Jump to content
Not connected, Your IP: 18.117.76.221

Staff

Staff
  • Content Count

    10932
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1843

Everything posted by Staff

  1. Hello, can you tell us which DNS the Raspberry PI queries to resolve names? Kind regards
  2. Hello, unfortunately we don't know MS One Note, anyway as it was written in the previous message you can remap any remotely forwarded port to any other local port. You can do that in your "Forwarded ports" panel, accessible by clicking "Client Area" from the upper menu and then clicking "Forwarded ports" from the left tabs. Kind regards
  3. Yes, of course: since the exit-IP address is shared (a dedicated IP address per client might easily crumble the anonymity layer) this is unavoidable. You can anyway remap any remotely forwarded port to any local port. Alternatively just configure your service to listen to the appropriate port or create a basic port re-mapping. Kind regards
  4. Hello, for more accuracy please use a more accurate IP geo-location database. MaxMind is not bad, amongst those we have tested (see it working on ipleak.net for example), but keep in mind that maintaining a "geo-IP" database in good order is not easy. Anyway, to know the exact locations of our servers please see our servers monitor by clicking "Status" from the upper menu of the web site. Kind regards
  5. Hello, for a complete setup please see also our guide https://airvpn.org/topic/3405-windows-comodo-prevent-leaks Kind regards
  6. Hello, for your and other persons privacy needs we accept Bitcoin since years. This thread pertains to a completely different problem, please do not hijack it. Kind regards
  7. Hello, maybe you have a disconnection without notification in UDP mode. When this happens, the client can't communicate to the Air server that it's going to disconnect. Since UDP is connectionless, the server has therefore no way to know that the client disconnected and will believe the client is in the PN until the timeout (60 seconds). Subsequently, during this time frame the system will believe that the account is still logged in. Kind regards
  8. Hello, it seems an OpenVPN 2.2.1 bug which shows up every time default route does not use a gateway (such as in PPP): https://bugs.launchpad.net/ubuntu/+source/openvpn/+bug/771148 In the link above you will also find a workaround. Kind regards
  9. Hello, it's difficult to provide definite numbers about performance hit. Consider roughly at least a 10-15% loss due to double overhead (OpenVPN will have to run in TCP mode instead of UDP, and there's the additional overhead by SSL/SSH). It's not a matter of security. The additional encryption layer (RC4-128) is not significant compared to OpenVPN data channel encryption (AES-256-CBC), its only purpose is to encapsulate and encrypt the OpenVPN "fingeprint" so that your ISP can't see that you're running OpenVPN (we repeat: useful only when your ISP discriminate against OpenVPN). DPI is anyway defeated even with OpenVPN alone: it's not that through DPI your ISP can see your real packets headers and payload. If your ISP does not disrupt or dramatically cap OpenVPN we strongly recommend that OpenVPN is NOT tunneled over SSL or SSH. Kind regards
  10. Hello, OpenVPN packets have a typical fingerprint (basically due to additional information on the packets headers for error correction) which make OpenVPN protocol different from pure SSL/TLS. Usage of OpenVPN is perfectly normal and widespread, therefore it's not a reason of concern unless your ISP decides to cap or disrupt OpenVPN connections (as it happens in China). In this case, you can use OpenVPN over SSL/SSH to encapsulate OpenVPN packets inside SSL or SSH tunnel (you can find the instructions by clicking "Enter" from the upper menu of our web site). In case your ISP does not perform this discrimination, you should connect directly with OpenVPN for better performance. Kind regards
  11. @pete.rose Hello, sometimes the TLS re-keying fails. Through DHE OpenVPN re-negotiate TLS keys every 60 minutes (Perfect Forward Secrecy). Sometimes this re-keying fails from your system, but most times it succeeds, making the problem very hard to detect. First of all, please check that the system clock and date are correctly set. Kind regards
  12. Hello! You just need to drop packets from the "uninvited" IP addresses with a firewall running on the same device where OpenVPN is running. Kind regards
  13. @magpies1 Each time we check (just like now) we see your account REALLY connected and REALLY exchanging data (even at a good, sustained rate). On your control panel, however, you can also see this: Last attempted connection failed 6h 55m 21s ago. Reason: Already logged on 'some server'. Now, 6h55m ago your account was already connected (to the same server you continued to try to connect to with the same account) and exchanging data. Please keep in mind the one concurrent connection is allowed from the same account. Please also make sure that you're not running multiple OpenVPN instances. Kind regards
  14. Hello! Yes, there are several ways, you can find many of them in our How-To section ("Forums"->"How-To"), according to your OS, as specified in the welcome e-mail as well. Kind regards
  15. Hello! The directive has nothing to do with that, please see the OpenVPN manual: --explicit-exit-notify [n] In UDP client mode or point-to-point mode, send server/peer an exit notification if tunnel is restarted or OpenVPN process is exited. In client mode, on exit/restart, this option will tell the server to immediately close its client instance object rather than waiting for a timeout. The n parameter (default=1) controls the maximum number of attempts that the client will try to resend the exit notification message. OpenVPN will not send any exit notifications unless this option is enabled. You can prevent leaks without firewall rules anyway, please see here https://airvpn.org/topic/9797-blocking-non-vpn-traffic-without-firewall-using-routing-router Kind regards
  16. Hello! We're sorry, you can't do that with the Air client. You can either run OpenVPN as a service or OpenVPN GUI at the startup. Kind regards
  17. @magpies1 Hello, your account is really connected to some VPN server and exchanging data since before you wrote the message, can you please check? Kind regards
  18. Hello! We're sorry, the referral program is momentarily closed for new referrers, it will be re-opened in the near future. Kind regards
  19. Hello, we have never revealed any data of any user (and of course we can't give away information that we don't have), however that's not relevant since you say that it's an old thing from when you did not use a VPN. The account you're writing from is not subscribed to our service, but we assume that this is intentional to increase your privacy, and not just a message from a troll. About your other question on encrypted drives, it depends on what encryption and program have been used to encrypt the media. If strong encryption and a good key were employed, and the adversary could not intercept (for example with a keylogger hidden in the computer) the key/password, then it's nearly impossible to decrypt in less than million of years. About using a VPN, it's impossible to decrypt your data for adversaries monitoring your line, BUT you must keep in mind that a VPN protects your line, not your computer. If an adversary has installed spyware on your computers (and from what you say you MUST take into consideration this option) then the encryption on the line is irrelevant, because the adversary takes data directly from the computer, when they are not encrypted. The above are just technical information, about your last question we think that you should contact a good lawyer (if you haven't already done so). Kind regards
  20. Hello! Disclaimer: we don't know this router. From information and technical specifications gathered from the www (therefore NOT from our direct experience) it seems that there's apparently no way to run OpenVPN in it. If that is confirmed, you will need to connect directly from your computer. Kind regards
  21. Staff

