Jump to content
Not connected, Your IP: 216.73.216.21

Staff

Staff
  • Content Count

    11599
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    2062

Everything posted by Staff

  1. Hello! Our apologies, we fixed a little bug in our TOR detection system. Now ipleak.net reports correctly if an IP address is associated to a Tor Exit (exit versus 8.8.8.8). Take for example Pallas, the information about the relay is public: https://atlas.torproject.org/#search/37.48.80.175 We inevitably know which AirVPN users are, because they forward the ORPort and DirPort to do that. We remind you that AirVPN already powers two Relays and funds TorServers.net (1000 EUR every other month) to power an Exit node. Note: it's disappointing that TorServers.net has our Exit node down at the moment. We are investigating about this, and also thinking about the option to run ourselves one or more Tor Exit node. We are evaluating whether to send a private notification to all AirVPN users that are running a Tor exit node behind one of our servers with a link to this topic. Kind regards
  2. Hello! It seems all right, probably the tun/tap interface DNS servers are set to accept DHCP-push, which is fine. Kind regards
  3. Hello, what happens if you try a connection in TCP? With our client Eddie you can change connection mode in "AirVPN" -> "Preferences" -> "Protocols". In your laptop, try for example port 443, protocol TCP. Have a check to antivirus software (if any) as well, just in case it's blocking openvpn.exe Kind regards
  4. Hello, although many ipleak.net data are cached over time, Tor detection is always in real time. Currently (at the time of this writing) there are no servers marked as Tor exit nodes. We are monitoring when a server is marked as Tor exit node for further investigation. Kind regards
  5. Hello! Some additional considerations on the whole discussion. It seems somehow paradoxical that some of our customers explicitly ask for Net Neutrality violation when they look exactly for a service capable to respect Net Neutrality with no discriminations against any protocol. As soon as Net Neutrality respect brings inconveniences created by third-parties, we are somehow invited to send such respect into the trashcan. We tend to think that it would be more appropriate and honest to focus energy and protests against those services whose administrators actively contribute to destroy the open Internet, with Tor indiscriminate bans, huge blacklists which block millions of IP addresses just because they are 'used as NAT' or because they are used to operate dedicated servers. It seems unquestionable that the concept behind such actions is an Internet where end-to-end principle and privacy are deemed as negative features to be fought. Remember our philosophy and mission: banning a server of ours because it's a source of problems appears as a very questionable action. It is the same error that some services do with Tor: to hit someone, they ban innocent users who love their privacy or who are forced to use Tor to bypass censorship in their country. If our servers or a Tor node are performing vulnerability scan, service needs to fix the vulnerability, not blame who caught it red handed. If our servers or a Tor node are wasting a service resource, service operators need to learn how to configure well their systems. If a service can't afford a method to manage spam, it should close the discussion system, it would be better for all. For all of the above, AirVPN will never violate Net Neutrality, and so we'll never commit any action to help "incompetent services". Kind regards AirVPN Staff
  6. Case study: Currently (04/12/2014 00:49) users on Riguel cannot edit Wikipedia. The Riguel exit IP is 95.211.186.118. MaxMind - https://www.maxmind.com/en/home considers that IP address as Anonymous Proxy. whatismyipaddress.com - http://whatismyipaddress.com/geolocation-providers uses MaxMind database. Wikipedia has its own project to detect proxy. http://en.wikipedia.org/wiki/Wikipedia:WikiProject_on_open_proxies We entered the Riguel exit IP in the unblock requests area, and this message has been displayed: Conclusion: Wikipedia prevents Riguel users to edit articles only because MaxMind considers Riguel as a proxy. No Tor or other reason in this case. Kind regards
  7. Hello! It may happen that some VPN servers are used to insert spam in forums, are categorized as proxy servers by services like MaxMind and it may happen that a Tor exit node is used behind a VPN server. Currently no VPN server is considered a Tor exit node. It's a highly dynamical list. A flag which identifies VPN servers which are in that moment used to run a Tor exit node behind them would not be very significant, given the fact that now none of our servers is categorized as a Tor exit node. If this flag were used to identify a server with any of the aforementioned issues, many servers would be flagged but in practice they would have no important malfunction. Before proceeding, it is necessary to understand the frequency of problems occurrences. We kindly ask you to continue to warn us, reporting the exact reason of the problem. Have a look at the following message as an example. Even if we don't provide feedback on every and each case, we are monitoring the situation you warned us about. Kind regards
