Jump to content
Not connected, Your IP: 216.73.216.167

Staff

Staff
  • Content Count

    11554
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    2045

Everything posted by Staff

  1. Hello! Perhaps you've added some firewall rule to secure your VPN connection in case of unexpected disconnection? If so, try to add to your hosts file the line: 46.105.19.36 airvpn.org and check whether it solves the issue. Kind regards
  2. Hello! The routing tables and the logs are just fine. We can see that your account is currently connected and exchanging data as well. If you browse to http://ip2location.com while you're connected to the VPN, is the exit-IP of the VPN server displayed? Kind regards
  3. Hello! "When attempting to connect to a VPN, Tunnelblick may fail to load tun.kext or tap.kext. This can happen when another program, or another version of Tunnelblick, has loaded different versions of tun.kext and tap.kext. A For example, the Cisco VPN client loads conflicting kexts at system startup, and they must be unloaded for Tunnelblick to work. Viscosity loads tun.kext and tap.kext when it is running. This problem may be avoided (for Viscosity) by quitting Viscosity, or (for Cisco) by using the user-contributed script designed for that purpose" Please see http://code.google.com/p/tunnelblick/wiki/cKnown Kind regards
  4. Hello! The Air client programmer has been informed about this and will investigate. Kind regards
  5. Hello! Thank you for your inquiry. The subscription plans are fixed, you can't get fractions of them. Kind regards
  6. Hello! Our servers push routes so that all the traffic is anyway tunneled over the VPN. You can ask for clarifications to Viscosity support. About your Tunnelblick problem, can you please send us the logs for troubleshooting? Kind regards
  7. Any update on Virgo?, it's been offline for a few days now. Hello! We'll keep you informed. We are confident to solve the issue in a few days. Kind regards
  8. Hello! If the VPN is continuously up and there's no leak, you might ignore that, but it would be safer to investigate. We'll look into this apparent problem as soon as possible, you might also like to report it in the DD-WRT support forum. Kind regards
  9. Hello! You're substantially right, a PayPal payment might be considered a proof that you are or have been an AirVPN's customer, but there's no possible correlation with your activities on our servers. Bitcoin is strongly recommended to those who need to hide their identities completely, even to us. Imagine a person who needs to spread sensitive information about organized crime, or whistleblowing, or someone who lives in human rights hostile countries. He/she might need this additional protection. See also here: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=54&limit=6&limitstart=6&Itemid=142#1745 Kind regards
  10. Hello! It should not be a client bug, because, as far as it concerns the effective connection, the Air client is just an OpenVPN wrapper. The next time you experience this problem, instead of rebooting your system try to issue the command "ipconfig /renew" from a command prompt or the PowerShell (with administrator privileges) and then relaunch the Air client to see whether it solves the problem. Kind regards
  11. Hello! Rebooting your computer should never be necessary... can you please tell us what your OS is? Kind regards
  12. Hello! No, there are no plans on that. Do you have some references or documents that show how it would increase anonymity? Kind regards
  13. Hello! We're glad to inform you that an expansion in Swedish infrastructure is planned within the end of September. Kind regards
  14. Hello! Can you please send us your routing table before and after the connection (feel free to delete sensitive information)? Just issue the command "route print" (before and after you have performed a connection to a VPN server) from a command prompt and publish the output. Kind regards
  15. Hello! The logs are perfectly fine. Now, if you restart your browser and browse to our website, you should see a green central bottom box saying "Connected!" to Omicron, as it was confirmed by checkmyip.com Kind regards
  16. Hello! Can you please send us the connection logs? Kind regards
  17. UPDATE: the problem has been solved. Draconis is now up and running Hello! Draconis suddenly stopped responding to everything. We have warned the datacenter technicians and we will keep you informed. In the meantime we kindly ask you to connect to any other server and we apologize for any inconvenience. Kind regards
  18. Hello! Please make sure that ServeToMe listens to the same port you have remotely forwarded. After that, you can reach a service behind a VPN server at the following address: : For example, if the device where ServeToMe runs is connected to Leonis and ServeToMe listens to port 12345, you can point to: 85.17.20.219:12345 See also: http://www.ehow.com/how_8683578_streamtome-enabled-over-3g.html Kind regards
