Jump to content
Not connected, Your IP: 3.21.106.69

Staff

Staff
  • Content Count

    10612
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1766

Everything posted by Staff

  1. Hello! Yes, you are right, that was Pegasi with another provider who could not handle the stress of copyright alleged infringement notices and/or did not respect its contract with us. Our totally neutral policy involves an ongoing, perpetual "war" against copyright trolls in Germany and in the USA. Furthermore, if the provider is unable to respect the agreements with us, we leave it. We'll be looking for additional North America locations in the near future. Kind regards
  2. Hello! It is an IP geo-location mistake by that website. Sirius is in Virginia (USA). Kind regards
  3. Hello! The TOR Browser Bundle is useful to you to launch the TOR proxy, but of course you can use any other bundle you like. TBB also includes Aurora. After the TOR proxy is running and has established a circuit, connect OpenVPN over the TOR proxy according to the instructions, finally browse with any browser NOT configured to connect over a proxy (not Aurora, therefore). The browser (and any other program) will transparently connect over OpenVPN which is connected over the TOR proxy, therefore you have a connection over OpenVPN over TOR. When you have that setup use a browser not configured to connect over a proxy in order to connect it over AirVPN over TOR. Kind regards
  4. Hello! Can you please send us your client logs when the issue occurs? Kind regards
  5. Hello! Yes, of course, that was clear. The instructions in the previous admin post were meant exactly for this purpose. Do not use the TOR browser because if you use it with the above setup it will be tunneled over the same proxy OpenVPN connects to and the final host will see a TOR exit-node IP address. Just use any browser which is not configured to connect to a proxy so that it will connect over OpenVPN over TOR. The final host will see the Air server exit-node and the Air server will not see your real IP address. The TOR nodes will see encrypted by OpenVPN traffic. Kind regards
  6. Hello! You can find here the TOR Browser Bundle in the TOR Project website. It requires no installation (just decompress it), so it should be perfect for you, especially if Ubuntu-lucid is on a pen drive. Direct link: https://www.torproject.org/download/download-easy.html.en Once you have it, your goal can be achieved with connections over OpenVPN over TOR. Instructions are available here: https://airvpn.org/tor Kind regards
  7. Hello! Anyway, your key and certificates are unique, the same for every server. Additionally, you can download all the possible configuration files in just one hit with our configuration generator (just select simultaneously all the servers, ports and protocols). Kind regards
  8. Hello! Yes, please access the configuration generator and generate the appropriate configuration. Download the archive, copy and paste the .ovpn file into the OpenVPN configuration directory, just like you did before, on your host. Kind regards
  9. Hello! Do you have the rules that are specified in step 9 of our guide? Allow IP In/Out From In [Loopback Zone] to MAC Any Where Protocol Is Any Allow IP In/Out From MAC Any To In [Loopback Zone] Where Protocol Is Any where [Loopback Zone] is [127.0.0.0 - 255.0.0.0] If you use the TOR Browser Bundle: - Proxy Type: socks - Proxy IP: 127.0.0.1 - Port: 9050 Also, connection over a proxy can ONLY be TCP. Remember to select a TCP port. Kind regards
  10. Hello! Correct, in this case you need only one account. Kind regards
  11. Staff

    Servers!!!

    Hello! As you probably know, you can check anytime the servers status here: https://airvpn.org/status Kind regards
  12. Hello! You can use the Air client both on your host and guest OS. Please note that you can't use the same account for two simultaneous connections. You need to know the proxy type, IP and listening port of the proxy you're using. You can discover them from inside the proxy interface and its documentation. Kind regards
  13. Staff

    Servers!!!

