Jump to content
Not connected, Your IP: 216.73.216.7

Staff

Staff
  • Content Count

    11388
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1978

Everything posted by Staff

  1. Hello! But that's not us. It's just a geo-location mistake made by some service. Kind regards
  2. Hello! Maybe you are trying to connect to the ControlPort instead of the SocksPort. Defaults in Windows are 9050 (SocksPort) and 9051 (ControlPort). OpenVPN must connect to the SocksPort, not the ControlPort. Kind regards
  3. Hello! A very explicative guide (maybe even too much) is here: http://macs.about.com/od/networking/qt/configure-your-macs-dns.htm You might also like to search for 'how to change DNS on Mac OS X" on any search engine, for example: http://www.google.com/search?q=how+to+change+DNS+on+Mac+OS+X Kind regards
  4. Hello! Our business model is based on various important factors, amongst which a guaranteed allocated bandwidth, transparency (see our real time servers monitor) and total absence of overselling. These are the main reasons for which we allow one single connection per account. In order to connect multiple devices simultaneously with one account, you need a gateway which runs OpenVPN (such as a computer with two network cards, a DD-WRT/Tomato router...). All the other devices connected to the "gateway" will use the tunnel transparently. What we want to avoid, in order to provide a premium service, is a variable number of connections from one account from different networks, which would cause several issues to our model. Please consider that the competitor you cited (snipped out by this admin, in order to avoid bad or good advertising to them) provides just 3 servers in 3 countries, no real time servers monitor and no guaranteed allocated bandwidth. Kind regards
  5. Hello! Yes, the test is normal, it shows no leaks. Cygni is in Stockholm, Sweden, if you see Netherlands there's a mistake somewhere, can you please tell us where you see that? Kind regards
  6. Hello! About I2P over AirVPN, please see this old post: https://airvpn.org/index.php?option=com_kunena&func=view&id=23&catid=3&Itemid=142#26 Kind regards
  7. Hello! Once you have subscribed, our configuration generator becomes accessible and will generate certificates, key and configuration files according to your preferences. Please access it (while logged in) at menu "Member Area"-->"Access without our client". Instructions for Mac OS X are available here: https://airvpn/macosx anyway at the subscription you will receive an e-mail (if you entered a valid e-mail address) with instructions and all the relevant links. Kind regards
  8. Hello! Thank you for the information! We'll look into the issue. Kind regards
  9. Hello! Please see previous messages in this thread. Again, if you can't afford to trust us for imparting and/or receiving critical information, we have designed the system so that you can use it as a tool where trust in us is not necessary: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=54&limit=6&limitstart=6&Itemid=142#1745 Kind regards
  10. Hello! Please see here: https://airvpn.org/tor Some of your questions are not fully understood, can you please elaborate? Kind regards
  11. Hello! A sufficiently powerful adversary theoretically can have performed the packet substitution on any point between our servers and you. Using a VPN properly configured is an effective way to defeat replay attacks. If you have noticed no decrease in performance, probably either the attack was short in time or it was not an attack at all, just a momentary network problem. Probably you should not be worried at all (as long as you connect to a VPN or you connect over SSL/TLS), anyway keep an eye on the logs and feel free to report back if the problem persists or gets bigger. Kind regards
  12. Hello! The replay attack (if any) would be against you specifically. Not a big concern, OpenVPN can perfectly handle and defeat such attacks through packet authentication (if enabled, as it is in our system). Did you notice any performance decrease? Kind regards
  13. Hello! Yes, we confirm that. Each server has one static entry-IP and one shared static exit-IP address. Kind regards
  14. Hello! Please see here: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=4821&Itemid=142#4828 We kindly ask you to keep us informed at your convenience if the problem persists. Kind regards
  15. Hello! You can check on the .ovpn configuration file and on your OpenVPN client logs. For your comfort: - data channel: AES-256-CBC (AES 256 bit) - packet authentication: SHA 160 bit - RSA keys size: 2048 bit Kind regards
  16. Hello! It must be determined why you ping 10.4.0.1 and you get a reply from 163.139.126.110 (it suggests that you're not inside the VPN and/or that the OpenVPN server routes and gateway push failed): Can you please send us (even in private if they include sensitive information): - your client connection logs - your routing table after the connection (output of the command "route print") - your network cards information while your computer is connected (output of the command "ipconfig /all") - a route tracing to 10.4.0.1 while your computer is connected (output of the command "tracert 10.4.0.1") Kind regards
