Jump to content
Not connected, Your IP: 3.237.205.144

Staff

Staff
  • Content Count

    8761
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1263

Everything posted by Staff

  1. Kinomodano wrote: Hello! Yes: we kindly ask you to send your request through our "Contact us" form, direct link https://airvpn.org/index.php?option=com_alfcontact&Itemid=105 Kind regards AirVPN admins
  2. Hello! From the logs it seems that OpenVPN is unable to invoke route and ifconfig: Thu Nov 3 20:01:46 2011 Options error: Unrecognized option or missing parameter(s) in [PUSH-OPTIONS]:4: route (2.1.1) Thu Nov 3 20:01:46 2011 Options error: Unrecognized option or missing parameter(s) in [PUSH-OPTIONS]:8: ifconfig (2.1.1) The default_gateway route remains to a gateway (66.*.*.*) which is none of our servers and finally OpenVPN shuts the TUN and exits. Apparently it is the following problem (a fix is suggested): http://code.google.com/p/android-openvpn-settings/issues/detail?id=26 Let us know if the fix works for your phone. Looking forward to hearing from you. Kind regards AirVPN admins
  3. static418 wrote: Hello! Could you please publish the OpenVPN connection logs? They might be useful to understand where the problem is. Kind regards AirVPN admins
  4. shooterroot wrote: Hello! The main problem with Malaysia and Panama is the infrastructure. Having a server in those countries might imply very poor performance from the rest of the world. Kind regards AirVPN admins
  5. shycum wrote: Hello! There was no interruption of service. However, it is probable that the AUTH_FAILED you experienced was due to a "dirty" disconnection or an ongoing (but aborted) connection attempt. When it happens, the account server (which, for additional security reasons, is completely separated from the VPN servers) records that you're still connected, and when the VPN server checks your account for your authorization it gets the response "already connected". Normally, the situation is fixed with the time-out. If you experience AUTH_FAILED, please wait 1-2 minutes and then retry. If the problem goes on for more than 1-2 minutes, do not hesitate to contact us. Kind regards AirVPN admins
  6. shooterroot wrote: Hello! We recommend to set firewall rules for that purpose. Anyway, the alternative you're looking for does exist. Just use small programs like VPNLifeGuard, VPNCheck or VPNetMon. They will forcefully kill the programs you tell them if the VPN connection drops Kind regards AirVPN admins
  7. According to some vendors, this issue is a PayPal bug: "The error message described above occurs due to a cookie on your computer (a text file that saves some information you have entered at a web site, such as a user name or email address so you do not have to type it every time you return to the site). If someone (you or anyone else) has logged into a PayPal account on the computer where you are experiencing problems, the e-mail address associated with that PayPal account will be saved until the PayPal cookie is deleted. This can be verified if you go to PayPal.com and an email address is already entered in the text box at login. Whether or not your browser is set to automatically delete cookies will determine this situation. If the cookie remains and you attempt to pay with PayPal, but do not log into that (or any other) PayPal account, this is when the error occurs. The best way to fix the problem is to delete the PayPal cookie (or all cookies), by following the steps provided above." (from SandingSupply, for example). So deleting the cookies should fix the problem. Kind regards AirVPN admins
  8. 2975863j wrote: Hello! You will be contacted by e-mail within a few minutes so that you can subscribe while we look into the problem (the fix suggested in your link does not seem to work for your case). Is there anybody else who is experiencing the same problem? We are receiving payments as usual, so the problem could be related with some addresses only. Kind regards AirVPN admins
  9. 2975863j wrote: Thank you very much! Can you please try again now? Kind regards AirVPN admins
  10. heyyou wrote: Hello! We recommend that solution when someone has to transfer critical information and does not want to put his/her trust on us. It is a layer of anonyimity "by design" where trust on us is not necessary. You might be interested in reading this: https://airvpn.org/index.php?option=com_kunena&Itemid=55&func=view&catid=3&id=892 Kind regards AirVPN admins
