Jump to content
Not connected, Your IP: 18.221.136.142

Staff

Staff
  • Content Count

    10932
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1843

Everything posted by Staff

  1. Hello! Can you please send out the output of the commands (issued in a command prompt): route print ipconfig /all 1) before a VPN connection is tried 2) after the VPN connection is established but before it works (the "35 minutes" time frame) 3) when everything works (VPN connections established and working after the "35 minutes") Kind regards
  2. Hello! We're sorry to hear that, but the problem is in your system. All the VPN servers have a near-100% uptime. You can check anytime the servers status here: https://airvpn.org/status Kind regards
  3. Hello! Unfortunately we confirm. There is a thread dated today on openvpn.net about this important problem. It is probable that OpenVPN Technologies has already started to work on it. Kind regards
  4. when I click status on the webpage it shows the server status and if connected or not below. I do not see any icon or anything besides ping to click. Hello! The "Status" line of the openvpn-connect app. Kind regards
  5. Hello, you can find the client connection logs by clicking the "Status" line. Kind regards
  6. Hello! Can you please send us the openvpn-connect logs pertaining to a failed connection? Kind regards
  7. Hello, no VPN setting can be left behind, but the servers might have put cookies or flash cookies or some other file to remember your position, and maybe it was stored when you were connected to a VPN UK server.Alternatively, it might be just an IP location database error (your ISP IP address detected as being from the UK), nothing particularly unusual. Kind regards
  8. Hello! Try to allow airvpn.org IP address if you run the Air client. The Air client connects to airvpn.org in order to download the servers list etc. Also edit your hosts file in order to allow airvpn.org resolution with no need of a DNS query (which would be dropped by the firewall). Kind regards
  9. Hello, we have never detected any problem for your connections on our side. Even now, your account has been connected without interruptions for 1h 35m and exchanged so far GigaBytes of data. The other problem you refer to (connection working after 35 minutes since the initial run of OpenVPN) suggests system deep problems on your side about which we are not in the position to say anything specific. We would anyway recommend that you check for malware and reset Winsock and TCP/IP stack (please see https://airvpn.org/topic/8320-solved-connects-but-ip-doesnt-change-on-windows-server-essentials-2012/?do=findComment&comment=8321). Kind regards
  10. Are there many different types of leaks I'd experience on Win 7? Would using the dnsleak bat file fix and a: route delete 0.0.0.0 192.n.n.n be enough or do I need to apply the recomended Comodo type rules to the firewall I'm using? Also running OS X 10.6.n Would this be enough: #! /bin/sh route delete 0.0.0.0 192.n.n.n Tns for your service. Really liking it compared to previous VPN provider Hello! Yes, it's sufficient, see also https://airvpn.org/topic/9787-the-pros-and-the-cons/?p=11501 (in particular the second part of the post). Thank you for your feedback! Kind regards
  11. Hello! Please use the "Contact us" form and select "Trial Request" dep. Trial requests in the forum are not processed at all. Kind regards
  12. Hello! We confirm you that that is one of our IP addresses. It's not, however, one of our VPN servers IP addresses (neither entry, nor exit-IP). The reason is related to packets re-routing to torrent trackers, in turn caused essentially by this: https://airvpn.org/topic/9499-connecting-to-trackers-fails-from-different-servers Therefore, you have no leaks if that IP is announced to a tracker. Kind regards
  13. Hello! Confirmed, this feature is under development in the new client. Anyway this feature is largely overrated, remember that you can anyway secure your system against leaks in case of unexpected VPN disconnection in just a few seconds. Kind regards
  14. Hello, luckily this is partial nonsense, and total nonsense about OpenVPN (if correctly configured) please see https://airvpn.org/topic/9981-fbi-admits-it-controlled-tor-servers-behind-mass-malware-attack/?do=findComment&comment=12441 Also see https://airvpn.org/topic/9949-us-and-uk-spy-agencies-defeat-privacy-and-security-on-the-internet/?do=findComment&comment=12224 and https://airvpn.org/topic/9949-us-and-uk-spy-agencies-defeat-privacy-and-security-on-the-internet/?do=findComment&comment=12227 and https://airvpn.org/topic/9949-us-and-uk-spy-agencies-defeat-privacy-and-security-on-the-internet/?do=findComment&comment=12242 This is an interesting point, however privacy is a fundamental right as enshrined in the Universal Declaration on Human Rights (art. 12) and in many countries it is a right granted by the Constitutional Charter. Usage of VPNs is massively spread (most of the small and all of the big companies use them for obvious reasons). Probably the more encryption will be properly used, the more the "curiosity" about encrypted traffic will necessarily fade away, because diluted amongst an enormous number of citizens and companies. Kind regards
