Jump to content
Not connected, Your IP: 18.116.85.204

Staff

Staff
  • Content Count

    11047
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1867

Everything posted by Staff

  1. Hello! Yes, there are several ways, you can find many of them in our How-To section ("Forums"->"How-To"), according to your OS, as specified in the welcome e-mail as well. Kind regards
  2. Hello! The directive has nothing to do with that, please see the OpenVPN manual: --explicit-exit-notify [n] In UDP client mode or point-to-point mode, send server/peer an exit notification if tunnel is restarted or OpenVPN process is exited. In client mode, on exit/restart, this option will tell the server to immediately close its client instance object rather than waiting for a timeout. The n parameter (default=1) controls the maximum number of attempts that the client will try to resend the exit notification message. OpenVPN will not send any exit notifications unless this option is enabled. You can prevent leaks without firewall rules anyway, please see here https://airvpn.org/topic/9797-blocking-non-vpn-traffic-without-firewall-using-routing-router Kind regards
  3. Hello! We're sorry, you can't do that with the Air client. You can either run OpenVPN as a service or OpenVPN GUI at the startup. Kind regards
  4. @magpies1 Hello, your account is really connected to some VPN server and exchanging data since before you wrote the message, can you please check? Kind regards
  5. Hello! We're sorry, the referral program is momentarily closed for new referrers, it will be re-opened in the near future. Kind regards
  6. Hello, we have never revealed any data of any user (and of course we can't give away information that we don't have), however that's not relevant since you say that it's an old thing from when you did not use a VPN. The account you're writing from is not subscribed to our service, but we assume that this is intentional to increase your privacy, and not just a message from a troll. About your other question on encrypted drives, it depends on what encryption and program have been used to encrypt the media. If strong encryption and a good key were employed, and the adversary could not intercept (for example with a keylogger hidden in the computer) the key/password, then it's nearly impossible to decrypt in less than million of years. About using a VPN, it's impossible to decrypt your data for adversaries monitoring your line, BUT you must keep in mind that a VPN protects your line, not your computer. If an adversary has installed spyware on your computers (and from what you say you MUST take into consideration this option) then the encryption on the line is irrelevant, because the adversary takes data directly from the computer, when they are not encrypted. The above are just technical information, about your last question we think that you should contact a good lawyer (if you haven't already done so). Kind regards
  7. Hello! Disclaimer: we don't know this router. From information and technical specifications gathered from the www (therefore NOT from our direct experience) it seems that there's apparently no way to run OpenVPN in it. If that is confirmed, you will need to connect directly from your computer. Kind regards
  8. Staff

