Jump to content
Not connected, Your IP: 3.146.206.247

Staff

Staff
  • Content Count

    10932
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1843

Everything posted by Staff

  1. Hello! The implications of the paper are completely different than what the message seems to suggest. In particular how did you get the idea that "If you use TOR, there's a 81.6% chance someone knows your real IP." from the paper? It says quite the opposite, i.e. that even if the attack was successful, the likelihood to get your real IP address is astronomically low. Besides paper reading, https://blog.torproject.org/blog/traffic-correlation-using-netflows can help. Do not miss the comments from the paper authors themselves.It looks like several persons are taking this paper implications at the exact opposite of what they are. Urban legends seem to spread very fast even nowadays. Kind regards
  2. Hello! No. That was a message in 2012, many things were different in the NAT. Now you necessarily need port forwarding. Kind regards
  3. Hello, there are no DNS leaks on Linux. To use VPN DNS go to "AirVPN" -> "Preferences" -> "Advanced" and select a proper "DNS Switch Mode" in the combo box. In most cases "Automatic" will detect the correct method. In general set "resolvconf" if you have resolvconf package installed and "Renaming" in any other case. Kind regards
  4. Hello! Yes, it is. Otherwise you can use CoinBase, as you prefer. Kind regards
  5. Hello, the problem is here: . 2014.11.17 22:07:11 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting Something is blocking OpenVPN packets (or all UDP packets). Please check your firewall (for testing purposes you might disable it completely). Also check that your router does not block UDP. If the problem persists, maybe it's your ISP blocking packets, or packets only to/from Nunki. Try different servers and different connection modes. You can change them in our client Eddie in "AirVPN" -> "Preferences" -> "Protocols". Test some port in TCP. Kind regards
  6. Hello! Since resolvconf package is available in FreeBSD we would recommend that you implement the following solution: https://airvpn.org/topic/9608-how-to-accept-dns-push-on-linux-systems-with-resolvconf Kind regards
  7. Hello, two of the most effective "multi-hopping" setups are extensively described here: https://airvpn.org/tor If you run our client Eddie you do not even need a middle-box or a VM for OpenVPN over TOR. As far as we know Eddie was the first and currently is the only open source OpenVPN wrapper/GUI for Linux and OS X in the world that saves you from using a middle-box or a VM. About VMs and OpenVPN, maybe the quickest solution is running a guest OS attached to the host via NAT (important!). Connect the host to VPNServer1 and then connect the guest to VPNServer2. On the guest OS (and only on the guest OS) you will have traffic tunneled over VPNServer2 over VPNServer1. On the Internet your VM will appear with the exit-IP address of VPNServer2. Kind regards
  8. @computerpc Hello, you're probably trying to run the 64 bit version. Make sure to download the 32 bit version for Windows 7. Kind regards
  9. Hello, you can already do it by yourself. Each account can establish up to 3 concurrent connections so multi-hop solutions are trivial. However "multi-hopping" on servers all owned by the same company is not an optimal solution, you might prefer OpenVPN over TOR, or TOR over OpenVPN, which are much safer. Kind regards
  10. Hello! Monitoring or DPI in themselves would not cause that. Injections attempts, replay attacks or just very normal packet errors in UDP will cause that. Please see the aforementioned post for more information. Kind regards
  11. @BreathingAir Hello, you don't need to download anything, just copy the magnet link and paste it into your torrent client. Wait for the results in the web site, by refreshing the page (updated every 10 seconds). Kind regards
  12. Please see for example here: https://airvpn.org/topic/3773-pls-help-strange-logs/?do=findComment&comment=3784 It would be a good habit to search the forums (good search functions are available) before posting questions that have been already answered multiple times. Kind regards
  13. Hello, if possible do not use OpenVPN over SSL, go straight to UDP direct. Do not trust any speed test, including ours, they are not reliable. Kind regards
  14. @fantastico As we wrote previously please read here: https://airvpn.org/topic/9608-how-to-accept-dns-push-on-linux-systems-with-resolvconf Kind regards
