EnglishFrenchGermanPolishSpanishTurkishRussianItalianDutchDutch

Foire aux Questions

See also the
"How to" video

Général

Qu'est-ce que SecurityKISS Tunnel?

SecurityKISS Tunnel est le programme et le service qui vous permet d'accéder à Internet en dépit de la censure et des restrictions locales. Il sécurise aussi votre connexion et empêche des tiers d'intercepter vos activités de navigation sur le web, messages instantanés, téléchargements, informations de carte de crédit ou tout ce que vous pouvez envoyer sur le réseau.

Techniquement, SecurityKISS Tunnel est une implémentation du Réseau Virtuel Privé (ou Virtual Private Network (VPN) en anglais). Il crée un VPN entre votre ordinateur portable et notre passerelle sécurisée, de telle façon que tout votre trafic Internet passe par un tunnel impénétrable et opaque aux yeux extérieurs.

Est-ce entièrement gratuit ?

Nous offrons une version gratuite et une version payante. Dans le premier cas, le programme et le service sont entièrement gratuits, avec une restriction d'utilisation quotidienne.

La version payante dispose d'une limite d'utilisation élevée chaque mois et d'options supplémentaires. Voir les offres.

Le service restera-t-il gratuit, ou bien le rendrez-vous payant à l'avenir ?

Il y aura toujours une version gratuite.

My ISP provides me the Internet link with 10 GB per month. If I use your JADEITE plan, will my montly limit increase to 50 GB ?

No. SecurityKISS is not Internet provider and we cannot add an extra Internet link to your PC. If you ISP's monthly limit is 10 GB you will not be able fully use the quota of the JADEITE plan so it makes more sense to order the cheaper OLIVINE plan with 20 GB/month instead.

Thanks to the fact that SecurityKISS is using compression before data is encrypted and transferred. it is possible that the total data sent and received may be larger by about 10 or 20 percent depending on the type of traffic. So while there is no way to increase the 10 GB limit of your ISP, you may slightly increase the amount of user data transferred (for example to 11 GB).

Comment puis-je obtenir un compte gratuit pour utiliser votre service ? Avez-vous besoin d'informations personnelles me concernant ?

Vous n'avez pas besoin d'un compte. Téléchargez simplement le programme et utilisez-le. Votre programme installé est identifié uniquement par un ID client.

Nous respectons votre vie privée et votre temps, aussi nous n'avons pas besoin de votre nom et vous n'avez pas à perdre votre temps à remplir des formulaires inutiles.

Plus de noms d'utilisateurs ni de mots de passe !

Combien de temps dois-je attendre pour que mon compte soit activé ?

Les comptes de nos clients sont activés immédiatement après que nous avons reçu le paiement (cela prend en général quelques secondes).

Quels sont les systèmes d'exploitation supportés ?

La version gratuite de SecurityKISS Tunnel que tous les utilisateurs peuvent télécharger est supportée par Windows XP, Windows Vista et Windows 7.

Les clients JADEITE et EMERALD peuvent se connecter avec les programmes VPN inclus dans la plupart des systèmes d'exploitation modernes pour se connecter aux serveurs PPTP de SecurityKISS.

Can I run SecurityKISS Tunnel on 64-bit operating system?

Yes, it works on 64-bit Windows

Does SecurityKISS work with Windows 7?

Yes, both 32-bit and 64-bit versions of Windows 7 are supported

Where are VPN servers located?

While the company is based in Ireland the VPN servers (security gateways) are in the UK, US, Germany, Switzerland, Canada, Poland, Sweden and Netherlands. We are setting up new servers in other locations.

Are you planning to offer more servers in other countries?

Yes, we will publish locations of the servers once they are ready

As this software is very good to keep the system secure so please let me know why are you providing this software free of cost?

We make the software available for free to present the quality and reliability of our service to everyone. We also offer paid packages, however we will maintain a free version of the service all the time.

We believe in the formula:

Satisfied User = Potential Customer

Free users can still avail of the benefits of SecurityKISS Tunnel but they need to manage their limits judiciously.

When will the usage limit be dropped? I want to run this tunnel all the time...

The usage limit will be increased but never be dropped.

