-
Content Count
11526 -
Joined
... -
Last visited
... -
Days Won
2035
Everything posted by Staff
-
Hello! The socks proxy can be external as well, for example on a server with a public IP address, or on another device in the LAN. OpenVPN needs to communicate with such a node outside the tunnel, needing therefore to reach the proxy server (in your case 127.0.0.1) through the default gateway (in this case 10.1.1.1). Actually, since 127.0.0.1 is the localhost, that route is superfluous (but in no way harmful) in this particular case, OpenVPN just include it without discerning peculiar cases. We have tried to replicate the behavior on yet another Linux box without success, eveything works swiftly. IF it's the bug that was mentioned in a previous post in this thread, it might be related to your box. Unfortunately we have currently no CentOS 6.2 available, we will investigate further. In the meantime you might like to post in CentOS and OpenVPN community support forums. Kind regards
-
@airbreathe Hello! Apparently you edited the OpenVPN configuration file with the directive "remote 127.0.0.1". However, in order to allow OpenVPN to connect over a socks proxy, you must specify it through the "socks-proxy" directive. The "remote" directive must always point to the entry-IP of the VPN server you wish to connect to (over the proxy) otherwise OpenVPN has no way to set the correct routing table. Compare your configuration file with the configuration files generated by our configuration generator with the proxy option enabled. If you did so, is there any particular reason for which you needed this solution? If it is mandatory for you to keep this setup, probably adding a route manually could solve. Otherwise you should revert to the "canonical" OpenVPN setup to connect over a proxy. We're looking forward to hearing from you. Kind regards
-
Hello! Any chance that you can try OpenVPN 2.3.0? Kind regards
-
@airbreathe Hello! It might be an OpenVPN 2.2.x bug: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657964 See also these messages: http://readlist.com/lists/lists.sourceforge.net/openvpn-users/2/12784.html http://readlist.com/lists/lists.sourceforge.net/openvpn-users/2/12785.html However, we are currently unable to reproduce the behavior with OpenVPN 2.2.1 on Debian 6 and Debian 7 64 bit. Which OpenVPN version are you running? Kind regards
-
Hello! Thank you for your subscription! Unfortunately it seems an undocumented bug. What is your Mac OS X version? Is it possible to catch the logs before the crash? Kind regards
-
DD WRT setup issue, no openVPN option at all
Staff replied to joshmygosh's topic in General & Suggestions
Hello! What is your router model? Also, please evaluate Tomato, now that you need anyway to re-flash a new firmware. If you just need an OpenVPN client on the router, by our and our customers' experience we can say that Tomato is more friendly. Also, several DD-WRT firmwares have a fatal OpenVPN implementation bug. But DD-WRT has some attractive features for the advanced user, so evaluate your needs before picking Tomato instead of DD-WRT. Kind regards -
Hello! Some options for Windows: http://superuser.com/questions/106078/per-process-network-activity-monitor More options for Windows: https://duckduckgo.com/?q=windows+display+"network"+activity+"per-process" Kind regards
-
Hello! We're sorry, we have some issues in understanding,can you please elaborate? Kind regards
-
sorry' date=' MB/s[/quote'] Hello! Well, 10 MB/s == 80 Mbit/s looks like a GREAT performance. Why aren't you satisfied with it? What is your nominal peak download and upload bw according to your ISP? Kind regards
-
Hello! What do you mean with "meg"? MB/s or Mbit/s? Kind regards
-
Error: OpenVPN is already under execution
Staff replied to xylathorion@hotmail.com's topic in General & Suggestions
Hello! It is a consequence of a bug in the OpenVPN GUI installer. Try to launch OpenVPN GUI with administrator privileges, it should be able to create the key. Anyway with our client for Windows you could just ignore OpenVPN GUI. You can't launch the Air client and OpenVPN, or the Air client and OpenVPN GUI, at the same time. Make sure that OpenVPN and OpenVPN GUI are NOT running when you launch the Air client. Kind regards -
Hello! Thank you for your concern. You can use p2p in any server you like. Just as a courtesy to us, absolutely not as an obligation, you can avoid Germany and USA servers, where we receive some alleged copyright infringement notices (most of them bogus, anyway, and all of them lacking any proof). Kind regards
