Jump to content
Not connected, Your IP: 216.73.216.40

Staff

Staff
  • Content Count

    11482
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    2020

Everything posted by Staff

  1. Hello! There's probably something wrong in your rules, Firefox must be unable to send data when the VPN connection drops. Can you post your rules? Kind regards
  2. Hello! That depends on the investigation methods chosen by the proper authorities and on the alleged crime. We can't spy on our customers, the investigation methods are not our competence. Sorry, we don't understand the scenario depicted in your phrases as well. [EDIT] In case you're speculating about a scenario in which the adversary has the power to monitor the VPN provider servers, then again the technical solution to defeat such an adversary is performing partition of trust as described in the post linked in the previous message. Kind regards
  3. Hello! No investigation based on logs is possible because we don't keep any log on OpenVPN clients traffic. About the USA (since you cite FBI, probably you're thinking of the USA only), there are no USA laws which compel any provider to keep logs. Please read carefully our ToS: if an account allegedly violates our ToS (in particular infringements of the ECHR) AND we are authorized to proceed by the jurisdictional competent magistrate with the aid of competent/specialized authorities, nothing prevents us to perform ex-post investigations if we wish so, just like it happens with any real mere conduit of data. The important difference between us and several VPN providers is that we don't log ex-ante and that we strictly comply to 95/46/EC and 2002/58/EC. We can go on forever discussing about what's true or not, so the ultimate argument is that our system has been designed so that you don't need to trust us, please read here: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=54&limit=6&limitstart=6&Itemid=142#1745 Partition of trust is sometimes overlooked but it becomes essential when you can't allow yourself to trust a single entity, like your ISP, or a VPN provider. Kind regards
  4. Hello! There are no problems with Air servers. Please see here for possible causes: https://airvpn.org/faq#speed That said, another option is that your ISP is capping bandwidth on some ports. Please try connections on different ports to make a comparison (for example 80 UDP, 80 TCP and 53 UDP). Kind regards
  5. Yes, I generated it and it is self signed, as the website states. There are many issues I take with Certification Authorities. And, in fact, I use Convergence, which removes the whole spurious CA issue. The certificate is trusted by default in Convergence. I have thought about implementing something similar to your suggestion. I have not decided yet but it is possible--to avoid scaring off people. Hello! A confirmation from you of the following would be enough atm: SHA-1 fingerprint: 5E 1B EA F4 B3 76 E0 01 E0 3D 51 21 0C 9F FC 77 00 E3 5C 85 SHA-256 fingerprint: 7B 5F A0 F0 18 49 13 B4 8E 06 F5 A6 B4 2F 94 FF 59 9B B2 A2 5D 4F B4 AB 86 7A 6B E6 26 61 0A B2 This is the certificate we can see from the Air network. Since it's the same from all the Air servers, the probability of an hijacking can be considered practically zero if you confirm the above. This manual verification may be irrelevant in several countries, but might be important in some other countries. Kind regards
  6. Thank you! Since the certificate is not emitted by a CA, can you please publish the SH1 and MD5 fingerprints of the certificate to allow verification to everyone? Kind regards
  7. Hello! Of course, this may happen if your computer sends DNS queries to your locked router/modem. The locked router/modem will then send a query to your ISP DNS. In this case you need either to prevent leaks with our firewall guides or force the DNS resolution to the VPN DNS (10.4.0.1 https://airvpn.org/specs), so that the VPN query will be encrypted and encapsulated by your OpenVPN client, sent to our servers and finally processed by them. This gives the advantage to be able to access VPN internal services and bypass some ICE censorship which can't be bypassed with any other DNS. Kind regards
  8. Hello! If the modem/router DNS are locked, you can anyway bypass them. Once you're inside the VPN you can use the VPN DNS or tunnel any DNS query you like over the VPN. Kind regards
  9. Hello! Unfortunately so. Please see here: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=5650&Itemid=142 Kind regards
  10. Hello! Yes. Your ISP can't see: - the real origin and destinations of your packets - the payload (the content) of your packets - the applications you use - the protocols you use About e-mail, an important exception is when your mail provider is also your ISP. In that case your e-mails will in the end pass through the servers of your very same ISP and (if unencrypted) can be potentially read by it. We don't keep logs of that kind. We don't monitor traffic and we don't log any client activity. Absolutely not. PayPal never reveals your credit card number to the seller. Kind regards
