Jump to content
Not connected, Your IP: 18.191.240.243

Staff

Staff
  • Content Count

    10612
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1766

Everything posted by Staff

  1. The fact remains when a connection is made to a server, the login credentials must be authenticated and the user's IP be visible in order to process the connection. Yes, this information is not "recorded" but it is visible--and it has to be. So in the final analysis, if a strong opponent comes after you (a government warrant), this "visible" information will be recorded and used against you. No, that's plainly false. If you connect over Air over TOR, our servers see the TOR exit-node IP address. We don't perform authentication on an IP basis and we our servers don't block connections from TOR exit nodes. Please see here: http://www.zoklet.net/bbs/showthread.php?t=99012 Nodes like that are not uncommon and it's very easy to run them and sniff all the traffic. Sites which allow non-https connections are very many. Even Yahoo and Facebook do not force https (and GMail forced it only recently) and for the experience of this admin even activists living in human rights hostile countries make those mistakes, which are fatal in social networks and e-mail web wrappers sites. The guy in the above thread was able to discover some interesting things and passwords, and a government can do much more. Unfortunately the evidence shows the contrary. Even e-mails of chinese people (who surely have a lot to fear from their government) could be sniffed in the above example. So you confirm that partition of trust is very necessary when someone deals with critical activities for which identity disclosure causes direct harm to physical safety and personal freedom. Look deep into darknets and specialized forums, you will discover a lot of interesting things. The above link was just an example. In real life, anonymity is not unlinked from privacy. The correlations you can perform when you control a significant portion of the TOR network may well lead to identity disclosure So the fact remains that the VPN can see your IP--and in truth, it has to, in order to connect to the server and to forward the IP packets. No, that's plainly false. If you pay with Bitcoin and you use the code to activate an account with a configuration to connect over Air over TOR, our servers NEVER come to know neither your identity nor your real IP address. If you forget to run the TOR proxy the OpenVPN client will not even reach any of our servers. On the contrary, if you use TOR over Air, our servers can see your real IP address. So one solution or the other is to be decided on a case by case basis, according to the adversary you have to face. They are two different partitions of trust. But "keep" does not mean it cannot be seen. And in truth, it has to be seen to authenticate the user. But the larger point here is this: if compelled to by a government, all users can be identified by their login credentials and their IPs. Connecting to Tor first to "hide" an IP from the VPN would be senseless since the authorities would already have identified you by the credentials and the IPs recorded. By exiting out of Tor, neither the authorties nor the VPN operator can know your destination. If the authorties come after you, for whatever reason, and they see you exited out of Tor--it is by magnitudes more difficult to be identified than if you exit out of a VPN server. No, again this is false, see above. With the specified setup, we NEVER know neither the identity nor the IP address of the customer, so we can't disclose those information, not even if we had a gun pointed to our head. Those information could not be discovered not even if one of our servers was monitored in real time. Kind regards
  2. Hello! With the due respect, are you joking? First of all we're not in the USA, second and more importantly we don't turn on logging because "an USA individual" asks us to. Kind regards
  3. Hello! Thank you for the nice discussion. Absolutely not: Air has been designed exactly with the purpose to leave the option to customers to NOT allow the admins to know the identity from the login credentials. It is well explained in the link given in the previous post: if you buy a code with Bitcoin from an independent reseller and you connect over TOR, there's no way in this world that Air admins can get to know your identity. Unfortunately not. If you use only TOR, you anyway need to trust: - that the exit node is not malicious or compromised; - that your adversary does not control the relevant portion of the TOR network you connect to. Control over the TOR network is possible by an adversary with enough power (for example a well determined government which controls the ISPs and the border routers). Bypassing the trust on one single party requires partition of trust. So, with VPN over TOR you defeat a malicious exit node and an adversary which has the power to control your line AND (the Air server you connect to OR the relevant portion of the TOR network). With TOR over VPN, you can't defeat this type of adversary and you don't defeat a malicious exit node. Kind regards
