Jump to content
Not connected, Your IP: 216.73.216.91

Staff

Staff
  • Content Count

    11388
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1978

Everything posted by Staff

  1. Hello! Correct. No. It's necessary to establish a new circuit, so you had better restart the proxy, in consideration of your purpose. In particular, since you want to prevent your ISP to see that you use TOR, always "switch off" Vidalia (or any other TOR proxy) before disconnecting from the VPN, and turn it on only after the VPN connection is established. Kind regards
  2. Hello! There are no problems on the USA servers. You can check anytime the servers status on our real time servers monitor (click "Status" on the upper menu). https://airvpn.org/status Can you please send us your client connection logs? Kind regards
  3. Hello, maybe you're running Tunnelblick 3.2.8 or 3.2.9 which are not compatible with OS X 10.8.x. Feel free to send us Tunnelblick logs. Kind regards
  4. Hello, please search the forum with keywords: split traffic Kind regards
  5. Hello, the server rack has a 50 minutes power outage. Problem promptly fixed by the datacenter. Kind regards
  6. Hello! Connections to our OpenVPN servers can be either over UDP or over TCP. Any protocol from/to your system is encapsulated within UDP or TCP, according to the protocol you pick for the connection to an OpenVPN server. Please see here: https://airvpn.org/faq/udp_vs_tcp Kind regards
  7. Hello! DNS traffic is encrypted & tunneled as well. Set 10.4.0.1 as primary DNS IP address to use our VPN DNS. Check here: http://ipleak.net Kind regards
  8. Hello, it's not an artifact, and all the services you're using return the correct data. Everything is fine, this is our anti-blocking system working. Please do not publish IP addresses. Kind regards
  9. Hello! Adding a VPN server in South Korea is very problematic, however you just probably need routing to bypass geo-IP-location based blocking, can you confirm this? From https://airvpn.org/faq/locations Please note that, even if we decide to setup a routing servers in South Korea, we will need the full range of the game service domain names and/or servers IP addresses, otherwise we can't implement the bypass system. Kind regards
  10. Hello, ok. Unless you have some packet filtering tool that slows down the flow (if it's the case, just disable it), your ISP is shaping UDP traffic, and with TCP probably you're already getting the best possible performance. Kind regards
  11. @mordants Hello, about trackers, it's normal, probably you have missed this: https://airvpn.org/topic/9499-connecting-to-trackers-fails-from-different-servers/?do=findComment&comment=10370 About DNS, check for DNS leaks (if you run Windows). Kind regards
  12. Hello, getting higher performance with TCP instead of UDP strongly suggests that your ISP is performing port shaping. However your tests are not reliable, so maybe there's a bias from them. Kind regards
  13. Hello, have you tested different servers (only 1 Gbit/s servers: 100 Mbit/s servers will probably never give you higher performance than the one you report)? How do you perform the speed test? With such a bandwidth, a short-in-time speed test is not reliable. Prefer UDP, if your ISP does not cap UDP traffic. Kind regards
  14. Hi, yes, you can! All you need is the hash. If you have destroyed the magnet link as well, just re-create it with the hash. Kind regards By re-create it do you mean be sure that I have exactly all of the same files in place and use the same piece size so that the torrent I create from scratch has the same hash? I believe I read somewhere that the hash will come out the same under these circumsutances. But I have never tried it myself. Hello! Correct. If you have modified the files you can't get the same hash (hash collisions are very unlikely - otherwise the p2p infrastructure might be easily poisoned to the point to collapse), and the files can't be seeded again as before, trackers or not (trackers are irrelevant even in this case). They will be seeded according to the new hash, therefore with a new magnet link (which can specify or not trackers) or a new torrent file. Kind regards
  15. Hello, block circumvention should now work on all US servers and all NL servers. We have scheduled to check Herculis. Kind regards
  16. Hello, please continue to report, if you wish, blocked trackers (exact url) on specific servers. Kind regards
  17. Hi, yes, you can! All you need is the hash. If you have destroyed the magnet link as well, just re-create it with the hash. Kind regards
  18. Hello! It's worth that you try OpenVPN over SSH, and OpenVPN over SSL. https://airvpn.org/ssh https://airvpn.org/ssl Kind regards
  19. @flexon11 Is there any correlation with bigfish9 report? Kind regards
  20. Hello, thank you very much for the report. Have you also tried port 53 UDP? Kind regards
  21. Hello, sure, you have already the solution under your eyes. Up & down directives in .ovpn files can be used to execute a script. Write your own script for "up" which adds nameserver 10.4.0.1 in head, and a "down" script which removes (comment) it. Or modify properly the update-resolv-conf. Or... well, there are probably so many ways to do it. Kind regards
  22. Hello! Currently the choice is random. We are working to implement a system which will select dynamically the best available server for regions according to the result of a formula based on definite parameters. You will have more details in the future. Kind regards
  23. Hello! The blue bars show the total portion of currently exploited bandwidth of each server (updated every 60 seconds). The numbers you refer to are exploited bandwidth/total available bandwidth Kind regards
  24. Hello, put in /etc/resolvconf/resolv.conf.d/head 10.4.0.1 as first nameserver, and your internal nameserver after it, for example nameserver 10.4.0.1 nameserver Kind regards
  25. Hello! 1) No. 2) It's impossible to answer definitely: there are just too many unknown factors. Feel free to ask for a trial and test. 3) Very very consistent. The general availability of the service was 99.8% in 2012. On top of that most of the 0.2% downtime (a total of ~16 hours out of ~8760) was related to the web site accessibility, not to the VPN servers. 2013 is currently going slightly worse (99.6%) but that's due to some massive system changes we performed and some initial problems related to the new clustered database, so it can be reasonably expected that the uptime in the second semester will be as high as in 2012. Kind regards
×
×
  • Create New...