Jump to content
Not connected, Your IP: 216.73.216.112

All Activity

This stream auto-updates     

  1. Past hour
  2. Today
  3. Yesterday
  4. First test: Note with ./goldcrest AirVPN_Netherlands_UDP-443-Entry3.ovpn No problem 😁 @localhost:/usr/local/bin> ./goldcrest AirVPN_Belgium_UDP-1637-Entry3.conf Goldcrest - AirVPN Bluetit Client 2.1.0 alpha 1 - 23 April 2026 2026-04-25 17:03:13 Reading run control directives from file /home/gerrit/.config/goldcrest.rc 2026-04-25 17:03:13 Bluetit - AirVPN WireGuard/OpenVPN3 Service 2.1.0 alpha 1 - 23 April 2026 2026-04-25 17:03:14 OpenVPN core 3.12 AirVPN (20260206) linux x86_64 64-bit 2026-04-25 17:03:14 Copyright (C) 2012- OpenVPN Inc. All rights reserved. 2026-04-25 17:03:14 OpenSSL 3.5.3 16 Sep 2025 2026-04-25 17:03:14 AirVPN WireGuard Client 2.0.0 Linux x86_64 64-bit 2026-04-25 17:03:14 Bluetit options successfully reset 2026-04-25 17:03:14 Requesting VPN connection to Bluetit 2026-04-25 17:03:14 Network filter and lock are using nftables 2026-04-25 17:03:14 Kernel module nf_tables is already loaded 2026-04-25 17:03:14 WARNING: firewalld is active on this system and may interfere with network filter and lock 2026-04-25 17:03:14 WARNING: firewalld is currently owning NFTables and this will prevent the system network f ilter settings to be restored and cause an error. Please set NftablesTableOwner to "no" in /etc/firewalld/fire walld.conf 2026-04-25 17:03:14 Network filter successfully initialized 2026-04-25 17:03:14 Private network is allowed to pass the network filter 2026-04-25 17:03:14 Ping output is allowed to pass the network filter 2026-04-25 17:03:14 IPv6 NDP is allowed to pass the network filter 2026-04-25 17:03:14 Local interface lo - IPv4 127.0.0.1 IPv6 ::1 2026-04-25 17:03:14 Local interface enp6s0 - IPv4 192.168.178.11 IPv6 2001:1c04:588:e400:23da:d20e:1229:fd80 I Pv6 2001:1c04:588:e400:c866:1f63:a0b9:4a41 IPv6 fe80::35a5:513a:4743:88bd 2026-04-25 17:03:14 Default IPv4 gateway via 192.168.178.1 dev enp6s0 2026-04-25 17:03:14 Default IPv6 gateway via fe80::3a17:b1ff:fe40:9189 dev enp6s0 2026-04-25 17:03:14 Starting WireGuard synchronous connection 2026-04-25 17:03:14 ERROR: gateway 192.168.178.1 on interface enp6s0 has the same metrics (2147483647) of gate way on interface . Network routing can be unpredictable in most cases. Please fix your routing table. 2026-04-25 17:03:14 Kernel module wireguard is already loaded 2026-04-25 17:03:14 WireGuard client successfully created and initialized. 2026-04-25 17:03:14 WireGuard Connect thread exception: Cannot resolve hostname 2026-04-25 17:03:14 Bluetit session terminated
  5. @anchoby Hello! Error 111 means that the packet reached your node but the attempted connection was actively rejected, typically through a TCP RST packet. Please follow this checklist: https://airvpn.org/forums/topic/66388-port-forwarding/?do=findComment&comment=243305 Kind regards
  6. This happened to me, but that was eons ago and on Windows host. Eddie typically backs up the current system DNS configuration on startup and replaces it with AirVPN’s DNS servers for the duration of the VPN session. Under normal conditions, the original DNS settings are restored when the session ends. However, if the client or system shuts down unexpectedly, this restoration step may not complete. As a result, the system can be left using AirVPN DNS servers. On subsequent launches, Eddie may then back up this already-modified state instead of the original configuration, effectively losing the previous (likely DHCP-assigned) DNS settings. To resolve the issue, reset your DNS configuration [while Eddie is not running, Staff]. Go to your network settings and set IPv4 DNS to Automatic (DHCP). This will restore your system’s default DNS behavior. Regards Viktor23596
  7. Last week
  8. Oh good! I'm glad I'm not going insane, because I couldn't figure it why it wasn't working. Thanks for the quick fix.
  9. Hello! We see the problem. Eddie Android edition 4.0.0 is affected by a bug. When Eddie generates a profile for WireGuard or AmneziaWG, it fails to add the MTU option and the IPv6 argument for the AllowedIPs option. We have immediately patched Eddie with high priority and now version 4.0.1 is available, addressing these issues. We strongly recommend that you upgrade immediately. Thank you for having reported the problems! Please see also here: https://airvpn.org/forums/topic/80030-eddie-android-edition-401-available/ Kind regards AirVPN Support Team
