-
Content Count
11487 -
Joined
... -
Last visited
... -
Days Won
2022
Everything posted by Staff
-
done a dns leaktest is this normal what i get with dnsleaktest
Staff replied to sunnymorning's topic in General & Suggestions
Hello! Yes, the test is normal, it shows no leaks. Cygni is in Stockholm, Sweden, if you see Netherlands there's a mistake somewhere, can you please tell us where you see that? Kind regards -
Hello! About I2P over AirVPN, please see this old post: https://airvpn.org/index.php?option=com_kunena&func=view&id=23&catid=3&Itemid=142#26 Kind regards
-
Hello! Once you have subscribed, our configuration generator becomes accessible and will generate certificates, key and configuration files according to your preferences. Please access it (while logged in) at menu "Member Area"-->"Access without our client". Instructions for Mac OS X are available here: https://airvpn/macosx anyway at the subscription you will receive an e-mail (if you entered a valid e-mail address) with instructions and all the relevant links. Kind regards
-
virustotal.com not working with airvpn only works over tor
Staff replied to sunnymorning's topic in General & Suggestions
Hello! Thank you for the information! We'll look into the issue. Kind regards -
Hello! Please see previous messages in this thread. Again, if you can't afford to trust us for imparting and/or receiving critical information, we have designed the system so that you can use it as a tool where trust in us is not necessary: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=54&limit=6&limitstart=6&Itemid=142#1745 Kind regards
-
Hello! Please see here: https://airvpn.org/tor Some of your questions are not fully understood, can you please elaborate? Kind regards
-
Hello! A sufficiently powerful adversary theoretically can have performed the packet substitution on any point between our servers and you. Using a VPN properly configured is an effective way to defeat replay attacks. If you have noticed no decrease in performance, probably either the attack was short in time or it was not an attack at all, just a momentary network problem. Probably you should not be worried at all (as long as you connect to a VPN or you connect over SSL/TLS), anyway keep an eye on the logs and feel free to report back if the problem persists or gets bigger. Kind regards
-
Hello! The replay attack (if any) would be against you specifically. Not a big concern, OpenVPN can perfectly handle and defeat such attacks through packet authentication (if enabled, as it is in our system). Did you notice any performance decrease? Kind regards
-
Hello! Yes, we confirm that. Each server has one static entry-IP and one shared static exit-IP address. Kind regards
-
Hello! Please see here: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=4821&Itemid=142#4828 We kindly ask you to keep us informed at your convenience if the problem persists. Kind regards
-
Hello! You can check on the .ovpn configuration file and on your OpenVPN client logs. For your comfort: - data channel: AES-256-CBC (AES 256 bit) - packet authentication: SHA 160 bit - RSA keys size: 2048 bit Kind regards
-
Hello! It must be determined why you ping 10.4.0.1 and you get a reply from 163.139.126.110 (it suggests that you're not inside the VPN and/or that the OpenVPN server routes and gateway push failed): Can you please send us (even in private if they include sensitive information): - your client connection logs - your routing table after the connection (output of the command "route print") - your network cards information while your computer is connected (output of the command "ipconfig /all") - a route tracing to 10.4.0.1 while your computer is connected (output of the command "tracert 10.4.0.1") Kind regards
-
Hello! Yes, of course. The showed picture (link removed, no ads allowed) pertains only to OpenVPN, though, and a picture is a picture, it proves nothing unfortunately. Unfortunately, because if a picture could prove that we don't keep logs, it would be so easy to provide such a proof. If you can't afford to trust us because your network activity is highly critical (for example high level whistleblowing, information dissemination about brutality/corruption in a human rights hostile regime etc etc...), you should hide your real IP address to our servers even while connected. An example: https://airvpn.org/tor or you can hide the content of your traffic with the other way round (TOR over AirVPN, for example). When it's a matter of personal freedom (or even of life or death...) the concerns focus not only on logging, but on real-time wiretapping by some hostile entity. Kind regards
-
Hello! The percentage shows the used bandwidth on the servers. So a 100% shows that a server can't give any more bandwidth, the additional bandwidth required will be divided into all the connected clients, so you might like to prefer servers with lower percentages. Our guaranteed allocated bandwidth requires that you pick servers "cum grano salis", because currently we prefer not to forbid connections on busy servers. Bandwidth redundancy is currently so high that you can always find a server with at least 500 Mbit/s bw free. Kind regards
-
Hello! They use the very same datacenter where Virginis is located, probably they have the luck that some IP blocks are not blocked by Zattoo. Kind regards
-
EDIT: problem solved. It was caused by a flood attack which we successfully mitigated. Hello! We're experiencing various issues with the secondary frontend. If you have in your hosts file the line: 85.17.207.151 airvpn.org and you can't access it, please switch to the primary frontend 212.117.180.25: 212.117.180.25 airvpn.org We're investigating. Kind regards
