our commitment to minimum allocated bandwidth, which PIA does not provide. When you provide a "best effort" service without any warranty on bandwidth allocation per client, things change radically. Since AirVPN birth we have never used VPS for our VPN servers. We have dedicated servers with redundant uplink ports and bandwidth (with the exception of Hong Kong, where we were forced to accept a sufficient compromise) and PoP with tier 1-2 transit providers. Compare our servers status page with any competitor servers status page https://airvpn.org/status/ Click on the servers name to access plenty of data about them. Please define properly and technically how "the security of the VPN" can be harmed by this: the point of hiding data that are anyway there, during the whole duration of a client session, is nonsensical. The client just shows you the information that the VPN server has got and which it already communicates with (incidentally, very useful for other purposes); the frontend does the same. On top of that, we remind you once again that our client Eddie is free and open source, that it is totally optional to use it, and that, contrarily to the setup of most our competitors, entry-IP address and exit-IP address of VPN servers are different. Kind regards
  2. Hello! You're right, without the option "All servers for area/region" (which we deleted for good reasons) getting all the entry-IP addresses through the CG has become a time consuming task. We need to insert the following information in the "How-To" forum. We apologize for the delay and for any inconvenience. You can resolve "server_name.airvpn.org" to get a specific server entry-IP address. Server names can be found in the "Status" page of our web site, or in the Configuration Generator. For example, from a command line interface: nslookup nihal.airvpn.orgto get entry-IP address of Nihal server. Please resolve country_code.airvpn.org to get all the entry-IP addresses of that country VPN servers. Example: dig @8.8.8.8 nl.airvpn.org +short(NL is the country code for the Netherlands) or nslookup nl.airvpn.orgYou can resolve "continent_name.airvpn.org" as well, to get the full list of entry-IP addresses of VPN servers in a continent. Finally, resolve "earth.airvpn.org" to get ALL the entry-IP addresses of all the VPN servers. Note: dig is not available by default on Windows, you need to install it. Alternatively, you can use nslookup, but the output of dig with the option "+short" could be easier to parse in some cases. Kind regards
  3. Hello, you probably mean OS X 10.10.4. In this case, we're aware that Eddie does not run in 10.10.4. On the other hand, that's a preview version. Kind regards
  4. Hello! Today we're starting AirVPN fifth birthday celebrations! From a two servers service located in one single tiny country providing a handful of Mbit/s, the baby has grown up to a wide infrastructure in 16 countries in three continents, providing now 86000 Mbit/s to tens of thousands people around the world. Quite electrifying for a service initially thought as a small experiment! Well, at least WE are electrified... you know, sometimes creators tend to overrate their creatures. If you're curious to know something about a series of fortunate events which gave birth to AirVPN, have a look here: https://airvpn.org/aboutus To worthily celebrate Air's fifth birthday, we're glad to inform you that starting from now we will offer a 25% discount on all plans. Hurry up, celebrations as well as this special offer will end on June the 6th, 23:59:59 UTC! Kind regards and datalove AirVPN Staff
  5. Hello, glad to know it. Nothing worrying, your post was split because you entered it in an unrelated topic (the announcement about problems and resolution on the auth servers). Kind regards
  6. UPDATE: we believe we have solved all the problems. We'll be closely monitoring the infrastructure to make sure it's stable again and be ready to intervene in case of unexpected problems. Kind regards
  7. Hello! Please follow this thread: https://airvpn.org/topic/14362-problems-on-authentication-servers Kind regards
  8. UPDATE: it is now possible to download the client software. Any other previously inaccessible page of the web site is now reachable. Kind regards
  9. Please follow this thread: https://airvpn.org/topic/14362-problems-on-authentication-servers Kind regards
  10. UPDATE: we are aware that it's currently not possible to download any version of our client software, we're working on this as well. The main problem has been partially mitigated but we still need to work hard on some part of the infrastructure. We'll keep you updated. Kind regards
  11. Hello, due to different causes we are experiencing issues on our authentications servers. We have been and are working on the problem in order to resolve it as soon as possible. NOTE: the problem will make VPN connections difficult or slower to be established for those using our client Eddie, but it does NOT affect VPN connections stability or performance once they are established. Additionally, VPN server might be unable to forward your reserved ports. Kind regards
