Jump to content
Not connected, Your IP: 216.73.216.103

Staff

Staff
  • Content Count

    11527
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    2036

Everything posted by Staff

  1. Hello! "When attempting to connect to a VPN, Tunnelblick may fail to load tun.kext or tap.kext. This can happen when another program, or another version of Tunnelblick, has loaded different versions of tun.kext and tap.kext. A For example, the Cisco VPN client loads conflicting kexts at system startup, and they must be unloaded for Tunnelblick to work. Viscosity loads tun.kext and tap.kext when it is running. This problem may be avoided (for Viscosity) by quitting Viscosity, or (for Cisco) by using the user-contributed script designed for that purpose" Please see http://code.google.com/p/tunnelblick/wiki/cKnown Kind regards
  2. Hello! The Air client programmer has been informed about this and will investigate. Kind regards
  3. Hello! Thank you for your inquiry. The subscription plans are fixed, you can't get fractions of them. Kind regards
  4. Hello! Our servers push routes so that all the traffic is anyway tunneled over the VPN. You can ask for clarifications to Viscosity support. About your Tunnelblick problem, can you please send us the logs for troubleshooting? Kind regards
  5. Any update on Virgo?, it's been offline for a few days now. Hello! We'll keep you informed. We are confident to solve the issue in a few days. Kind regards
  6. Hello! If the VPN is continuously up and there's no leak, you might ignore that, but it would be safer to investigate. We'll look into this apparent problem as soon as possible, you might also like to report it in the DD-WRT support forum. Kind regards
  7. Hello! You're substantially right, a PayPal payment might be considered a proof that you are or have been an AirVPN's customer, but there's no possible correlation with your activities on our servers. Bitcoin is strongly recommended to those who need to hide their identities completely, even to us. Imagine a person who needs to spread sensitive information about organized crime, or whistleblowing, or someone who lives in human rights hostile countries. He/she might need this additional protection. See also here: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=54&limit=6&limitstart=6&Itemid=142#1745 Kind regards
  8. Hello! It should not be a client bug, because, as far as it concerns the effective connection, the Air client is just an OpenVPN wrapper. The next time you experience this problem, instead of rebooting your system try to issue the command "ipconfig /renew" from a command prompt or the PowerShell (with administrator privileges) and then relaunch the Air client to see whether it solves the problem. Kind regards
  9. Hello! Rebooting your computer should never be necessary... can you please tell us what your OS is? Kind regards
  10. Hello! No, there are no plans on that. Do you have some references or documents that show how it would increase anonymity? Kind regards
  11. Hello! We're glad to inform you that an expansion in Swedish infrastructure is planned within the end of September. Kind regards
  12. Hello! Can you please send us your routing table before and after the connection (feel free to delete sensitive information)? Just issue the command "route print" (before and after you have performed a connection to a VPN server) from a command prompt and publish the output. Kind regards
  13. Hello! The logs are perfectly fine. Now, if you restart your browser and browse to our website, you should see a green central bottom box saying "Connected!" to Omicron, as it was confirmed by checkmyip.com Kind regards
  14. Hello! Can you please send us the connection logs? Kind regards
  15. UPDATE: the problem has been solved. Draconis is now up and running Hello! Draconis suddenly stopped responding to everything. We have warned the datacenter technicians and we will keep you informed. In the meantime we kindly ask you to connect to any other server and we apologize for any inconvenience. Kind regards
  16. Hello! Please make sure that ServeToMe listens to the same port you have remotely forwarded. After that, you can reach a service behind a VPN server at the following address: : For example, if the device where ServeToMe runs is connected to Leonis and ServeToMe listens to port 12345, you can point to: 85.17.20.219:12345 See also: http://www.ehow.com/how_8683578_streamtome-enabled-over-3g.html Kind regards
  17. Hello! Please see here: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=3240&limit=6&limitstart=12&Itemid=142#3274 Kind regards
  18. Hello! Can you elaborate? You can't see in or out bytes in the event logs. Comodo is the most reliable firewall for Windows systems. We can't reproduce the behavior you report on Windows 7 64 bit and Windows XP systems, and we have no such reports of malfunctioning from hundreds of clients using Comodo. Since you have a discrepancy between BitTorrent report and Comodo report, you might like to check your traffic with Wireshark, in order to determine whether Comodo or BitTorrent are wrong. If you're absolutely sure of what you report, you might send a warning to Comodo team, write in their forum and send a warning to all the major security experts in the world, because this would be an information of paramount importance. In the meantime, as long as this behavior is not reproducible, we are unfortunately forced to dismiss your claims as not credible. Please see here: http://www.matousec.com/projects/proactive-security-challenge-64/results.php There are a lot of security and practical reasons. Killing applications is not a viable solution, because we have tested that the time between disconnection detection and application forced shutdown allows leaks anyway, not to mention potential data corruption. Anyway, you can do this with small utilities, but we don't recommend to do that. Disabling routes on your physical interface would make your device unable to communicate within your internal network. Blocking traffic with a firewall like Comodo, on the contrary, is a very reliable solution that usually takes a couple of minutes to the average user. Kind regards
