-
Content Count
11044 -
Joined
... -
Last visited
... -
Days Won
1867
Everything posted by Staff
-
Hello, it's the company which operates the datacenter in Zurich where Virginis is physically located. If some IP geo-location service reports it as being in Norway, it's just a geographical IP location database error (not uncommon: maintaining an IP database in good order is a difficult task). Kind regards
-
Hello, OpenVPN does not interfere in any way with the system physical interfaces (WiFi, Ethernet...) settings. The fact that the problem did not arise in one year hints to some recent configuration change in your system. Please check your firewall and antivirus, and also make sure that the DHCP client service is running. Does the problem disappear if you disconnect and re-connect to your WiFi hot-spot? Kind regards
-
How to force everything through the tunnel?
Staff replied to lightleptonparticle's topic in General & Suggestions
I think I understand now. So even though I see queries going to whatever DNS server (on ipleaks), they will always go through the VPN tunnel? Yes, the only exception is when DNS queries are sent to a destination inside your local network or to the entry-IP address of the OpenVPN server the system is connected to, in this case they will not be encrypted (see your routing table while connected to the VPN to understand why). This opens up the option (or the risk) to send out unencrypted DNS queries, for example when DNS queries are sent to your router which in turn forwards them to some other DNS server. However technically this is not a DNS leak, because the system complies to the settings (contrarily to Windows, where real DNS leaks can occur). Kind regards -
How to force everything through the tunnel?
Staff replied to lightleptonparticle's topic in General & Suggestions
Hello, simply because your system IS sending DNS queries to OpenDNS servers. Kind regards -
How to force everything through the tunnel?
Staff replied to lightleptonparticle's topic in General & Suggestions
Hello, the results show that you're tunneling DNS queries to OpenDNS (Linux has no DNS leaks). If you wish to use our DNS and you don't have resolvconf or openresolv packages installed, add 10.4.0.1 as first nameserver in your /etc/resolv.conf: nameserver 10.4.0.1 If you have one of them installed just follow the previously mentioned How-To. When you use our DNS you will get, in the DNS test of ipleak, the same VPN server exit-IP address (there's a very rare exception to this, in case of VPN server DNS failure you might get an Irish IP address, it's just a backup DNS for emergencies operated by us). Kind regards -
Yes... and here the importance of different, independent from each other peer-reviews by specialists comes into play. Such reviews are sometimes very hard or even impossible to be performed when the source code is not available. Source code of TrueCrypt is available, unfortunately latest versions of TrueCrypt are at the moment missing these reviews, as far as we know. Kind regards
-
Hello! "Routing servers" are used to re-route traffic to/from geo-restricted servers (see here: https://airvpn.org/forum/10-websites-support). Thus, routing servers are never directly accessed by our clients, they just receive and send out encrypted traffic to/from some VPN server (accessed by the client), and send/receive unencrypted or encrypted traffic to/from the geo-discriminatory service requested by the client. As an important consequence, routing servers are not subject to our legal and privacy requirements for VPN servers: those requirements are fulfilled "higher in the chain", i.e. on the VPN servers. That said, we have recorded your request and we'll work on that. For future requests, we have a dedicated forum section: https://airvpn.org/forum/28-blocked-websites-warning/ Kind regards
-
How to force everything through the tunnel?
Staff replied to lightleptonparticle's topic in General & Suggestions
Hello, you don't need to do anything like that (BUT: *). OpenVPN takes care of everything. Compare your routing table before, during and after a connection to an OpenVPN server. See also the routes pushed by our servers, look at the OpenVPN logs. (*) See here for some clarifications on DNS push in Linux: https://airvpn.org/topic/9608-how-to-accept-dns-push-on-linux-systems-with-resolvconf/ Also, it is assumed that you do not configure your client to actively reject OpenVPN servers routes push. If you do (directive route-nopull) for some very specific need, you can build your own routing table. Make sure that you know what you do in this case and proceed with caution (mistakes might crumble the anonymity layer). Kind regards -
How to force everything through the tunnel?
