Jump to content
Not connected, Your IP: 3.238.88.35

Staff

Staff
  • Content Count

    8894
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1285

Everything posted by Staff

  1. Hello! Can you please describe which options you pick (server, port, proxy), so that we can reproduce the error? We're looking forward to hearing from you. Kind regards
  2. Hello! The problem has been fixed. Let us know if everything is all right now. Kind regards
  3. Hello! We are looking into the issue right now. We will keep you posted. Kind regards
  4. Hello! It looks like the configuration generator works just fine. Can you please tell us when and where you obtain an "internal error" page? If you click the following link (while you are logged in), does it open the configuration generator page? https://airvpn.org/direct_access/ Kind regards
  5. Hello! [EDIT] Please note that the account "tetsuia" is not authorized to access the VPN servers, as it is not subscribed to any plan. If you are trying to connect with the key of that account, this is the reason for which the connection fails. Ignore this message if you're trying to connect with a premium account. About the first part of the log, please see this known issue (from the Tunnelblick wiki http://code.google.com/p/tunnelblick/wiki/cKnown) and uncheck "Monitor connection" to see whether it solves the problem. In the second part, though, there seems to be a problem with 127.0.0.1:1080 (see 6:29 [...] Connection refused [...]), was your local tunnel active? The first disconnection might have been caused by your 'SSH tunnel' going down, not by a Tunnelblick fault. We're looking forward to hearing from you. Kind regards
  6. @tetsuia Hello! When you connect without TOR, is everything ok? Can you please send us the connection logs both with and without socks proxy? Kind regards
  7. Hello! We changed certificates, but we did it more than 4 months ago (approx. 10 months ago). Anyway, glad to know that the problem is solved! Kind regards
  8. @odamra Just one more thing: if you need to completely reset your Tunneblick setup with AirVPN, you can follow the instructions here: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=1559&limit=6&limitstart=6&Itemid=142#1571 Kind regards
  9. Hello! Open Tunnelblick, locate "VPN Details..." window, then click the "gear" button at the bottom of the list and select "Edit OpenVPN Configuration File…". That will open the installed OpenVPN configuration file in TextEdit. Changes take effect as soon as the file is saved in TextEdit. Note that this does not modify your original .tblk; it modifies the installed copy only. When the TextEdit show your configuration file, locate the line that begins with "remote", it will appear like: remote a.b.c.d <portnumber> For example, to connect to Draconis server on port 80: remote 178.248.29.132 80 Changing will change the connection port. Valid connection ports are 53, 80 and 443. Then, locate the line "proto " and change (if necessary) it to: proto tcp Save and try again to connect. Useful link: http://code.google.com/p/tunnelblick/wiki/cConfigT#Modifying_a_Tunnelblick_VPN_Configuration We're looking forward to hearing from you. Kind regards
  10. Hello! A reboot should not be necessary. It looks more like a crash than a simple disconnection. Are you using the latest version of the client (1.6)? Can you please tell us your OS version? If your computer keeps requiring reboots, please try to connect directly with OpenVPN GUI and see if you need rebooting or not. Kind regards
  11. Hello! Instructions are given in the second message of the valid link we gave you. The invalid link you cite is reported in the third message and you can safely ignore it. Re-installing Tunnelblick can not solve your problem, because with uninstallation you don't delete the old confiiguration directory, so Tunneblick will continue to see old configuration and certificates. If you need further details: http://code.google.com/p/tunnelblick/wiki/cConfigT#Modifying_a_Tunnelblick_VPN_Configuration For your comfort we copy & paste the relevant content which can solve your problem in a matter of seconds: If you follow step 1 ("edit your OpenVPN configuration file"), you just need to modify the IP address reported in line: remote 174.140.166.91 <port> with (in this example we assume you will connect to Sirius, an american server, on port 443): remote 108.59.8.147 443 Of course you can insert any server IP address you like (see their entry-IP with our configuration generator). Valid ports are 53, 80 and 443. To switch between UDP and TCP (see the FAQs about their differences), locate the line proto <protocol> and set it to proto udp if you wish UDP, or proto tcp if you wish TCP. Please do not hesitate to contact us for any further information. Kind regards
  12. Hello! Probably your problem can be solved with removal of old configuration. Please see here for all the details: http://groups.google.com/group/tunnelblick-discuss/browse_thread/thread/3ebde520b606dfd4 Let us know if this fixes the problem. Kind regards
  13. Hello! The problem seems to lie here: Can you please make sure that Tunnelblick can access the certificate files (user.crt and ca.crt) and the key (user.key)? Also, please to connect to another port (for example 80 TCP). We're looking forward to hearing from you. Kind regards
