Jump to content
Not connected, Your IP: 18.222.193.207

Staff

Staff
  • Content Count

    10626
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1772

Reputation Activity

  1. Like
    Staff got a reaction from Lee47 in XMPP server available   ...
    Hello!
     
    We're very glad to inform you that our XMPP (Jabber) server is now available for free to all members of AirVPN web site. The server has an A-A security rating.
     
    We have opened a dedicated forum: https://airvpn.org/forum/37-xmpp
     
    Enjoy XMPP!
     
    Kind regards & datalove
    AirVPN Staff
  2. Like
    Staff got a reaction from Spronky in Problem access ntp servers   ...
    Hello!
     
    We do not block NTP, absolutely not.
     
    Additionally, connection to NTP servers from the router, when booting, should be performed before a connection to a VPN server, to allow the router to set the correct date and time, otherwise authentication will fail.
     
    Kind regards
  3. Like
    Staff got a reaction from OpenSourcerer in PortQuiz - Outgoing TCP Port Tester   ...
    Remember that the tool tells you nothing about UDP ports, that test is only for TCP.
     
    Kind regards
  4. Like
    Staff got a reaction from Lee47 in XMPP server available   ...
    Hello!
     
    We're very glad to inform you that our XMPP (Jabber) server is now available for free to all members of AirVPN web site. The server has an A-A security rating.
     
    We have opened a dedicated forum: https://airvpn.org/forum/37-xmpp
     
    Enjoy XMPP!
     
    Kind regards & datalove
    AirVPN Staff
  5. Like
    Staff got a reaction from rickjames in Browser setup for security and privacy   ...
    Hello,
     
    check out also Privacy Badger by Electronic Frontier Foundation (for Firefox and Chrome). We have not tested it but it looks very promising. It faces the challenging tracking problem with a completely different approach than various ad blocks, which are often powerless against tracking and anyway may have a questionable behavior.
     
    https://www.eff.org/privacybadger
     
    Kind regards
  6. Like
    Staff got a reaction from OpenSourcerer in Shellshock   ...
    Hello!
    We're glad to inform you that the critical, remotely exploitable "shellshock" bug http://seclists.org/oss-sec/2014/q3/650 does not affect our systems, which (if they used bash) have been all patched with appropriate updates.
     
    Kind regards
    AirVPN Staff
     
  7. Like
    Staff got a reaction from foole in Singapore servers withdrawal   ...
    Hello!
    We're sorry to inform you that we have received a communication from SoftLayer IBM (owner of the datacenter where we operate our servers in Singapore) telling us that we must block p2p protocols on the servers as a consequence of very few copyright complaints received.
     
    If we complied to this request we would prevent VoIP, BitCoin, BitTorrent and many other uses of the servers. This would be an unacceptable inconsistency for the the purposes of our services and a betrayal of a key part of our mission (no discrimination against any protocol, Net Neutrality preservation).
     
    Additionally, complying to such requests would silently encourage protocols discriminations and other detrimental practices for an open Internet.
     
    We are therefore planning to reject this request, cancel our business relationships with IBM and withdraw the servers in the Singapore datacenter. We are already working to find alternative, network neutral solutions in the Pacific Asia area (as you probably know we already operate a 1 Gbit/s server in Hong Kong), if possible in Singapore itself.
     
    Kind regards
    AirVPN Staff
     
  8. Like
    Staff got a reaction from foole in New 1 Gbit/s server available: Antares (SG)   ...
    Hello!

    We're very glad to inform you that a new 1 Gbit/s server located in Singapore is available: Antares.

    The AirVPN client will show automatically the new server, while if you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The server accepts connections on ports 53, 80, 443, 2018 UDP and TCP.

    Just like every other Air server, Antares supports OpenVPN over SSL and OpenVPN over SSH.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.
     
    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Team
  9. Like
    Staff got a reaction from OpenSourcerer in Shellshock   ...
    Hello!
    We're glad to inform you that the critical, remotely exploitable "shellshock" bug http://seclists.org/oss-sec/2014/q3/650 does not affect our systems, which (if they used bash) have been all patched with appropriate updates.
     
    Kind regards
    AirVPN Staff
     
  10. Like
    Staff got a reaction from OpenSourcerer in PortQuiz - Outgoing TCP Port Tester   ...
    Remember that the tool tells you nothing about UDP ports, that test is only for TCP.
     
    Kind regards
  11. Like
    Staff reacted to mage1982 in Proxy as Public Exit IP   ...
    Let's go through the basics first (apologies if this is too basic).
     