For free users it is possible to use SecurityKISS Tunnel all the time if they manage their limit carefully while we provide paid versions of the service with full support and high usage limits. You can view the paid packages here

For free users we increased the limit to 300 MB/day

Combien d'ordinateurs peuvent utiliser SecurityKiss, et peuvent-ils être en ligne simultanément ?

Vous pouvez vous connecter depuis de nombreux PCs avec un ID client (avec le même exemplaire du programme). La seule restriction est qu'un seul ID client peut se connecter au même serveur en même temps.

Vous disposez avec la version payante de plus de 15 serveurs, vous pouvez donc vous connecter depuis autant de PCs.

La connexion est censée atteindre 100Mbit/s mais je n'en atteins même pas la moitié.

100 Mbit/s est la limite supérieure de la bande-passante physique connectant les serveurs au monde extérieur. Cela ne signifie pas que vous pourrez vous connecter avec la bande-passante maximale, car le débit dépend de nombreux facteurs mentionnés ci-dessous.

I have looked at the status on the Tun/Tap adapter and it says it is running at only 10Mbit/s.

"The Tun/Tap adapter will run at whatever speed the hardware and network will support - the 10Mbps you see in the interface properties doesn't really mean anything - it's really just a Windows artifact from the days when ethernet interfaces were always hardware and never virtual." By James Yonan

La vitesse de connexion dans le tunnel est plus lente que ma connexion Internet normale.

La vitesse de connexion du tunnel ne sera jamais aussi rapide que la vitesse normale de votre bande-passante, car :

Pour améliorer le débit du tunnel, vous pouvez :

Is there any speed difference between plans?

The primary difference is between the free GREEN plan and other plans. In the free version the bandwidth is controlled in order to prevent traffic congestion when the large number of free users connect.

On the other hand in the paid plans the connection speed is limited only by the 100Mbit bandwidth of ethernet link of our server, your Internet link bandwidth and the time needed for data to travel between your PC and the server.

The same rules apply for OLIVINE, MALACHITE, JADEITE and EMERALD plans so the speed should be the same for all paid plans however, in the high end packages you get more servers which are underloaded (since only high end plans customers can use them) so most of the bandwidth is available to you.

How can I upgrade my current plan?

If you bought 1 month plan and exceeded your monthly data allowance before expiry date, just buy another package and your account will be upgraded immediately. In order to upgrade your existing 3 month, 6 month or 12 month plan please contact Support

Manuel

Comment trouver mon ID client ?

Vous trouverez des instructions ici.

Comment fonctionne le compteur d'utilisation de SecurityKISS ?

Vous trouverez des instructions ici.

Can I change servers I am connecting to?

Yes. SecurityKISS system has servers in many locations and you can change server at any moment. If you don't select a server from the list before connection the program will connect to a random one.

When you need a server in particular location you can select server manually from the list.

Où se trouve la liste des serveurs ?

La liste des serveurs s'ouvre dans une fenêtre de dialogue dédiée. Vous pouvez y accéder depuis la barre de menus ou en cliquant sur le bouton du panneau inférieur. Voir les captures d'écran

How to change the server?

Once you open the server list select the server you want to connect and click 'Apply'. If you are connected via tunnel, disconnect and connect again. After clicking 'Disconnect' wait a few seconds before reconnecting to let your operating system return to stable state.

After successful connection the bottom panel should display the new IP address and corresponding country flag.

See the full instruction here

Que signifie la colonne 'Customer Only' dans la liste des serveurs ?

Les serveurs réservés aux clients ne sont pas utilisés par les utilisateurs gratuits de façon à ne pas être surchargés, leurs adresses IP ne sont pas connues publiquement et ils ont une meilleure réputation sur la plupart des sites web qui surveillent et filtrent les IP.

I had to reinstall my Windows. The SecurityKISS Tunnel link from the activation email does not work anymore. How can I install SecurityKISS on the new system?

If you lost your SecurityKISS Tunnel installer or you want to install it on a new PC, you can download individually generated software from the client area panel at any time:

https://www.securitykiss.com/panel/

Please go to the Download tab and your operating system subtab. Generating the software usually takes up to 30 seconds and it includes security certificate and up to date server list for your client ID.

Comment utiliser le Panneau de l'espace client ?

