Jump to content
Not connected, Your IP: 18.118.30.137

Staff

Staff
  • Content Count

    11042
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1866

Everything posted by Staff

  1. Hello! DNS leaks should not affect *BSD based systems, anyway securing your connection against leaks in case of accidental VPN disconnection will also prevent any DNS leak on your Mac OSX. We have thoroughly examined the solution. An overview of fundamental concepts: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=1713&Itemid=142#1764 A practical set of rules from jessez: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=1713&limit=6&limitstart=36&Itemid=142#2532 All the thread is interesting: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=1713&Itemid=142 Kind regards
  2. Hello! Log in and log out time and date can be activated, deleted and completely disabled by you. They are not data which can be used in a court, for example. Anyway, as long as you don't put in your account data any information which can be exploited to disclose your identity, you are protected even against a catastrophic account database leak from us. If those data were authenticated by a proper authority and recognized as reliable by a court, and that authority could get its hands on our database (which is not in any VPN server), and the user had kept the login and logout dates and times active, and that authority could wiretap in real time all of our servers, then it could make such correlation regardless of forwarded ports or not. Please note that our system is designed to defeat even such an adversary: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=54&limit=6&limitstart=6&Itemid=142#1745 In general, an authority needs our cooperation to try to disclose an identity in ex-post investigations. As you probably know from our ToS, we will cooperate with all our resources with proper and competent authorities when the alleged crime is a violation or an attempted violation of human rights as enshrined in the ECHR. In particular, we will not tolerate usage of our systems for aiding or inciting human trafficking, child exploitation and privacy infringements. Kind regards
  3. Hello! No, it's not possible to make such a correlation because there are no logs. However, if you forward the SAME port on your router while connected, certain correlation attacks from an adversary who has the ability to monitor your line or knows in some way your real IP address are possible. Just do not forward the same ports on your router and such attacks can't succeed. Please do not hesitate to contact us for any further information on such an important subject. Kind regards
  4. Hello! If you don't have particular bridging needs, a tested and working configuration is to set NAT in the networking option of VirtualBox for that guest. After that, you can choose to connect to the VPN the host (so that all the virtual machines will use transparently the VPN tunnel) or the guest only. NAT in VB fully supports port forwarding, so you can forward the remotely forwarded ports to your VMs as well. Kind regards
  5. Hello! Can you please describe your setup (host machine, virtual guest, VirtualBox networking configuration)? Kind regards
  6. Hello! Of course we could do that. However, having a reliable 3rd party provides some very remarkable advantages, which might not be immediately clear to customers. Anyway, one paramount advantage is an additional, extremely strong layer of anonymity, because the relationship between a Bitcoin purchase and an account activation is destroyed even for customers which do not tunnel Bitcoin over TOR. You might like to read this: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=54&limit=6&limitstart=6&Itemid=142#1745 Kind regards
  7. Hello! This is not the right place to ask your questions. You should send them to the reseller. Of course we do not and we are not willing to interfere with the business operations of an independent entity. Our role is to provide codes to bitcoincodes.com according to their requests, check the quality and guarantee the transactions on their site, since bitcoincoides is an authorized reseller. You can subscribe with Bitcoin directly from us, please use the "Contact us" form in the "Support" menu for inquiries. Kind regards
  8. Hello! There is a mistake on your configuration. For uTorrent, do not remap the remotely forwarded port to a different local port. Just set the port in uTorrent so that it matches the remotely forwarded port number. Please follow the FAQ for any doubt. https://airvpn.org/faq If you use Windows, we recommend to install Comodo Firewall and disable Windows firewall. Comodo will provide by default the pro-active security required when using a VPN, further allowing finer tuning. Also, please make sure that the ports you have remotely forwarded on our VPN are NOT forwarded on your router. https://personalfirewall.comodo.com Kind regards
  9. Hello! Yes, you're correct. Just remap a remotely forwarded port to the local port your service is listening to , or change the listening port of your service, or remap the port on your home network or on your computer if possible, in order to overcome this limitation. That's not necessary at all, it would be an annoying waste of time. Our RPF is fully dynamic and we keep a database of the forwarded ports for each account. When you connect to any VPN server, that server will interrogate a backend which, based on your key, will communicate back to the VPN server which ports must be forwarded for that (your) client. Kind regards
  10. Hello! As fort1 wrote, your real IP is not exposed in any way with remote port forwarding. Yes, that's it. In particular, it's important that you do NOT forward that port on your router. Kind regards
  11. Hello! Because the reseller went out of stock. In order to fight bots spam. After the 2nd written message an account is required to enter no more captchas. Kind regards
