-
Content Count
11392 -
Joined
... -
Last visited
... -
Days Won
1979
Everything posted by Staff
-
anonmc wrote: Hello! You have described TOR over VPN. We recommend VPN over TOR, so that we can't see your real IP address and the TOR nodes see encrypted OpenVPN traffic. The correct path of your config is: PC (OpenVPN with proxy) -> TOR entry -> TOR exit -> VPN server -> SSH server There should be no need to torify anything. Every application should transparently use VPN over TOR (thanks to OpenVPN proxy features). Furthermore, UDP traffic now can go through TOR (it's TCP over UDP, done by OpenVPN)! In this way: - SSH server sees VPN server exit-IP address - VPN server sees TOR exit node IP address - VPN server sees SSH encrypted traffic - TOR servers see OpenVPN+SSH encrypted traffic The packets which finally go out have the SSH server IP address on their header. So please note that if the SSH server is owned by you and you have given your real identity to rent or house it, you might destroy completely the anonymity layer. Kind regards AirVPN
-
Hello! Please take note that the server Altair will be brought offline at 6 PM (GMT+2, or CET+1) of 13-Oct-2011. We recommend you disconnect from the server before that time to avoid forced disconnection. We need the server to re-plan its traffic capacity which is almost exhausted. If you need a Netherlands server, Lyra is perfectly capable to replace Altair under any respect (more powerful hardware, same infrastructure, unmetered bandwidth). Furthermore, we have added a new 1 Gbit/s server in the USA, Vega. This server will allow much faster connections than Sigma in the USA, to the advantage also of those premium members who need connections outside Europe. Omicron (Germany) and Sigma (USA) also remain available as usual too. Kind regards AirVPN admins
-
Hello! We're very glad to inform you that a new server located in the United States is available: Vega. The AirVPN client will show automatically this new server, while if you use the OpenVPN client you can generate all the files to access it through our configuration/certificate/key generator (menu "Member"->"Access without our client"). The server accepts connections on port 53, 80 and 443 UDP and TCP and can give a maximum of 500 Mbit/s per user. It has a 1 Gbit/s port. With this addition, we break the previous limit of 50 Mbit/s maximum per user, bringing it to a theoretical maximum of 500 Mbit/s. As usual, no traffic limits and no logs. Do not hesitate to contact us for any information or problem. Kind regards and datalove AirVPN admins
-
Config guide for setting up VPN with DD-WRT router
Staff replied to privado's topic in General & Suggestions
privado wrote: Hello! Yes, ns-cert-type is "server". You need to activate the option. The certificate and the key you cite are both inside the archive air.zip. Do not hesitate to contact us for any further information. Kind regards AirVPN admins -
Config guide for setting up VPN with DD-WRT router
Staff replied to privado's topic in General & Suggestions
privado wrote: Hello! If you have already flashed the DD-WRT firmware with OpenVPN support, you should now generate all the files you need with our configuration generator. Go to menu "Member"->"Access without our client" and choose server and port. Download air.zip. Inside the archive, you will find the air.ovpn configuration file which has all the parameters to copy according to the interface you have on your router. A quite complete guide is available here: http://www.dd-wrt.com/wiki/index.php/OpenVPN Do not hesitate to contact us for any further information. Kind regards Paolo AirVPN -
AirVPN client v.1.4 for Windows is now available. - fixed bug "startIndex cannot be larger than length of string" AirVPN 1.4 comes pre-packaged with OpenVPN 2.2.1. When you run the client, it will detect if you need an update of your OpenVPN package, and you can decide to authorize it to make the upgrade (or a first installation) automatically or not. Kind regards AirVPN admins
-
AirVPN client v.1.3 for Windows is now available. It comes pre-packaged with OpenVPN 2.2.1. When you run the client, it will detect if you need an update of your OpenVPN package, and you can decide to authorize it to make the upgrade (or a first installation) automatically or not. We recommend to upgrade to OpenVPN 2.2.1. The changelos are available here: http://openvpn.net/index.php/open-source/documentation/change-log/425-changelog-for-openvpn-22.html Kind regards AirVPN admins
-