Staff replied to lightleptonparticle's topic in General & Suggestions
Hello NaDre, the links/pages you mentioned are probably: https://airvpn.org/forum/10-websites-support/ and https://airvpn.org/specs/ Kind regards -
How private/anonymous are you using Paypal with AirVPN?
Staff replied to user412f3ew's topic in General & Suggestions
Hello, a payment made with PayPal or credit card shows that you paid to AirVPN for a subscription, but it does not say anything about HOW of even IF you used the service. As Baraka says, many additional steps would be necessary to make relevant correlations, which would be in the ability of a very powerful adversary. If you think you must face such an adversary. you should (must) subscribe through Bitcoin or Monero. UPDATE: AirVPN accepts Bitcoin directly so you will not pass through any third party processor that might weaken significantly your privacy through KYC procedures / identification. This is the article we usually link for such a debate (it goes deeper): https://airvpn.org/topic/54-using-airvpn-over-tor/?do=findComment&comment=1745 As NaDre suggests, defeating an extraordinarily strong adversary requires extraordinarily strong discipline. Luckily encrypted traffic is, at the moment, not a preoccupation in most countries, given the widespread usage of the Internet to perform monetary transactions, VPNs used by almost every small, average and large companies, increasing number of web servers implementing https etc. etc. But it may be actually troublesome in some country. We would not recommend for example to send/receive a significant percentage of encrypted traffic (out of total traffic) in a chinese Internet cafè. In these cases, when important data must be protected and one can't afford to "trigger encryption detection", steganography is a safe solution (and also technically simple, with modern tools), at the price of a certain overhead (which in most cases can be quite remarkable). Kind regards -
Hello! nbname is the name given to port 137 in Windows system. Port 137 is used for the netbios name service. http://support.microsoft.com/kb/204279 NBName is a computer program that can be used to carry out denial-of-service attacks that can disable NetBIOS services on Windows machines. http://en.wikipedia.org/wiki/NBName See also http://forums.comodo.com/leak-testingattacksvulnerability-research/nbname-port-137-t38043.0.html Kind regards
-
Comodo Firewall's default settings
Staff replied to resettler's topic in Troubleshooting and Problems
Hello, yes, no problems. Following the guide will make removal superfluous, anyway removal will do no harm. Kind regards -
Hello, that hints to some Air client bug. If this is a major problem, can you please try a connection through OpenVPN GUI? Can you also tell use your exact Windows version? Kind regards
-
Hello, 2) It does not say anything about that (it's not a hint pointing to any direction) 3) if all packets were unroutable, connection could not even be established. If a significant percentage of packets are unroutable, connection will drop or performance will be impaired, so look at the complete logs and if you see a lot of them yes, try to change VPN server. Kind regards
-
ANSWERED Stunnel/Openvpn Reset Connection Glitch
Staff replied to tharrisone's topic in Troubleshooting and Problems
Hello, problem solved. Kind regards -
Hello, "No Route to Hosts ... Host unreachable" is a message from your TCP/IP stack issued when a packet is not routable to the wished host. A packet may be unroutable for various reasons, such as null-routing forced by your ISP or some gateway, routing loops (misconfiguration of routing in some Internet node), routing nodes failure... if you run Windows, the problem might be related also to an intermittent malfunctioning of the TCP/IP stack, normally solved with a TCP/IP stack reset ((but we're not sure: in the past years we have observed some not easily explainable Windows TCP/IP stack weird behaviors, that have in common the fact that malfunctioning is solved with a stack reset followed by a system reboot). Such problems should be momentary, and if your connection was successful it was a momentary failure. If the problem persists feel free to keep us informed, in which case please send us the complete logs. Kind regards
-
VPS and cloud services as gateways/exit nodes
Staff replied to resettler's topic in General & Suggestions
Hello, none of them. Kind regards -
