-
Content Count
11042 -
Joined
... -
Last visited
... -
Days Won
1865
Everything posted by Staff
-
Hello! [EDIT] Please note that the account "tetsuia" is not authorized to access the VPN servers, as it is not subscribed to any plan. If you are trying to connect with the key of that account, this is the reason for which the connection fails. Ignore this message if you're trying to connect with a premium account. About the first part of the log, please see this known issue (from the Tunnelblick wiki http://code.google.com/p/tunnelblick/wiki/cKnown) and uncheck "Monitor connection" to see whether it solves the problem. In the second part, though, there seems to be a problem with 127.0.0.1:1080 (see 6:29 [...] Connection refused [...]), was your local tunnel active? The first disconnection might have been caused by your 'SSH tunnel' going down, not by a Tunnelblick fault. We're looking forward to hearing from you. Kind regards
-
@tetsuia Hello! When you connect without TOR, is everything ok? Can you please send us the connection logs both with and without socks proxy? Kind regards
-
Hello! We changed certificates, but we did it more than 4 months ago (approx. 10 months ago). Anyway, glad to know that the problem is solved! Kind regards
-
@odamra Just one more thing: if you need to completely reset your Tunneblick setup with AirVPN, you can follow the instructions here: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=1559&limit=6&limitstart=6&Itemid=142#1571 Kind regards
-
Hello! Open Tunnelblick, locate "VPN Details..." window, then click the "gear" button at the bottom of the list and select "Edit OpenVPN Configuration File…". That will open the installed OpenVPN configuration file in TextEdit. Changes take effect as soon as the file is saved in TextEdit. Note that this does not modify your original .tblk; it modifies the installed copy only. When the TextEdit show your configuration file, locate the line that begins with "remote", it will appear like: remote a.b.c.d <portnumber> For example, to connect to Draconis server on port 80: remote 178.248.29.132 80 Changing will change the connection port. Valid connection ports are 53, 80 and 443. Then, locate the line "proto " and change (if necessary) it to: proto tcp Save and try again to connect. Useful link: http://code.google.com/p/tunnelblick/wiki/cConfigT#Modifying_a_Tunnelblick_VPN_Configuration We're looking forward to hearing from you. Kind regards
-
My AirVPN client sometimes disconnects me.
Staff replied to bobbydamaster's topic in Eddie - AirVPN Client
Hello! A reboot should not be necessary. It looks more like a crash than a simple disconnection. Are you using the latest version of the client (1.6)? Can you please tell us your OS version? If your computer keeps requiring reboots, please try to connect directly with OpenVPN GUI and see if you need rebooting or not. Kind regards -
Hello! Instructions are given in the second message of the valid link we gave you. The invalid link you cite is reported in the third message and you can safely ignore it. Re-installing Tunnelblick can not solve your problem, because with uninstallation you don't delete the old confiiguration directory, so Tunneblick will continue to see old configuration and certificates. If you need further details: http://code.google.com/p/tunnelblick/wiki/cConfigT#Modifying_a_Tunnelblick_VPN_Configuration For your comfort we copy & paste the relevant content which can solve your problem in a matter of seconds: If you follow step 1 ("edit your OpenVPN configuration file"), you just need to modify the IP address reported in line: remote 174.140.166.91 <port> with (in this example we assume you will connect to Sirius, an american server, on port 443): remote 108.59.8.147 443 Of course you can insert any server IP address you like (see their entry-IP with our configuration generator). Valid ports are 53, 80 and 443. To switch between UDP and TCP (see the FAQs about their differences), locate the line proto <protocol> and set it to proto udp if you wish UDP, or proto tcp if you wish TCP. Please do not hesitate to contact us for any further information. Kind regards
-
Hello! Probably your problem can be solved with removal of old configuration. Please see here for all the details: http://groups.google.com/group/tunnelblick-discuss/browse_thread/thread/3ebde520b606dfd4 Let us know if this fixes the problem. Kind regards
-
Hello! The problem seems to lie here: Can you please make sure that Tunnelblick can access the certificate files (user.crt and ca.crt) and the key (user.key)? Also, please to connect to another port (for example 80 TCP). We're looking forward to hearing from you. Kind regards
-
Hello and welcome back! You need to re-generate your files (menu "Member"->"Access without our client"). You probably have an old certificate which is no more valid, but above all you are trying to connect to a server which is not in our infrastructure anymore (it has been replaced by two 1 Gbit/s servers, dedicated line/port). As you will see from the configurator, there are now 3 servers in Holland (100 Mbit/s each, dedicated), 1 in Sweden (1 Gbit/s, dedicated), 1 in Germany (100 Mbit/s dedicated) and 2 in the USA (1 Gbit/s each, dedicated). The server you try to connect too is Sigma, which could no more sustain the load and has been dismissed. Please do not hesitate to contact us for any further information. Kind regards
-
Hello! Very well. Thank you for your time! Kind regards
-
I have a tunnel terminated at my router so that my OS (WinXP) thinks I have a native IPv6 connection and gives me a public IP address through stateless autoconfig. That public IP was visible at whatismyipv6.com when the VPN was active. I'd say the risk is far more than non-zero. Hello! It seems just fine. It's PPTP that tunnels your real IPv4 address in the IPv6, not OpenVPN. Please confirm that when you say "public IP was visible at whatismyipv6" you refer to the generated IPv6 address, not to your real IPv4 address. If whatismyipv6.com could see your real IPv4 public address (instead of the IPv4 address of the VPN server), please warn us as soon as possible. Kind regards
-