  4. The link does not work. And I strongly suspect this is rubbish to the nth power. The traffic is encrypted and cannot be parsed in plain text. I have never heard or read of anything bypassing strong encryption. This is fanciful nonsense. Hello! You can imagine a situation where a citizen is "locked in a cage": the adversary must have the ability to poison the victim DNS and propose alternative (or stolen) SSL certificates which "look like" the original site. The victim is led to believe that he/she is not in a such a "caged" network and that the certificates he/she receives from the https websites are not fake. With the device advertised in the tvhawaii's link, the adversary can more easily succeed in its attack, because the device acts as a gateway to the real https website and sends fluidly (quickly enough so that the victim can't notice any suspect lag) the real pages of the site the victim connects to. Each vInspector devices is advertised as capable to handle up to 3.5 Gbit/s SSL throughput. Actually, this admin has had direct experience that this method has been repeatedly used by human rights hostile governments in order to capture and "decrypt" the traffic of their citizens to/from https websites, including GMail and Facebook. Kind regards
  5. Hello! It's not possible to decrypt the packets you send to the VPN server and the packets you receive from the VPN server (not even by someone who's monitoring your line), except by your client. The device you link is meant to decrypt and re-encrypt SSL traffic for which it has already all the keys. This can be obtained in corporate environments or with malicious means, to which an OpenVPN hardened security based VPN is not vulnerable. To have a closer hint on how these devices work: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk65123 EDIT If you're curious to see the strength of AES (Air data channel is encrypted with AES-256-CBC): http://en.wikipedia.org/wiki/Advanced_Encryption_Standard#Known_attacks The fastest known attack against AES-256 requires 2^254 operations for key discovery... and OpenVPN executes TLS re-keying every 60 minutes. Kind regards
  6. Hello! That's the whole point. An account used for critical activities for which the account holder does not want to let VPN administrators know its real IP address must always connect over the VPN over TOR. It's not difficult at all (once you have configured OpenVPN or our client to use a TOR proxy, OpenVPN will not even connect if you forget to run the proxy) and a careful person will always do that, or use separate accounts for separate activities. In our case, we are unable to correlate because we don't keep logs. But if a server is monitored in real time by an hostile entity, here you can see the great advantage of VPN over TOR. You can defeat an adversary even if it can monitor YOUR line AND VPN servers lines simultaneously, and this is a huge, really enormous benefit. Anyway, this sends us back to partition of trust. We have repeatedly been talking about the strong advantages of Air over TOR in order to perform partition of trust when absolutely necessary: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=54&limit=6&limitstart=6&Itemid=142#1745 Obviously partition of trust can be performed with any other socks or http proxy, or with VPN over VPN (for example just running a client in a host machine and another client which connects to a different server in a VM), TOR is just a significant example which gives some notable advantages (for example in TOR Browser Bundle you find a customized browser perfectly prepared to mitigate any privacy assault). It all depends on which adversary you have to face. A file sharer adversary is completely different from the adversary in human rights hostile countries. Kind regards
  7. Hello! The problem was here: but immediately after, when restarted, OpenVPN could handle correctly the TUN/TAP interface: It's difficult to say for sure, but maybe the TUN adapter driver had crashed. If the problem persists, we would suggest that you uninstall completely and re-install OpenVPN, making sure to authorize the installer to install all the drivers. In our package for Windows OpenVPN 2.2.2 is included, while if you need different versions please see here: http://openvpn.net/index.php/open-source/downloads.html Also, we strongly recommend that you secure your connection against leaks in case of unexpected disconnections. You can find the guides to do that (according to your system) in the forum announcement section link. https://airvpn.org/forums Please feel free to keep us updated. Kind regards
  8. Hello! That's why we accept Bitcoin (also through a separate reseller) and Liberty Reserve. If you tunnel over TOR over OpenVPN, the VPN can see your real IP address. So, if your aim is to hide your IP address to our servers and use every protocol over TOR, you have to go with Air over TOR. If you don't want to hide your IP address to our servers AND you don't need to tunnel UDP over TOR AND you don't need transparent tunneling over TOR, then TOR over VPN is an option. It's the opposite. If you tunnel TOR over VPN, you'll need to configure every single program to be tunneled over TOR, and you can't anyway tunnel UDP. If you tunnel VPN over TOR, our servers can't know who you really are and you bypass proxy limitations and need to configure every single program to be tunneled over a proxy. So it's just a matter of what you really need. Kind regards
  9. Hello! Can you please try connections to different servers and especially different ports and protocols? Just in case your ISP caps bandwidth on some or all UDP ports. Kind regards
  10. Hello! You can achieve your purpose with DNAT, please see here: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=2849&Itemid=142#4695 Kind regards