Vous trouverez des instructions ici

Sécurité

Ce programme a-t-il un enregistreur de frappe, un logiciel malveillant, un virus ou un logiciel espion ? Lorsque j'essaie d'installer ce programme, le système affiche un avertissement.

Non, ce programme est totalement sûr. Le programme est la propriété de SecurityKISS.com et a été écrit en utilisant des technologies open-source. Cela signifie qu'il ne contient aucun élément tiers pouvant représenter une menace potentielle.

L'avertissement est déclenché par l'installation du driver TUN/TAP. Il simule un système Ethernet ; comme cela est une opération de niveau relativement bas, votre systême d'exploitation affiche un avertissement. Le code du driver TUN/TAP fait partie du projet OpenVPN et est entièrement sûr, testé et utilisé par des millions d'utilisateurs.

SecurityKISS Tunnel a été certifié par Softpedia comme étant '100% CLEAN'.

Ci-dessous se trouve la note originale de Softpedia :

'SecurityKISS Tunnel a été testé dans les laboratoires de Softpedia en utilisant diverses solutions de sécurité à la pointe de l'industrie, et s'est avéré entièrement libre de logiciel espion/publiciel. Nous sommes impressionnés par la qualité de votre produit et vous encourageons à conserver ce standard élevé à l'avenir.'
En lire davantage Softpedia

Mon programme contre les logiciels malveillants rapporte la présence d'un virus dans votre programme. Qu'est-ce que cela signifie ?

Cela signifie que :

En premier lieu, veillez à télécharger SecurityKISS Tunnel directement depuis notre site web.

Il existe une probabilité marginale d'une attaque de type 'homme du milieu', c'est-à-dire que quelqu'un se trouvant entre votre ordinateur et notre site web remplace le flux de données de telle sorte que vous receviez un fichier infecté. Cela peut être spécifiquement le cas si vous utilisez des services de proxy anonymes.

Il est plus probable que la troisième possibilité soit correcte, mais par mesure de sécurité, veuillez vérifier le fichier avec un autre programme anti-virus.

Certains programmes anti-virus sont connus pour leurs 'faux positifs' (AVIRA et EMSISOFT en sont des exemples célèbres). Un faux positif est une situation où un programme anti-virus identifie un fichier normal et légitime comme étant un virus. Vous pouvez trouver plus d'informations sur Wikipédia (en anglais) : Wikipédia : Faux positif

SecurityKISS Tunnel peut être identifié de façon erronée car il contient du code servant à se connecter à www.securityKiss.com pour obtenir le message de bienvenue et la liste mise à jour des adresses des Passerelles Sécurisées (serveurs VPN).

Ce problème est causé par certains produits luttant contre les logiciels malveillants, qui souhaitent séduire les utilisateurs pensant 'Plus l'anti-virus détecte de menaces, meilleur il est', ce qui est une conclusion fallacieuse.

Vous pouvez analyser les fichiers de SecurityKISS Tunnel en les téléchargeant vers des services en ligne utilisant différents programmes anti-virus.

Nous recommandons les services ci-dessous car ils ne requièrent pas l'installation d'un logiciel sur votre ordinateur :

www.virusscan.jotti.org
www.virustotal.com

Les rapports d'analyses incluent les résultats d'environ 40 moteurs d'anti-virus différents.

Pour aller plus vite, veuillez lire le rapport de Virus Total concernant l'analyse de SecurityKISS :

Rapport d'analyse de SecurityKISS Tunnel sur www.virustotal.com

Bien sûr, vous pouvez opérer une double vérification en utilisant d'autres services anti-virus de ce type.

Mon trafic sortant est très sensible. Je crains que la connexion VPN de SecurityKISS se coupe subitement et que mon PC continue d'envoyer des informations en utilisant une connexion standard non-cryptée.
Comment puis-je bloquer automatiquement le trafic ? Avez-vous une solution pour cela ?

La solution est l'Exclusive Tunneling. Il se résume en la suppression de la route par défaut de la connexion sous-jacente de telle sorte qu'aucune donnée ne puisse être envoyée à l'extérieur du tunnel.

Why am I always assigned the same IP address from a particular server? Is it based on my client ID? This would seem to have the potential to compromise my security.

