-
Content Count
11333 -
Joined
... -
Last visited
... -
Days Won
1948
Everything posted by Staff
-
Hello! Account 99zeros is not on premium status, so you should not be able to connect to VPN servers with that account. Probably you're trying with another account in premium status, but we can't help you properly if we don't know the account name. As a general recommendation, please make sure that no program (check especially firewall, antivirus, PeerGuardian, PeerBlock and Malwarebytes) is blocking incoming packets for torrent clients. Kind regards
-
Hello! A VPN secures your connection, not your computer or your behavior. When you subscribe you accept the Terms of Service and the Privacy Notice in their entirety. We can't, we don't keep logs that can be used for such purposes. Also we don't process directly credit cards so we don't have any data about credit cards. We do have PayPal info payments but we are not able to correlate them with VPN activity, because we don't monitor connections and we don't keep logs which can be exploited to disclose a customer identity or real IP address, in compliance with relevant EU directives. Kind regards
-
done a dns leaktest is this normal what i get with dnsleaktest
Staff replied to sunnymorning's topic in General & Suggestions
Hello! But that's not us. It's just a geo-location mistake made by some service. Kind regards -
Hello! Maybe you are trying to connect to the ControlPort instead of the SocksPort. Defaults in Windows are 9050 (SocksPort) and 9051 (ControlPort). OpenVPN must connect to the SocksPort, not the ControlPort. Kind regards
-
Help me out! Tunnelblick+GoogleDNS=DNS leaks?
Staff replied to foole's topic in Eddie - AirVPN Client
Hello! A very explicative guide (maybe even too much) is here: http://macs.about.com/od/networking/qt/configure-your-macs-dns.htm You might also like to search for 'how to change DNS on Mac OS X" on any search engine, for example: http://www.google.com/search?q=how+to+change+DNS+on+Mac+OS+X Kind regards -
Hello! Our business model is based on various important factors, amongst which a guaranteed allocated bandwidth, transparency (see our real time servers monitor) and total absence of overselling. These are the main reasons for which we allow one single connection per account. In order to connect multiple devices simultaneously with one account, you need a gateway which runs OpenVPN (such as a computer with two network cards, a DD-WRT/Tomato router...). All the other devices connected to the "gateway" will use the tunnel transparently. What we want to avoid, in order to provide a premium service, is a variable number of connections from one account from different networks, which would cause several issues to our model. Please consider that the competitor you cited (snipped out by this admin, in order to avoid bad or good advertising to them) provides just 3 servers in 3 countries, no real time servers monitor and no guaranteed allocated bandwidth. Kind regards
-
done a dns leaktest is this normal what i get with dnsleaktest
Staff replied to sunnymorning's topic in General & Suggestions
Hello! Yes, the test is normal, it shows no leaks. Cygni is in Stockholm, Sweden, if you see Netherlands there's a mistake somewhere, can you please tell us where you see that? Kind regards -
Hello! About I2P over AirVPN, please see this old post: https://airvpn.org/index.php?option=com_kunena&func=view&id=23&catid=3&Itemid=142#26 Kind regards
-
Hello! Once you have subscribed, our configuration generator becomes accessible and will generate certificates, key and configuration files according to your preferences. Please access it (while logged in) at menu "Member Area"-->"Access without our client". Instructions for Mac OS X are available here: https://airvpn/macosx anyway at the subscription you will receive an e-mail (if you entered a valid e-mail address) with instructions and all the relevant links. Kind regards
-
virustotal.com not working with airvpn only works over tor
Staff replied to sunnymorning's topic in General & Suggestions
Hello! Thank you for the information! We'll look into the issue. Kind regards -
Hello! Please see previous messages in this thread. Again, if you can't afford to trust us for imparting and/or receiving critical information, we have designed the system so that you can use it as a tool where trust in us is not necessary: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=54&limit=6&limitstart=6&Itemid=142#1745 Kind regards
-
Hello! Please see here: https://airvpn.org/tor Some of your questions are not fully understood, can you please elaborate? Kind regards
-
Hello! A sufficiently powerful adversary theoretically can have performed the packet substitution on any point between our servers and you. Using a VPN properly configured is an effective way to defeat replay attacks. If you have noticed no decrease in performance, probably either the attack was short in time or it was not an attack at all, just a momentary network problem. Probably you should not be worried at all (as long as you connect to a VPN or you connect over SSL/TLS), anyway keep an eye on the logs and feel free to report back if the problem persists or gets bigger. Kind regards