-
Hello! This admin has verified that the support team had sent a proper answer to you, we're sorry that you did not receive it (maybe you can check your inbox spam folder?). Anyway, the answer is quick: no, you don't need to modify any System Setting. If your real IP is detected, please send us your Tunnelblick logs (just after you have established a connection) at your earliest convenience, they may be very useful for troubleshooting. A general advice: please keep in mind that Tunnelblick 3.2.8 is NOT compatible with Mountain Lion (Mac OS X 10.8.x) so if it's your case you need to upgrade to Tunnelblick 3.3beta21b. Kind regards
-
Hello! Nice idea, it will be implemented for sure, thank you! Kind regards
-
Hello! Today we're very glad to introduce native support for OpenVPN over SSL and OpenVPN over SSH, and a completely re-designed configuration generator which includes exciting, additional AirVPN services and features. Our service becomes more censorship resistant and easier to use with a wide range of OpenVPN GUIs and wrappers. NEW SERVICES: OPENVPN OVER SSL - OPENVPN OVER SSH OpenVPN over SSL and OpenVPN over SSH will allow you to bypass OpenVPN connections disruption. Known ISP countries where the disruption takes place are China, Iran, Syria, Egypt. The connection disruption is possible because OpenVPN connections have a typical fingerprint which lets Deep Packet Inspection to discern them from pure SSL/TLS connections. Connecting OpenVPN over SSL or OpenVPN over SSH will make your connection undiscernable from pure SSL or SSH connections, rendering DPI fingerprint identification powerless. OpenVPN over SSL/SSH is included in every Premium subscription without any additional payment. Use OpenVPN over SSL/SSH only when necessary: a slight performance hit is the price to pay. The performance hit is kept as low as possible because the "double-tunneling" is performed directly on our servers without additional hops. NEW FEATURES A new system for host resolution (not available for Windows) and dynamic VPN server choice is available. This will let you have OpenVPN configuration files which will try connections to various servers (according to your preferences) if one or more servers are unavailable. A new connection port (2018) is now available on all Air VPN servers. A new, alternative entry-IP address is now available on all Air VPN servers. NEW CONFIGURATION GENERATOR FEATURES - You can now select servers by countries, continents and planets (currently only one planet) or any combination between single servers and countries. - You can now select an alternative entry-IP address. Each Air server has now an additional entry-IP address to help you bypass IP blocking. - You can now choose a wide variety of compressing options: zip, 7zip, tar, tar & gzip, tar & bzip2. - You can now choose not to compress the files and download them uncompressed one by one NEW CONFIGURATION GENERATOR "ADVANCED MODE" FEATURES - Total connection ports range available, including new port 2018 in addition to 53, 80, 443 and (for SSH) 22. - Option to generate non-embedded configuration files, mandatory if you use network-manager as OpenVPN wrapper under Linux or just in case you use any wrapper that does not support embedded with certificates and keys OpenVPN configurations. - Option to generate files and scripts for OpenVPN over SSL/SSH connections by clicking on "Advanced Mode" - Option to select "Windows" or "Linux and others". Make sure you select the correct option according to your OS, because connections over SSL/SSH in Windows require different files than those required for Linux, *BSD and Unix-like / POSIX compliant systems such as Mac OSX. - New options to generate configuration files that support proxy authentication for OpenVPN over a proxy connections, particularly useful if you're behind a corporate or college proxy which requires authentication Instruction page for OpenVPN over SSL: https://airvpn.org/ssl Instruction page for OpenVPN over SSH: https://airvpn.org/ssh Please do not hesitate to contact us for any additional information. Kind regards & Datalove AirVPN admins
-