  19. Hello! Please see here: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=3240&limit=6&limitstart=12&Itemid=142#3274 Kind regards
  20. Hello! Can you elaborate? You can't see in or out bytes in the event logs. Comodo is the most reliable firewall for Windows systems. We can't reproduce the behavior you report on Windows 7 64 bit and Windows XP systems, and we have no such reports of malfunctioning from hundreds of clients using Comodo. Since you have a discrepancy between BitTorrent report and Comodo report, you might like to check your traffic with Wireshark, in order to determine whether Comodo or BitTorrent are wrong. If you're absolutely sure of what you report, you might send a warning to Comodo team, write in their forum and send a warning to all the major security experts in the world, because this would be an information of paramount importance. In the meantime, as long as this behavior is not reproducible, we are unfortunately forced to dismiss your claims as not credible. Please see here: http://www.matousec.com/projects/proactive-security-challenge-64/results.php There are a lot of security and practical reasons. Killing applications is not a viable solution, because we have tested that the time between disconnection detection and application forced shutdown allows leaks anyway, not to mention potential data corruption. Anyway, you can do this with small utilities, but we don't recommend to do that. Disabling routes on your physical interface would make your device unable to communicate within your internal network. Blocking traffic with a firewall like Comodo, on the contrary, is a very reliable solution that usually takes a couple of minutes to the average user. Kind regards
  21. Hello! The rule is correct ("to MAC any" is just fine). Did you click "Apply" and then "Ok"? Did you give time to the BitTorrent client to report the correct stats (even if the block is immediate, torrent clients update the stats progressively)? Did you launch bittorrent.exe after you had set the rule? Also, enable the logging when this rule is fired (just tick the box as you can see from our screenshot) and check the Comodo logs, you should see a series of denials for bittorrent.exe when you launch it when you're not connected to the VPN, or when you disconnect from the VPN. Finally, monitor the bittorrent.exe connection with Comodo firewall option "View Active Connections". Kind regards
  22. Hello! Yes, the rules are wrong. Please set the rules for bittorrent.exe as you can see from the screenshot. You don't need to set any additional rule for bittorrent.exe. Link to the screenshot: http://airvpn.org/media/kunena/attachments/62/comodo_rule1_2012-08-11.jpg After you have deleted your rules and set the above rule, it must be displayed as: "Block TCP or UDP Out From IP Not In [10.4.0.0 - 10.9.255.255] To IP Any When Source Port Is Any And Destination Port is Any" Kind regards
  23. Hello! Sorry, the link is broken. Please find the image in this post. This very same rule can be applied to any application that you want to blocked when you are disconnected from the VPN. Since svchost.exe is responsible (among many other things) for DNS queries, with this rule you will block any DNS leak. Please note that you will not be able to reconnect to the VPN in case you use the Air client (because it needs to resolve the domain name airvpn.org in order to show you the server list and download via TLS certificates, key and configuration) so please just add the following line to your hosts file: 46.105.19.36 airvpn.org You don't need to add the above line if you use OpenVPN or any OpenVPN GUI/wrapper. Kind regards
  24. Hello! We have just checked that your account is authorized to access all the servers and that, at the time of writing, is not connected to any server. Can you please try a connection to a TCP port and send us the attempted connection logs? Kind regards
  25. Hello! Please note that a VPN connection does not secure your computer, as clearly stated in our ToS (and in the ToS of every serious VPN provider). That said, if you need to connect one device, you don't need to connect your router to our servers. About your suggestions, they will be taken into considerations. The problem here is that "securing a computer" and in general computer security is a task which goes well beyond a VPN service. A VPN connection should never be meant as an anti-malware/spyware tool. A VPN service like ours should be meant as an extremely strong anonymity layer and data protection tool only for non-compromised systems. If the computer is compromised by a keylogger, or any malware which can run with high privileges, for example, it may leak every information regardless of the encryption and services you use. A course on computer security is always an ongoing, enormous project that can hardly be defined as exhaustive. Kind regards
×
×
  • Create New...