-
Content Count
11392 -
Joined
... -
Last visited
... -
Days Won
1982
Everything posted by Staff
-
Hello! We're very glad to inform you that two new 1 Gbit/s servers located in Virginia, USA, are available: Electra and Kuma. The AirVPN client will show automatically the new servers, while if you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 2018 UDP and TCP. Just like every other Air server, Electra and Kuma support OpenVPN over SSL and OpenVPN over SSH. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
-
Slow AirVPN Speeds (0.50MB/s Down or less)
Staff replied to Samad's topic in Troubleshooting and Problems
Hello, performance improved probably because your ISP performs traffic shaping on a port/protocol-basis or deprioritizes certain packets. UDP traffic to port 53 is less likely to be capped or deprioritized because it is normally made of DNS queries. Anyway, what you experience is a hint of possible illegal behavior from your ISP, IF you live in the EU and you have not been informed in a clear, comprehensive and understandable way in the contract about limitations on services and protocols (when such limitations are allowed by national and Community laws). Please see Directive 2009/136/EC (amending directive 2002/22/EC article 20): 14) Articles 20 to 23 shall be replaced by the following: ‘Article 20 Contracts 1. Member States shall ensure that, when subscribing to services providing connection to a public communications network and/or publicly available electronic communications services, consumers, and other end-users so requesting, have a right to a contract with an undertaking or undertakings providing such connection and/or services. The contract shall specify in a clear, comprehensive and easily accessible form at least: [...] — information on any other conditions limiting access to and/or use of services and applications, where such conditions are permitted under national law in accordance with Community law, [...] — information on any procedures put in place by the undertaking to measure and shape traffic so as to avoid filling or overfilling a network link, and infor mation on how those procedures could impact on service quality, Kind regards -
Hello, just an additional note to the above: in checkmytorrentip, from our USA servers, you will see a different IP address, because the traffic is re-routed (this is performed to bypass a lot of trackers problems we were made aware of in the past, so for consistency the traffic is re-routed even to the checkmytorrentip address). Just make sure that your real IP address never comes out in the test. Kind regards
-
Erratic UDP or TCP that max's out at 8Mbit ??
Staff replied to Runin's topic in Troubleshooting and Problems
Hello! Generally not. Please see https://airvpn.org/faq/udp_vs_tcp Since you report that you have erratic perfomance, we can rule out ISP traffic shaping. Logs taken after a couple of hours of a connection could help to determine whether the problem is caused by packet loss and/or packet fragmentation (in which case it is possible to intervene) or not. Also, this behavior (performance with wide oscillations) is typically experienced in low-signal WiFi connections and high latency connections, such as satellite connections. The recommended server is the server with the highest rating determined as the outcome of a formula which includes parameters such as available bandwidth, server status, server packet loss to/from all the other Air nodes, latency to/from all the other Air nodes. Kind regards -
Slow AirVPN Speeds (0.50MB/s Down or less)
Staff replied to Samad's topic in Troubleshooting and Problems
Hello! Given that you experienced lower performance suddenly, and that the available bandwidth and the overall performance of our service increased very much recently, maybe your ISP started traffic shaping. Have you tried to connect to different VPN servers ports? If not, please test port 53 (UDP) to begin with. Kind regards -
Hello, the MTU size looks wrong. Please make sure that you pasted certificates and key properly and that cipher suites are correct. If in doubt please feel free to open a ticket including a screenshot of your OpenVPN client configuration page. Kind regards
-
Hello, however it does seem a problem of date: in 1970 the certificates were not valid. Anyway the full logs can be more helpful. Kind regards
-
Hello, yes, it is working. Please note that your account, lacking a subscription, is not authorized to access the CG. Kind regards
-
still have damn dns leak aaaarrggghhhh
Staff replied to Kubr1ck's topic in Troubleshooting and Problems
Hello, there is no such leak "from OpenVPN", or "from an OpenVPN client", they have nothing to do with anything of that. "DNS leaks" are a direct consequence of Windows buggy DNS implementation and lack of concept of global DNS. Kind regards -
Singapore servers are extremely slow!!!!
