- 
				Content Count11527
- 
				Joined...
- 
				Last visited...
- 
				Days Won2036
Everything posted by Staff
- 
	Hello, if it happens on every and each server you try, it might be your ISP line. If the same behavior occurs with many different providers the probability that it's our ISPs fault extremely low. If it happens only on some servers, can you please post a list? Kind regards
- 
	Hello! The test is hosted inside the VPN server. Random data are created and then sent to/from your system from/to VPN server entry-IP (therefore out of the tunnel) and inside the tunnel. These tests are not very reliable in absolute terms, their value lies more on relative comparisons between in-tunnel and out-tunnel throughput. Increase the buffer to try to get more precise results. We wanted to implement a test that does not need Flash or Java and that at the same time is running inside the VPN server in order not to rely on a 3rd node which causes bias. Kind regards
- 
	Hello! Because the test is performed to and from the same VPN server your system is connected to (that's why this test can work only with our service and when your system is connected to a VPN server). There is no bypass at all, routing table is respected. Kind regards
- 
	.thumb.png.8be84fd39f94c1640ac8c5456fbf3449.png)  Google.com redirecting to third party country siteStaff replied to vangosh's topic in General & Suggestions A beneficial mistake. Kind regards
- 
	.thumb.png.8be84fd39f94c1640ac8c5456fbf3449.png)  Google.com redirecting to third party country siteStaff replied to vangosh's topic in General & Suggestions Hello! In case of geo-location errors, "real" Google search engine is anyway available at https://www.google.com/ncr ("ncr" is "no country redirect"). Kind regards
- 
	Hello! iwih2gk comment is good especially for security. In order not to weaken anonymity layer, it is even more important not to mix identities. As long as identities are not mixed, the anonymity layer is not compromised. An isolated from the rest of the local network computer can anyway weaken the anonymity layer if it uses, over the VPN, non-VPN identities. For "identities" in this context we mean any possible account, behavior, pattern. Such elements should not be used over the VPN and not over the VPN. Kind regards
- 
	Hello, those instructions are quite outdated and are not fine for Mavericks, which should use pf as packet filtering tool, not ipfw. First of all, be informed that OpenVPN clients are available in Android 4 or higher. https://airvpn.org/android If you need to share the VPN connection on Mavericks please follow this Apple guide: http://support.apple.com/kb/PH13855 keeping in mind that the interface you wish to share is tun0 (the network card used by OpenVPN), while the interface you wish to make accessible to the Android device is the WiFi card. Kind regards
- 
	Hello! What about point 3? Kind regards
- 
	Hello! Thank you very much for the information! We'll check. Just an additional information, is resolvconf package installed in your system? Kind regards
- 
	Hello! The IP range is ok. About the DHCP service: Please check your Windows manual or have a look here: http://computerstepbystep.com/dhcp_client_service.html Make sure that the service is set in "Automatic" (default value when Windows is shipped). Kind regards
- 
	Hello! The problem: ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=11] etc. Please check: 1) Is your local network IP range not overlapping with VPN one (10.4.0.0/16)? 2) Is the DHCP client service running? 3) Does the same problem occur if you disable any firewall and antivirus? Kind regards
- 
	Hello, we would recommend troubleshooting. All of these problems are not reproducible in our Debian systems. Consider that Eddie for Linux has been developed first in Debian 7 machines! Additionally, Eddie is in beta version, so we need as much feedback as possible to fix any bug. Eddie 2.2 will have a lot of fixes. This is interesting, can you provide additional information? This is not Eddie's fault, connections are handled anyway by OpenVPN, regardless of network-manager or Eddie or any other OpenVPN wrapper. Kind regards
- 
	Actually, I'm hating ipleak.net. Would it please be possible for you to provide an actual .torrent file, not a magnet link, for testing the torrent piece of ipleak? I'm using a NAS box configured to access AirVPN; the client embedded in the box doesn't support magnet links. In fact, magnet links only work on a computer, and appear to download the actual .torrent file from a peer with the file in question, so I *can't* even extract the info to make a torrent file from the magnet link. Please stop assuming that all users use your system in a single way. Thanks. Hi, probably not, we'll see what we can do... in the meantime use another service which provides torrent files instead of magnet links to test. Kind regards