Hello! We're very glad to inform you that a new server located in the Netherlands is available: Lyra. The AirVPN client will show automatically this new server, while if you use the OpenVPN client you can generate all the files to access it through our configuration/certificate/key generator (menu "Member"->"Access without our client"). The server accepts connections on port 53, 80 and 443 UDP and TCP and can give a maximum of 50 Mbit/s per user (with bursts of 75 Mbit/s). With this addition, the global infrastructure now offers a minimum of 25 Mbit/s per user during 99% of any given 24 hrs period. The minimum guaranteed allocated bandwidth currently remains at 4 Mbit/s (worst case scenario: all premium customers connecting at the same time AND requiring at least and simultaneously 4 Mbit/s or more). The maximum bandwidth per user is 50 Mbit/s with bursts of 75 Mbit/s. As usual, no traffic limits and no logs. Do not hesitate to contact us for any information or problem. Kind regards AirVPN admins
-
dr wrote: Hello! Please follow the instructions here: https://airvpn.org/index.php?option=com_content&view=article&id=68&Itemid=57 If you need help to use AirVPN over TOR, please do not hesitate to contact us again. Kind regards AirVPN admins
-
jmsrie wrote: Hello! Can you please make sure that your account is on "premium" status? You need to subscribe to connect to the VPN servers. Do not hesitate to write again for any further information. Kind regards AirVPN admins
-
monway wrote: Hello and thank you for your inquiry! We're glad to hear that our service meets your expectations and requirements. While we understand that PPTP is easier on the client side, since it is implemented by default on most OS, it does not meet our security requirements. There are some serious security problems and we have chosen not to compromise security. The superior security of OpenVPN is well worth a little more effort on installation on the client side. For a quick overview of PPTP vulnerabilities please see: http://en.wikipedia.org/wiki/Pptp#Security_of_the_PPTP_protocol Do not hesitate to contact us for any further information. Kind regards AirVPN admins
-
[SOLVED] Only able to connect to German server
Staff replied to ncwmail's topic in Eddie - AirVPN Client
Hello! The problem has been fixed. Kind regards AirVPN admins -
[SOLVED] Help setting openVPN on Android
Staff replied to bluetenken's topic in Eddie - AirVPN Client
Hello! It should not ask for username and password if you have copied all the four files in the proper directory. Can you please check whether you're trying to connect to server Altair or Sigma on port 443 UDP? These servers are currently refusing connections on port 443 UDP and we'working to fix the issue. If that's the case, on Sigma and Altair please use one of the following ports: 53 TCP 53 UDP 80 TCP 80 UDP 443 TCP Omicron is accepting connection on port 443 UDP too. Please see also this thread: https://airvpn.org/index.php?option=com_kunena&Itemid=55&func=view&catid=2&id=896 Finally, could you please send us your OpenVPN connection log? Looking forward to hearing from you. Kind regards AirVPN admins -
[SOLVED] Only able to connect to German server
Staff replied to ncwmail's topic in Eddie - AirVPN Client
Hello! Altair and Sigma are refusing connections on port 443 UDP. We're currently investigating and working to fix the problem. In the meantime, you can connect both to Altair and Sigma on any other port: 53 TCP 53 UDP 80 TCP 80 UDP 443 TCP If you use the AirVPN client, please just click on the tab "Modes" and select one of the above ports. If you use the OpenVPN client, please modify your .ovpn configuration accordingly or just re-generate it from our configuration generator, selecting one of the above ports https://airvpn.org/index.php?option=com_air&view=access&Itemid=100 Omicron is OK on all the ports. We apologize for the inconvenience. We'll update this thread as soon as the problem is fixed. Kind regards AirVPN admins -
[SOLVED] Only able to connect to German server
Staff replied to ncwmail's topic in Eddie - AirVPN Client
@monalynn Hello! From the line: WARNING: No server certificate verification method has been enabled. it appears that the configuration used by NetworkManager does not respect the line: ns-cert-type server in the air.ovpn configuration file. Can you please make sure that you imported the configuration file with the proper option in the NetworkManager, and that you did not modify that configuration? For further details, see: '>https://airvpn.org/index.php?option=com_content&view=article&id=67&Itemid=124> You might also try to use directly the OpenVPN client, instead of NetworkManager, to check whether the problem lies in the configuration file or in the NetworkManager imported configuration. Looking forward to hearing from you. Kind regards AirVPN admins -