Hello! You're right, OpenVPN is not affected by the vulnerability discovered on PPTP. The IPv6 contains either your true IPv4 or your MAC address. If you point for example to a web site using an IPv6 address, with PPTP your REAL IPv4 address will be tunneled over PPTP, disclosing it to a malicious entity. OpenVPN does not have this vulnerability. Also, your IPv6 address is generated by the IPv4 address assigned to you. The IPv6 loopback interface never get out of your network card (think of it as the equivalent of 127.0.0.1 IPv4), it can only communicate on the local machine. Currently we don't support IPv6 at all. When the time will come, support to IPv6 will be added with the usual security standards. To answer to your question, the probability is therefore near-zero ("near" because in the security field it is theoretically impossible to state a 100% security under most circumstances). Please do check here while connected to an Air server: http://whatismyv6.com/ You should be able to see ONLY the IPv4 exit-IP of the VPN server you're connected to. Connection to their IPv6 web site should fail. Kind regards
-
Hello! We're going to add it in the FAQ too. Kind regards
-
Hello! The exit-IP addresses are static and shared. There is 1 exit-IP address per server. Additional exit-IP addresses may be used but only when strictly necessary. Please do not hesitate to contact us for any further information. Kind regards
-
I can`t find options for Access without our client
Staff replied to rvector's topic in General & Suggestions
Hello! If you have asked for a trial, you should have received a code and the instructions on how to use it in order to activate your account to premium status. Your account is currently and correctly on "Free member" since you did not follow the procedure. If you have not received the instructions, please do not hesitate to contact us (menu "Support"->"Contact us"). You need a valid e-mail address to receive code and instructions. Kind regards -
I can`t find options for Access without our client
Staff replied to rvector's topic in General & Suggestions
Hello! Of course they can. A "trial account" is just a label, "trial accounts" are full premium accounts for 4 days, there's absolutely no difference. Linux users can use OpenVPN directly or any OpenVPN GUI they like. Please do not hesitate to contact us for any further information. Kind regards -
Hello! VPNetMon works with OpenVPN, and on a Win7 system has been successfully tested with AirVPN. That said, this solution is not optimal, furthermore proprietary solutions that interferes with the OS should be carefully peer-reviewed. At the moment we don't recommend a solution based on forced shutdown of programs. One of the problems is in the forced shutdown time of the applications, which may allow some packets to get out of the tunnel anyway. Another potential problem is the risk of data loss which may happen with a forced shutdown (for example, if you're compiling a form with a browser, or executing a script). We recommend a much cleaner and safer solution, that is properly set firewall rules. According to your firewall and OS, we may help you to set the rules to prevent "data leakage" in case VPN connection drops. You can already find various instructions on the forum. Kind regards
-
Hello! We're very glad to inform you that a new 1 Gbit/s server located in Sweden is available: Draconis. The AirVPN client will show automatically the new server, while if you use the OpenVPN client you can generate all the files to access it through our configuration/certificate/key generator (menu "Member"->"Access without our client"). The server accepts connections on port 53, 80 and 443 UDP and TCP. As usual, no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN admins
-
I can`t find options for Access without our client
Staff replied to rvector's topic in General & Suggestions
Hello! Our configuration/certificates generator works only for premium members. You need to subscribe to access the VPN servers. Please do not hesitate to contact us for any further information. Kind regards -
Hello! Very well! Probably you will be able to establish successfully a connection on any server just using port 80 TCP. Kind regards
-
Hello! This is because outgoing port 25 is blocked. Please switch to SSL/TLS SMTP on port 465 or 587 (or any other port supported by your smtp server). In general, it is a very bad idea, under a security point of view, sending e-mails through smtp on port 25 without any encryption on negotiation and sending. Please do not hesitate to contact us for any further information. Kind regards
-
What do you mean by "traffic"? Do you mean the contents of the message? Tor both encrypts and decrypts "traffic" sent through its servers/nodes. This information is obtained from Tor's official website. Hello! "Traffic" is meant as the total amount of packets, including contents of messages. In the case of TOR over AirVPN, a malicious TOR node can see your traffic (unless you further encrypt it) because when the packets get out of our servers they are no more encrypted by OpenVPN, obviously. Anyway any TOR node will not be able to see your real IP (in the worst case, it will see the exit-IP of the Air server you're connected to). TOR over Air and Air over TOR therefore provide very different scenarios. Pick the one that is most suitable for your security needs. Please do not hesitate to contact us for any further information. Kind regards
-
Hello! We're very glad to inform you that a new 100 Mbit/s server located in the Netherlands is available: Orionis. The AirVPN client will show automatically this new server, while if you use the OpenVPN client you can generate all the files to access it through our configuration/certificate/key generator (menu "Member"->"Access without our client"). The server accepts connections on port 53, 80 and 443 UDP and TCP. As usual, no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN admins
-
Hello! Your logs look ok. Since everywhere else the connection is fine, it is possible that there's something in your home line which is the issue. First of all, try to connect to a different server and to a TCP port (for example 80 TCP) in order to ascertain whether it's a line (quality, latency...) issue with Vega. Also, check your browser settings. Test also some other protocol (for example FTP, bittorrent) to determine if the issue lies in the browser. We're looking forward to hearing from you. Kind regards