- 
	.thumb.png.8be84fd39f94c1640ac8c5456fbf3449.png)  Explanation of simultaneous connections policy?Staff replied to strideram's topic in Troubleshooting and Problems Hello! You can connect to the same server but make sure to connect different devices to different ports, otherwise you will always experience the problem you report. Also, port forwarding will not work properly in any case if you connect multiple times simultaneously to the same server. Kind regards
- 
	.thumb.png.8be84fd39f94c1640ac8c5456fbf3449.png)  New 1 Gbit/s servers available: Dheneb and Hoedus (CA)Staff posted a topic in News and Announcement Hello! We're very glad to inform you that two new 1 Gbit/s servers located in Canada, Toronto, Ontario are available: Dheneb and Hoedus. The AirVPN client will show automatically the new servers, while if you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 2018 UDP and TCP. Just like every other Air server, Dheneb and Hoedus support OpenVPN over SSL and OpenVPN over SSH. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
- 
	EDIT: UPGRADE HAS BEEN COMPLETED Hello! In the next hours we will be upgrading OpenSSL on all of our servers to fix newly discovered OpenSSL vulnerabilities. In particular, we want to close CVE-2014-0224 immediately, that's why we will proceed to the upgrade without early warnings. In order to make sure that no previous OpenSSL functions remain loaded we will restart various services including OpenVPN. Your client will be therefore briefly disconnected from the VPN server. The web sites will remain unavailable just for a fraction of a second and established HTTPS connections will be reset. What you need to do on your side. Nothing urgent: the exploit can be performed only when both client and server sides run OpenSSL vulnerable versions. Therefore the patch on our servers will prevent the exploit. Anyway, as an additional precaution: Linux/FreeBSD/OpenBSD/Unix users: upgrade OpenSSL to latest version of your branch. Windows users: a patch is not currently available for OpenSSL included in OpenVPN binaries. As soon as it is available we will update our packages. At that time, you will need to upgrade OpenVPN. Upgrade to OpenVPN 2.3.4I002 which includes a non-vulnerable OpenSSL version. Android / iOS users: if you run "openvpn-connect" nothing is required since it does not use OpenSSL but PolarSSL. If you run "OpenVPN for Android" stand by for instructions. OS X users: a patch is not currently available for Tunnelblick. When a new version will be released, please upgrade. A new version of Viscosity that includes non-vulnerable OpenSSL is available, please upgrade. Tunnelblick users, please upgrade to versions built on 12 Jun 2014 or later. Kind regards AirVPN Staff
- 
	Hello! We remind you that May projects funding poll is open and will close on Jun the 21th. Which project shall we fund? AirVPN community has selected the candidate projects during April and May and the community will decide the one to be funded! Feel free to express your preference here https://airvpn.org/topic/11686-poll-may-2014-projects-funding NOTE: already funded projects are not included in the current contest. All projects are compatible with our mission. Kind regards AirVPN Staff
- 
	Only persons who have contributed to our forums with at least 5 posts are allowed to vote. Anyone can vote with a single or multiple choice. Who votes for what is NOT a public information. We can change this if the community prefers so.
- 
	05/06/2014, Funded with 1000€ (1355 USD). https://airvpn.org/mission/
- 
	.thumb.png.8be84fd39f94c1640ac8c5456fbf3449.png)  TO All Airvpn User's Having Problems with Port 443Staff replied to Solex1's topic in Troubleshooting and Problems Hello! Thanks, but that's undeserved, we did not do anything. The system was working just like it is working now. Under our point of view and according to our status/health monitoring systems, there's absolutely no difference. Kind regards
- 
	Hello @ghostp, please open a ticket at your convenience and send us the Eddie logs taken after the problem occurs (click "Logs" tab, click "Copy to clipboard" and paste into your ticket). Kind regards
- 
	If you run the older client 1.92, does this problem disappear or is it the same? Kind regards
 Not connected, Your IP: 216.73.216.103
 Not connected, Your IP: 216.73.216.103
 Online: 36019 users - 399305 Mbit/s total BW
 Online: 36019 users - 399305 Mbit/s total BW 
			