Thank you @HugeHedon! There are also some nice articles on the web about the differences between us and HideMyAss. These two look pretty good: http://www.itworld.com/security/206429/who-trust-your-secrets-some-vpn-anonymity-providers-sound-noble-others-are-just-icky https://www.privacyinternational.org/blog/enjoy-internet-freedom-and-anonymity-terms-and-conditions-apply Kind regards AirVPN admins
-
>>> Mon Sep 26 19:58:03 2011 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Hello! It seems there's a TLS negotiation problem. Can you please check that you have copied all the files in the air.zip archive inside your OpenVPN configuration directory? Can you please check your network connectivity - it might be that connections of that kind are disrupted by your ISP - please try a connection on port 80 TCP, or on port 53 TCP. Feel free to open a ticket if the problem is not solved on port 80 TCP and on port 53 TCP. Kind regards AirVPN admins
-
kimkat wrote: Hello! Download of the files is restricted to premium users, simply because files can't be generated if an account has no access to the VPN. So, just activate your account to premium status (either supporting us with a paying subscription or using a free trial period when available, contact us for this), and then proceed to our configuration generator. Kind regards AirVPN
-
[SOLVED] Only able to connect to German server
Staff replied to ncwmail's topic in Eddie - AirVPN Client
ncwmail wrote: Hello! There is no difference in authorizations and configurations between the server.... Could you please send us the connection OpenVPN logs of some of the failed connections? They are located inside the OpenVPN logs directory. Kind regards AirVPN admins -
An "HideMyAss" VPN service user identity has been compromised and as a consequence personal freedom of the customer is now at stake. http://arstechnica.com/tech-policy/news/2011/09/fbi-arrests-lulzsec-member-for-sony-pictures-hack.ars As a consequence, apparently to defend their activity by saying that they did nothing more than any other provider would have done, HideMyAss released a series of statements which are not correct. For example, they claimed that "all VPN providers keep logs. When there was a court order issued to them, they WILL release it". On top of that, they released on their website a communiqué which, in our opinion, is harmful to the professional reputation and to the the status of mere conduit of a service provider. For the aforementioned reasons, we would like to re-assure our users and our customers that nothing like that may happen with AirVPN, for a series of legislative (we are based in the EU, not in the USA, and we don't recognize USA jurisdiction, obviously) and above all technical reasons. When we built our infrastructure we had in mind access from people who live in freedom of expression extremely hostile areas, where identity disclosure can lead to critical threats to physical safety and to personal freedom. Therefore we have planned solutions designed to give higher security and stronger anonymity layers which can be used by anyone. These solutions have been designed so that you don't need to have "faith" in what we say (for example, when we say "we don't keep logs", how can you trust us if you're outside activists circles?), but to be inherently secure, regardless of what you think of us and regardless of which pressures we might receive from enforcement or criminal entities. The key is that we must NOT know who you are (on the other hand, EU law prohibits us to investigate privately about your personal data and real identity, or to monitor your communications). 1) If you don't wish to leave a trail payment, the most secure way is to buy an account via our authorized Bitcoin reseller bitcoincodes.com. We encourage you to use TOR when you buy an account there and use the BitCoin client via TOR, to protect the Bitcoin payment with a layer of anonymity (Bitcoin per se is not really anonymous for transactions). 