  11. perhentian wrote: Hello! We still have to make a final decision about it. The addition of Lyra and Vega to Omicron and Sigma have made the infrastructure capable to give more than the bandwidth we guarantee, so at the moment we have decided it is wiser to add Altair to the list of shadow servers to have redundancy on the infrastructure for any emergency. We will keep you posted, of course. Kind regards AirVPN admins
  12. Fairbod wrote: Hello! You must specify on uTorrent the same port you have remotely forwarded on the server, so that uTorrent can accept incoming connection on that port. uTorrent needs only one port. If you keep ports un-forwarded on our servers, you can do p2p but performance will be lower, because uTorrent will only be able to establish outgoing connections and will not be able to receive incoming connections. Furthermore initial seeding will not be possible because peers will not be able to contact the unique seeder. If you specify to uTorrent incoming port 443, it can't receive any incoming connection, because that port is reserved for VPN connections with clients, like 53 and 80. In very populated swarms, anyway, you might not notice any significant performance difference, as long as you are not the initial seeder. Finally, you don't need to open/forward ports on your router, because all the traffic is tunneled through the TUN/TAP OpenVPN network adapter, overriding firewall, your ISP NAT etc. Kind regards AirVPN
  13. bagedtiynhjfuerty574839 wrote: Hello and thank you for your subscription! There is currently a block on outgoing port 25, as stated in the website, which was put in place to block spammers. This is a temporary block that will be removed soon (but could be reinstated if our servers are warned of blacklisting for e-mail spam) and we apologize for any inconvenience it may cause. However, we very strongly recommend not to send unencrypted e-mail on port 25, but to use SSL/TLS with your SMTP server. Do not hesitate to contact us for any further information. Kind regards AirVPN admins
  14. demichej wrote: Hello! Please note that you must not forward the remotely forwarded ports on your router (there is no communication on that port, you communicate with the VPN exclusively on a tunneled port), while it is crucial that the listening port of the application matches the remotely forwarded port. According to the data you provided on your e-mail, we have emulated your account connection and started an application listening to your forwarded port on server Lyra. We have detected that it works properly. Can you please make sure that the incoming port of your application matches the remotely forwarded port on the server? On which server(s) does the problem arise? We're looking forward to hearing from you. Kind regards AirVPN admins
  15. anonmc wrote: Hello! You have described TOR over VPN. We recommend VPN over TOR, so that we can't see your real IP address and the TOR nodes see encrypted OpenVPN traffic. The correct path of your config is: PC (OpenVPN with proxy) -> TOR entry -> TOR exit -> VPN server -> SSH server There should be no need to torify anything. Every application should transparently use VPN over TOR (thanks to OpenVPN proxy features). Furthermore, UDP traffic now can go through TOR (it's TCP over UDP, done by OpenVPN)! In this way: - SSH server sees VPN server exit-IP address - VPN server sees TOR exit node IP address - VPN server sees SSH encrypted traffic - TOR servers see OpenVPN+SSH encrypted traffic The packets which finally go out have the SSH server IP address on their header. So please note that if the SSH server is owned by you and you have given your real identity to rent or house it, you might destroy completely the anonymity layer. Kind regards AirVPN
  16. Hello! Please take note that the server Altair will be brought offline at 6 PM (GMT+2, or CET+1) of 13-Oct-2011. We recommend you disconnect from the server before that time to avoid forced disconnection. We need the server to re-plan its traffic capacity which is almost exhausted. If you need a Netherlands server, Lyra is perfectly capable to replace Altair under any respect (more powerful hardware, same infrastructure, unmetered bandwidth). Furthermore, we have added a new 1 Gbit/s server in the USA, Vega. This server will allow much faster connections than Sigma in the USA, to the advantage also of those premium members who need connections outside Europe. Omicron (Germany) and Sigma (USA) also remain available as usual too. Kind regards AirVPN admins
