Jump to content
Not connected, Your IP: 18.222.239.77

Staff

Staff
  • Content Count

    10632
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1774

Everything posted by Staff

  1. Hello! Thank you! Please see here: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=3405&Itemid=142 Kind regards
  2. Hello! Which client are you running? Kind regards
  3. Hello! Thank you for your warning. Apparently novo-ordo is blocking our German servers. We will try to bypass the block. In the meantime you can access the web site from our non-DE servers. Kind regards
  4. Hello! The TAP-Win32 adapter is the tun/tap virtual network interface used by OpenVPN. Without it OpenVPN can't work. The problem is that there are no TAP-Win32 adapters on your system. Maybe something went wrong during the installation. Try to add an adapter as suggested in the above quoted piece of your logs (the utility to add it is inside ..."OpenVPN"->"Utilities"). If the operation fails probably the adapter driver has not been installed properly. In this case, please uninstall OpenVPN completely and re-install it, making sure to authorize the installation of any driver. Kind regards
  5. Hello! Yes, that's correct, you have no DNS leaks. On dnsleaktest.com you should just get the server exit-IP address because we dropped Google DNS completely earlier this day. Kind regards
  6. Hello! Since a few hours ago, we have completely dropped Google DNS. You are of course free to use Google DNS or any other public DNS if you wish so. Every VPN server has its DNS server, directly finds out information about the root servers, top level domains and authoritative name servers. Our DNS servers are neutral, do not ever inject or alter the requests (other services resolve to search results, try to fix typos etc). Where ICANN or root servers themselves interfer with censorship, we may apply specific censorship fix to our DNS server. See "AirVPN does not recognize ICANN authority anymore" topic for more information: https://airvpn.org/index.php?option=com_kunena&func=view&id=852&catid=3&Itemid=142 Using our DNS allows our customers to use Air anti-geolocation discrimination features. For example, visiting a website that allows only United States connections from a Netherlands VPN server. It's recommended to use our DNS server to avoid censorship and use our anti geo-IP based discriminations features. Kind regards
  7. Hello! The name of the file is: hosts Please note that it has no extension, so in Notepad make sure that you select "All files" (otherwise it will filter *.txt files and you will not see it). The file on standard Windows installation is inside the following directory: C:\Windows\system32\drivers\etc If you have still issues try to open a command prompt with administrator privileges and type: notepad C:\Windows\system32\drivers\etc\hosts (press ENTER key at the end of the line) Kind regards
  8. Hello! Please send us the documentation required in the "Prevent leaks with Windows & Comodo" thread for troubleshooting. Please send us also the Air client connection logs after a failed connection attempt. Kind regards
  9. @drewwheelerosman Hello! From the second post you published everything seems fine. Can you also send us the output of ping google.com as usual while you are connected to the VPN. Kind regards
  10. Hello! As you prefer. Using our DNS will give you the following advantages: - access to internal services (currently only http://speedtest.air) - ICE censorship bypass - access to our experimental service aimed to bypass IP-based geo-location discriminations (for example you can watch BBC iPlayer from non-UK servers and access CBS and Pandora from non-USA servers) In most cases it's not a reason for concern, but if you exchange sensitive, "critical" information (for example if you are a whistleblower, or you live in a human rights hostile country) you should disconnect as soon as the critical information have been imparted or received. This attention is not necessary if you connect over OpenVPN over TOR. Which proxy server? Kind regards
  11. Hello! In the first part of the logs apparently something was blocking UDP packets, but after that the logs show no problems at all. Let's see if it's a DNS problem. Please open a command prompt or the PowerShell, issue the following commands and send us the output: ping 10.4.0.1 ping airvpn.org ping 8.8.8.8 Kind regards
  12. Hello! Please right-click on the Air client dock icon, select "Logs" and click on "Copy to clipboard", finally paste here. Kind regards
  13. Hello! Your account is successfully connected to another server, can you confirm that you could manage to connect properly? Kind regards
  14. Hello! Can you please send us your client logs? What is your OS? Kind regards