  8. Hello, an important point which shows how useless is this method is exactly this one. Even when you can monitor your own Tor network, you end up with 6% false positives, which does not allow you to discern anything useful at a big scale. Kind regards
  9. Hello, we know how DNScrypt works. Every VPN server has its resolver. When an authoritative DNS receive a query from our server (for example Castor), actually may know (if it knows the Castor exit-IP address) that the domain is requested by an AirVPN customer. Absolutely no information about which customer. Your suggestion doesn't really provide any benefit. And opening servers for public access (anyway even if limited to DNS) may expose them to other kind of troubles. Also it makes no sense to support DNScrypt in our client. When you are connected to the VPN, DNS queries are already encrypted. If you mean 'using DNScrypt when not connected to a VPN', this can be eventually done, but it sounds like bloatware, it's better to have a dedicated DNScrypt client. What we might do is funding a DNScrypt resolver node on a dedicated server (that can resolve ICANN domains, OpenNIC domains and NameCoin domains at the same time, like our VPN servers) or a project for a better client. We'll think about that. Kind regards
  10. Hello! Can you please publish or send us the logs pertaining to the loop? Kind regards
  11. What about the server Cygni what? Kind regards
  12. Confirmed, it has been withdrawn. Kind regards
  13. https://airvpn.org/topic/12793-completed-openvpn-upgrade Kind regards
  14. https://airvpn.org/topic/12793-completed-openvpn-upgrade Topic locked. Kind regards
  15. Hello! Starting from Dec 2 2014 2.00 PM GMT+1 we will upgrade OpenVPN on all of our VPN servers. The upgrade will cause clients disconnection and server unavailability for approximately less than a minute. We will perform the upgrade sequentially, following servers alphabetical order. No action on your side is required, our Eddie client will reconnect automatically. UPDATE: UPGRADE HAS BEEN COMPLETED Kind regards
  16. Hello! We're following closely the matter and when the fixed version is released we will upgrade as soon as possible. Kind regards Does this mean that for those who connect to AirVPN through Viscosity or Tunnelblick will have to re-download config files? Hello! No, the vulnerability is on the server side. The exploit does not affect security but cause OpenVPN daemon crash. No action on the client side is required (as long as you use OpenVPN as a client only). Kind regards
  17. Hello! We're following closely the matter and when the fixed version is released we will upgrade as soon as possible. Kind regards
  18. Hello! We're glad to know that the problem is solved. During the last week serious problems have occurred at a global Internet level due to malfunction (we have no idea about the causes) of infrastructures of big providers in the world. That affected thousands of smaller providers, residential ISPs and datacenters, in particular during some hours of November the 26th. Just to give you an idea of the enormity of the malfunction, ALL of our datacenter traffic providers (we're talking about more than forty providers, which include several tier1 providers, in three different continents) had problems: high latency and 20% packet loss. Kind regards
  19. Hello! Due to prolonged problems we will probably withdraw the server. We have starting searching for different providers in LU since some days ago. Kind regards
  20. Hello, thank you for your choice. You just need to transfer the exact required amount to the address that's displayed when you pay through CoinBase. Kind regards Is coinbase the only bitcoin payment option that I can use to get the 35% discount? Does coinbase require registration if I already have another wallet? Thanks. Hello! Yes, it's the only option and no, it does not require registration. Kind regards
  21. Hello, thank you for your choice. You just need to transfer the exact required amount to the address that's displayed when you pay through CoinBase. Kind regards
  22. Hello! It was a momentary problem on bestvpn web site, they have fixed it, thank you all! Kind regards
  23. Hello, try servers in Canada, the likelihood that trackers administrators block them is significantly lower than it is with USA servers. Kind regards
  24. Hello, yes 7 MB/s (=56 Mbit/s) is an excellent performance, especially in TCP. Since you get higher performance in TCP than in UDP (while it should be the contrary) probabiy your ISP shapes UDP traffic. Kind regards
  25. The AirVPN Client (codename Eddie) is a free and open source OpenVPN wrapper that's fully integrated with the AirVPN service. It's licensed under GPL. Source code is available on GitHub. You can find the manual in this page. Before you open a topic, please check if your questions are in the AirVPN Client FAQ. Technical notes about the source code, how it works and how to build an executable file from it are explained in this faq
×
×
  • Create New...