Jump to content
Not connected, Your IP: 216.73.216.62

Staff

Staff
  • Content Count

    11396
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1982

Everything posted by Staff

  1. @fasi72 Hello, there's no attachment in your message, can you please try again? Also, what is your OS, and which server are you trying to connect over SSH? Kind regards
  2. Hello! That's interesting, we have not done anything in the last days about trackers. From which server(s) have you noticed that the mentioned trackers are only intermittently reachable? Anyway, as a side question, why do you need public trackers? They are not only useless (thanks to DHT+PEX) but also harmful. Kind regards
  3. Hello! Bitcoin is important for a variety of reasons. First, as you correctly note, to add an important anonymity layer, provided that the Bitcoin payment is supported by connections to the VPN servers performed over OpenVPN over a proxy or over TOR etc (and the Bitcoin transaction itself is performed behind TOR). Second, Bitcoin provides a really global transaction exchange system for anyone with Internet access: there are several countries from which it is very hard, and sometimes impossible, to deliver a payment abroad in foreign currency via credit cards, bank transfers or any payment processor (including PayPal). There are also countries where it is almost impossible to have one of the credit cards commonly accepted in western countries. Last but not least, there may be cases in some countries when, even if you are theoretically free to do so, and where privacy is recognized as a fundamental right, you don't want anyway to let anybody know that you purchase a foreign service aimed to privacy enhancement. Yes, we do, otherwise we could not grant any refund (but these data are not kept neither in VPN servers, nor in the web site servers, this is important). Our "no questions asked" refund policy has been with us since AirVPN birth and will not go away. Anyway, remember that transactions data remain (and are not deletable) both on your and our PP accounts, just like for any transaction performed through a bank or financial institution, so you're just right, the list could be obtained simply through a proper request to PP. No value at all in a perfect world, you are right, since using a VPN service is perfectly legal (exception: in Iran only authorized and registered VPN services are legal), but we don't live in a perfect world, even if we did not consider the aforementioned exceptions. Kind regards
  4. Hello! Yes, in most cases it will be faster. Additionally you will have no protocol limitations like in TOR. However, it's not as secure as TOR over VPN, or VPN over TOR. As usual, it depends on the balance between security and performance that you want to achieve. Such balance can be correctly evaluated only by yourself, carefully, according to the sensitiveness of the data you need to receive or impart. Probably the easiest way to connect over a VPN over a VPN is through a VM attached via NAT (important!) to the host machine. The host connects to VPN1. The VM connects to VPN2. On the VM all the traffic will be tunneled over VPN2 over VPN1. This solution has also some nice side-effects, the usual advantages of running a VM: disasters and attacks isolation, portability, option to keep the virtual disk encrypted with the assurance that no unencrypted data can be written without your knowledge outside the virtual machine disk. Kind regards
  5. Hello, please have a look at the servers monitor (click "Status" from the upper menu), direct link https://airvpn.org/status As you have seen, databases about IP geo-location are inaccurate: 3 different databases return three different answers for the same IP address. Kind regards
  6. Hello! The problem is caused by OpenDNS: Oct 5 23:59:00 kaytsai nm-openvpn[4570]: UDPv4 link remote: [AF_INET]67.215.66.132:443 67.215.66.132 is the server IP address to which OpenDNS hijacks our *.airdns.org names, as if they did not exist. Please see here for more information and quick solutions: https://airvpn.org/topic/10000-connection-timeout/?do=findComment&comment=12480 Kind regards
  7. Hello! Please try to re-generate the .ovpn files in the following way: - tick "Advanced Options" - tick "Resolved hosts in .ovpn file" - tick "All servers for area or region" Additionally, should you prefer to separate certificates and key from .ovpn file (not required bv openvpn-connect app anyway) tick "Separate certs/keys from .ovpn file" too. The updated instructions for Android devices (with Android 4 or higher) are here: https://airvpn.org/android Kind regards
  8. Hello! Thank you gigan3rd! We will probably put the guide in the How-To forums section or in the "Enter" instructions page after some testing, however at the moment the Air staff does not own any Fritz!Box router. Any feedback from Fritz!Box users will be very much appreciated. Kind regards
  9. Hello! The 10.4.26.114 was the VPN IP address DHCP-assigned to your system tun interface (the virtual network card used by OpenVPN). To prevent DNS leaks, this is probably the simplest and quickest approach (in the first half of the post): https://airvpn.org/topic/9289-dns-leaks-and-how-to-fix-them/?do=findComment&comment=11603 If in doubt, please do not hesitate to send us your "ipconfig /all" output. Kind regards
  10. Hello! About OpenVPN over SSH, our servers listen to ports 22, 53 and 80 of the entry-IP address, and to port 22 of the Alternative Entry-IP address. About OpenVPN over SSL, our servers listen to port 443 of the entry-IP address. About OpenVPN "direct" or "over a proxy", our servers listen to ports 53, 80 and 443 both of the Entry-IP and the Alternative Entry-IP address. In Comodo, for OpenVPN over SSH/SSL you need, on top of the rules described in our guide for Comodo to prevent lekas, to allow communications from "Any IP Address" to 10.50.0.0/255.255.0.0 and from 10.50.0.0/255.255.0.0 to "Any IP Address" (Comodo will display "Any IP address" as "MAC Any" in the rules). There is no generally valid recommendation about which port to choose: if your ISP performs port shaping on some ports, some ports can provide better performance than others. Keep in mind that OpenVPN over SSH or over SSL should be used ONLY if your ISP disrupts OpenVPN communications, because the additional SSH/SSL tunnel causes a performance hit without increasing security. OpenVPN over SSH/SSL have been implemented originally for China only, where OpenVPN connections are disrupted. The purpose of SSH/SSL is to encrypt the OpenVPN typical fingerprint, not to increase significantly the security. There is no such a thing as a non-tunneled connection in our service, unless you explicitly decide to reject the pushed routes by our servers. Kind regards
  11. Hello! It seems that your system is not tunneling traffic. Can you please send us the OpenVPN logs? Kind regards
  12. Hello! No, it's closed source (but your are not forced to use it: you can run OpenVPN directly or any OpenVPN wrapper/GUI you wish in order to connect to the Air VPN servers). The next client release, "Eddie", will be free and open source (very probably under GPLv3). Kind regards
  13. Hello! Can you please specify which NL servers at your convenience? We have tested them and everything seems fine with schneier.com resolving correctly into 204.11.246.48 Kind regards
  14. Hello! Assuming that the tun module has not been radically removed, please try to re-load/re-activate it. Please see here: http://superuser.com/questions/497245/how-to-load-tun-module-in-linux Kind regards
  15. Staff

