Jump to content
Not connected, Your IP: 18.225.57.164

Staff

Staff
  • Content Count

    10932
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1843

Everything posted by Staff

  1. Hello, questions specifically directed to AirVPN founders are not answered in this message, of course. You can refer to the Terms of Service in the meantime. We are not aware that any datacenter where our servers are located performs traffic logging and we have some evidence that they do not (and they are not obliged to do so, not that it means much). Anyway, this kind of logging is not the real issue here. The real issue is whether traffic logging is assisted by timing correlations on the VPN server, otherwise the logging would be ineffective to produce anything valid (unless there's only one client connected to the server). You can imagine wiretapping boxes put on the servers ends, methods of undetectable servers control that do not leave trace and that would make correlations easy etc., assuming that a datacenter is willing to spend on such things. If you feel that it's the case, there's no claim in this world that can convince you or anybody else that this is not happening: just perform partition of trust. You have absolutely no other option to the best of our knowledge. https://airvpn.org/topic/54-using-airvpn-over-tor/?do=findComment&comment=1745 Kind regards
  2. Hello! It might be a DNS issue. Your torrent client can work perfectly without resolving names. Once your system is connected to a VPN server, can you please open a command line, issue the following commands and send us the output? If on Linux or OS X: traceroute google.com ping 10.4.0.1 If on Windows, from a command prompt with administrator privileges: ipconfig /flushdns tracert google.com ping 10.4.0.1 Kind regards
  3. Hello! Yes, it's a false positive, anyway you are not forced to use it, you can run OpenVPN or any OpenVPN wrapper/GUI to connect to our servers. Kind regards
  4. Hello! Maybe the subnet is different, i.e. the IP addresses range of the second house network is different from your own home network, can you please check when you can? For example, in your house it could be somewhere in 192.168.0.0/16 while on other networks it could be somewhere in 172.16.0.0/12. Please have also a look here: http://en.wikipedia.org/wiki/IP_address#IPv4_private_addresses Also, please feel free to send us the client logs pertaining to failed connection attempts and the output of "ipconfig /all" (when you are not in your home network). Kind regards
  5. Hello! All elements point to no risk or hazard. At the moment, it was "just" a DNS nameservers change and subsequent DNS hijack. See also here: http://leasewebnoc.com/en/networkstatus/leaseweb-com-issues We are of course following developments (if any) very closely. Please note that the Air servers passwords do not match with the passwords displayed in the Leaseweb control panel, and that there's no console access from it, therefore if the attackers had obtained access to Leaseweb customers' panels (and there are absolutely NO indications that this could have happened), they could not enter the servers, but they could reboot, erase them, perform IP null-routing. The fact they did not do any of those things (at the moment) shows that they don't have the will or the ability to do so. Kind regards
  6. Hello! If magnet: is not a registered service, please just copy the magnet link and paste it into KTorrent, or register the magnet protocol (please see the KTorrent wiki for details, assuming that you run Gnome). About the port, can you please make sure that both ports are correctly set (i.e. they match the remotely forwarded ports)? Kind regards
  7. Hello, it seems that Putty is either not running or not listening to port 1412. Can you please make sure that you execute the script file (the .bat file) from a command prompt? Also, can you please send us the output? Kind regards
  8. @fasi72 Hello, there's no attachment in your message, can you please try again? Also, what is your OS, and which server are you trying to connect over SSH? Kind regards
  9. Hello! That's interesting, we have not done anything in the last days about trackers. From which server(s) have you noticed that the mentioned trackers are only intermittently reachable? Anyway, as a side question, why do you need public trackers? They are not only useless (thanks to DHT+PEX) but also harmful. Kind regards
  10. Hello! Bitcoin is important for a variety of reasons. First, as you correctly note, to add an important anonymity layer, provided that the Bitcoin payment is supported by connections to the VPN servers performed over OpenVPN over a proxy or over TOR etc (and the Bitcoin transaction itself is performed behind TOR). Second, Bitcoin provides a really global transaction exchange system for anyone with Internet access: there are several countries from which it is very hard, and sometimes impossible, to deliver a payment abroad in foreign currency via credit cards, bank transfers or any payment processor (including PayPal). There are also countries where it is almost impossible to have one of the credit cards commonly accepted in western countries. Last but not least, there may be cases in some countries when, even if you are theoretically free to do so, and where privacy is recognized as a fundamental right, you don't want anyway to let anybody know that you purchase a foreign service aimed to privacy enhancement. Yes, we do, otherwise we could not grant any refund (but these data are not kept neither in VPN servers, nor in the web site servers, this is important). Our "no questions asked" refund policy has been with us since AirVPN birth and will not go away. Anyway, remember that transactions data remain (and are not deletable) both on your and our PP accounts, just like for any transaction performed through a bank or financial institution, so you're just right, the list could be obtained simply through a proper request to PP. No value at all in a perfect world, you are right, since using a VPN service is perfectly legal (exception: in Iran only authorized and registered VPN services are legal), but we don't live in a perfect world, even if we did not consider the aforementioned exceptions. Kind regards