Assigning the same IP is an OpenVPN feature - it is the underlyig technology SecurityKISS Tunnel use. It is based on client ID and not on external IP address. The mapping is only stored internally on our server.

The 'static IP' is an option in OpenVPN but it is a default option and there is no reason to change it as it is fully secure.

The local IP you can see in SecurityKISS application is the IP address of virtual network created inside the tunnel so it is completely opaque for third parties. This IP does not appear outside of the tunnel as it makes no sense for external world (it is in a non-routeable address pool).

When I'm connected via SecurityKISS Tunnel and testing the connection using Internet Vulnerability tools like Shields Up I can see that the following ports are open: 22, 80, 443. Isn't it a security threat?

When connected in SecurityKISS Tunnel, the server you are connected to is scanned instead of your PC.

Port scanning tools like the one from Shields Up are designed to test open ports on Internet users' PCs and it generally makes no sense to run port scan tool for the server because it is normal mode of operation for a server to open ports to 'serve' the content and part of its nature.

It is a general principle of the client - server architecture that the server side must open a port to make communication possible. An average Internet user works as a client so usually they don't need to open any ports that's why the negative Shields Up scanning test result may be an indication of some vulnerability. However, testing the server in the same way is like trying to apply the same standards to completely different network entity. What is good for the goose is NOT good for the gander here. While for PC workstation exposing open ports is not very common, for the server it's perfectly normal to have many ports open.

To explain WHY the mentioned ports are open:
port 22 is an SSH console for administration, port 80 has many applications, port 443 is one of the VPN server software.

None of these open ports is a security threat. Additionally they are protected against attacks with adaptive firewall rules.

Can I be absolutely sure that data uploaded/downloaded is completely secure?

The tunneled connection is very secure - it is even resistant to 'man in the middle' type of attack.

The thing that can make the whole solution less secure is the ends of the tunnel, especially on the user's side.

Using SecurityKISS Tunnel your data is very well protected once it leaves your PC but if your PC is infected with virus, trojan or the Internet browser sends too much information then SecurityKISS Tunnel will not help much. That's why having a good antivirus program apart from SecurityKISS is so important.

Dépannage

Comment lancer le programme en mode 'Dépannage' ?

Vous trouverez des instructions ici.

J'ai installé SecurityKISS Tunnel mais je ne peux pas me connecter

Veillez à bien télécharger SecurityKISS Tunnel sur notre site web. N'utilisez pas de programme téléchargé depuis un autre site. Il ne fonctionnera pas. La copie du programme que vous avez reçu de votre ami ne fonctionnera pas non plus.

Vérifiez dans les réglages de votre pare-feu qu'une connexion est ouverte pour SecurityKISS Tunnel (TCP 80, 443 et UDP 123)

Vérifiez aussi que DHCP Client fonctionne. Vous trouverez des instructions ici

I can establish the tunnel but connection is slow and hangs up often

Please check your firewall for some advanced options that may cause problems with tunneled connection.

For example the Comodo firewall has 'Block Fragmented IP Datagrams' option which is turned on by default (Comodo -> Firewall Behavior Settings -> Advanced).

Since tunneling is about wrapping one packets into others some of them may be fragmented and blocked by the firewall because of that.

Issues of this kind are particularly difficult to track down so in case of unstable connection it is recommended to turn off firewall for a short time and observe if there is any difference.

Lorsque le tunnel est actif, mon programme d'e-mails ne peut pas se connecter pour recevoir ou envoyer des e-mails

Dans la version gratuite de notre service, il est impossible d'envoyer et de recevoir des e-mails directement depuis des programmes d'e-mails comme Thunderbird ou Outlook afin d'empêcher l'envoi de spams et d'autres utilisations abusives. Veuillez lire aussi notre offre qui explique cela en détails.

When SecurityKISS Tunnel installation completes and I'm trying to run it I get another dialog from AVG antimalware software saying that a threat was detected. After selecting 'Ignore the threat' I still don't have access to the program.

When AVG software complains about the SecurityKISSTunnel.exe file you actually need to select the AVG dialog box option to 'Ignore the threat' but it is not enough.

You can find additional info in the 'Ignore the threat' AVG dialog box, which says that the program can still be blocked by AVG Resident Shield. It means that Resident Shield does not respond to the 'Ignore the threat' command.

