Jump to content
Not connected, Your IP: 216.73.216.120

Staff

Staff
  • Content Count

    11589
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    2060

Everything posted by Staff

  1. Hello! It can't be related to the attacks you refer to (they just did not involve VPN servers). Does anybody else experience the same with Comcast? Kind regards
  2. Hello! We regret to inform you that AirVPN is no more welcome in Leaseweb USA. On April the 1st, Leaseweb USA will terminate any agreement with us. Therefore, the following servers: Andromedae Arrakis Electra Kuma Librae Sirius will be canceled. We have been working to find equal or better replacements and we have had success so far. In the last few days we have added five new 1 Gbit/s servers in Miami and in Los Angeles as you have already seen. Furthermore, we're still working to reach an agreement with an additional provider, so we are confident that we will be able to enlarge infrastructure in the near future in different USA locations. Kind regards and datalove AirVPN Staff
  3. Hello! We're very glad to inform you that two new 1 Gbit/s servers located in the USA are available: Acamar and Cursa. The AirVPN client will show automatically the new servers, while if you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 2018 UDP and TCP. Just like every other Air server, Acamar and Cursa support OpenVPN over SSL and OpenVPN over SSH. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  4. Hello, first of all let's see the frontend servers blocking problem. What is the output of commands (issued from a command line interface): ping airvpn.org ping 95.211.138.143 ping auth.airvpn.org ping 54.93.175.114 Kind regards
  5. Hello! We need a clarification, please. If you kill ungracefully Eddie (from Task Manager, or forcing closure in the shutdown process etc), then the Network Lock will not be active at the subsequent Eddie start because Eddie detects an "Unexpected crash" (by checking a log line). In this case, the behavior you describe is expected, but we are thinking about specific options to modify it. If you shut down Eddie properly, then close the system, and at the subsequent boot of the system and autostart of Eddie you see that Network Lock is not active, then this would be a bug, but we can't reproduce it in any way. Can you please clarify according to the above considerations at your convenience? Kind regards
  6. There was an electric issue in the ISP, but at end of the issue servers remain in stall without trigger our alarms. Now four of six servers are up correctly. We are investigating.
  7. Hello! Thank you! Feel free to open a ticket if we want to investigate together on the causes of the crash. A forum in which we put the results of our tests under various environments (among which many Linux distributions) is https://airvpn.org/forum/35-client-software-platforms-environments Kind regards
  8. Hello, watch out, the correct address is 10.4.0.1 Kind regards
  9. Hello! There are no DNS leaks on Linux. Even if your system queries your ISP DNS, the queries are tunneled and ISP nameservers see them coming from our VPN servers... assuming that the VPN connection is really working, though. Complete client logs and content of /etc/resolv.conf while the system is in the VPN could provide clues. Kind regards
  10. Hello! LZO compression is not used, but the directive "comp-lzo" must be on both sides, otherwise the connection can fail, Once the directive is on both OpenVPN sides, the OpenVPN that performs the push (the server) can override it. Kind regards
  11. Hello! It's normal. The tunnel is actually established and working before the client finishes all the initial procedures. Routes checking, DNS checking and other management stuff is obviously performed after initialization sequence by OpenVPN is completed. Kind regards
  12. Hello, that's because airvpn.org IP address is allowed by "Network Lock". Kind regards
  13. Hello! Your test shows that port 88 is open on the VPN server, not necessarily on your system (actually the definitions given by "port scanners" web sites are not accurate, they do not take into account that a system can be behind a NAT on a shared public IP address). Packets to port 88 are not forwarded to VPN clients. Kind regards
  14. Hello! It is described here: https://airvpn.org/tor in the "TOR Control Authentication" paragraph. Kind regards
  15. Hello! We're very glad to inform you that three new 1 Gbit/s servers located in the USA are available: Merope, Alkes and Sabik. The AirVPN client will show automatically the new servers, while if you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 2018 UDP and TCP. Just like every other Air server, Merope, Alkes and Sabik support OpenVPN over SSL and OpenVPN over SSH. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  16. Hello! We're very glad to inform you that four new 1 Gbit/s servers located in the Netherlands are available: Anser, Chara, Matar and Phaet. The AirVPN client will show automatically the new servers, while if you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 2018 UDP and TCP. Just like every other Air server, Anser, Chara, Matar and Phaet support OpenVPN over SSL and OpenVPN over SSH. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. These servers are meant to replace old servers Lyra and Leonis as well which will be dismissed at the end of March. Lyra and Leonis are glorious, veteran servers and it's time to tell them goodbye due to the increased bandwidth requirements in the Netherlands. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  17. Hello! We're very glad to inform you that a new 100 Mbit/s server located in Latvia are available: Shaula. The AirVPN client will show automatically the new server, while if you use the OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 2018 UDP and TCP. Just like every other Air server, Shaula support OpenVPN over SSL and OpenVPN over SSH. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Kind regards and datalove AirVPN Team
  18. Hello! Clarification: the attack was and is directed against our infrastructure, but it was not against VPN servers. Kind regards
  19. Hello! If you use the France server to access services restricted to France IP addresses, we could add them in the micro-routing to try to make them accessible from all VPN servers. If so, feel free to give us a list of such services (with URLs). Kind regards
  20. Hello! This sounds strange: can you re-check since when you started to get the warning? There was and there is no attack against the VPN servers. The attack is against other parts of the infrastructure. See also other messages by us in the thread. Kind regards
  21. Hello! The vulnerabilities rated with Severity "High" do not affect our system (due to an upgrade which was already performed in January). Additionally, our OpenSSL is not vulnerable to some "Moderate" issues. We will probably upgrade OpenSSL to close the "Low" and one "Moderate" vulnerabilities, which anyway are not really exploitable on our systems as far as we can see at the moment. Kind regards
  22. Hello! It's unrelared, that's just some mess in the stats system. Kind regards
  23. Hello! We have continued to work and you should now not get anymore the 503 error. Feel free of course to report any anomaly. We are still monitoring and we confirm that the situation was and is under control, although an apparently different problem arose, which has been anyway fixed in a matter of minutes. EDIT: error 503 may still occasionally occur. You can safely ignore it. Kind regards
  24. Hello! Do you mean that you get a 503 error more often than every 60 minutes? By the way, if you find it annoying, go to "AirVPN" -> "Preferences" -> "Advanced" and in the "Servers list update every" combo box select "Never". Remember to set it back to "Automatic" or "Every one hour" when you wish to update servers list (or remember to update it manually with the little button in the "Servers" tab). Kind regards I was getting it every couple of minutes like the person who started this thread. It seems to have stopped now. Thanks for the tip and good luck stopping the attack (b*****ds!). Hello and thank you! The attack seems completely under control since hours (fingers crossed). Kind regards
  25. Hello! Do you mean that you get a 503 error more often than every 60 minutes? By the way, if you find it annoying, go to "AirVPN" -> "Preferences" -> "Advanced" and in the "Servers list update every" combo box select "Never". Remember to set it back to "Automatic" or "Every one hour" when you wish to update servers list (or remember to update it manually with the little button in the "Servers" tab). Kind regards
×
×
  • Create New...