Jump to content
Not connected, Your IP: 216.73.216.40

Staff

Staff
  • Content Count

    11483
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    2020

Everything posted by Staff

  1. Hello! Persei is in Fremont (California). We do not detect any latency problem at the moment, hopefully it was just a momentary problem from your node. See also the Ping Matrix: https://airvpn.org/pingmatrix Kind regards
  2. Hello! Those addresses are DNS servers from Verizon. In order to change OS X DNS please see for example here: http://www.howtogeek.com/howto/38793/how-to-switch-mac-os-x-to-use-opendns-or-google-dns/ Kind regards
  3. Hello, it is available, perhaps you missed the FAQ. Kind regards
  4. Hello, not that it really increases or lowers security in every circumstance, anyway the answer is yes. Kind regards
  5. @retiredpilot In your case (TOR usage raising alerts), TOR over OpenVPN might be a perfectly acceptable solution: our servers would come to know your real IP address, but our servers (and therefore any malignant entity that could have the power to fully monitor the server you're connected to) would know nothing about your traffic content, real origin, real destinations and real protocols (assuming that that malignant entity does not control, in addition to the server, even the relevant portions of the TOR network: extremely unlikely anyway). Your country would not see TOR usage from your node. Of course there is a major limitation, you can't use UDP over TOR. Evaluate this possible solution, only you can decide if it's ok or not. Kind regards
  6. @csc106 Hello! Following hints by ZPKZ, can you please try to delete file: C:\Users\******\AppData\Roaming\AirVPN\Air\1.0.0.0\AirVPN.xml It's the Air client configuration file. When you re-start the Air client, it will re-create the file (you will have to enter again your login name). If that file is somehow corrupt, deleting it will solve the problem. Kind regards
  7. Hello! Does it happen with every and each Air server? Kind regards
  8. Hello! Apparently the Air client passes to OpenVPN a wrong remote address (localhost) or does not pass any parameter at all. Can you please try again with any antivirus or similar program disabled? When you "login" with the Air client, does it show the correct servers list? Can you please check that "Proxy" settings in client "Preferences" are set to "None"? Kind regards
  9. Hello, probably it's true that "balls of steel are needed to run a TOR exit-node". You must be ready to take into account necessity of legal fights and potential, serious annoyances if you really wish to help TOR with an exit-node. The following links show some of the bad things that happened to TOR exit-node operators (essentially due to "authorities" lack of understanding of how TOR works and general incompetence): https://lists.torproject.org/pipermail/tor-talk/2009-September/019511.html http://www.techdirt.com/articles/20121130/07495221185/tor-exit-node-operator-charged-with-distributing-child-porn.shtml etc. On the other hand, we have never seen a telecom operator general manager charged with similar accusations, when "abuses" and "infringements" probably occur much more frequently on any telco network than on the whole TOR infrastructure. That said, please read the Tor Project recommendations to run a TOR exit-node: https://blog.torproject.org/running-exit-node Kind regards
  10. @Royee You don't see anything outside Windows because DNS leaks occur on Windows only. In the "How-To" section of the forum you can find various guides to prevent any leak on systems running iptables. Kind regards
  11. Hello! No collisions are possible: when the system reserves a port to your account, you can rest assured that you don't need to worry about that. We have investigated the issue and one of your forwarded port is totally blocked by the system on some servers. This is due to very particular circumstances: either an attack against our servers toward that port has been detected by the server or activity that infringes our Terms of Service to that/those IP:port has been reported to us. In both cases momentary port blocking/packets dropping is essential to protect our system without infringing customer's privacy. Thank you for your understanding. For any further information and/or for your problem with the Air client please open a ticket at your convenience. Kind regards
  12. Hello! We confirm you that you should NOT forward ports on your router. That would potentially expose your system to correlation attacks. Kind regards
  13. @itsmeprivately Hello, it's just a matter of automatic triggers (when they are possible to implement) to be decided on a case by case basis. Kind regards
  14. Hello, as you have correctly noticed, Cygni load has been more or less constant during last days. Such extreme performance differences are usually due to network congestion, from your ISP or anywhere between your node and our node, or (but in this case you would be warned on the servers monitor and we confirm you that Cygni has had no problems) to some server malfunctioning (typical example: packet loss) or attack against the server itself. Check the servers monitor https://airvpn.org/status and the Ping Matrix https://airvpn.org/pingmatrix to have an overview of the servers. Do not hesitate to switch server to perform a comparison. Also, you might like to have a look at your OpenVPN logs to check whether there's some intermittent problem (such as packet loss, or packet fragmentation). If in doubt, do not hesitate to send us a copy of the logs, taken while the problem is occurring. Kind regards
