Jump to content
Not connected, Your IP: 18.219.176.215

Staff

Staff
  • Content Count

    11043
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1866

Everything posted by Staff

  1. Hello! Yes, once you're inside the VPN browse to https://speedtest.air to perform a direct speed test with the server, without relying on external services. Kind regards
  2. Hello! In order to change DNS: - Choose Apple menu > System Preferences, and then click Network. - Select the network connection service/card you want to use in the list, and then click Advanced. - Click DNS and enter the IP address of the VPN DNS server (10.4.0.1) as first Repeat the process for every network card. Kind regards
  3. Hello! Uh, sorry, when you talked of iptables this admin assumed that you were trying to implement the iptables rules without graphical iptables frontends. If you use gufw, just send the gufw rules, don't bother about the underlying iptables rules. Kind regards
  4. Hello! It depends on your OS, which one are you using? No DNS query will go out when you're disconnected from the VPN with the firewall recommended rules set in the computer which runs the client, regardless of a locked or not locked router (this is the reason for which we recommend, in some configurations, to add in the hosts file the airvpn.org resolution, otherwise reconnection with the Windows Air client would not be possible - no modification is necessary if you use OpenVPN directly). When that computer is connected to the VPN, only encrypted (tunneled) DNS queries will go out. The tunneled DNS queries not only can't be read by your ISP, but can't even be recognized as such. Kind regards
  5. Hello! Did you create a script to flush rules and add the rules showed in https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=1713&limit=6&limitstart=30&Itemid=142#2010 ? If so, can you publish it? Kind regards
  6. Hello! We can tell you ad nauseam that we don't log and we respect privacy of our customers etc. but IF you can't trust us and/or if you think that your adversary has the power to control the VPN servers, THEN the only safe solution is performing partition of trust: this a technical solution to defeat ANY adversary that spies on you directly on the VPN server. Kind regards
  7. Hello! Great news, thank you for sharing! Kind regards
  8. Hello! There's probably something wrong in your rules, Firefox must be unable to send data when the VPN connection drops. Can you post your rules? Kind regards
  9. Hello! That depends on the investigation methods chosen by the proper authorities and on the alleged crime. We can't spy on our customers, the investigation methods are not our competence. Sorry, we don't understand the scenario depicted in your phrases as well. [EDIT] In case you're speculating about a scenario in which the adversary has the power to monitor the VPN provider servers, then again the technical solution to defeat such an adversary is performing partition of trust as described in the post linked in the previous message. Kind regards
  10. Hello! No investigation based on logs is possible because we don't keep any log on OpenVPN clients traffic. About the USA (since you cite FBI, probably you're thinking of the USA only), there are no USA laws which compel any provider to keep logs. Please read carefully our ToS: if an account allegedly violates our ToS (in particular infringements of the ECHR) AND we are authorized to proceed by the jurisdictional competent magistrate with the aid of competent/specialized authorities, nothing prevents us to perform ex-post investigations if we wish so, just like it happens with any real mere conduit of data. The important difference between us and several VPN providers is that we don't log ex-ante and that we strictly comply to 95/46/EC and 2002/58/EC. We can go on forever discussing about what's true or not, so the ultimate argument is that our system has been designed so that you don't need to trust us, please read here: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=54&limit=6&limitstart=6&Itemid=142#1745 Partition of trust is sometimes overlooked but it becomes essential when you can't allow yourself to trust a single entity, like your ISP, or a VPN provider. Kind regards
  11. Hello! There are no problems with Air servers. Please see here for possible causes: https://airvpn.org/faq#speed That said, another option is that your ISP is capping bandwidth on some ports. Please try connections on different ports to make a comparison (for example 80 UDP, 80 TCP and 53 UDP). Kind regards