    The hole in Bitcoin

    Hello, Bitcoin is not anonymous by itself (as it is, it just adds a significant privacy layer) and has not been designed with this purpose. The purposes of Bitcoin are different and much more radical. You should add an anonymity layer (for example simply running the client over TOR), an operation which should take no more than a minute, if you wish anonymous transactions. The "hole in Bitcoin" according to the article's author refers to energy consumption to generate blocks and economics, with the totally arbitrary assumption that 1 BTC=220 USD. This assumption has a fundamental flaw in it, and anyway it is wrong today, so all the article calculations are questionable. Furthermore they are not much pertinent to those people who need a highly private (or even anonymous) subscription to an online service. Kind regards
  22. Hello, it's menu "Client Area"->"Config generator" but your account (at the moment) can't access it because it is not subscribed to the service. Kind regards
  23. @mr.Rhee Hello and welcome aboard! In the rule you need to specify the entry-IP address of the VPN server you connect to. europe.vpn.airdns.org resolves to the entry-IP of the VPN server which has the "best rating". Rating is calculated every 5 minutes according to various parameters (server status, latency with all the other VPN servers, available bandwidth, packet loss) and the DNS record, if necessary, is updated accordingly. In order to see which IP address the name resolves into, just resolve it in your system (for example "dig @ europe.vpn.airdns.org, or even ping europe.vpn.airdns.org). In order to see the list of all the servers entry-IP address, you can generate a single configuration file with "Planet Earth" or "Europe" as region, making sure to tick both "Resolved hosts in .ovpn file" and "All servers for area or region". You will get a file with a long list of "remote" lines which will show the various servers entry-IP addresses. Alternatively just open a ticket to "Support" (from the upper menu "Contact us") and ask for them. About the DNS push, if you have resolvconf or openresolv installed, please see here https://airvpn.org/topic/9608-how-to-accept-dns-push-on-linux-systems-with-resolvconf/ Kind regards
  24. Hello! Please send us at your convenience the Air client logs taken just after the problem occurs: right-click on the Air tray icon, select "Logs", click "Copy to clipboard" and paste into your message. Kind regards
  25. Hello, it's not a message from us. It might be a message either from your system (do you run something like Malwarebytes or other blocking tools?) or from the destination web site. Kind regards
×
×
  • Create New...