  11. Hello! Yes, TCP has a full error correction and therefore you have a slight overhead which results in slower performance. If there's high packet loss or fragmentation, TCP may be able to let you connect anyway (while UDP might be unable to do that) at the price of performance. You should check the logs during an UDP connection in order to see whether you have packet loss or fragmentation (fragmentation is not so rare on WiFi connections). Kind regards
  12. Hello! We have detected no problem at all with Serpentis in the last week. Some more details? Kind regards
  13. @superduper Hello! Please try to uninstall completely OpenVPN. Then re-install it making sure that you authorize the installer to install all the drivers. Kind regards
  14. Hello! Can you please try a direct VPN connection with your computer, both toward TCP and UDP ports? It's likely that you have some bottleneck on your routers. Also, please consider that most DD-WRT routers don't have the CPU power to support an higher than 7-8 Mbit/s AES-256 encrypted throughput. Kind regards
  15. Hello! That's perfectly fine, your ISP can't even know that you're using an NNTP client. On top of that, using an ssl connection (like you do) will also encrypt the packets from the Usenet to our server (i.e. not only from our server to you and vice versa), which protects your authentication details even outside the VPN. You don't need to forward ports (in general, you need to forward ports only for services which need to be reached with connections from the Internet, and this is not the case for an NNTP client: it's the client that establishes a connection). Kind regards
  16. Hello! Can you please send us: - your network zones - your global rules - your application rules - your client logs Kind regards
  17. Hello! Your account was activated to premium status immediately after the payment and the instructions e-mail was sent as well. Anyway you can access the instructions here: https://airvpn.org/enter FAQ are available here: https://airvpn.org/faq The servers monitor is available here: https://airvpn.org/status Guides to secure your connection against leaks in case of unexpected disconnection are permanently linked in the announcement section of the forum: https://airvpn.org/forums Our ToS and Privacy Policy are linked at the bottom of our web pages. Kind regards
  18. Hello! Please see here: https://www.torproject.org/docs/faq#TBBSocksPort Once you can predict the proxy listening port, just set the same port in our configuration generator (or modify the configuration file accordingly). Kind regards
  19. Hello! It depends especially on how many trial requests we receive. If you have not received an answer to your trial request, please re-send it after November the 4th. Please note that a trial request message must have the correct subject and that only one trial can be requested. Kind regards
  20. Hello! Outbound port 25 is blocked to prevent spam. This is the only non-neutral constraint on our servers, it is absolutely necessary because spamming would cause a quick blacklisting of all of our IP addresses. The solution is quite straightforward, just use a different port and use SMPT over SSL or other forms of encryption/authentication. Clear text SMTP handshaking and mail sending must be avoided at all costs in any case. Kind regards
  21. Hello! You need to make sure that your proxy is running and listening to port 9050. Please see here: https://www.torproject.org/docs/faq#TBBSocksPort Kind regards
  22. Hello! We're glad to inform you that OpenVPN 2.2.2 and OpenVPN 2.3-beta work swiftly on Windows 8, so this OS is already supported. Kind regards
  23. Hello! The MAC address of your computer card is not transmitted to the Internet (it is not a part of the network layer packets). Your computer network card MAC address is visible only inside your LAN/WAN. Your ISP can't see your computer network card MAC address. It can see your router/modem MAC on its first hardware device because that is an ARP domain between your router and the ISP's domain router. So, AirVPN and AirVPN providers can't see neither your computer MAC address nor your router MAC address, simply because they don't receive it in any way. Kind regards
  24. Hello! Yes, it is. Please note that since Tails forces all connections over TOR, you will have a connection over OpenVPN over TOR, not a pure over OpenVPN connection. This adds security at the price of poor performance. If you wish a pure OpenVPN connection (i.e. not over TOR) in Tails, you can easily have that, please read here: https://tails.boum.org/forum/how_to_install_openvpn__63__/ Proceed with caution. Kind regards
  25. Hello! Please try to limit your upload speed. We don't shape traffic at all, so it might be an ADSL problem (if you're on an asymmetric line), since a too high upload bandwidth will "strangle" your download bandwidth. PeerBlock/PeerGuardian blocking lists have been reported to cause a lot of troubles in our network (because some of those lists block a huge amount of perfectly legitimate IP addresses, including some of our servers IP addresses). If you're running this type of programs, try to disable them. Finally, if you're using Windows and the Windows firewall, please check that it does not filter your torrent client on ANY network. Even though the torrent client is authorized on some network, it might be filtered in other ones (when you enter the Virtual Private Network, you're in another network). Kind regards
×
×
  • Create New...