  12. Yes, I generated it and it is self signed, as the website states. There are many issues I take with Certification Authorities. And, in fact, I use Convergence, which removes the whole spurious CA issue. The certificate is trusted by default in Convergence. I have thought about implementing something similar to your suggestion. I have not decided yet but it is possible--to avoid scaring off people. Hello! A confirmation from you of the following would be enough atm: SHA-1 fingerprint: 5E 1B EA F4 B3 76 E0 01 E0 3D 51 21 0C 9F FC 77 00 E3 5C 85 SHA-256 fingerprint: 7B 5F A0 F0 18 49 13 B4 8E 06 F5 A6 B4 2F 94 FF 59 9B B2 A2 5D 4F B4 AB 86 7A 6B E6 26 61 0A B2 This is the certificate we can see from the Air network. Since it's the same from all the Air servers, the probability of an hijacking can be considered practically zero if you confirm the above. This manual verification may be irrelevant in several countries, but might be important in some other countries. Kind regards
  13. Thank you! Since the certificate is not emitted by a CA, can you please publish the SH1 and MD5 fingerprints of the certificate to allow verification to everyone? Kind regards
  14. Hello! Of course, this may happen if your computer sends DNS queries to your locked router/modem. The locked router/modem will then send a query to your ISP DNS. In this case you need either to prevent leaks with our firewall guides or force the DNS resolution to the VPN DNS (10.4.0.1 https://airvpn.org/specs), so that the VPN query will be encrypted and encapsulated by your OpenVPN client, sent to our servers and finally processed by them. This gives the advantage to be able to access VPN internal services and bypass some ICE censorship which can't be bypassed with any other DNS. Kind regards
  15. Hello! If the modem/router DNS are locked, you can anyway bypass them. Once you're inside the VPN you can use the VPN DNS or tunnel any DNS query you like over the VPN. Kind regards
  16. Hello! Unfortunately so. Please see here: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=5650&Itemid=142 Kind regards
  17. Hello! Yes. Your ISP can't see: - the real origin and destinations of your packets - the payload (the content) of your packets - the applications you use - the protocols you use About e-mail, an important exception is when your mail provider is also your ISP. In that case your e-mails will in the end pass through the servers of your very same ISP and (if unencrypted) can be potentially read by it. We don't keep logs of that kind. We don't monitor traffic and we don't log any client activity. Absolutely not. PayPal never reveals your credit card number to the seller. Kind regards
  18. Hello! If/when you wish to use the VPN DNS, just set 10.4.0.1 as primary DNS IP, and leave the OpenDNS server IP as "alternate". Kind regards
  19. Hello! We're sorry to inform you that Pegasi and Arietis have been suspended by the provider (SecuredServers LLC) without prior notice for alleged network abuse. While the provider was and is totally incapable to provide any proof of such abuse, it decided to suspend the servers. We assure you that such suspension does not harm our plans in the USA: on the contrary it gives us additional incentives to expand our USA operations. Currently bandwidth for the USA remains widely redundant, anyway we're working to bring additional servers in the USA as soon as possible. Kind regards
  20. Hello! It appears definitely a DNS issue. What is your OS? Kind regards
  21. Hello! The problem has been fixed, we apologize for the inconvenience. Please try again port forwarding on Cygni at your convenience. Kind regards
  22. Hello! No particular setup is needed. Connect to a server and then launch uTorrent. It's very important that you launch uTorrent AFTER you have connected to the VPN. Nothing more on the torrent client side. We recommend that you secure your connection against leaks in case of unexpected VPN disconnection, please see the guides in the announcement section of the forum "Prevent leaks with..." according to your OS: https://airvpn.org/forums Yes, absolutely! Kind regards
  23. Hello! When you're connected to any VPN server, all the programs you run will be tunneled transparently. No need to configure any of them. Please note that we don't have proxy servers and we don't provide (currently) proxy services. Just make sure that you launch your p2p client AFTER you have connected to the VPN, of course. Yes, in order to optimize performance. If you use latest uTorrent versions or torrent programs which are able to "punch" NATs, you don't even need to forward remotely ports (our NAT is p2p friendly and can be punched by clients). No: that's necessary only if you want to tunnel a program over a proxy over AirVPN (an advanced usage which you probably don't need for p2p). Kind regards
  24. Hello! Thank you for your purchase from our authorized reseller. Please log in with the account you wish to activate and click on the big star in the home page. Direct link: https://airvpn.org/payment_plans Kind regards
×
×
  • Create New...