TrueCrypt has been tested in real life powerful attacks and has never been defeated according to available information, remember Operation Satyagraha. http://www.theregister.co.uk/2010/06/28/brazil_banker_crypto_lock_out/ About some comments on the thread... the source code of TrueCrypt is available. You can't say it's free, given its license, but the source code is regularly available. Of course obtaining an executable file bit-by-bit identical to the distributed packages is practically impossible, but that's a different problem. Also, it is false that TrueCrypt is not currently developed. Wikipedia has an article which provides a balanced overview on TrueCrypt and includes several, important reference notes: http://en.wikipedia.org/wiki/Truecrypt#Licensing_and_Open_Source_status Kind regards
-
Hello, migration completed successfully as far as we can see. We're sorry for the inconvenience, and we are quite disappointed that a provider announces such an important procedure with just a few hours pre-warning. Kind regards
-
Hello, maybe some system process is sending a lot of data on the internal network or to the machine itself, or it is a bug. Would you be able to detect if there's any application causing the spike? Kind regards
-
Hello, it is normal, Comodo counts all the traffic on every single interface as a percentage of the global traffic on all of them. uTorrent does generate traffic, of course, on the tun interface (the virtual network card used by OpenVPN). If the uTorrent percentage were higher than the openvpn.exe percentage, then there would be something wrong: since all the traffic must be tunneled, the traffic percentage of each single process must never exceed the openvpn.exe traffic percentage (the traffic of each process is ALSO traffic for openvpn.exe). Anyway, for additional security, can you please perform this test: http://checkmytorrentip.com/ and make sure that your real IP address (the IP address assigned to you by your ISP) never shows up? Kind regards AirVPN Support Team
-
Hello, we have read that "review". We reserve the right to reply, therefore our comments follow. That's not exact. You fail to mention that iVPN is a VPN service competitor. False, Air is based in Italy as clearly stated in the Privacy Notice. False: "These data are not collected to identify, through elaboration or any other technique" has an unequivocal legal meaning in the EU. It means that personal data, including IP addresses (regardless of the debate whether an IP address is a personal data or not), are not collected at all and in any way. Therefore not only we legally state that they are not stored when a client accesses a VPN service, but we also say that they are not even sent to third-parties WHILE a client is connected to a VPN server, which is a higher privacy condition. It seems, to say the least, bizarre that a higher privacy protection policy is interpreted as a lower one. Once again, the sentence has a very precise legal meaning in the EU. The service is erogated when a client is connected, therefore when a client is disconnected the service is not erogated, ergo when a client disconnects those data are no more on the servers and the data retention period is, in the worst case, the timeout period (up to 60 seconds), in the best case 0 seconds. False. The Privacy Notice states, since three years ago: And also: This fact alone shows that iVPN either did not even read our documents, or the writer(s) voluntarily lied. Additionally, we don't need to cite ads or affiliates because: we have no ads and we don't plan to host any ad; and affiliates (if any) are totally separated from the system and can't access in any way any personal data, according to our Privacy Notice (see again above: data are not transmitted to third parties). That's true and IT MUST BE SO. We will never mention how we "respond" to laws that are outside our jurisdiction and that are therefore inapplicable, simply because we are not forced to and we MUST NOT comply (and of course we must not even "respond") to such laws. An USA Act "has jurisdiction" on the USA. We are not subject to every single law existing in the world and we will NEVER mention them as if we recognized their validity. Doing so would imply an utter incompetence on the legal field. Ironically, we would like to ask to iVPN staff why they do not state in their policy how they "respond" to every single law in the world which makes VPN business illegal. Broken English or illiterate iVPN reviewer? We recommend iVPN people to open a dictionary, for example the Webster dictionary, and search for "erogate", which means "give, lay out, provide, deal out". And about you, centerc3290=@3, why don't you actually read our Tos and Privacy Notice, instead of relying on a COMPETITOR review, spreading it as a review "from IT professionals"? Use your own brain! Kind regards