Staff replied to SaveSnowden's topic in Troubleshooting and Problems
Hello, we do not detect any problem on Singapore servers. Kind regards -
Hello, we are aware that the Configuration Generator is not working properly and we are working to restore it. We apologize for the inconvenience. We will keep you updated on this thread. EDIT: problem fixed. Kind regards
-
Hello! That's because we thought to leave that task to the server DNS push, that your client is free to accept or not (well, in Windows the DNS push is accepted by default, in Linux and *BSD it's not considered by default), but that's a good idea anyway, thank you. Kind regards
-
Hello, it's extremely trivial for a web server or a p2p client. The attacker just sends packets to the same port both to your ISP assigned IP address and to the VPN server exit-IP address and compares the result. If the victim service replies to packets on both the IP addresses (because the same inbound router port is open) and those replies are consistent (as they are, obviously) both in timing and content, then the attacker have a proof (usable in courts but also useful to criminal organizations etc.) that that service is run by you. No: the first attack condition is already that the attacker is wiretapping your line. If the service does not reply to packets to your real IP addres, no correlation proof is possible and the attack fails: it is not possible to prove that a certain service is run by you. The primary point is exactly to defeat those who are wiretapping your line. However, as a secondary but not less important point, there are more subtle attacks which allow an attacker to establish correlations even if that attacker is unable to monitor your ISP line. All of these attacks are possible only with the misconfiguration of your system, as already said over and over. Kind regards
-
Hello, no, totally false. The real risk is much higher. As it has been already explained, the exploit can be performed when the system is properly connected to a VPN server and properly tunneling. The consequences of the attack are that your real IP address is discovered and all the p2p activities or the activities of the service behind the VPN server are related to your REAL IP address. In order to avoid that, do NOT forward ports on your router, or at least close those ports on your physical network interface with a properly configured firewall, or bind the service to the tun/tap interface (but not all services can be bound to a specific interface). Be careful, this is NOT a fault or a problem of OpenVPN, this is a deliberate vulnerability that you voluntarily insert into your system: your system just complies to your orders and OpenVPN can't protect you against your own behavior. Kind regards
-
Hello, you're right, there's some confusion about it. The tutorial is correct but not entirely: some builds must be configured in that way, although TLS-Auth is "None" in our service. But if you set "None" on those builds, OpenVPN will inexplicably fail to maintain a stable connection, as if some different TLS-Auth parameter is passed to OpenVPN. We see that newest builds work just fine with the correct setting. On yet some other builds, the setting must be forced in the nvram (with a simple command). Usually this is not needed, we have met this necessity only on very old builds. So, please try to set it to "None". If it fails again, feel free to write back and we'll show how to set the proper setting directly, by bypassing the interface. Kind regards
-
Hello, tray icons are usually on the taskbar (the same bar where you can see the "Start" or Windows logo button). The Air client tray icon is a white cloud on a gray (or blue, if connected) sky. If the Air client tray icon is not there, expand the tray icons section by clicking the arrow symbol. If it's still not there, then the Air client is probably not running. Kind regards
-
@pxmjd Hello, be patient, we'll make an announcement soon. We are aware that Eddie development is terribly late with delay after delay since the announcement in April 2013, and we're working to fix the situation. In the meantime, please spend 10 seconds of your time to 'fix' the flawed DNS implementation in Windows (if you run Windows). Kind regards
-
Hello, we do not provide a SOCKS proxy in our service but you can connect OpenVPN over any SOCKS or http proxy. See here for an example: https://airvpn.org/tor If you need to connect an external proxy over OpenVPN, then you don't need anything special, just connect to a VPN server, then "proxify" the applications whose traffic you want to be tunneled over AirVPN over a proxy. On the contrary, if you wish OpenVPN to connect over a proxy, then you need to configure OpenVPN to connect over that proxy according to the aforementioned example. Kind regards
-
Hello, please enable the TUN/TAP adapter (the interface used by OpenVPN) in the Control Panel and make sure that you run only one instance of OpenVPN. The interface name is "TAP-Win32 Adapter ...". See also here: https://airvpn.org/topic/9988-airvpn-failed-to-start/?do=findComment&comment=13089 Kind regards
-
Hello, certificates and key are embedded in the .ovpn files. From the error message, maybe you're making some mistake during the installation of the .ovpn file. Can you please try the classical old, safe method according to the instructions? For example create a folder on the Destkop (example: "blabla"), paste one (and only one) .ovpn file inside it, rename the folder with a ".tblk" extension (so it becomes "blabla.tblk") and double click on the folder icon. Kind regards