Jump to content
Not connected, Your IP: 216.73.216.40

Staff

Staff
  • Content Count

    11483
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    2020

Everything posted by Staff

  1. Hello! Using AirVPN while connected to a public wifi hot-spot is a very good idea. While your device is connected to a VPN, the hot spot administrators can't see your packets real headers and payload, so they can NOT see real origins and destinations of your packets, real origin and destination ports, protocols and applications you use and content of your traffic. Additionally you will not be "visible" on the Internet with the hot-spot exit-IP address. Kind regards
  2. Hello! You get a certificate warning because the certificate belongs to airvpn.org We confirm you that the domain name you typed belongs to us. Please use the other name only if absolutely necessary (for example is your ISP blocks airvpn.org via DNS poisoning), or even better insert in your hosts file the following lines, so you can point to airvpn.org, you'll not get any warning and you'll be immune to DNS poisoning for airvpn.org: 85.17.207.151 airvpn.org 212.117.180.25 airvpn.org Kind regards
  3. @WinniethePooh Hello! We don't accept Paysafecard. We accept Liberty Reserve, Bitcoin and PayPal. You can pay any amount you wish with Bitcoin on each transaction, you don't have to transfer all the BTC in your account on any given transaction, obviously. Kind regards
  4. Staff

    API?

    Hello! We're sorry, currently not, and at this moment it has not been planned. Kind regards
  5. Hello! Yes, it's normal. The Unidentified network is bound to the TAP-Win32 Adapter (the virtual network interface used by OpenVPN), as far as we can see from the screenshot, because the reported IP address is the VPN IP address DHCP-pushed to your client by our servers. Kind regards
  6. Hello! Not really... HTTP is TCP traffic, while torrent clients rely heavily on UDP. UDP over UDP has some advantages (for some purposes) and disadvantages on UDP over TCP. There's also at least another variable to take into consideration, i.e. with http you normally connect to a single server, while with p2p to a swarm of peers. Kind regards
  7. Hello! Yes, it's possible, the performance difference may be very small in optimal conditions (for example when your ISP is directly connected to, or IS, the same tier1 provider to which the Air server is connected to). What is your ISP nominal "peak" download bandwidth? Kind regards
  8. Hello! The upgrade solved the first detected problem. Now the logs look just fine. Kind regards
  9. Hello! The problem is that the TAP-Win32 interface does not come up properly. Can you please try an upgrade to OpenVPN 2.3.0? Please pick the package for your system here: https://airvpn.org/windows OpenVPN 2.3.0 fixes several issues with the TAP-Win32 driver for Windows. Kind regards
  10. Hello! Perfect, Transmission is correctly tunneled as expected. Kind regards
  11. Hello! The reason of the disconnection is that there's no communication between your system and Castor. Maybe it happens 2-3 times a day. See here: and here: Our configuration files already order OpenVPN to retry connection. network-manager ignores also "explicit-exit-notify" directive (so even when the client disconnects "cleanly" our servers do not get notified of it by the client). Can you please try a connection directly with OpenVPN to make a comparison test? Kind regards
  12. Hello! Apparently there's a communication problem between your system and the server you're trying to connect to (unfortunately you deleted the IP address so we don't know whether you're pointing to the correct address). Can you please check that your firewall or any other program is blocking OpenVPN and/or UDP packets to outbound port 443? Do you get those logs with every server on port 443 UDP you try to connect to? Have you tested different ports? What is your OS and which client are you using? If it's network-manager, please make sure that you generate (in our configuration generator) .ovpn configuration files NOT embedded with certificates and key, because unfortunately network-manager does not support them. Kind regards
  13. Hello! Can you please perform the following test (while you're connected to an Air VPN server): http://checkmytorrentip.com and check whether the test detects your real IP address or not? Kind regards
  14. Hello! No, the DNS servers used by our servers (after a first, internal resolution to bypass ICE censorship) are by Google, which routes the query in order to optimize performance. If you see only Google DNS you have no DNS leaks. Kind regards
  15. Hello! In order to show the routing table issue the command (from a shell): netstat -rn or netstat -r if you wish host names. Which torrent client are you running? Might it be forced to bind to your physical interface, instead of tun adapter? For example Vuze provides a bind option. Kind regards
  16. Hello! At the time of your writing we had approx. 15 "tormented" minutes caused by db lack of sync. The problem was solved, please feel free to let us know if it's all right now. Kind regards
  17. Hello! When the problem occurs, could you please try to close the Air client, open a command prompt, issue the command "ipconfig /renew", re-launch the client and connect again? Can you please let us know if these steps solve your problem when it occurs? Kind regards
  18. Hello! Nothing seems unusual, all the data you report do not show anything strange. About the routing table, which OS are you running? Kind regards
  19. Hello! In optimal conditions UDP is much more efficient than TCP for an OpenVPN connection. Please see our FAQ for more details. https://airvpn.org/faq#udp_vs_tcp Kind regards
  20. Hello! Either you're not really connected to an Air server or your account in the chat room has been recorded with your real IP address (maybe you connected to it in the past with your real IP address and the same account). In order to ascertain that your VPN connection is correctly established, can you please send us your client connection logs? Kind regards
  21. Unfortunately, DNS was originally designed with a great deal of implicit trust, so encrypting the traffic between you and AirVPN doesn't necessarily cure everything. https://en.wikipedia.org/wiki/DNS_spoofing Hello! It must be said that connection to Air makes your system immune to DNS spoofing as long as you use the VPN DNS (and you don't have malware or hosts interfering software rewriting your hosts file, but in this trivial case neither DNSSEC can save you, obviously). And it must also be noted that things like that can't happen AFTER the connection to an Air VPN server (of course China has still the power to perform IP hi-jacking against our servers IP addresses and prevent connections or cause disconnections to our Chinese users). Kind regards
  22. Hello! Glad to hear it. Some things to check on Comodo: - logging: an excessive logging may slow down the whole system - in the "Advanced" tab of the "Firewall Behavior Settings", the following items must NOT be selected: "perform protocol analysis" "block fragmented IP datagrams" and finally probably the most important thing to check: make sure, when you're connected to the VPN, that no task/process is flooding Comodo with an attempt to send packets outside the tunnel (even if they are not harming because directed within your private network, typical example Windows system tasks which start sending an incredible amount of packets toward broadcast addresses under rare conditions). You can check that on the "View Active Connections" windows or even better in the Comodo logs (if you enabled logs for the Block rule(s)). Kind regards
  23. Hello! The MTU in Air is the OpenVPN default (1500 bytes). The fact that your setup does not work in any case (with or without connection to an Air server) suggests that there's something wrong in your freenet configuration. Kind regards
  24. Hello! Please make sure that you have no "defense" program which might wrongly identify UDP packets as an attack and subsequently start to drop packets. When you connect over OpenVPN, all the packets come from the same IP and port on your physical network interface, regardless of the real protocols and applications you use (as you know): the real headers and payload are still encrypted when a packet arrives to your physical network card (the decryption occurs later, when the packets are on the tun adapter they are already decrypted). Having a massive amount of UDP packets all coming from the same IP and toward the same inbound port may trigger a flood alert for some firewall or network monitor/packet filtering programs. Kind regards
  25. Hello! The problem is here: Probably something went wrong during the installation of OpenVPN. Please try to add a TAP-Win32 Adapter by going to "Start"->"All Programs"->"OpenVPN" and launch "Add a new TAP-Windows virtual ethernet adapter" with administrator privileges. After that, try again a connection, if you still have problems do not hesitate to send us the logs again at your convenience. Kind regards
×
×
  • Create New...