Jump to content
Not connected, Your IP: 216.73.216.91

Staff

Staff
  • Content Count

    11388
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1978

Everything posted by Staff

  1. Hello! The configuration screenshot looks perfectly ok. You can perform a test, a connection to a TCP port instead of an UDP one, just to check whether it can mitigate the packet loss problem. Finally, another test that you might perform is to connect directly with the OpenVPN client from you computer, letting the router alone (you might test with pfsense enabled and disabled). Kind regards
  2. Hello! Something must have changed on your system. First of all you should ascertain whether you have added some Comodo rule which blocks incoming packets. Just disable Comodo firewall completely for a quick check in order to determine if it's a problem related to Comodo. Kind regards
  3. Hello! Well, we just checked that from inside Castor and Draconis there is no packet loss at all toward 109.105.111.14 (and several additional know hosts). So it remains to be seen whether it's a problem between your ISP and those servers, or between your device and those servers. First of all, try to mtr the entry-IP or the exit-IP of Castor and Draconis while you are NOT connected to the VPN. If there's packet loss, it is highly likely that the problem is somewhere between your ISP and Castor and Draconis datacenters, and that your OpenVPN configuration and your system are just fine. In this case, it will be unfortunately very hard to detect and solve the problem in a short time. On the contrary, if you detect packet loss ONLY when connected to some Air server, try to connect to a TCP port of Castor and Draconis and see whether the issue is fixed. Finally, although it's not very likely that this will solve the problem, try to disable completely pfsense firewall and see whether there's a change. We're looking forward to hearing from you. Kind regards
  4. Hello! As a pro-active security firewall, it appears there's no comparison between them. Comodo passes about 96% of the hardest leak tests, Bitdefender only 9% (on 64-bit systems). On 32-bit systems, Comodo passes 100% of the tests and Bitdefender 97% of them, so if you have a 32-bit system you can remain with Bitdefender, while if you have a 64-bit Windows you should seriously consider to drop it. Switching between the two should be possible without particular issues, but please first check with the Bitdefender and Comodo support teams. Our recommendations on Comodo are based on independent security experts reviews, not our own, also we have never tested Bitdefender. Kind regards
  5. Hello! Yes, Comodo is (unfortunately) the only choice for Windows 64-bit systems, with Outpost quickly recovering form previous leaks issues from older versions: http://www.matousec.com/projects/proactive-security-challenge-64/results.php On 32-bit Windows system, there are good alternatives, but Comodo remains anyway the best firewall. Various "free" (not open source) Comodo suites are available here: https://personalfirewall.comodo.com/ Kind regards
  6. Hello! If you look at the security tests performed by independent researchers (results linked on our forum), Bitdefender does not appear adequate to offer an effective pro-active protection on Windows 64-bit systems. Anyway, it is ok to perform the task you wish. According to matousec, Bitdefender only passes 9% of the leak tests. The remaining 91% of the tests show leaks from Bitdefender, resulting in protection "NONE": http://www.matousec.com/projects/proactive-security-challenge-64/results.php Kind regards
  7. Hello! You can generate the files you need with our configuration generator (menu "Member Area"->"Access without our client"). You can generate as many configurations as you wish (you will need one configuration file for each server, if you switch amongst them, while the certificates and key are the same for each server). However, the recommended solution to secure your connection against accidental drops is setting up firewall rules, please see here: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=1713&Itemid=142 The above solutions are recommended because forceful kills of programs in case of VPN disconnection pose issues about data integrity as well as security issues: the time between disconnection detection and program forced kill may allow anyway packets leak outside the tunnel. Kind regards
  8. Hello! Please disable PPTP, although we're afraid this might not solve the problem. We need to see the connection log to get an idea about what happens. If you can't access the logs through the web DD-WRT control panel, you can generate them with a script, see here: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=1955&Itemid=142#1956 You have to store the script in nvram. After that, just copy & paste the connection logs. Kind regards
  9. Hello! Yes, we meant that. Kind regards
  10. Hello! Once you tunnel an application over Air over TOR you will be "visible" on the Internet with the exit-IP of the Air server you're connected to over TOR, except when that application is configured to use the proxy directly, in which case of course you will be visible on the Internet with the TOR exit-node IP address. Kind regards
  11. Hello! EDIT: please note that 109.105.111.14 is not Draconis IP address That said, a 2% packet loss detected with a ping may or may not be significant. Please run mtr in order to have a more realistic overview. We don't detect packet loss problems on Draconis. Do you detect the same problem with other AirVPN servers? We're looking forward to hearing from you. Kind regards
  12. Hello! Can you please make sure that OpenVPN is enabled in your web control panel? Kind regards