  14. Hello and welcome back! You need to re-generate your files (menu "Member"->"Access without our client"). You probably have an old certificate which is no more valid, but above all you are trying to connect to a server which is not in our infrastructure anymore (it has been replaced by two 1 Gbit/s servers, dedicated line/port). As you will see from the configurator, there are now 3 servers in Holland (100 Mbit/s each, dedicated), 1 in Sweden (1 Gbit/s, dedicated), 1 in Germany (100 Mbit/s dedicated) and 2 in the USA (1 Gbit/s each, dedicated). The server you try to connect too is Sigma, which could no more sustain the load and has been dismissed. Please do not hesitate to contact us for any further information. Kind regards
  15. Hello! Very well. Thank you for your time! Kind regards
  16. I have a tunnel terminated at my router so that my OS (WinXP) thinks I have a native IPv6 connection and gives me a public IP address through stateless autoconfig. That public IP was visible at whatismyipv6.com when the VPN was active. I'd say the risk is far more than non-zero. Hello! It seems just fine. It's PPTP that tunnels your real IPv4 address in the IPv6, not OpenVPN. Please confirm that when you say "public IP was visible at whatismyipv6" you refer to the generated IPv6 address, not to your real IPv4 address. If whatismyipv6.com could see your real IPv4 public address (instead of the IPv4 address of the VPN server), please warn us as soon as possible. Kind regards
  17. Hello! You're right, OpenVPN is not affected by the vulnerability discovered on PPTP. The IPv6 contains either your true IPv4 or your MAC address. If you point for example to a web site using an IPv6 address, with PPTP your REAL IPv4 address will be tunneled over PPTP, disclosing it to a malicious entity. OpenVPN does not have this vulnerability. Also, your IPv6 address is generated by the IPv4 address assigned to you. The IPv6 loopback interface never get out of your network card (think of it as the equivalent of 127.0.0.1 IPv4), it can only communicate on the local machine. Currently we don't support IPv6 at all. When the time will come, support to IPv6 will be added with the usual security standards. To answer to your question, the probability is therefore near-zero ("near" because in the security field it is theoretically impossible to state a 100% security under most circumstances). Please do check here while connected to an Air server: http://whatismyv6.com/ You should be able to see ONLY the IPv4 exit-IP of the VPN server you're connected to. Connection to their IPv6 web site should fail. Kind regards
  18. Hello! We're going to add it in the FAQ too. Kind regards
  19. Hello! The exit-IP addresses are static and shared. There is 1 exit-IP address per server. Additional exit-IP addresses may be used but only when strictly necessary. Please do not hesitate to contact us for any further information. Kind regards
  20. Hello! If you have asked for a trial, you should have received a code and the instructions on how to use it in order to activate your account to premium status. Your account is currently and correctly on "Free member" since you did not follow the procedure. If you have not received the instructions, please do not hesitate to contact us (menu "Support"->"Contact us"). You need a valid e-mail address to receive code and instructions. Kind regards
  21. Hello! Of course they can. A "trial account" is just a label, "trial accounts" are full premium accounts for 4 days, there's absolutely no difference. Linux users can use OpenVPN directly or any OpenVPN GUI they like. Please do not hesitate to contact us for any further information. Kind regards
  22. Hello! VPNetMon works with OpenVPN, and on a Win7 system has been successfully tested with AirVPN. That said, this solution is not optimal, furthermore proprietary solutions that interferes with the OS should be carefully peer-reviewed. At the moment we don't recommend a solution based on forced shutdown of programs. One of the problems is in the forced shutdown time of the applications, which may allow some packets to get out of the tunnel anyway. Another potential problem is the risk of data loss which may happen with a forced shutdown (for example, if you're compiling a form with a browser, or executing a script). We recommend a much cleaner and safer solution, that is properly set firewall rules. According to your firewall and OS, we may help you to set the rules to prevent "data leakage" in case VPN connection drops. You can already find various instructions on the forum. Kind regards
  23. Hello! We're very glad to inform you that a new 1 Gbit/s server located in Sweden is available: Draconis. The AirVPN client will show automatically the new server, while if you use the OpenVPN client you can generate all the files to access it through our configuration/certificate/key generator (menu "Member"->"Access without our client"). The server accepts connections on port 53, 80 and 443 UDP and TCP. As usual, no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN admins
  24. Hello! Our configuration/certificates generator works only for premium members. You need to subscribe to access the VPN servers. Please do not hesitate to contact us for any further information. Kind regards
  25. Hello! Very well! Probably you will be able to establish successfully a connection on any server just using port 80 TCP. Kind regards
×
×
  • Create New...