2) For extremely critical data transfer (whistleblowers, reports on organized crimes, etc.) please consider to use AirVPN over Tor or Tor over AirVPN. A simple example: https://airvpn.org/index.php?option=com_content&view=article&id=64&Itemid=122 3) If/when you need to communicate with us, always use a secure and safe e-mail account which can't be used to reveal your identity. In this way you can buy an account via Bitcoin or LibertyReserve by directly asking to us. For some further information, you might be interested in reading this thread: https://airvpn.org/index.php?option=com_kunena&Itemid=55&func=view&catid=3&id=37 If you live in freedom of expression hostile areas and you can't afford the payment, you can obtain a free access. Feel free to contact us. Some free access coupons are usually available also from the Telecomix cluster (best way to reach them is through their IRC servers). Kind regards and datalove AirVPN
-
An "HideMyAss" VPN service user identity has been compromised and as a consequence personal freedom of the customer is now at stake. http://arstechnica.com/tech-policy/news/2011/09/fbi-arrests-lulzsec-member-for-sony-pictures-hack.ars As a consequence, apparently to defend their activity by saying that they did nothing more than what any other provider would have done, HideMyAss released a series of statements which are not correct. For example, they claimed that "all VPN providers keep logs. When there was a court order issued to them, they WILL release it". On top of that, they released on their website a communiqué which, in our opinion, is harmful to the professional reputation and to the the status of mere conduit of a service provider. For the aforementioned reasons, we would like to re-assure our users and our customers that nothing like that may happen with AirVPN, for a series of legislative (we are based in the EU, not in the USA, and we don't recognize USA jurisdiction, obviously) and above all technical reasons. When we built our infrastructure we had in mind access from people who live in freedom of expression extremely hostile areas, where identity disclosure can lead to critical threats to physical safety and to personal freedom. Therefore we have planned solutions designed to give higher security and stronger anonymity layers which can be used by anyone. These solutions have been designed so that you don't need to have "faith" in what we say (for example, when we say "we don't keep logs", how can you trust us if you're outside activists circles?), but to be inherently secure, regardless of what you think of us and regardless of which pressures we might receive from enforcement or criminal entities. The key is that we must NOT know who you are (on the other hand, EU law prohibits us to investigate privately about your personal data and real identity, or to monitor your communications). 1) If you don't wish to leave a trail payment, the most secure way is to buy a subscription via some cryptocurrency. We accept a wide variety of cryptocurrencies. 2) For extremely critical data transfer (whistleblowers, reports on organized crimes, etc.) please consider to use AirVPN over Tor, or Tor over AirVPN (on top of end-to-end encryption, of course). Please see https://airvpn.org/tor 3) If/when you need to communicate with us, always use a secure and safe e-mail account which can't be exploited to reveal your identity. For some further information, you might be interested in reading this post: https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=54&limit=6&limitstart=6&Itemid=142#1745 If you live in freedom of expression hostile areas and you can't afford the payment, you can obtain a free access. Feel free to contact us. Some free access coupons are usually available also from the Telecomix cluster (best way to reach them is through their IRC servers). Kind regards and datalove AirVPN
-
zombie1982 wrote: Hello! As you know from the exchanged e-mails the problem has been caused by PayPal and now it has been fixed. Thank you! Kind regards AirVPN admins
-
jengkoll wrote: Hello! Free premium membership is reserved to activists who work in freedom of expression hostile countries. Please see: https://airvpn.org/index.php?option=com_content&view=article&id=70&Itemid=132 Kind regards AirVPN admins
-
jengkoll wrote: Hello! Access to VPN servers is reserved to premium members. Have you picked a subscription plan? Please see: https://airvpn.org/index.php?option=com_content&view=article&id=70&Itemid=132 Kind regards AirVPN admins
-
Alpanna wrote: Hello! You can find everything you need here: http://bitcoin.org/ We also accept PayPal and Liberty Reserve. Do not hesitate to contact us for any further information. Kind regards AirVPN admins