  11. Hello! Yes, in most cases it will be faster. Additionally you will have no protocol limitations like in TOR. However, it's not as secure as TOR over VPN, or VPN over TOR. As usual, it depends on the balance between security and performance that you want to achieve. Such balance can be correctly evaluated only by yourself, carefully, according to the sensitiveness of the data you need to receive or impart. Probably the easiest way to connect over a VPN over a VPN is through a VM attached via NAT (important!) to the host machine. The host connects to VPN1. The VM connects to VPN2. On the VM all the traffic will be tunneled over VPN2 over VPN1. This solution has also some nice side-effects, the usual advantages of running a VM: disasters and attacks isolation, portability, option to keep the virtual disk encrypted with the assurance that no unencrypted data can be written without your knowledge outside the virtual machine disk. Kind regards
  12. Hello, please have a look at the servers monitor (click "Status" from the upper menu), direct link https://airvpn.org/status As you have seen, databases about IP geo-location are inaccurate: 3 different databases return three different answers for the same IP address. Kind regards
  13. Hello! The problem is caused by OpenDNS: Oct 5 23:59:00 kaytsai nm-openvpn[4570]: UDPv4 link remote: [AF_INET]67.215.66.132:443 67.215.66.132 is the server IP address to which OpenDNS hijacks our *.airdns.org names, as if they did not exist. Please see here for more information and quick solutions: https://airvpn.org/topic/10000-connection-timeout/?do=findComment&comment=12480 Kind regards
  14. Hello! Please try to re-generate the .ovpn files in the following way: - tick "Advanced Options" - tick "Resolved hosts in .ovpn file" - tick "All servers for area or region" Additionally, should you prefer to separate certificates and key from .ovpn file (not required bv openvpn-connect app anyway) tick "Separate certs/keys from .ovpn file" too. The updated instructions for Android devices (with Android 4 or higher) are here: https://airvpn.org/android Kind regards
  15. Hello! Thank you gigan3rd! We will probably put the guide in the How-To forums section or in the "Enter" instructions page after some testing, however at the moment the Air staff does not own any Fritz!Box router. Any feedback from Fritz!Box users will be very much appreciated. Kind regards
  16. Hello! The 10.4.26.114 was the VPN IP address DHCP-assigned to your system tun interface (the virtual network card used by OpenVPN). To prevent DNS leaks, this is probably the simplest and quickest approach (in the first half of the post): https://airvpn.org/topic/9289-dns-leaks-and-how-to-fix-them/?do=findComment&comment=11603 If in doubt, please do not hesitate to send us your "ipconfig /all" output. Kind regards
  17. Hello! About OpenVPN over SSH, our servers listen to ports 22, 53 and 80 of the entry-IP address, and to port 22 of the Alternative Entry-IP address. About OpenVPN over SSL, our servers listen to port 443 of the entry-IP address. About OpenVPN "direct" or "over a proxy", our servers listen to ports 53, 80 and 443 both of the Entry-IP and the Alternative Entry-IP address. In Comodo, for OpenVPN over SSH/SSL you need, on top of the rules described in our guide for Comodo to prevent lekas, to allow communications from "Any IP Address" to 10.50.0.0/255.255.0.0 and from 10.50.0.0/255.255.0.0 to "Any IP Address" (Comodo will display "Any IP address" as "MAC Any" in the rules). There is no generally valid recommendation about which port to choose: if your ISP performs port shaping on some ports, some ports can provide better performance than others. Keep in mind that OpenVPN over SSH or over SSL should be used ONLY if your ISP disrupts OpenVPN communications, because the additional SSH/SSL tunnel causes a performance hit without increasing security. OpenVPN over SSH/SSL have been implemented originally for China only, where OpenVPN connections are disrupted. The purpose of SSH/SSL is to encrypt the OpenVPN typical fingerprint, not to increase significantly the security. There is no such a thing as a non-tunneled connection in our service, unless you explicitly decide to reject the pushed routes by our servers. Kind regards
  18. Hello! It seems that your system is not tunneling traffic. Can you please send us the OpenVPN logs? Kind regards
  19. Hello! No, it's closed source (but your are not forced to use it: you can run OpenVPN directly or any OpenVPN wrapper/GUI you wish in order to connect to the Air VPN servers). The next client release, "Eddie", will be free and open source (very probably under GPLv3). Kind regards
  20. Hello! Can you please specify which NL servers at your convenience? We have tested them and everything seems fine with schneier.com resolving correctly into 204.11.246.48 Kind regards
  21. Hello! Assuming that the tun module has not been radically removed, please try to re-load/re-activate it. Please see here: http://superuser.com/questions/497245/how-to-load-tun-module-in-linux Kind regards
  22. Staff

    NSA

    Hello, already discussed in several different threads, moved to off-topic. Kind regards
  23. Hello! Please check your firewall, usually error 111 (assuming that your p2p client is running while the test is performed, of course) suggests a firewall problem. Kind regards
  24. Hello! It might be related to this: https://airvpn.org/topic/10000-connection-timeout/?do=findComment&comment=12480 If not, can you please publish the complete Tunnelblick logs taken after the problem occurred? Kind regards
  25. Hello, you have published this script 7 times in different threads. Now it's enough, thank you. Kind regards
×
×
  • Create New...