  12. Hello! We do. Just use the "Contact us" form and specify that you want to buy an account with Bitcoin directly from us. Actually the prices Bitcoincodes offer are lower than those we directly offer for Bitcoin purchases and we are not aware about any 5% overcharge. How did you calculate a 5% fee? Bitcoincodes is privacy aware, you can connect to their site over TOR and tunnel your Bitcoin client over TOR. On top of that, you can use a secure anonymous e-mail or no e-mail at all. That's not true, Bitcoincodes is the only authorized Bitcoin reseller, it's reliable and furthermore we guarantee the transactions on Bitcoincodes. We do. Just use the "Contact us" form and specify that you want to buy an account with Bitcoin directly from us. Thank you for your inquiry and please do not hesitate to contact us for any further information. Kind regards
  13. Hello! There are no restrictions at all in our Netherlands servers. Kind regards
  14. Hello! The exit-IP address of each VPN server is always the same and is shared by ALL the clients connected to a server. This setup gives the best comfort for those who need to run a service behind a VPN server, while at the same time it strengthens the anonymity layer. Please note that entry-IP and exit-IP addresses are different. Please see here for some basic concepts: http://en.wikipedia.org/wiki/Network_address_translation Kind regards
  15. Hello! Please read here: http://www.dd-wrt.com/wiki/index.php/Startup_Scripts Kind regards
  16. Hello! Please create the directory with mkdir and copy & paste there the files user.key, ca.crt, user.crt. You can do this in script. Then, check consistency between file names. Kind regards
  17. Hello! Your account is not on Premium status so it's not authorized to access the VPN servers. Usually this happens when the recurring payment can not be performed by PayPal (no funds, for example, or charge authorization deletion by the account owner). Please use the "Contact Us" form for further information, specifying the PayPal account associated with "bozwick" account. Kind regards
  18. Hello! It never changes, servers exit-IP addresses are static and shared. Kind regards
  19. Hello! You're right. The router firewall/NAT can't block or analyze anything because it sees only encrypted traffic on one port and from one single IP address. By default, all accounts are provided with NO open ports. When you remotely forward a port, you must be sure to secure the service listening to that port and also make sure that you do NOT forward that port on your router. Furthermore, just forward the ports you really need. A software firewall on the destination device is a good idea. Kind regards
  20. Hello! Yes, yes, that's the exit-IP, it's the IP you need to point to when you want to reach your router from the Internet. We wanted to point out that it is not the "entry-IP" (that is, the IP you reach on our servers to establish an OpenVPN connection and that you can see on the configuration file). Just as above. Our web pages also report the IP address you're visible on the Internet (central bottom box). Kind regards
  21. Hello! If your connection to VPN servers is already working, you don't need any further change. It depends on your needs. In case of doubt, leave TCP & UDP. Please be aware that when forwarding a port, your system will be reachable from the Internet on that port. Our firewall will not protect you anymore on that port, so open only the strictly necessary ports which your service(s) listen(s) to. Host is the name or the IP address of the proxy and port is the port the proxy listens to. If you don't run or use a proxy or don't know what all this is about, just leave the proxy field to "None". True, the difference is due to the fact that Air client retrieves certificates, key and configuration via an SSL connection and passes them to OpenVPN. Finally, it performs a safety check to verify whether the connection has been really established. Viscosity does not need to retrieve any file, because it already has them on the HDD (generated by our configuration generator). Thank you for your nice words, they are appreciated. Kind regards
  22. Hello! Yes, you're right. In a few words, in the DD-WRT router you will see two network interfaces. The tun interface will be used by OpenVPN in client mode. Once the incoming packets are unencrypted you're totally free to forward them as you prefer. Just a side note: when you contact a service listening behind a VPN server, keep in mind that you have to reach it on the exit-IP address:port of the server you're connected to (each server has separate entry and exit-IP addresses to prevent some correlation attacks). Kind regards
  23. Hello! Can you please send us the connection logs? We don't detect any problem with Vega. Also, does your problem arise with Vega only or with any server? We're looking forward to hearing from you. Kind regards
  24. Hello! Thank you for your purchase and welcome aboard. Yes, you're correct. Perfect. Data encryption is guaranteed for every and each application transparently by OpenVPN and the routing tables pushed by our servers when you enter the VPN. You don't need to configure any other application. Perhaps there's some confusion between VPN and proxy. A proxy is not a Virtual Private Network and a VPN is not a proxy. A VPN like ours, which acts also as a transparent "gateway" to the Internet to provide a strong layer of anonymity, might be used with the same aims of a proxy (with significant advantages), but a proxy can't be used as a private network. Please note that OpenVPN supports connections over http and SOCKS proxies, however if you don't have a proxy and/or you are not behind a corporate proxy you don't need that feature. For some interesting usage of that feature, please see here: https://airvpn.org/tor Kind regards
  25. Hello! It's ok, you don't need to forward it. No, you should not do that. All the traffic is tunneled over the port you have chosen to connect to. Your router firewall will not see any traffic from/to our servers on any other port. Forwarding on the router the same ports you have remotely forwarded exposes you to correlation attacks. If your OS is Windows, you can never tell whether a DNS leak will happen in the future, so for additional security you should consider to implement them anyway. Please read here as well: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=1713&Itemid=142 Kind regards
×
×
  • Create New...