    NSA

    Hello, already discussed in several different threads, moved to off-topic. Kind regards
  16. Hello! Please check your firewall, usually error 111 (assuming that your p2p client is running while the test is performed, of course) suggests a firewall problem. Kind regards
  17. Hello! It might be related to this: https://airvpn.org/topic/10000-connection-timeout/?do=findComment&comment=12480 If not, can you please publish the complete Tunnelblick logs taken after the problem occurred? Kind regards
  18. Hello, you have published this script 7 times in different threads. Now it's enough, thank you. Kind regards
  19. Hello! Yes. Our Configuration Generator is a friendly web interface that allows you to generate configuration files (and key and certificates) according to your preferences. OpenVPN or any compatible OpenVPN wrapper, including Viscosity, can be used with those files to connect to our service. Kind regards
  20. So OPENVPN will update it every 60min even if i don't disconnect from the VPN? or does it only do it when i reconnect? Hello, the re-keying occurs every 60 minutes as well. Kind regards
  21. Hello, first of all, please make sure that the Minecraft server listens to the correct interface and port and check your firewall. Do you have any additional information, in particular have you tested that packets reach your system from the Internet (you can do that for example with our PortListener)? Kind regards
  22. Hello, we'll be working on that. Reasons for which trackers administrator blacklist entire datacenters may also be "good" (mitigation of torrent poisoning, for example). We kindly remind you, anyway, that you should use DHT. We have gathered a remarkable amount of evidence that proves that, nowadays, trackers are harmful, because it's easy to quickly announce multiple, fake IP addresses and ports on hundreds of trackers, and because © trolls fabricate notices based on trackers IP harvesting. Kind regards
  23. Hello! Please click "Enter" from the upper menu of the web site, then click on the Linux icon, and read the 3rd and 4th point of the bulleted list. We can read: Select "Advanced Options"Tick "Separate certs/keys from .ovpn files" Kind regards
  24. Hello! We have currently no plans to offer different types of encryption. TLS re-keying (Diffie-Hellman) is by default performed at each new connection AND every 60 minutes by default. You can lower this time, but you can not increase it, on the client side (please see OpenVPN manual). Kind regards
  25. Hello! It seems that your local proxy is either not running or not listening to port 9150, can you please check? Which proxy is it... is it TOR? Kind regards
×
×
  • Create New...