Jump to content
Not connected, Your IP:


  • Content Count

  • Joined

  • Last visited

  • Days Won


Everything posted by Staff

  1. Hello! They will not interfere with the anonymity layer of your computer. AirVPN will protect only your computer. However, if the router is connected to an ISP, and the subscription to this ISP is yours, liability for anything done online by the other users may be charged to you. You should check the laws in your country. Please do not hesitate to contact us for any further information. Kind regards
  2. Staff


    Hello! When you're connected to our VPN server, your DNS requests are already encrypted, and a DNS server IP address is pushed (see also https://airvpn.org/index.php?option=com_content&view=article&id=74&Itemid=141). If you need to use DNSCrypt in conjunction with OpenVPN, you may try to send the DNS queries outside the encrypted tunnel and check whether DNSCrypt disables itself or not. We recommend you to ask for support to OpenDNS too, since our setup is a typical hardened security OpenVPN setup. Please do not hesitate to contact us for any further information. Kind regards
  3. Hello! Wait, in the FAQ we wrote that your router must support OpenVPN. This is incompatible with PPTP. We don't support PPTP for security reasons (see http://en.wikipedia.org/wiki/Pptp#Security_of_the_PPTP_protocol). Does your router support OpenVPN? If not, you may have additional accounts for your different devices in order to connect to VPN servers simultaneously. No logs are kept in any VPN server. Also, no VPN server has any database account information. If you fear that USA servers may be wiretapped in real time without our knowledge you may use them over TOR. See https://airvpn.org/index.php?option=com_content&view=article&id=64&Itemid=122 USA servers are anyway helpful to keep our project sustainable, because we have several requests to access geo-discriminatory (legal) USA services like Hulu, Pandora and Netflix. We're looking forward to hearing from you. Kind regards
  4. Thanks! So it is probable that deadfix blacklisted Omicron exit-IP address. Please use our Netherlands servers (Lyra and Leonis) or USA servers (Sirius and Vega) to access it while we look into the issue. Kind regards
  5. Hello! Grooveshark should block ALL German IP addresses, there is an official statement. Can you please check at your convenience? Kind regards
  6. Hello! It's the other way round: it's those sites which block German IP addresses. We don't block ANY website. Please try our Netherlands servers. Kind regards
  7. Hello! Ok. No, the configurations are identical on all servers. The times are high but normal for a WiMax ISP. Yes, Vega is really in the USA (in Oregon). It has IP addresses belonging to a block which has been spread throughout different countries, probably this is the cause for Google mistake. Anyway, US geodiscriminatory services correctly detect Vega IP as an american IP address (therefore Hulu, Pandora etc. work just fine). Also, please use Sirius if you want Google to detect you come from the USA. This does not cause problems. At worst, it might only introduce slightly higher latency. The real problem is WiMax. We have noticed that several WiMax providers cap bandwidth on anything except http connections when they detect volumes of traffic on certain ports. This would explain why at the beginning (trial period) your connection was fast, and now it is not. So, if it's your case (if you wish, can you tell us, in private of course, the name of your ISP?) when you connect with OpenVPN, your bandwidth is capped by your ISP. Please connect to port 80 TCP to try to circumvent the cap. We are also preparing a technical solution that will help to circumvent such caps. As soon as it is ready, we'll provide all the information in the forum. It should be a matter of days. In the meantime, we are very much looking forward to hearing from you whether connections on port 80 TCP (also try port 53 UDP and 53 TCP) mitigate the problem. Kind regards
  8. Hello! There's clearly something wrong. If you can do p2p but not open up pages, maybe this is a DNS problem. What is your OS? Please perform the following test when connected to a VPN server from which you can't surf web pages. Send the following command from a shell, copy and paste the first 4-5 lines output: ping www.google.com ping ping airvpn.org ping We're looking forward to hearing from you. Kind regards
  9. Hello! Can you please check that you're using AirVPN version 1.6? After you have right-clicked on the dock icon, select "Preferences". In the preferences window, you should see the following options in the Proxy "Type" combo box: None, http, socks. We're looking forward to hearing from you. Kind regards
  10. @rained23 Hello! We do not cap the bandwidth. Trial accounts are premium accounts, they are absolutely identical, there is no difference in the system. You might like to watch the FAQs to see the reasons for which you may experiment different bandwidth at different times. Please try to switch servers in order to determine which server can give you the best performance. Please do not hesitate to contact us for any further information. Kind regards
  11. This is an important update about connecting AirVPN over TOR. When performing critical data transmission, please always evaluate whether it's the case to harden security with this kind of connection. The reported example is a working and tested configuration with Tor Browser Bundle, that is highly recommended by the TOR Project. https://airvpn.org/index.php?option=com_content&view=article&id=64&Itemid=122 Kind regards
  12. Hello! We're sorry, we are not able to reproduce that behaviour. KTorrent in its default configuration, and without remote port forwarding, appears to work just fine. Please note: without remote port forwarding, initial seeding is not possible. This is normal, not a fault of KTorrent. However, there can be a case for which KTorrent can NOT work. In its default configuration, UDP port for UDP trackers is 4444 and DHT is off. Now, if you share a torrent with UDP tracker(s), if the tracker(s) can't contact your client and/or is/are down, there's no way for KTorrent to know which peers share the file pointed by the torrent. Solution: log in our website, select menu "Member"->"Forwarded ports". Forward two ports and remember the port numbers. Then, configure KTorrent ports so that they match the two ports you have just remotely forwarded. To do so, select menu "Settings"->"Configure KTorrent". Click on tab "Network". Type in the fields "UDP tracker port" and "Port" the two ports you have previously forwarded. In this way you'll be able to do initial seeding and to receive incoming connections. Finally, enable DHT. Click on tab "BitTorrent" and tick the box near "Use DHT to get additional peers". DHT will enable the client to find peers even when trackers are down. Furthermore, it will enable your client to share trackerless torrents and trackerless magnet links. Please note that when you forward ports, your computer will be reachable from the Internet on those ports. Let us know if the above configuration solves your problem. Kind regards
  13. Hello! AirVPN client v.1.6 for Windows is now available. Changelogs: - Added support for OpenVPN connections over a SOCKS proxy - Fixed a problem with HTTP proxy AirVPN 1.6 comes pre-packaged with OpenVPN 2.2.1. When you run the client, it will detect if you need an update of your OpenVPN package, and you can decide to authorize it to make the upgrade (or a first installation) automatically or not. Kind regards AirVPN admins
  14. Hello! Of course, your position is calculated as described in the article, it's not based only on your IP address. You have to disable ALL the geolocation features (not only GPS tracking), as described in the article. Kind regards
  15. Hello! Free access is reserved ONLY to activists who work in freedom of expression hostile countries and can't afford to pay a premium subscription. It is a full, premium access. Fur such purposes, the Telecomix cluster can provide support. Please do not hesitate to contact us for any further information. Kind regards
  16. Hello! Usually geolocation software use a combination of GPS, cell site triangulation and local WiFi networks scanning to disclose your position with accuracy (A-GPS, that is Assisted GPS). If Location Services are on, connection to a VPN server may be necessary but not sufficient in order to hide your real position. You might like to read the following article: http://socialtimes.com/turn-off-location-services-on-android-phones_b59219 Kind regards
  17. Hello! Thank you. It is related to the DDoS attack suffered today. When the Air client tried to contact the db server, this was frequently unable to respond within the time limit, triggering an unexpected behaviour. Kind regards
  18. Staff