  11. Hello! If/when you wish to use the VPN DNS, just set 10.4.0.1 as primary DNS IP, and leave the OpenDNS server IP as "alternate". Kind regards
  12. Hello! We're sorry to inform you that Pegasi and Arietis have been suspended by the provider (SecuredServers LLC) without prior notice for alleged network abuse. While the provider was and is totally incapable to provide any proof of such abuse, it decided to suspend the servers. We assure you that such suspension does not harm our plans in the USA: on the contrary it gives us additional incentives to expand our USA operations. Currently bandwidth for the USA remains widely redundant, anyway we're working to bring additional servers in the USA as soon as possible. Kind regards
  13. Hello! It appears definitely a DNS issue. What is your OS? Kind regards
  14. Hello! The problem has been fixed, we apologize for the inconvenience. Please try again port forwarding on Cygni at your convenience. Kind regards
  15. Hello! No particular setup is needed. Connect to a server and then launch uTorrent. It's very important that you launch uTorrent AFTER you have connected to the VPN. Nothing more on the torrent client side. We recommend that you secure your connection against leaks in case of unexpected VPN disconnection, please see the guides in the announcement section of the forum "Prevent leaks with..." according to your OS: https://airvpn.org/forums Yes, absolutely! Kind regards
  16. Hello! When you're connected to any VPN server, all the programs you run will be tunneled transparently. No need to configure any of them. Please note that we don't have proxy servers and we don't provide (currently) proxy services. Just make sure that you launch your p2p client AFTER you have connected to the VPN, of course. Yes, in order to optimize performance. If you use latest uTorrent versions or torrent programs which are able to "punch" NATs, you don't even need to forward remotely ports (our NAT is p2p friendly and can be punched by clients). No: that's necessary only if you want to tunnel a program over a proxy over AirVPN (an advanced usage which you probably don't need for p2p). Kind regards
  17. Hello! Thank you for your purchase from our authorized reseller. Please log in with the account you wish to activate and click on the big star in the home page. Direct link: https://airvpn.org/payment_plans Kind regards
  18. Hello! Thank you for the information. We confirm we have still some issues with port forwarding on Cygni. We're working on it in order to detect the problem. Kind regards
  19. Hello! We have received some excellent feedback from California, for example: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=5296&Itemid=142#5587 Kind regards
  20. Hello! If you capture traffic on the tun/tap adapter you can see unencrypted packets. If you capture traffic on the physical interface you must see all encrypted packets to/from the Air server, except those to/from your internal network, otherwise there's something wrong: check your routing table after the VPN server push. Kind regards
  21. Hello! Our OpenVPN servers don't listen to port 1194, they listen to ports 53, 80 and 443 (TCP and UDP). Kind regards
  22. Hello! Ports 137, 138, 139 and 445 are closed and clients within the virtual network can't communicate with each other (inside the network), so your shared resources can't be accessed, at least through the VPN. In general, a client on the VPN has all ports closed, in order to open them the client owner must explicitly forward ports remotely. There is a way to overcome this security limitation, it requires remote port forwarding with remap to the above mentioned local ports. Just don't do it and you are secure on the VPN side. Kind regards
  23. Hello! We're confident about that: the provider has been thoroughly informed about our activity. Of course things in real life may be different, we rely both on the correctness of the provider and on our customers' respect of AirVPN Terms of Service. Kind regards Hello! We have not detected any problem with the server during these first days. We would be more than glad to receive any feedback especially from Asian customers about this server. Kind regards
  24. Hello! We're very glad to inform you that a new 1 Gbit/s server located in Sweden is available: Cygni. The AirVPN client will show automatically the new server, while if you use the OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Member Area"->"Access without our client"). The server accepts connections on ports 53, 80 and 443 UDP and TCP. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN admins
×
×
  • Create New...