    Hello! We can confirm we have plans for one additional Swedish server. However we are currently unable to provide you with a date. Please note that currently Serpentis bandwidth is permanently under usage, with only 25% peaks. Kind regards
  14. So to acheive this I will: 1. Now install the new windows VM 2. Then download and install Tor and the windows AirVPN client on the VM and then am assuming Im good to go pretty much 3. OR are there any special settings to make the "Tor over VPN part of the connection on normal windows" (HM its called right?) routes to the VM correctly? Hello! That's correct, there are no additional requirements. However, the previous admin post forgot to specify an important detail, that is the VM must be connected to the host via NAT in order to render the setup effectively working (i.e. no bridging). This is the default configuration in VirtualBox (just make sure that "NAT" is selected in "Settings"->"Connections") so you should not worry about it, the virtualization program will take care transparently of all NATting. Correct. About point b, remember to configure OpenVPN to connect to an Air server over your TOR proxy. The configuration generator or the Air client will take care of it, just select the appropriate options for Proxy Type, Proxy IP and Proxy Port. The rules should already allow these type of connections because, when you connect OpenVPN over TOR, OpenVPN will communicate with 127.0.0.1 (your local proxy address), which is explicitly allowed in some rule. Additionally remember, when Comodo will prompt you about that, to allow any communication from/to the Virtual Machine (i.e. take care not to block the virtualization program NAT). If you have any issue on this matter please do not hesitate to contact us, a Comodo expert will support you. Kind regards
  15. Hello! About Windows and Comodo yes, absolutely, the recommended rules prevent DNS leaks. About Linux, it does not suffer DNS leaks, which is a typical Windows problem basically related to the fact that Windows lacks the concept of global DNS. So just set your favorite DNS servers (for example by editing /etc/resolv.conf if you don't have resolvconf installed) and OpenVPN will tunnel them. Only obvious exception: nameserver in which case DNS queries will be sent to your router and the the router will send them out unencrypted. Kind regards
  16. Hello! Currently the infrastructures in Singapore and Italy do not provide a 1 Gbit/s dedicated port with 1 Gbit/s lines (even shared, best effort) as a viable solution for our requirements. They just can't provide enough traffic. About the Netherlands servers, the old 100 Mbit/s have a dedicated line, which is burstable up to 200 Mbit/s, while the 1 Gbit/s servers have a dedicated 1 Gbit/s port connected to multiple shared lines capable to provide up to 1 Gbit/s 95% of the time. Since the 100 Mbit/s NL servers are in a different network than the Gbit NL servers, we prefer anyway to keep them for access redundancy. Kind regards
  17. Hello! We're confident about that: the provider has been thoroughly informed about our activity. Of course things in real life may be different, we rely both on the correctness of the provider and on our customers' respect of AirVPN Terms of Service. Kind regards
  18. Hello! Please see here: https://airvpn.org/linux It was understood that you had already placed the guest virtual HDD inside a host TrueCrypt volume When the VM is fully setup, you have plenty of options, please see the previous message. For example, if you wish to connect over TOR over AirVPN over TOR: - connect the host over AirVPN over TOR - connect the guest programs over TOR (just to make an example use the Aurora browser of the Tor Browser Bundle in the guest) If you wish to connect over VPN over VPN: - connect the host to a VPN service - connect the guest over another VPN (you can also perform Air 2-hops, connecting the host to an Air server and the guest to another Air server, in which case you will need 2 Air accounts - EDIT: this is not partition of trust because you would multi-hop on servers that are all controlled by the same entity) Kind regards
  19. Hello! We're very glad to inform you that a new 100 Mbit/s server located in Italy is available: Crucis. The AirVPN client will show automatically the new server, while if you use the OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Member Area"->"Access without our client"). The server accepts connections on ports 53, 80 and 443 UDP and TCP. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN admins
  20. Hello! Phoenicis migration has been completed successfully and the new server is online. Contrarily to what stated in the previous message, it has been possible to maintain the IP addresses. Please do not hesitate to contact us for any issue with this server. Kind regards
  21. Hello! We're very glad to inform you that a new 100 Mbit/s server located in Singapore is available: Sagittarii. We hope and we're confident that this is only the first step of AirVPN expansion in Asia. The AirVPN client will show automatically the new server, while if you use the OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Member Area"->"Access without our client"). The server accepts connections on ports 53, 80 and 443 UDP and TCP. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN admins
  22. WARNING: the migration process has begun. Please disconnect as soon as possible. Kind regards
  23. In what sense are you making that statement: Hello! The http traffic "in transit" cannot be sniffed by your ISP or by a "man in the middle" (an entity between) the OpenVPN client and the OpenVPN server. Kind regards
  24. Hello! The support team replied to your mail where you attached the Tunnelblick logs. The solution to your problem is straightforward, please check your inbox. Kind regards
  25. Hello! What do you mean with irrelevant...? If you refer to TOR over OpenVPN over TOR, one TOR exit node is essential to send your packets to our servers and receive them from our servers, the other TOR exit node is essential to send out and receive packets to/from the Internet (assuming two circuits). Yes. In order to connect to Air please install OpenVPN and follow the instructions for Linux. You have now tons of options: Any VPN over AirVPN over TOR, TOR over AirVPN over TOR, proxy over AirVPN over TOR, I2P over VPN over TOR, AirVPN over AirVPN over TOR... and theoretically you can even connect (from the VM) over AirVPN over TOR over AirVPN over TOR, or over TOR over AirVPN over AirVPN over TOR etc. etc.. These last two "setups" work fine, but do not expect performance exceeding 100 kbit/s, and be ready for very high latency (1000-2000 ms with the final host you connect to are not uncommon). Usually connecting over a VPN over TOR over AirVPN over TOR is necessary only in extremely critical environments which currently we have not found in practice in any country (but of course our experience is not "universal"). You should study each solution to see which one suits your needs in the best way, i.e. the best compromise between security and performance, provided the minimum necessary setup to defeat your adversary. Ideally, you should have a clear vision of the maximum power your adversary (or adversaries) has/have. I/O = Input / Output. Kind regards
×
×
  • Create New...