-
Hello! The replay attack (if any) would be against you specifically. Not a big concern, OpenVPN can perfectly handle and defeat such attacks through packet authentication (if enabled, as it is in our system). Did you notice any performance decrease? Kind regards
-
Hello! Yes, we confirm that. Each server has one static entry-IP and one shared static exit-IP address. Kind regards
-
Hello! Please see here: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=4821&Itemid=142#4828 We kindly ask you to keep us informed at your convenience if the problem persists. Kind regards
-
Hello! You can check on the .ovpn configuration file and on your OpenVPN client logs. For your comfort: - data channel: AES-256-CBC (AES 256 bit) - packet authentication: SHA 160 bit - RSA keys size: 2048 bit Kind regards
-
Hello! It must be determined why you ping 10.4.0.1 and you get a reply from 163.139.126.110 (it suggests that you're not inside the VPN and/or that the OpenVPN server routes and gateway push failed): Can you please send us (even in private if they include sensitive information): - your client connection logs - your routing table after the connection (output of the command "route print") - your network cards information while your computer is connected (output of the command "ipconfig /all") - a route tracing to 10.4.0.1 while your computer is connected (output of the command "tracert 10.4.0.1") Kind regards
-
Hello! Yes, of course. The showed picture (link removed, no ads allowed) pertains only to OpenVPN, though, and a picture is a picture, it proves nothing unfortunately. Unfortunately, because if a picture could prove that we don't keep logs, it would be so easy to provide such a proof. If you can't afford to trust us because your network activity is highly critical (for example high level whistleblowing, information dissemination about brutality/corruption in a human rights hostile regime etc etc...), you should hide your real IP address to our servers even while connected. An example: https://airvpn.org/tor or you can hide the content of your traffic with the other way round (TOR over AirVPN, for example). When it's a matter of personal freedom (or even of life or death...) the concerns focus not only on logging, but on real-time wiretapping by some hostile entity. Kind regards
-
Hello! The percentage shows the used bandwidth on the servers. So a 100% shows that a server can't give any more bandwidth, the additional bandwidth required will be divided into all the connected clients, so you might like to prefer servers with lower percentages. Our guaranteed allocated bandwidth requires that you pick servers "cum grano salis", because currently we prefer not to forbid connections on busy servers. Bandwidth redundancy is currently so high that you can always find a server with at least 500 Mbit/s bw free. Kind regards
-
Hello! They use the very same datacenter where Virginis is located, probably they have the luck that some IP blocks are not blocked by Zattoo. Kind regards
-
EDIT: problem solved. It was caused by a flood attack which we successfully mitigated. Hello! We're experiencing various issues with the secondary frontend. If you have in your hosts file the line: 85.17.207.151 airvpn.org and you can't access it, please switch to the primary frontend 212.117.180.25: 212.117.180.25 airvpn.org We're investigating. Kind regards
-
Hello! We have been unable to find any provider in Switzerland which is not blocked by Zattoo, unfortunately. Kind regards
-
Hello! Yes, fake. Interestingly enough no law is cited. A brief but good overview of the data retention laws in the USA is in the Wikipedia article http://en.wikipedia.org/wiki/Telecommunications_data_retention#United_States On top of that, we can cite Title 18 of the United States Code, Section 2703(f), that states that: "A provider of wire or electronic communications services or a remote computing service, upon the request of a government entity, shall take all necessary steps to preserve records and other records in its possession pending the issuance of a court order or other process." So "a government entity" may oblige a provider to NOT destroy logs (pending an investigation), IF those logs exist, for 90 days (renewable for additional 90 days), without a court order. In order to force a provider to keep recorded logs (again, if they exist) for more than 180 days, a court order is necessary. The requirement for data preservation does not require a service provider to collect data prospectively, nor does it permit the preservation of everything in a service provider’s systems – only the information that related to a specific investigation, IF those information were already available. The United States also does not require ISPs to routinely destroy or retain communications data. ISPs are free to destroy or retain communications data as they each choose, based upon their own assessments, resources, needs and limitation. An up to date situation on data retention laws in the world is kept by the Electronic Frontier Foundation. About the USA, please see here: https://www.eff.org/issues/mandatory-data-retention/us Kind regards