I read the info on the linked page but I am still not quite sure what the answer to the above question was and it is really very relevant to me personally. Please clarify in simple terms. Thanks. Hello! With Facebook and some other social network and with Google services, mixing identities can open the road to potential identity correlations even to third-party services which use Facebook integration/authentication. About your bank, the risk should be zero. Anyway it seems useless to use a VPN to access home banking in order to have an anonymity layer, because the bank surely knows your identity regardless of your IP address. Using a VPN to access home banking may be useful in some rare circumstances, where your connection might be hijacked to make you believe you are accessing your bank while in reality you are not (to steal your login credentials, for example). However, if the hijacking comes from inside your system (malware which modifies your hosts file, spyware like keyloggers) a VPN is powerless (keep in mind the golden rule: a VPN does not protect you against virus, spyware and malware in general). Kind regards
-
Hello! Your ISP can see the total amount of in/out traffic (if it couldn't, it would be unable to provide you with Internet connectivity ). While you are connected to the VPN your ISP sees all packets going to and coming from a single IP address (the entry-IP address of the VPN server your computer is connected to). Your ISP can NOT see: - the real packets header - the packets payload (i.e. the content you send and receive) - the real origin and destinations of the packets - the "real" protocol you use - the applications you use Kind regards
-
Hello! Yes, there are many. What is your OS? Kind regards
-
Running openVPN server on the same PC as well?
Staff replied to joshmygosh's topic in General & Suggestions
Hello! On the home PC yes, you should run different instances of OpenVPN, one in server mode and the other, connecting to an Air server, in client mode. In other words, you should set up a home VPN, accessible from your laptop when you're around, on the same machine which connects to our servers. The PC would act simultaneously as an OpenVPN client and server, needing adjustments to routing table and gateways. The setup requires advanced networking experience. As far as we know unfortunately there are no tutorials around. Kind regards -
DD WRT setup issue, no openVPN option at all
Staff replied to joshmygosh's topic in General & Suggestions
Hello! Apparently you flashed a firmware without OpenVPN. What is your router model (not all routers have enough memory for firmware that include OpenVPN)? Kind regards -
Why can Google Maps pin point my exact location?
Staff replied to Fritz's topic in Eddie - AirVPN Client
Hello! Your phone determines your exact location through GPS and Wi-Fi hot spots detections. When you don't want to be located you should at least disable location detection on your phone. Kind regards -
[SOLVED] Problems with your website & P2P issues
Staff replied to dcelite's topic in General & Suggestions
@dcelite Hello! The TAP-Win32 adapter in your Vuze list is eth4. Kind regards -
[SOLVED] Problems with your website & P2P issues
Staff replied to dcelite's topic in General & Suggestions
Hello! Ok, most of the work is done. Vuze is already able to receive incoming connections when behind a VPN server. Now you need to: 1) close port 35497 on your router (see your router manual) 2) bind Vuze to the TAP-Win32 adapter (see below) Performing point 2 makes point 1 superfluous. To bind Vuze to the TAP adapter: - go to "Tools"->"Options" and under "Modes" select "Advanced" - go to "Connection"->"Advanced connection settings" - detect the name assigned by Vuze to the interface "TAP-Win32 Adapter V9.xx" (for example eth1 or something similar) - insert the interface name (eth1 in our example) in the field "Bind to local address or interface" - make sure to tick "Enforce IP bindings even when interfaces are not available" (IMPORTANT!) - click "Save" and shut Vuze down Now connect to the VPN, launch Vuze and re-perform the port checking. You should get a green token. Finally, leaving Vuze running, disconnect from the VPN to be sure that Vuze bind is effective. If it is, Vuze will lose connectivity after the VPN disconnection, protecting you against leaks in case of unexpected VPN disconnection. Kind regards -
[SOLVED] Problems with your website & P2P issues
Staff replied to dcelite's topic in General & Suggestions
Hello! Can you please describe the issues? Kind regards -
Hello! Please do not proceed randomly, there are almost 65535 ports the proxy can listen to. First, please determine (or configure) the port the proxy listens to. Then modify the OpenVPN configuration accordingly (port numbers must match). Kind regards