  15. Hello! It's not planned at all and will not be planned as long as it does not exist in final version. Latest stable version is 2.3.2. Kind regards
  16. Interesting response! How about this senario.1. A court orders the data centre to provide them with logs of all network traffic associated with AirVPN server (source IP address, source port, destination IP address, destination port, time, bytes). Hello! So, they already can see your real IP address in the first place, if that VPN server is the first hop you connect to. So, even if they can't see your real IP address, they can see the exit-IP address of another server of the same company. It can slow it down. OpenVPN over TOR can make it impossible. It is useless in comparison to OpenVPN over TOR. Additionally, OpenVPN over TOR protects you against the VPN provider itself, while multi-hopping to different servers of the same provider does not. Kind regards
  17. @DemonsRuns You mean that you get: RESOLVE: Cannot resolve host address: europe.vpn.airdns.org regardless of the DNS server you query? Can you please give us the list of such DNS servers? We have checked a few minutes ago that the domain name is correctly resolved on every public DNS (except OpenDNS, as usual) we have tested. Kind regards
  18. Hello, please remember to ALWAYS state the exact VPN server(s) name. We can't check if you don't state that, sorry. Kind regards
  19. Hello! The problem is here: 2013-09-18 08:31:14 UDPv4 link remote: [AF_INET]67.215.66.132:443 This is caused by OpenDNS hijacking our *.airdns.org to one of their servers IP address, as if the domain name did not exist. 67.215.66.132 is an OpenDNS server and of course OpenVPN connection fails. You can solve this problem in two different ways: 1) Change DNS (use for example OpenNIC, http://opennicproject.org) and discard OpenDNS once and for all - after all, you might not like to use a poisoned DNS that hijacks your queries 2) Solve the problem at its roots by generating .ovpn configuration files which contain only IP addresses (and not names) in the following way: - in the Configuration Generator tick "Advanced Options" - tick "Resolved hosts in .ovpn file" - tick "All servers for area or region" Kind regards
  20. @nunz Hello! Your account is successfully connected to some VPN server since approx. 15 hours ago. You can see anytime the reason of the last failed connection in your account panel (please click "Client Area" from the upper menu). Kind regards
  21. Hello, some significant advantages of such a setup is the option to keep the whole VM encrypted when it is off, with the additional security that no unencrypted file can ever leak on the host system. These may be extremely important features in some cases (imagine an activist working in a country controlled by a human rights hostile regime). Then there are the 'usual' advantages of a VM: portability (just a file) and isolation of "disasters" in particular. The most important cons you have to consider are: more resources required from the host, slower performance of the guest system (mitigated if you have a CPU supporting hardware virtualization). However, setting up a firewall will be necessary anyway to prevent leaks in case of unexpected VPN disconnection. If the VM is connected to the host machine via NAT, the firewall settings may be simpler on the host side. If the VM is attached to a bridged network adapter, firewall rules will be necessary on the VM itself. You have also another option, i.e. connecting the host to a VPN server, and attaching the VM via NAT to the host. In this case you always need firewall rules on the host side, and all the VMs will have their traffic tunneled 'transparently'. This setup can be additionally hardened (under a security point of view) by connecting the VM itself to TOR or to another VPN, to obtain (in the VM) a multi-hop connection (traffic over VPN1 over VPN2 for example) with multiple layers of encryption at the price of a remarkable network performance decrease. Kind regards
  22. Hello! Yes, port 9150 is the default SocksPort in the TOR proxy bundled with the latest TBB versions, other packages can have the TOR proxy configured to listen to port 9050 or other ports, please check. Kind regards
  23. Hello! Can you please publish the Tunnelblick logs, taken after the problem has occurred? Kind regards
  24. Hello! By default (when you register an account) it's already off. You must specifically turn it on if you wish it. It can be useful for troubleshooting, in case of issues, or to monitor the traffic volume (for example for users on a traffic-volume-limited connection). Kind regards
×
×
  • Create New...