  15. Hello! No, they are single IP addresses (each server has one entry-IP address), so pick add single IP addresses for that network zone. In this case yes, they are necessary. To add the lines to the hosts file launch a text editor (for example notepad) with administrator privileges, load the hosts file, add the lines and save the file. The file on standard Windows installation is inside the following directory: C:\Windows\system32\drivers\etc Yes, they are necessary. Correct, although it does not really matter what DNS you put in your physical network card, because any query from that card will be blocked by Comodo. Anyway you might like to put your favorite DNS in your physical network card so that you can regain full Internet connectivity when disconnected from the VPN if you decide to disable Comodo rules (just in case you need to connect to the Internet without VPN). Kind regards
  16. Hello! Sure: you can see our guide linked in announcement section of the forum. Direct link: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=3405&Itemid=142 Kind regards
  17. Hello! Presumably this is what happens: - the Google servers are showed for DNS queries inside the tunnel - the Comodo servers are showed for DNS queries both inside and outside the tunnel Therefore the DNS leak test in this case does not provide a clear result because you can't discern queries sent to Comodo DNS within the tunnel from those sent to Comodo outside the tunnel. After a very long discussion and evaluation, we have taken the decision to drop Google DNS. There will be no noticeable performance impact to our customers on DNS resolution and the DNS leak tests will give a much clearer response. The change is expected to take place within one week. Kind regards
  18. Hello! It's totally normal. In order to understand which DNS server you're using to resolve names, dnsleaktest.com needs to operate its own DNS server through which it monitors which DNS server the requests to randomly-generated subdomains (transmitted to your browser) of their own domain come from. As a consequence, your system will repeatedly query your configured DNS (to resolve such subdomain names) servers which in turn send the request to the most convenient DNS server of their infrastructure (which may vary from second to second). Kind regards
  19. Hello! Presumably this is what happens: - the Google servers are showed for DNS queries inside the tunnel - the Comodo servers are showed for DNS queries both inside and outside the tunnel Therefore the DNS leak test in this case does not provide a clear result because you can't discern queries sent to Comodo DNS within the tunnel from those sent to Comodo outside the tunnel. After a very long discussion and evaluation, we have taken the decision to drop Google DNS. There will be no noticeable performance impact to our customers on DNS resolution and the DNS leak tests will give a much clearer response. The change is expected to take place within one week. Kind regards
  20. Hello! Can you please send us the client logs just after you get that error? Kind regards
  21. Hello! It means all the ports which OpenVPN in our servers listen to: 53 UDP and TCP, 80 UDP and TCP, 443 UDP and TCP. Kind regards
  22. Hello! No, it's not there (no tls-auth required). Leave it blank, just fill the server certificate, the client key and the client certificate. (EDIT: since 13 Apr 2014, TLS Auth has been introduced) Kind regards
  23. Hello! If Gargoyle OpenVPN reads the OpenVPN configuration files, all those directives are included in the configuration file. If the router web interface lacks such options, you'll have to convince OpenVPN to read and parse the configuration file. Probably Gargoyle forums can support you in a more effective way. According to gargoyle-router.com admins, Gargoyle supports fully OpenVPN configuration files. Kind regards
  24. Hello! You don't need to read the whole thread... only this post: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=1713&limit=6&limitstart=42&Itemid=142#2756 We strongly recommend that you spend a couple of minutes to read the welcome e-mail and the FAQ. Besides sending an e-mail to everybody at the subscription explaining all the points to use our service at best (including how to prevent leaks in case of unexpected VPN disconnection), with relevant links, publishing FAQ which focus also on the issue of preventing leaks in case of unexpected VPN disconnection, keeping a forum open to everyone (although moderated to prevent spam and trolling), putting permanent links on how to prevent leaks in the announcement section and answering ten thousand times to the same ten thousand identical questions... no, we have not planned anything else to make you aware that a VPN connection can drop unexpectedly just like any packet switching based connection. Humor mode suffered by this admin tonight apart, please do not hesitate to contact us for any further information or support. Kind regards
  25. Hello! Gargoyle parses correctly .ovpn OpenVPN configuration files. Unsure whether it has issues in supporting embedded files, probably not, anyway you can generate non-embedded files (just untick the "Embed..." option in the configuration generator). Kind regards
×
×
  • Create New...