  17. Hello! Yes, of course. The showed picture (link removed, no ads allowed) pertains only to OpenVPN, though, and a picture is a picture, it proves nothing unfortunately. Unfortunately, because if a picture could prove that we don't keep logs, it would be so easy to provide such a proof. If you can't afford to trust us because your network activity is highly critical (for example high level whistleblowing, information dissemination about brutality/corruption in a human rights hostile regime etc etc...), you should hide your real IP address to our servers even while connected. An example: https://airvpn.org/tor or you can hide the content of your traffic with the other way round (TOR over AirVPN, for example). When it's a matter of personal freedom (or even of life or death...) the concerns focus not only on logging, but on real-time wiretapping by some hostile entity. Kind regards
  18. Hello! The percentage shows the used bandwidth on the servers. So a 100% shows that a server can't give any more bandwidth, the additional bandwidth required will be divided into all the connected clients, so you might like to prefer servers with lower percentages. Our guaranteed allocated bandwidth requires that you pick servers "cum grano salis", because currently we prefer not to forbid connections on busy servers. Bandwidth redundancy is currently so high that you can always find a server with at least 500 Mbit/s bw free. Kind regards
  19. Hello! They use the very same datacenter where Virginis is located, probably they have the luck that some IP blocks are not blocked by Zattoo. Kind regards
  20. EDIT: problem solved. It was caused by a flood attack which we successfully mitigated. Hello! We're experiencing various issues with the secondary frontend. If you have in your hosts file the line: 85.17.207.151 airvpn.org and you can't access it, please switch to the primary frontend 212.117.180.25: 212.117.180.25 airvpn.org We're investigating. Kind regards
  21. Hello! We have been unable to find any provider in Switzerland which is not blocked by Zattoo, unfortunately. Kind regards
  22. Hello! Yes, fake. Interestingly enough no law is cited. A brief but good overview of the data retention laws in the USA is in the Wikipedia article http://en.wikipedia.org/wiki/Telecommunications_data_retention#United_States On top of that, we can cite Title 18 of the United States Code, Section 2703(f), that states that: "A provider of wire or electronic communications services or a remote computing service, upon the request of a government entity, shall take all necessary steps to preserve records and other records in its possession pending the issuance of a court order or other process." So "a government entity" may oblige a provider to NOT destroy logs (pending an investigation), IF those logs exist, for 90 days (renewable for additional 90 days), without a court order. In order to force a provider to keep recorded logs (again, if they exist) for more than 180 days, a court order is necessary. The requirement for data preservation does not require a service provider to collect data prospectively, nor does it permit the preservation of everything in a service provider’s systems – only the information that related to a specific investigation, IF those information were already available. The United States also does not require ISPs to routinely destroy or retain communications data. ISPs are free to destroy or retain communications data as they each choose, based upon their own assessments, resources, needs and limitation. An up to date situation on data retention laws in the world is kept by the Electronic Frontier Foundation. About the USA, please see here: https://www.eff.org/issues/mandatory-data-retention/us Kind regards
  23. Hello! We are aware that OpenVPN 2.3.0 fixed some issues in Windows, but at the moment we have no rational explanation on the performance boost. It must be related to your upgrade, though, because nothing changed on the servers side. By the way, we're of course extremely glad to know that! Kind regards
  24. Hello! We don't know about any data retention law, and not even about any law, in the Anonymous Proxy. Currently there's no data retention law in the USA. The last attempt to approve a law which would mandate data retention failed years ago. Please see also: http://en.wikipedia.org/wiki/Telecommunications_data_retention#United_States The comment this admin sees on that site is "Are you comfortable with Leaseweb BV..." which again is deeply incorrect (please see the data retention directive, 2006/24/EC). Apparently that site has a page which automatically shows your ISP (this admin connected to their site from Leporis) and adds "logging...", and this explains why you get the very funny message "...laws in Anonymous Proxy..." No, we're not aware of that, anyway it is irrelevant, because the web sites visited from one of our servers in any Leaseweb server would be recorded as visited by us, not by our customers. Any correlation with our customers' traffic is destroyed. Kind regards
  25. Hello! You need the .NET framework 2.0, or alternatively you can download the following client specifically compiled for 64 bit systems and .NET framework 4 (you will find OpenVPN 2.3_rc1 in the package as well): https://airvpn.org/repository/air_windows8_x86_64.zip We'll soon rationalize packages because OpenVPN 2.3 stable version has been released two days ago. Kind regards
×
×
  • Create New...