  13. Hello! If Transmission is working as you stated in your previous message but checkmytorrentip can't detect any IP address, chances are that Transmission can't connect (or refuse connections) to the checkmytorrentip tracker. The issue of Transmission failing to connect to trackers (especially UDP trackers) has come out just some months ago. Please see here: https://forum.transmissionbt.com/viewtopic.php?f=4&t=13075 As long as you have DHT enabled, anyway, you will be able to share files without problems. Kind regards
  14. Hello! Can you please check that Vuze not blocked by some firewall? Just in case you use Windows 7 or Vista and the Microsoft firewall, please note that it can block some applications even though they are authorized on your main network area, because when you connect to the VPN you enter a new network. Kind regards
  15. ps. i tried other servers, ports and protocols aswell please help Hello! The problem is outlined in the quoted log line. That IP address is not an entry-IP address of any Air server. You have to connect to the entry-IP address of any server you choose. Our configuration generator will generate all the files you need according to your preferences. Kind regards
  16. Hello! Unfortunately you can't. Apple, in its ongoing war against free and open source software and against an open Internet, decided some time ago to forbid free and open source software to run on iPad and iPhone. You need to jailbreak your device if you wish to run free and open source software. AirVPN is completely based on free & open source OpenVPN for security reasons and we don't and won't provide PPTP access. See also: http://www.zdnet.com/blog/open-source/no-gpl-apps-for-apples-app-store/8046 http://www.guizmovpn.com/ While we don't provide support to jailbreak, our configuration generator does provide all the necessary files for GuizmoVPN and any other OpenVPN based wrapper/GUI. Kind regards
  17. Hello! Please make sure that when you connect without TOR you have no proxy configured in your connection options or configuration file. Kind regards
  18. Hello! You already have a code... just use it at your earliest convenience to activate any account you wish. Kind regards
  19. Hello! We have refurnished our authorized reseller 24 hours ago, the coupons for any plan should be available again very soon. Please be patient or contact us to perform a direct transfer to us if you have urgency. Kind regards
  20. Hello! Please follow the instructions that bitcoincodes gave you with the coupon code: - register/log in our website with any account you wish to activate - pick the appropriate plan from the payment plans (e.g. if you have a 3 months coupon, pick "3 months subscription" not recurring) - insert the code (all uppercase) and click "APPLY". The account you are logged in with will be immediately activated to premium status. This procedure strengthens the anonymity layer because destroys correlations between your Bitcoin transfer and the account you activate. Kind regards
  21. Hello! You should not have been given a username at all. Where did you get the bitcoin subscription? Our only authorized reseller is bitcoincodes.com and it provides instructions on how to use the code you get. The code is delivered immediately after the transaction confirmation and can be used to activate instantly any account you wish. Also, what do you mean you needed two days to log in the site? Registration and log in are immediate. Who did you e-mail? We're looking forward to hearing from you. Kind regards
  22. Hello! The entry-IP address of each server never changes. You can find it in several ways: - display the connection logs and see which IP address OpenVPN connects to. That IP address is the entry-IP address; - open the .ovpn OpenVPN configuration file and look at the line "remote" (the entry-IP address is the one specified in that line). You can generate the .ovpn files for any server you wish with our configuration generator; - (only if already connected): open Comodo Firewall "View Active Connections" and see which IP address openvpn.exe is exchanging packets. That IP address is the entry-IP address. Kind regards
  23. Hello! You'll need to know the Network Zone corresponding to your TAP-Win32 adapter (10.4.0.0->10.9.255.255 for AirVPN) and to your physical adapter (WiFi in your case). See the tab "Network Zones" inside the "Network Security Policy" menu of the Firewall section in order to detect them. About your WiFi adapter, you can easily locate it if you know its IP address. You can list all the details of your adapters with ipconfig /all Kind regards
  24. Hello! With Comodo, first detect the Network Zones corresponding to your adapters (usually Comodo gives them names like Home #1 etc. according to your preferences). Then apply the global rules to those network zones (both when they are the target and the sender) in the tab "Global Rules". You'll need to know the Network Zone corresponding to your local adapter (10.4.0.0/8) and to your physical adapter (WiFi or Ethernet card). See the tab "Network Zones" inside the "Network Security Policy" menu of the Firewall section in order to detect them. The Network Zone corresponding to the TAP-Win32 adapter can be authorized to receive and send any packet from any source or to any destination, from/to any port from/to any port. The Network Zone corresponding to your physical adapter must allow ONLY the packets coming from or going to the entry-IP address of the VPN server or the TAP-Win32 adapter. Kind regards
  25. Hello! Yes, it is possible. Remember to allow packets for your physical network card from and to the entry-IP address of the VPN server you're connected to, otherwise you will block every and each packet as you have experienced. There are several ways to accomplish this. An example is to block everything from and to your network card (NOT going to and coming from the entry-IP address) AND (NOT coming from or going to your TAP-Win32 adapter). See also: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=1713&limit=6&limitstart=30&Itemid=142#2019 Kind regards
×
×
  • Create New...