    When you use AirVPN, Internet traffic is sent from the AirVPN client encrypted to one of Air's servers, and then from that server to the rest of the world. Everything you do will appear to come from that server (instead of from you), which is normally what one would want when using a VPN service.
     
    You can add in a SOCKS proxy server in the loop before AirVPN, that is, the VPN client will use the SOCKS proxy; in that case, traffic will go from the AirVPN client, through the SOCKS proxy, to one of Air's servers, and then to the world. To any website, what you do will still look as though it originates from Air's server; the only thing that is even aware that a SOCKS proxy exists are you and the VPN client.
     
    For a site to see your proxy server as the source of traffic, it will have to come after AirVPN. The traffic would go encrypted to one of Air's servers, then back to you/it - possibly unencrypted - through the SOCKS proxy, and then out to the rest of the world. In this case, using AirVPN doesn't really add much in terms of privacy since it neither obscures the origin of traffic, nor necessarily guarantees that traffic will be encrypted.
     
    Of course, this could still be useful if the SOCKS proxy is on separate hardware from what you use AirVPN on, for instance if the proxy is on a server under your control and you use Air on your laptop when travelling. If you want to use Air in this way, you need to tell your web browser about the SOCKS proxy, not the VPN client.
     
     
    There might be other things possible too, like having both on the same machine and using the VPN for most things, but having the SOCKS proxy bypass AirVPN entirely so one could use that for particular websites that otherwise would block you, but that's another post.
     
    Does that clear things up or make it more confusing?
  12. Like
    Staff got a reaction from OpenSourcerer in Shellshock   ...
    Hello!
    We're glad to inform you that the critical, remotely exploitable "shellshock" bug http://seclists.org/oss-sec/2014/q3/650 does not affect our systems, which (if they used bash) have been all patched with appropriate updates.
     
    Kind regards
    AirVPN Staff
     
  13. Like
    Staff got a reaction from OpenSourcerer in Shellshock   ...
    Hello!
    We're glad to inform you that the critical, remotely exploitable "shellshock" bug http://seclists.org/oss-sec/2014/q3/650 does not affect our systems, which (if they used bash) have been all patched with appropriate updates.
     
    Kind regards
    AirVPN Staff
     
  14. Like
    Staff got a reaction from OpenSourcerer in Shellshock   ...
    Hello!
    We're glad to inform you that the critical, remotely exploitable "shellshock" bug http://seclists.org/oss-sec/2014/q3/650 does not affect our systems, which (if they used bash) have been all patched with appropriate updates.
     
    Kind regards
    AirVPN Staff
     
  15. Like
    Staff got a reaction from OpenSourcerer in Shellshock   ...
    Hello!
    We're glad to inform you that the critical, remotely exploitable "shellshock" bug http://seclists.org/oss-sec/2014/q3/650 does not affect our systems, which (if they used bash) have been all patched with appropriate updates.
     
    Kind regards
    AirVPN Staff
     
  16. Like
    Staff got a reaction from OpenSourcerer in Shellshock   ...
    Hello!
    We're glad to inform you that the critical, remotely exploitable "shellshock" bug http://seclists.org/oss-sec/2014/q3/650 does not affect our systems, which (if they used bash) have been all patched with appropriate updates.
     
    Kind regards
    AirVPN Staff
     
  17. Like
    Staff reacted to perhentian in Eddie 2.6 available   ...
    Hi, I have some positive feedback guys!
     
    I did a few "DNS leak tests" this morning with http://ipleak.net & https://dnsleaktest.com
    and I was leaking bad. So I read up on the subject of DNS leaks, and then tried your new Eddie 2.6 client. The default settings still got my DNS leaked. How ever, after going into the advanced settings and check-boxing the settings: "check if tunnel is using AirVPNs DNS" and "Force DNS", the issue is gone!
     
    So happy and so easy to use guys! Big thanks, no more leaking here!
    BR
  18. Like
    Staff got a reaction from encrypted in Cloudflare Captchas   ...
    Now this is getting interesting...

    https://twitter.com/JustusRanvier/status/511986110889619456
     
    Kind regards
  19. Like
    Staff got a reaction from S.O.A. in Eddie 2.6 available   ...
    Hello!
     
    Although not confirmed, Snow Leopard seems to have reached the end of its life cycle http://arstechnica.com/apple/2014/03/snow-leopard-updates-are-probably-done-here-are-your-os-x-upgrade-options
     
    There are some bugs in the developers tools we use to build Eddie about Snow Leopard which apparently will never be fixed because of the end of support. For example it seems that Snow Leopard doesn't work with the Xcode version that supports XIB integration.
     