To fully enable the program you need to configure AVG manually: in the AVG application open Tools --> Advanced Settings, find the Anti-Virus --> Resident Shield --> Exceptions form, and add SecurityKISSTunnel.exe into the list of exceptions for Resident Shield. (Thanks to Bill Rodgers)

I can't connect from Android or iPhone/iPad

Confidentialité

Les Fournisseurs d'Accès à Internet (FAI) peuvent-ils voir la nature des téléchargements ou uniquement leur volume ?

Votre FAI voit uniquement une connexion à la passerelle de SecurityKISS et son volume. Ni le type ni le protocole du trafic se trouvant dans le tunnel n'est visible par un tiers.

Conservez-vous des journaux du trafic passant par votre tunnel ?

Pour des raisons de sécurité, nous collectons les informations concernant l'adresse IP des utilisateurs et leur heure de connexion.

Quelles informations sont conservées, et pendant combien de temps ?

Nous conservons des journaux contenant le moment de connexion et de déconnexion, l'adresse IP ainsi que le volume de trafic de façon à contrôler son utilisation pour tout utilisateur.

Les journaux détaillés sont supprimés automatiquement aprés 10 jours et le seul renseignement conservé pour une longue période est l'utilisation totale.

I am concerned about the amount of information stored about the users using your VPN. What information do you keep? Websites visited, usernames, passwords, etc?

As a completion to previous response - we do not store logs with information about traffic type or content. Your data is decrypted and sent directly to destination.

I am still worried about security of personal information because you store my IP address and connection time.

This is the minimum of information that we must store in order to make the service running.

Please note that comparing to the amount of information captured by an average website it is a drop in the ocean. Normally every website can store visitors IP address and register users activity, guess their preferences based on the time spent on a particular page and on the click order (needless to say about cookies).

We do not require registration from free users - there are no login names and passwords so they cannot be associated with your IP address. Such a design primarily has had users privacy in mind.
This is a very important point of our philosophy - we protect you from the third parties but we also want to protect you from ourselves.

We don't want to be another Big Brother Google who knows your next step before you even think of it. We are here to come to grips with this Orwellian dystopia that becomes a reality nowadays.

I'm connecting from Italy to SecurityKISS server in Chicago. When i use Firefox and surf to Google homepage I can see Italian version! Is this correct? I would expect English version for United States?

If you had connected to Google website before using SecurityKISS Tunnel, Google is able to recognize you as an existing user and display Italian language version instead of the US version. It is possible because Firefox (and any other Internet browser) is storing a small piece of information locally on your PC when connecting first time to a website. This piece of information is called Cookie. Cookie can be turned off in your browser settings but it may limit functionality of many websites. Every time you open the website again the browser sends Cookie back to that website what allows to identify you as a returning visitor. Thanks to that the website can also display the language version saved when you connected first time.

There is also another phenomenon possible. Google tries to assign default language settings to the IP address the user is connecting from. This assignment is based on the language the search queries are submitted. It may happen that many Italian users connect via SecurityKISS Tunnel server to Google and submit search queries in Italian so Google algorithm identifies SecurityKISS server as Italy based and Italian version is displayed by default regardless of the real server location. We have experienced similar issue with our Manchester server where Hong Kong Google version was displayed by default because there were many SecurityKISS users connecting from that part of the world.

Finally it is possible that IP geolocation is wrong. Websites are trying to guess from what part of the world you are connecting from. Based on tbe IP address they try to match the country however, there is no such thing like official IP-country matching central service. All these guesses come from approximate databases built on empirical data and it happens they are wrong in some cases. It has already happened that the most popular geolocation databases were identifying one of our UK servers as located in Ireland and Germany server as located in Italy.

Would your software cause my computer to not have full access to various sites like ebay.com or youtube.com or amazon.com, etc.?

No, website providers do not block traffic outgoing from our security gateways. Remember however that SecurityKISS Tunnel does not prevent sending cookies from your browser to websites. This is potential opportunity to block users by website providers.

Integration

In the paid version I tried to use VoIP (2 different providers: Fastvoip and Voipalot) both using SIP protocol but I couldn't establish a call. Why are you blocking VoIP/SIP traffic?