  15. Do what please? Hello! "DNS push" is the "push" of VPN DNS servers IP addresses from our servers to your client (more in general, it is an OpenVPN DHCP-push). Your client is free to accept or not the DNS push. If not accepted, no DNS will be modified on your system. Ok, this will let us discern whether it's a DNS issue or not. Yes, the DNS servers administrators should configure the servers accordingly. In general, you should not worry about it, because one of the purposes of our service is protecting you against DNS queries snooping/sniffing for profiling or more sinister purposes, so in general one does NOT want to use his/her own ISP DNS or send out DNS queries in plain text. IF our explanation of the problem is correct, it's because OpenVPN for Windows comes packaged with OpenVPN GUI which by default accepts DNS pushes. Kind regards
  16. @fantastico Apparently it could be just a DNS issue because the connection is successful. From the logs it comes out that you do not worry about DNS push, but you must do it if you don't run our client. What happens if you try to ping directly without names resolution (for example "ping 8.8.8.8")? In one case, maybe the previously configured DNS servers did not accept queries from outside their network, in the other case (colleague configuration) they did. Please see this guide in our "How To" section: https://airvpn.org/topic/9608-how-to-accept-dns-push-on-linux-systems-with-resolvconf If you don't have resolvconf package installed, either install it or just use our client: it has another method to accept DNS push (resolv.conf direct handling). Kind regards
  17. @fantastico Please publish OpenVPN logs from computer A, taken after a connection to a VPN server has been allegedly established. They could have some useful clues. Kind regards
  18. Hello! Yes, at the moment translation into Spanish is needed. Kind regards
  19. Hello, if you run our client Eddie you might like to activate "Network Lock" option to prevent any leak, including leaks in case of unexpected VPN disconnection. https://airvpn.org/topic/12175-network-lock The method suggested by dd79 is NOT safe in general, due to potential DHCP lease renewal. Please see here for more details: https://airvpn.org/topic/9787-the-pros-and-the-cons/?do=findComment&comment=11501 (see UPDATE 2 and UPDATE TO UPDATE 2). Kind regards
  20. Hi: yes, you're right, currently the viewer needs to pause the video to read the whole block. Kind regards
  21. Hello, actually not, it is the total time needed by your browser to require via http a 1 byte file to the VPN server and receive it, but as a relative value it is good. And yes, using the client can be quicker (the client really pings). Kind regards
  22. Hello! Yes, please browse to the "Status" page of our web site https://airvpn.org/status The numbers displayed in ms for each server provide you with a relative (not absolute) latency which is a very precious information for your needs. Kind regards
  23. Hi! At the moment we do not provide a proxy service (although some features of our service might vaguely recall a proxy service), but a Virtual Private Network. Yes, definitely! Kind regards
  24. Hello! You might have noticed that something new is in our home page: our first promotional video! It is is visible in our home page, totally hosted on our servers, as well as on YouTube at the following URL: https://youtu.be/N7XMArI3bpACurrently it's subtitled in English, Italian and Chinese many languages. If anyone wants to help us translate the video, please download an existing subtitle files: English - https://airvpn.org/static/video/main_en.srt Italian - https://airvpn.org/static/video/main_it.srt Chinese - https://airvpn.org/static/video/main_cn.srt translate it without changing timings and send it to us. We are interested in Spanish and German, but any language is welcome. Gift guaranteed Kind regards AirVPN Staff
  25. Hello! Please upgrade to client version 2.7 and try again. If the problem persists, please try a connection in TCP. You can change connection mode in menu "AirVPN" -> "Preferences" -> "Protocols". Feel free to post the logs in TCP as well. If the client keeps failing in UDP and/or TCP at "checking route" state, disable the check: in "AirVPN" -> "Preferences" -> "Advanced" un-tick "Check if the tunnel effectively works", click "Save" try again a connection, open a browser and browse to airvpn.org. Check whether the central bottom box is red or green. Feel free to update the thread. Kind regards
×
×
  • Create New...