    Yes, pinfo.list have 10.6 as minimum requirement. This is simple because we have only a Mavericks testing system, we simply don't know if 10.6..10.8 works (perfectly) or not, and we are still studying feedbacks. [Staff note: additionally, Eddie is compiled to be compatible with OS X 10.6, as explained in the previous post]
     
    Our mistake might have been that we dropped the word 'beta' before adjusting the minimum requirements in plist.
     
    Kind regards
    Eddie programmers
  20. Like
    Staff got a reaction from S.O.A. in Eddie 2.6 available   ...
    Hello!
     
    Yes, we are not precise in the download page. Be informed that Eddie works only with OS X Mavericks and Yosemite, as repeatedly stated in the forums.
     
    The misleading information in info.plist comes from the fact that Eddie is really compiled to be compatible even with OS X 10.6 and 10.7, but the employed development tool used for OS X clearly must have problems in generating compatible binaries. Upgrade to Mavericks is free, if your system can support it. If you can't or don't want to upgrade, please use Tunnelblick (free and open source, just like Eddie), for which we provide instructions and a very thorough Configuration Generator, or OpenVPN (we also provide a re-compiled version of OpenVPN, just in case). At this very moment, we have no plans to make Eddie compatible with OS X older than Mavericks.
     
    Kind regards
  21. Like
    Staff got a reaction from azmo2 in Eddie 2.6 available   ...
    Hello!

    We're very glad to inform you that a new Eddie Air client version has been released: 2.6. Please read the changelogs: https://airvpn.org/services/changelog.php?software=client&format=html

    2.6 version is compatible with several Linux distributions. For very important notes about environments, please read here: https://airvpn.org/forum/35-client-software-platforms-environments

    This is essentially a release aimed to bug fixes. We recommend that OS X users as well as any Operating System users needing to connect OpenVPN over a proxy with authentication perform upgrade as soon as possible.

    Eddie 2.6 for Linux can be downloaded here: https://airvpn.org/linux
    Eddie 2.6 for Windows can be downloaded here: https://airvpn.org/windows
    Eddie 2.6 for OS X Mavericks can be downloaded here: https://airvpn.org/macosx

    PLEASE NOTE: Eddie 2.6 package, just like Eddie 2.4beta and Eddie 2.5 packages, includes an OpenVPN version re-compiled by us with OpenSSL 1.0.1i for security reasons and to fix this bug: https://community.openvpn.net/openvpn/ticket/328
     
    Eddie overview is available here: https://airvpn.org/software
    Eddie includes a Network Lock feature: https://airvpn.org/faq/software_lock
    Eddie 2.6 is free and open source software released under GPLv3

    Kind regards & datalove
    AirVPN Staff
  22. Like
    Staff reacted to He who shall not be named in Three simultaneous connections per account allowed   ...
    Sorry for the long delay in responding.  I don't check into the forums very often.  Just found out about the multiple connections.  That is very helpful for supporting my home network and mobile devices and fixes my main difficulty with your service.  Thanks very much. 
     
    -A very happy customer.
  23. Like
    Staff reacted to knighthawk in Call for tests and opinions   ...
    Exit confirmation: Options are good, I prefer it on (i'm an idiot and have hit the X instead of the - once or twice by mistake while connected), but don't really care what the default is so long as there is an option.
     
    "If these settings work for you, please use them and confirm in this topic that they work for you."
    ---
    win64-7\2008r2: They do seem to work as expected, I just don't have a need to have them enabled in most of my evironments.
     
    win64-7\2008r2 - Force DNS - No thanks, this should be off by default in my opinion, I don't want airvpn touching the dns settings (or any settings for that matter) of non-tunnel adapters on my system(s) without me explicitly telling it to do so; same reasons I suppose I will not use network lock, I've already configured rules of my own (that I touch at times while connected and those changes would be lost), I get that these feature maybe make life easier for the average joe at home though so they're good to have as options.
     
    /2cents
  24. Like
    Staff reacted to z3r0on3 in Call for tests and opinions   ...
    As Lyaios said: works fine with 10.9.4.
    Exit confirmation? 
    Hmm strange I've never seen this prompt? And yes it is enabled in my settings. Maybe this is the problem for my last post
     
    But yes it should be enabled by default!
  25. Like
    Staff reacted to urbanconcrete in Call for tests and opinions   ...
    Works on testmachine (Win7 x64) without problems. I think the exit confirmation is a good thing and should be enabled by default.
    Advanced users could turn it of if they feel like it. Its a good feature for beginner users...
×
×
  • Create New...