We don't block VoIP/SIP traffic for our customers. We have tested Fastvoip and Voipalot services and experienced many connection problems even on raw (non-tunneled) connection. When starting Voipalot in Ireland the program is failing when trying to find voipalot.com server.

Our conclusion is that those services are not reliable enough and also they may find it difficult to traverse NAT (Network Address Translation) which is an inherent part of local home networks and VPN services such as SecurityKISS.

It may be worth to look for other VoIP alternatives. Although we do not recommend using non-transparent technologies like Skype we have tested it with our service and it works well with SecurityKISS Tunnel.

Is there an option to set up forwarding ports, to fully set up something like emule to work as efficiently as possible?

No, we do not support port forwarding. It is not technically possible on a shared server IP.

Aspect technique

Why does your geolocation data differ from the WHOIS data?

There is a different purpose and meaning of WHOIS data and geolocation service.

When you check a server or your computer IP address on our geolocation service you are getting the best estimate of actual location of the device with this IP address. The estimate is based on traffic analysis and information from users.

WHOIS query identifies the person or company to which the address has been delegated. Usually it shows the address where the ISP is registered on. Additionally large ISPs tend to cover wide geographic areas and in WHOIS database they are allocated to the same city and country.

Votre VPN utilise-t-il OpenVPN ou PPTP?

Le programme SecurityKISS Tunnel (pour Windows uniquement) utilise OpenVPN bien qu'il existe une option de connexion PPTP (pour toutes les plateformes) pour nos clients.

What is the difference between OpenVPN and PPTP?

It is explained in this article.

What is the encryption strength of your tunnel?

We use 128-bit Blowfish algorithm for session encryption. For the session keys exchange we employ 1024-bit RSA certificates. Session keys are renegotiated once per user per hour.

Pourquoi SecurityKISS Tunnel est-il plus sûr que d'autres prestataires de VPN ?

Chaque programme SecurityKISS Tunnel téléchargé sur notre site web est différent. Chaque utilisateur reçoit une application unique générée de façon individuelle avec deux clés signées de 1024 bits générés secrètement : une publique et une privée.

L'idée réside dans le fait que la clé privée ne soit connue que de vous, et nous détruisons la clé privée RSA du client immédiatement après le téléchargement du programme. Nous ne conservons pas la clé privée car elle ne doit être connue que de vous et n'est pas nécessaire au serveur pour établir un tunnel sécurisé. Comme chaque utilisateur possède une clé privée différente, elles sont toutes réellement secrètes et le tunnel créé résiste à tous les types d'attaques connus, y compris l'attaque de 'l'homme du milieu' (à condition que vous ne dévoiliez pas votre clé privée).
Le fait que chaque utilisateur possède une clé privée différente offre un autre avantage - nous n'avons pas besoin de noms d'utilisateur ni de mots de passe pour identifier les utilisateurs.

D'autres prestataires de VPN fournissent seulement un exemplaire du programme de VPN qui possède la même paire de clés RSA pour tous les utilisateurs.
Cela signifie que la clé censée être privée est en fait connue publiquement !

Ces prestataires de VPN identifient leurs utilisateurs avec des noms d'utilisateur et des mots de passe, ce qui signifie que toute la sécurité se retrouve dans le mot de passe qui devient la véritable clé du canal de communication. La clé RSA de 1024 ou 2048 bits ou même la sécurité d'une simple session de 128 bits se retrouve réduite à une sécurité de 8 - 40 bits selon la force du mot de passe.

What is the technical difference between Pause and Disconnect? Which one is better and for what?

Disconnect turns down the tunneled connection, so in order to restore the complete connection establishment with authentication and other security procedures must be performed.

Pause changes only the routing table on the user's machine, so the tunnel is alive but user traffic is not redirected to it so it sits idle.

From practical point of view Pause is for fast on/off switching.

I don't want my DNS queries to be resolved by Internet Service Provider's (ISP) servers, which may result in the ISP being able to log data. Does SecurityKISS offer anonymous DNS servers?

Yes, by default every SecurityKISS server has its own DNS software server which resolves users' DNS queries when they are connected in the tunnel. These DNS servers operate on the local tunneled network 10.x.x.x and are not accessible from outside. All DNS queries travel encrypted inside the tunnel. We don't log DNS traffic.