-
Hello! We have been unable to find any provider in Switzerland which is not blocked by Zattoo, unfortunately. Kind regards
-
Hello! Yes, fake. Interestingly enough no law is cited. A brief but good overview of the data retention laws in the USA is in the Wikipedia article http://en.wikipedia.org/wiki/Telecommunications_data_retention#United_States On top of that, we can cite Title 18 of the United States Code, Section 2703(f), that states that: "A provider of wire or electronic communications services or a remote computing service, upon the request of a government entity, shall take all necessary steps to preserve records and other records in its possession pending the issuance of a court order or other process." So "a government entity" may oblige a provider to NOT destroy logs (pending an investigation), IF those logs exist, for 90 days (renewable for additional 90 days), without a court order. In order to force a provider to keep recorded logs (again, if they exist) for more than 180 days, a court order is necessary. The requirement for data preservation does not require a service provider to collect data prospectively, nor does it permit the preservation of everything in a service provider’s systems – only the information that related to a specific investigation, IF those information were already available. The United States also does not require ISPs to routinely destroy or retain communications data. ISPs are free to destroy or retain communications data as they each choose, based upon their own assessments, resources, needs and limitation. An up to date situation on data retention laws in the world is kept by the Electronic Frontier Foundation. About the USA, please see here: https://www.eff.org/issues/mandatory-data-retention/us Kind regards
-
Hello! We are aware that OpenVPN 2.3.0 fixed some issues in Windows, but at the moment we have no rational explanation on the performance boost. It must be related to your upgrade, though, because nothing changed on the servers side. By the way, we're of course extremely glad to know that! Kind regards
-
Hello! We don't know about any data retention law, and not even about any law, in the Anonymous Proxy. Currently there's no data retention law in the USA. The last attempt to approve a law which would mandate data retention failed years ago. Please see also: http://en.wikipedia.org/wiki/Telecommunications_data_retention#United_States The comment this admin sees on that site is "Are you comfortable with Leaseweb BV..." which again is deeply incorrect (please see the data retention directive, 2006/24/EC). Apparently that site has a page which automatically shows your ISP (this admin connected to their site from Leporis) and adds "logging...", and this explains why you get the very funny message "...laws in Anonymous Proxy..." No, we're not aware of that, anyway it is irrelevant, because the web sites visited from one of our servers in any Leaseweb server would be recorded as visited by us, not by our customers. Any correlation with our customers' traffic is destroyed. Kind regards
-
Hello! You need the .NET framework 2.0, or alternatively you can download the following client specifically compiled for 64 bit systems and .NET framework 4 (you will find OpenVPN 2.3_rc1 in the package as well): https://airvpn.org/repository/air_windows8_x86_64.zip We'll soon rationalize packages because OpenVPN 2.3 stable version has been released two days ago. Kind regards
-
[SOLVED] Connected in Client but not over VPN
Staff replied to sloxy's topic in Eddie - AirVPN Client
Hello! You don't have to give any justification or explanation for a refund request. However refund requests are not taken into consideration in the forum, you must send them through the "Contact us" form while logged in with your account, or send an e-mail to info@airvpn.org. Please provide payment details. Kind regards -
Hello! PPTP uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets, so there are issues in making connections over OpenVPN over PPTP, or over PPTP over OpenVPN. The quickest way to achieve that is probably running PPTP in a host and OpenVPN in a guest OS (VM). Sorry, we don't understand, can you please elaborate? Of course we take every care and we do our utmost best NOT to have (hidden) open backdoors on our servers and we check constantly against vulnerabilities. Running only open source software helps that a lot. Kind regards
-
Hello! You should have found AirVPN (the client for Windows) and the OpenVPN installer. Air is based on free and open source OpenVPN, the most reliable and secure VPN client/server solution available. The Air client is an OpenVPN wrapper with some additional commodities for AirVPN. You need to install OpenVPN in your system in order to connect to AirVPN servers. Instructions for Windows: https://airvpn.org/windows OpenVPN GUI is a Graphical User Interface for OpenVPN. Kind regards
-
Hello! It's a feature disabled by default. It can be enabled for your commodity or help us troubleshoot problems. It records date, time, duration and bytes exchanged for each user session. It is not possible to enable IP logging or any other logging. It tells the system to display or not your login name in the servers monitor top data (on the right of the page), only for active sessions. It is disabled by default. https://airvpn.org/status Kind regards