    The hole in Bitcoin

    Hello, Bitcoin is not anonymous by itself (as it is, it just adds a significant privacy layer) and has not been designed with this purpose. The purposes of Bitcoin are different and much more radical. You should add an anonymity layer (for example simply running the client over TOR), an operation which should take no more than a minute, if you wish anonymous transactions. The "hole in Bitcoin" according to the article's author refers to energy consumption to generate blocks and economics, with the totally arbitrary assumption that 1 BTC=220 USD. This assumption has a fundamental flaw in it, and anyway it is wrong today, so all the article calculations are questionable. Furthermore they are not much pertinent to those people who need a highly private (or even anonymous) subscription to an online service. Kind regards
  9. Hello, it's menu "Client Area"->"Config generator" but your account (at the moment) can't access it because it is not subscribed to the service. Kind regards
  10. @mr.Rhee Hello and welcome aboard! In the rule you need to specify the entry-IP address of the VPN server you connect to. europe.vpn.airdns.org resolves to the entry-IP of the VPN server which has the "best rating". Rating is calculated every 5 minutes according to various parameters (server status, latency with all the other VPN servers, available bandwidth, packet loss) and the DNS record, if necessary, is updated accordingly. In order to see which IP address the name resolves into, just resolve it in your system (for example "dig @ europe.vpn.airdns.org, or even ping europe.vpn.airdns.org). In order to see the list of all the servers entry-IP address, you can generate a single configuration file with "Planet Earth" or "Europe" as region, making sure to tick both "Resolved hosts in .ovpn file" and "All servers for area or region". You will get a file with a long list of "remote" lines which will show the various servers entry-IP addresses. Alternatively just open a ticket to "Support" (from the upper menu "Contact us") and ask for them. About the DNS push, if you have resolvconf or openresolv installed, please see here https://airvpn.org/topic/9608-how-to-accept-dns-push-on-linux-systems-with-resolvconf/ Kind regards
  11. Hello! Please send us at your convenience the Air client logs taken just after the problem occurs: right-click on the Air tray icon, select "Logs", click "Copy to clipboard" and paste into your message. Kind regards
  12. Hello, it's not a message from us. It might be a message either from your system (do you run something like Malwarebytes or other blocking tools?) or from the destination web site. Kind regards
  13. Hello! About the ping, probably you have blocked only TCP and/or UDP in the Application Rules. To solve the issue please either block IP, which includes ICMP, or add rules to block ICMP. In order to forward a port to the VM you need to build a DNAT on the router AND forward the port(s) on the host machine virtualization software NAT to the guest. On the host machine just forward the appropriate ports through the relevant virtualization software options, while on Tomato have a look at our guide in the "How-To" section https://airvpn.org/topic/9270-how-to-forward-ports-in-dd-wrt-tomato-with-iptables Kind regards
  14. Hello! With the VM attached to the host via NAT and the host machine running Comodo and OpenVPN running on the Tomato router there's an ultra-fast solution (with a side effect, though). You can just use Application Rules for the virtualization software process (for example virtualbox.exe) to block any packet to devices in your local network (except the router, of course). The side effect is that this block will affect all the VMs you run in the host through the same virtualization software process. Kind regards
  15. Hello, if the VM is attached to the host in "bridge mode", you can run a firewall in the VM dropping outgoing packets to any local address except your router address and (if you need DHCP) 255.255.255.255. If the VM is attached to the host via NAT, in addition to the above option you can alternatively run a firewall on the host dropping packets from the VM to any local address except the router and the host machine address. Kind regards
  16. Hello, what's the problem...? Kind regards
  17. Hello, according to our system your account subscription expired 218 days ago. If you think this is a mistake, please do not hesitate to open a ticket to Department "Sales" by clicking "Contact us" from the upper menu of our web site, including any relevant information such as your last payment details. Kind regards
  18. Hello! Your setup prevents any leak, so it's not necessary anything else to "secure" Bittorrent. Optimal settings for Bittorrent: DHT, PEX and Local Peer Discovery enabled UPnP and NAT-PMP disabled, because Bittorrent must listen to a definite port that you know in advance (so that you can match it with a remotely forwarded port on our system that you can set in your "Client Area"->"Forwarded port" panel accessible while you're logged in our web site). Kind regards
  19. Hello, when the VM is attached to the host via NAT and OpenVPN runs on the host, make sure to forward (via the host virtualization software) the proper ports to the guest. If OpenVPN runs on the guest machine that's not necessary. If OpenVPN runs neither on the host nor on the VM, but it runs on an external device, and the VM is attached via NAT, make sure to build the appropriate DNAT on that device, and then forward the proper ports via the host virtualization software to the guest. Kind regards
  20. Hello! Ok, that was done. Changes in micro-routing will be effective in a matter of minutes. Can you tell us, if you know, whether the Swedish contents are different than the Netherlands contents, out of curiosity? And is there any advantage, in terms of content access, in using Sweden Netflix instead of USA Netflix? Kind regards
  21. Hello! Yes, you can do that with iptables, provided that the owner module is available in your system. You can block outgoing packets on every physical interface (for example eth0, wlan0... determine your interface names for example with command "ifconfig") coming from the qBittorrent owner. An example: iptables -A OUTPUT -o eth+ -m owner --uid-owner user -j DROP iptables -A OUTPUT -o wlan+ -m owner --uid-owner user -j DROP The two rules above will drop any outgoing packet of any process launched by user user from any WiFi and Ethernet interface in your system. Replace user with the User ID that launches qBittorrent. In order to determine this UID use for example "ps aux | grep -i torrent" (provided that the qBittorrent process has "torrent" contained in its name). Therefore, only packets coming from tun+ (the network virtual interface used by OpenVPN) can get out. Be aware, though, that in this case the rule will block leaks (i.e. packets outside the tunnel) of ANY process launched by the same qBittorrent owner, not of qBittorrent only. Kind regards
  22. Hello, you need a simple DNAT on the router according to our guide that you can find in the "How-To" section of the forum: https://airvpn.org/topic/9270-how-to-forward-ports-in-dd-wrt-tomato-with-iptables Kind regards
  23. Hello, the logs are just fine. If OpenVPN does not display anything when you assume that the connection drops (not even after the 60 seconds ping timeout), either the connection has not really dropped, OpenVPN crashed (but you should see it) or we're missing something. When you assume that the connection drops, can you please try to ping 10.5.0.1 or 10.4.0.1? Kind regards
  24. Hello! After the problem occurs, can you please copy the OpenVPN output in the shell window you launch OpenVPN from, and paste it in your message? Kind regards
  25. Hello, you might like to inquire Comcast. Maybe they are shaping all traffic different than http, or something similar. Feel free to keep us informed, information may be useful for every Comcast customer (or for any person planning to subscribe to Comcast). Unfortunately we can't do that ourselves, because we are neither Comcast customers nor we know some Comcast customer who could do that for us. Kind regards
×
×
  • Create New...