When using SecurityKISS Tunnel, is DNS still done the 'regular' way outside the tunnel, or does SecurityKISS do it for me?

When connected with SecurityKISS Tunnel, the DNS queries and responses are sent inside the tunnel.

It means that DNS info is protected in the same way as every other data transmitted in the tunnel - completely opaque to a third party.

I went to the website dnsleaktest.com and did a test. The test concluded that SecurityKISS DNS servers were leaking. Can you explain?

There is a lot of misunderstanding about DNS leaks so let's clarify the basics first.

DNS leaks may happen on Windows and it is related to the known Windows vulnerability (no global DNS settings + closed source => hard to predict how DNS queries are routed). This is not 100% fixable by the third party software like SecurityKISS. It is just a design and implementation flaw in Windows. The best advice we can give to users experiencing this is "Please use a decent operating system instead".

Many SecurityKISS users reported DNS leaks after visiting the dnsleaktest.com website. They were concerned that the test shows various DNS server locations so we investigated these cases.

Fortunately all the reported incidents to SecurityKISS were not actual DNS leaks but only the "smoke and mirror" alarming results from such websites like dnsleaktest.com and ipleak.net. The DNS servers displayed on dnsleaktest.com are the servers in the DNS hierarchy that are trying to resolve the domain. This is how DNS system works and there is nothing wrong with it. Normally these servers don't know your real IP address. Queries are proxied by VPN server so they are anonymized like the rest of the traffic.

Only if dnsleaktest.com shows your real location, it might be worrying and deserve investigation.

In most cases there is nothing to worry about but it's confusing to users and the DNS leak websites incite fear and draw wrong conclusions.

Even if it is not the real problem we had to address this issue because users don't know whom to trust and it is quite complicated matter to be explained in one sentence. We updated our servers so that certain DNS queries are not forwarded upstream to external DNS servers. It should prevent displaying confusing results on dns leak testing websites.

Can you briefly explain the difference between using TCP vs UDP servers?

SecurityKISS Tunnel can use TCP or UDP protocol to connect to the servers.

TCP was designed as a stateful, reliable protocol with error checking, retransmissions, connection and congestion control.
UDP is lightweight, connectionless (each packet is handled individually) and faster.

SecurityKISS Tunnel supports both methods to give users option if one of the protocols is blocked in their network however, it is recommended to use UDP as it is slightly faster.
It may happen that UDP is blocked on Internet Provider firewall so then TCP is the alternative option. Usually TCP's performance penalty is very low and connection speed is almost the same as in UDP.

What are the advantages and disadvantages of using TCP 443, UDP 123, UDP 5000 or UDP 5353?

In most cases it does not matter. Multple options are given in order to enable users who are behind restrictive firewalls and some protocol (UDP/TCP) and port (443, 123, 5353, 5000) combinations are blocked. If randomly selected option works there is no need to worry about. Otherwise it's worth to check a different combination.

Should I compress the data before sending in the tunnel?

No. It will give you no advantage in speed because we use compression anyway.

The compression factor depends on the type of data you are sending and whether you use our OpenVPN client or PPTP (available in paid packages only).

Can you provide tls-auth file for OpenVPN configuration?

We don't use tls-auth. The tls-auth option uses a static pre-shared key (PSK) which is shared between users and the server.

It is often used if two peers connect over VPN as an additional line of defense. In the commercial VPN multi-user setup it makes no sense because the key is no longer secret. It is shared among users, everyone knows it so it does not offer any security (although it may mitigate some Denial-Of-Service attempts against server).

Autre

May I distribute your software?

There is no point in doing it since every downloaded instance of SecurityKISS Tunnel is a different binary.

Please do not share copies of downloaded binaries nor make them available on sharing websites. The shared binary is not going to work. Moreover it is in your interest not to share downloaded program because it will stop working for you. If you want to recommend it to someone - share the news and redirect people to our download website where they can get software for free.

Your software is one of the best ideas I've ever seen. Excellent work.

Thank you. You can help to improve it by sending suggestions and issues you found. Also any suggestions related to the website and its content are welcome.

We are going to expand the Articles section so if you have any ideas or texts you would like to publish - let us know!

Especially we are interested in making it as intelligible as possible since we want to reach a wide audience.