  19. Hello! The rule is correct ("to MAC any" is just fine). Did you click "Apply" and then "Ok"? Did you give time to the BitTorrent client to report the correct stats (even if the block is immediate, torrent clients update the stats progressively)? Did you launch bittorrent.exe after you had set the rule? Also, enable the logging when this rule is fired (just tick the box as you can see from our screenshot) and check the Comodo logs, you should see a series of denials for bittorrent.exe when you launch it when you're not connected to the VPN, or when you disconnect from the VPN. Finally, monitor the bittorrent.exe connection with Comodo firewall option "View Active Connections". Kind regards
  20. Hello! Yes, the rules are wrong. Please set the rules for bittorrent.exe as you can see from the screenshot. You don't need to set any additional rule for bittorrent.exe. Link to the screenshot: http://airvpn.org/media/kunena/attachments/62/comodo_rule1_2012-08-11.jpg After you have deleted your rules and set the above rule, it must be displayed as: "Block TCP or UDP Out From IP Not In [10.4.0.0 - 10.9.255.255] To IP Any When Source Port Is Any And Destination Port is Any" Kind regards
  21. Hello! Sorry, the link is broken. Please find the image in this post. This very same rule can be applied to any application that you want to blocked when you are disconnected from the VPN. Since svchost.exe is responsible (among many other things) for DNS queries, with this rule you will block any DNS leak. Please note that you will not be able to reconnect to the VPN in case you use the Air client (because it needs to resolve the domain name airvpn.org in order to show you the server list and download via TLS certificates, key and configuration) so please just add the following line to your hosts file: 46.105.19.36 airvpn.org You don't need to add the above line if you use OpenVPN or any OpenVPN GUI/wrapper. Kind regards
  22. Hello! We have just checked that your account is authorized to access all the servers and that, at the time of writing, is not connected to any server. Can you please try a connection to a TCP port and send us the attempted connection logs? Kind regards
  23. Hello! Please note that a VPN connection does not secure your computer, as clearly stated in our ToS (and in the ToS of every serious VPN provider). That said, if you need to connect one device, you don't need to connect your router to our servers. About your suggestions, they will be taken into considerations. The problem here is that "securing a computer" and in general computer security is a task which goes well beyond a VPN service. A VPN connection should never be meant as an anti-malware/spyware tool. A VPN service like ours should be meant as an extremely strong anonymity layer and data protection tool only for non-compromised systems. If the computer is compromised by a keylogger, or any malware which can run with high privileges, for example, it may leak every information regardless of the encryption and services you use. A course on computer security is always an ongoing, enormous project that can hardly be defined as exhaustive. Kind regards
  24. Hello! We gladly inform you that the configuration generator has been completely re-designed and includes all of your and other customers suggestions and more. Kind regards
  25. Hello! We're very glad to introduce native support for OpenVPN over SSL and OpenVPN over SSH, and a completely re-designed configuration generator which includes exciting, additional AirVPN services and features. Our service becomes more censorship resistant and easier to use with a wide range of OpenVPN GUIs and wrappers. NEW SERVICES: OPENVPN OVER SSL - OPENVPN OVER SSH OpenVPN over SSL and OpenVPN over SSH will allow you to bypass OpenVPN connections disruption. Known ISP countries where the disruption takes place are China, Iran, Syria, Egypt. The connection disruption is possible because OpenVPN connections have a typical fingerprint which lets Deep Packet Inspection discern them from pure SSL/TLS connections. Connecting OpenVPN over SSL or OpenVPN over SSH will make your connection undiscernable from pure SSL or SSH connections, rendering DPI fingerprint identification powerless. OpenVPN over SSL/SSH is included in every Premium subscription without any additional payment. Use OpenVPN over SSL/SSH only when necessary: a slight performance hit is the price to pay. The performance hit is kept as low as possible because the "double-tunneling" is performed directly on our servers without additional hops. NEW FEATURES A new system for host resolution (not available for Windows) and dynamic VPN server choice is available. This will let you have OpenVPN configuration files which will try connections to various servers (according to your preferences) if one or more servers are unavailable. A new connection port (2018) is now available on all Air VPN servers. A new, alternative entry-IP address is now available on all Air VPN servers. NEW CONFIGURATION GENERATOR FEATURES - You can now select servers by countries, continents and planets (currently only one planet) or any combination between single servers and countries. - You can now select an alternative entry-IP address. Each Air server has now an additional entry-IP address to help you bypass IP blocking. - You can now choose a wide variety of compressing options: zip, 7zip, tar, tar & gzip, tar & bzip2. - You can now choose not to compress the files and download them uncompressed one by one NEW CONFIGURATION GENERATOR "ADVANCED MODE" FEATURES - Total connection ports range available, including new port 2018 in addition to 53, 80, 443 and (for SSH) 22. - Option to generate non-embedded configuration files, mandatory if you use network-manager as OpenVPN wrapper under Linux or just in case you use any wrapper that does not support embedded with certificates and keys OpenVPN configurations. - Option to generate files and scripts for OpenVPN over SSL/SSH connections by clicking on "Advanced Mode" - Option to select "Windows" or "Linux and others". Make sure you select the correct option according to your OS, because connections over SSL/SSH in Windows require different files than those required for Linux, *BSD and Unix-like / POSIX compliant systems such as Mac OSX. - New options to generate configuration files that support proxy authentication for OpenVPN over a proxy connections, particularly useful if you're behind a corporate or college proxy which requires authentication. A significant example of usage of OpenVPN over a proxy is OpenVPN over TOR: https://airvpn.org/tor Instruction page for OpenVPN over SSL: https://airvpn.org/ssl Instruction page for OpenVPN over SSH: https://airvpn.org/ssh Please do not hesitate to contact us for any additional information. Kind regards & Datalove AirVPN admins
×
×
  • Create New...