  15. Hello, can you please perform a test with our PortListener available here: https://airvpn.org/topic/9315-port-forwarding-tester/ and report the results? Please set the PortListener to listen to your VPN IP address (10.x.x.x) on your remotely forwarded port, then log in the web site, go to your ports panel and start a test for that port (and also for some other port, for a more extensive test). Look at the PortListener and check whether any incoming packet is detected or not. Kind regards
  16. Hello! Theoretically, very few kbit/s would be sufficient to maintain the tunnel active. From the logs, it seems that periodically the bandwidth goes to 0 (see activity timeout lines) and therefore the connection is lost. Maybe there are "dropouts" in Starbuck connection? Kind regards
  17. Hello, your system is resolving europe.vpn.airdns.org to 67.215.66.132, which is not an entry-IP address of any of our VPN servers. In fact, it is an OpenDNS server IP address (OpenDNS is in no way related to AirVPN, of course). So Tunnelblick tries to establish a connection to... an OpenDNS server, which obviously fails. We can't say why it happens, can you please check your hosts file? Which DNS servers is your system using? Could you please open a command line and type ping europe.vpn.airdns.org and send us the output of the command? As an immediate solution, you can re-generate your configuration file(s) ticking, on the Configuration Generator, "Advanced Options", and then ticking both "Resolved hosts in .ovpn file" and "All servers for area or region", so that the generated file will contain only IP addresses and not host names. It would be anyway very interesting to investigate on the issue, so do not hesitate to reply if you wish so. Kind regards
  18. Hello! Yes, to our frontend, not to the VPN servers. It's an ordinary https connection like a web site login. The Proxy option of the Air client is meant for OpenVPN, not for the client (remember that the client is an OpenVPN wrapper). If you don't want to disclose your IP address to the frontend server, just run OpenVPN directly (or OpenVPN GUI). We don't force (and we will never force) to run any proprietary software to connect to the VPN servers. Kind regards
  19. Read this : https://airvpn.org/topic/891-important-notice-about-security/?do=findComment&comment=11718 OpenVPN is nice and gives you the option to run OpenVPN over TOR, your real IP address is not communicated to any VPN server unlike with the AirVPN client which will. Hello, no, the Air client itself does not connect to a VPN server, so it does not "communicate" anything to a VPN server. Kind regards
  20. Hello, that's correct: if you run a program configured to connect over the TOR proxy, its traffic will be tunneled over TOR only. When you wish traffic over OpenVPN over TOR you must run programs NOT configured to connect to TOR. Kind regards
  21. @janern We are not removing the link because it gives us the option to talk about an important security issue. With our service, you don't even have to create manually a file. Our Configuration Generator will generate all the files needed by OpenVPN. Make sure to tick "Advanced Mode", and then tick "Separate certs/keys from .ovpn file". Unfortunately, the instructions you linked talk only about a ca certificate, as if the Astrill authentication method is based only on that (with, optionally, login and password, which would be even worse). That's really a very bad way to build a secure & trusted VPN. Our authentication method is based on client certificate, server certificate and client key, with TLS re-keying at each connection and every 60 minutes (Perfect Forward Secrecy). No VPN server keeps any database of login names, passwords, user names or anything else. This is the correct way to provide a higher security service with OpenVPN. It is so obvious that we are astonished that you even compare a service without the aforementioned features with AirVPN. Since security and strength of the anonymity layer are one of our highest priorities, we're sure you'll understand our decision to never compromise the system to meet the needs of devices that do not implement all the OpenVPN features (IF it's your case, of course), even if that would mean to have some gullible customers that with the current system we can't have. If some services meet your need and our service does not because it provides a much higher security level, it's unfair to blame us, and not only in consideration of the fact that we clearly list all the systems that are compatible with our service. You should blame VPN providers and manufacturers that do not offer the better security options. We see that you have already asked for a refund and that the refund has been granted, so you are free to pick the service that you prefer. If you think that security is not of your concern, there are literally hundreds of low security, low privacy VPN services on the Internet that you can use. Our service will not compromise security and/or privacy for marketing reasons. Kind regards
  22. There are a few decrypter tools for Truecrypt, even commercial ones like from Elcomsoft. I would rather take my hands of Truecrypt or Bitlocker if we're talking about security. Hello, can you please elaborate? Kind regards
  23. Hello, glad to know it, enjoy the service! Just for information and reference, you don't need to rename the .ovpn files if you declare them explicitly. Kind regards
  24. Hello, the instructions for Linux do not require an OpenVPN GUI or wrapper, and do not require any desktop manager or any graphical environment. Please follow the instructions for Linux, ignore instructions for network-manager. Kind regards
  25. Hello, it's because your account is already connected to another server (maybe from another device?). You can check anytime the reason of the last connection failure in your "Client Area" on the web site. Kind regards
×
×
  • Create New...