  17. Hello! We're very glad to inform you that a new server located in the United States is available: Vega. The AirVPN client will show automatically this new server, while if you use the OpenVPN client you can generate all the files to access it through our configuration/certificate/key generator (menu "Member"->"Access without our client"). The server accepts connections on port 53, 80 and 443 UDP and TCP and can give a maximum of 500 Mbit/s per user. It has a 1 Gbit/s port. With this addition, we break the previous limit of 50 Mbit/s maximum per user, bringing it to a theoretical maximum of 500 Mbit/s. As usual, no traffic limits and no logs. Do not hesitate to contact us for any information or problem. Kind regards and datalove AirVPN admins
  18. privado wrote: Hello! Yes, ns-cert-type is "server". You need to activate the option. The certificate and the key you cite are both inside the archive air.zip. Do not hesitate to contact us for any further information. Kind regards AirVPN admins
  19. privado wrote: Hello! If you have already flashed the DD-WRT firmware with OpenVPN support, you should now generate all the files you need with our configuration generator. Go to menu "Member"->"Access without our client" and choose server and port. Download air.zip. Inside the archive, you will find the air.ovpn configuration file which has all the parameters to copy according to the interface you have on your router. A quite complete guide is available here: http://www.dd-wrt.com/wiki/index.php/OpenVPN Do not hesitate to contact us for any further information. Kind regards Paolo AirVPN
  20. AirVPN client v.1.4 for Windows is now available. - fixed bug "startIndex cannot be larger than length of string" AirVPN 1.4 comes pre-packaged with OpenVPN 2.2.1. When you run the client, it will detect if you need an update of your OpenVPN package, and you can decide to authorize it to make the upgrade (or a first installation) automatically or not. Kind regards AirVPN admins
  21. AirVPN client v.1.3 for Windows is now available. It comes pre-packaged with OpenVPN 2.2.1. When you run the client, it will detect if you need an update of your OpenVPN package, and you can decide to authorize it to make the upgrade (or a first installation) automatically or not. We recommend to upgrade to OpenVPN 2.2.1. The changelos are available here: http://openvpn.net/index.php/open-source/documentation/change-log/425-changelog-for-openvpn-22.html Kind regards AirVPN admins
  22. Hello! We're very glad to inform you that a new server located in the Netherlands is available: Lyra. The AirVPN client will show automatically this new server, while if you use the OpenVPN client you can generate all the files to access it through our configuration/certificate/key generator (menu "Member"->"Access without our client"). The server accepts connections on port 53, 80 and 443 UDP and TCP and can give a maximum of 50 Mbit/s per user (with bursts of 75 Mbit/s). With this addition, the global infrastructure now offers a minimum of 25 Mbit/s per user during 99% of any given 24 hrs period. The minimum guaranteed allocated bandwidth currently remains at 4 Mbit/s (worst case scenario: all premium customers connecting at the same time AND requiring at least and simultaneously 4 Mbit/s or more). The maximum bandwidth per user is 50 Mbit/s with bursts of 75 Mbit/s. As usual, no traffic limits and no logs. Do not hesitate to contact us for any information or problem. Kind regards AirVPN admins
  23. dr wrote: Hello! Please follow the instructions here: https://airvpn.org/index.php?option=com_content&view=article&id=68&Itemid=57 If you need help to use AirVPN over TOR, please do not hesitate to contact us again. Kind regards AirVPN admins
  24. jmsrie wrote: Hello! Can you please make sure that your account is on "premium" status? You need to subscribe to connect to the VPN servers. Do not hesitate to write again for any further information. Kind regards AirVPN admins
  25. monway wrote: Hello and thank you for your inquiry! We're glad to hear that our service meets your expectations and requirements. While we understand that PPTP is easier on the client side, since it is implemented by default on most OS, it does not meet our security requirements. There are some serious security problems and we have chosen not to compromise security. The superior security of OpenVPN is well worth a little more effort on installation on the client side. For a quick overview of PPTP vulnerabilities please see: http://en.wikipedia.org/wiki/Pptp#Security_of_the_PPTP_protocol Do not hesitate to contact us for any further information. Kind regards AirVPN admins
×
×
  • Create New...