    Hello! Most customers can reach much higher speeds, other unfortunately just can't. The reasons are clearly explained in the FAQ. Please do not hesitate to contact us for any further information. Kind regards
  19. Staff


    Hello! From the FAQ: Which speed can I expect when I am connected to the VPN? Speed may vary according to several conditions which are intrinsic to how the Internet works. We guarantee on our servers, switches and lines an allocated minimum bandwidth of 4 Mbit/s per account (worst case scenario), while the upper limit is 50 Mbit/s. Please note that this is the bandwidth which is "allocated" for each account: the bandwidth you can obtain depends also on your provider conditions, peering and several further conditions. Please contact us to test speed from your ISP connection. That said, you can have a look at our real time monitor to determine whether there's a server near or on capacity, and pick a server with more free bandwidth: https://airvpn.org/index.php?option=com_air&view=servers&Itemid=107 Please do not hesitate to contact us for any further information. Kind regards
  20. wingzeroxdelta5 wrote: Hello! There was an error in the FAQ, now it has been fixed. Also, port 4444 has now been forwarded for your account. We were using that port for test purposes. Please do not hesitate to contact us for any further information. Kind regards
  21. Hello! We're very glad to inform you that a new 100 Mbit/s server located in the Netherlands is available: Leonis. The AirVPN client will show automatically this new server, while if you use the OpenVPN client you can generate all the files to access it through our configuration/certificate/key generator (menu "Member"->"Access without our client"). The server accepts connections on port 53, 80 and 443 UDP and TCP. As usual, no traffic limits, no logs and hardened security against various attacks with separate entry and exit-IP addresses. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN admins
  22. 99zeros wrote: Hello! The port was already reserved to another account. There can't be two or more accounts forwarding the same port. Unfortunately, we are aware that BitWise does not allow to change the port. Anyway, that account was a trial one, so we are going now to free the port and forward it to your account. On a side note, if you use BitWise for private IM, please be aware that in its free version it does not provide effective protection. It's not open source, it has a low level encryption (Blowfish 128 bit, RSA 512 bit), there's no proper method to validate your contacts and the key is not generated and owned by you. If this is your case, you should consider to upgrade to BitWise Plus/Professional. A much better solution for secure IM (but not for voice calls), which is also free and open source and widely interoperable with so many IM services, is Pidgin+OTR. http://www.cypherpunks.ca/otr/ Please do not hesitate to contact us for any further information. Kind regards
  23. perhentian wrote: Thank you very much! Kind regards
  24. thigger wrote: Yeah - we agreed it's an excellent idea to have separate entry and exit IPs; we were just confused by the SNAT/ip rewriting. However with your clue I think I've found a better reason as to why the rewriting is a good idea. Without it, if an attacker was monitoring an AirVPN user's connection they could match the connection to a forwarded port by sending a packet to the VPN exit with the source ip spoofed to be the VPN's entry ip. The user's machine would send a reply outside the VPN tunnel, which would be seen by the attacker and confirm the user was using that port. Rewriting/SNATing means that the reply packet goes down the tunnel, preventing the attack. Is that the main reason? Thanks for the fascinating insight into how AirVPN works. Hello! Yes, exactly. It is a dangerous attack. One of us has also verified in the last days that this attack is possible with some VPN services. We have seen that it was also discussed in the Wilders Security Forums a couple of years ago (unfortunately no real solution was suggested at the time, except the unsatisfactory solution to prevent users to forward ports) so hopefully VPN providers are getting aware of that. It appears to be completely prevented by our current setup. The thread is becoming more and more interesting; if you (or anybody reading) have any idea on further attacks that you think might be successful with our current setup, please do not hesitate to share. We always do our best to harden security and we keep ourselves constantly updated from security forums and bulletins, but independent peer reviews and suggestions are anyway vital. Let's take it as a challenge where nobody can lose. Kind regards
  25. Hello and thank you! We're glad to hear that the problems is fixed. Please do not hesitate to contact us for any further information. Kind regards
  • Create New...