  12. Hello! We have been and are experiencing problems on the authentication servers, we're working on the issue. Kind regards
  13. Hello! We're experiencing connectivity issue with our authorization servers, please hold on, we're working on it. Kind regards
  14. Hello, that 443 port is a port that one of our OpenVPN daemons listen to.443 is also a listening port (in the alternative entry-IP address) for SSL connections. Both of those ports have nothing to do with your system ports or with your VPN remotely forwarded ports. Kind regards
  15. Hello! It's harmless, you can safely ignore it. Kind regards
  16. Hello! Every peer is peer to any other peer, hence "peer to peer": no node acts as a client only, no node acts as a server only (with a relevant exception for the initial seeder of something). For true p2p, each client must be able to accept incoming packets from the Internet. If all the nodes were unable to receive incoming connection, p2p would completely stop working. That's correct. Disable UPnP, NAT-PMP and any other auto port mapping when in the VPN, and do not forward any port from the router to the devices connected to it (assuming that it's NOT the router itself to connect to a VPN server by running OpenVPN). That will only expose you to correlation attacks. You don't need your physical network card ports. This FAQ answer may clarify concepts: https://airvpn.org/faq/what_is Kind regards
  17. Hello! Servers marked as closed for "Imminent Withdrawal" are closed to new connections because their withdrawal is imminent. Already connected clients will be disconnected only at the very last minute before the withdrawal. We also recommend that clients connected to such servers disconnect as soon as possible. Please connect to any open server. Kind regards
  18. Hello! We had to remove that option because OpenVPN can't handle configuration files with more than 64 "remote" directives. Now, with the growth of our infrastructure, we now have various areas with more than 64 servers. The only other option we had to generate correct configuration files would have been to over-complicate the generator, adding warnings for each case exceeding 64 remote directives and stopping the generation in such cases. We have evaluated that this would have caused confusion to a lot of customers. The advanced users who need this option can anyway easily circumvent the problem, as you have noticed. Just remember that with your method, if you build a .ovpn file including more than 64 "remote" directives, you'll end up with a non-usable configuration file. Kind regards
  19. Hi, I've exactement le same problem. Is there a solution to resolve it ? Thanks lot. bestway@sigaintorg Hello! Install all the required packages first. Please see here for a complete list of dependencies: https://airvpn.org/topic/12509-kali Kind regards
  20. Same, but on Ubuntu 14.04 LTS I see that it will be fixed in version Eddie 2.10.In the mean time, I reverted back to 2.8 Thanks for all your hard work! Hello! If you're interested, you can try now Eddie 2.10 Experimental. Kind regards
  21. Hello, the problem is here: I 2015.05.27 04:29:55 - Checking DNS E 2015.05.27 04:29:59 - DNS checking failed. Go to "AirVPN" -> "Preferences" -> "Advanced" -> "DNS", set "DNS Switch Mode" to "Renaming", click "Save" and try a new VPN connection. Keep us posted. Kind regards
  22. Hello! Thank you for your subscription. Most probably you need this: https://airvpn.org/topic/9270-how-to-forward-ports-in-dd-wrt-tomato-with-iptables/https://airvpn.org/topic/9270-how-to-forward-ports-in-dd-wrt-tomato-with-iptables Kind regards
  23. Hello! Not much, due to good Voxility direct peering https://www.voxility.com/shop/connectivity/internet/voxility-peerings We reputed that is enough to guarantee a comfortable experience to most customers connecting to Ruchbah. Of course the final judgment on the accuracy of our decision will come from our customers. Kind regards
  24. Hello, as usual we needed to set some priorities and allocate resources accordingly. Netherlands LW datacenter had assumed a role which was too important, a sudden collapse of the NL servers would have caused paramount problems in the whole Europe. This is not the case with Germany. The most important situation has been fixed with addition of servers in Sweden, Netherlands itself, UK, Czech Republic, Romania, Spain and Switzerland. We can evaluate Germany situation with no time pressure in the near future. Bandwidth demand in Germany is so low that Air infrastructure is not over-depending on Germany servers (if Germany dc collapsed, impact on our customers in terms of bandwidth would be negligible). Kind regards
×
×
  • Create New...