  10. Hello! We're very glad to inform you that Eddie Android edition 4.0.1 is now available. This is a patch release to fix a bug affecting AmneziaWG and WireGuard profile generation by Eddie. When generating a profile for WireGuard or AmneziaWG, Eddie 4.0.0 omits the MTU option and the IPv6 address space (even when it's necessary) in AllowedIPs option arguments. We strongly recommend that you upgrade immediately. Eddie Android edition 4.0.1 is available on our web site and the Google Play Store. Any other feature is described by the 4.0.0 version announcement, available here: https://airvpn.org/forums/topic/79743-eddie-android-edition-400-available/ Kind regards & datalove AirVPN Staff
  11. WireGuard all the way. OpenVPN only when you must bypass an outbound firewall, via TCP 443 for example.
  12. Hello. I'm new to AirVPN. So I'm trying to set up Airvpn + Qbittorrent and I'm having some troubles. I get a "Connection Refused" error when testing the port. I have opened the port in my firewall (30105) and It's also set in qbittorrent. Network Interface is also set to airvpn. I'm using the OpenVPN UDP config from the generator on the website. Continent: Europe, OS: Linux CachyOS.
  13. I use WireGuard as default and OpenVPN with some special ports as "backup" in cases where I cannot connect via regular WireGuard (though this has rarely happened).
  14. +1 for the HaGeZi Multi Pro blocklist. (the Pro++ may be too aggressive and might cause things to break I think - that's why the "regular" Pro is IMHO better suited)
  15. A couple of things I observed from the "not working" log: ipv4-default-gateway: 25.255.255.254 interface: ZeroTier Virtual Port your default route is not your router (192.168.1.1) it’s your ZeroTier interface Test DNS IPv6: Failed Test Ping IPv6: Failed IPv6 seems broken ... Looks like a conflict between OpenVPN via Eddie and the ZeroTier virtual networking. Can you temporarily disable ZeroTier and check if you can connect with Eddie?
  16. There are the two configs. The first one works, generated by the site I linked to. The second one does not, and was generated by Eddie for Android 4.0. # Phoenix - Guniibuu [Interface] PrivateKey = Address = 10.191.122.99/32,fd7d:76ee:e68f:a993:4abf:faec:ddcf:7af4/128 DNS = 10.128.0.1, fd7d:76ee:e68f:a993::1 MTU = 1420 Jc = 5 Jmin = 10 Jmax = 40 S1 = 0 S2 = 0 H1 = 1 H2 = 2 H3 = 3 H4 = 4 [Peer] PublicKey = PresharedKey = AllowedIPs = 0.0.0.0/0, ::/0 Endpoint = 198.44.133.70:1637 [Interface] Address = 10.191.122.99/32, fd7d:76ee:e68f:a993:4abf:faec:ddcf:7af4/128 PrivateKey = DNS = 10.128.0.1, fd7d:76ee:e68f:a993::1 Jc = 5 Jmin = 10 Jmax = 30 S1 = 0 S2 = 0 H1 = 2 H2 = 4 H3 = 1 H4 = 3 [Peer] PublicKey = PresharedKey = Endpoint = 198.44.133.67:1637 AllowedIPs = 0.0.0.0/0
  17. Hello! We're very glad to inform you that AirVPN Suite version 2.1.0 alpha 1 is now available for x86-64 based Linux systems. Builds for ARM architectures will be available in the near future. AirVPN Suite 2.1.0 development focuses on bug fixes, improved IPv6 management and aims at a quick release. New features are planned for the major new version (probably 3.0.0) which is planned to offer complete AmneziaWG support. Main changes: very large routing table should not cause Bluetit to crash anymore more accurate detection of default gateway several IPv6 addresses management fixes more accurate detection of network availability (in progress) Changelog for the AirVPN Suite 2.1.0 (complete file available in the downloadable package): Version 2.1.0 alpha 1 - 23 April 2026 [ProMIND] updated to OpenVPN-AirVPN 3.12 (20260206) airvpntools [ProMIND] added new method capitalizeWord() network [ProMIND] getGatewayFromRouteTable(): msgBuf is now dynamically allocated (currently to 32KiB) [ProMIND] getGatewayFromRouteTable(): socket's receive buffer set to 1MiB [ProMIND] getGatewayFromRouteTable(): revised code for a more strict and reliable scan [ProMIND] added methods isValidIPAddress(), isValidIPv4() and isValidIPv6() [ProMIND] parseIpSpecification(): fixed IPv6 specification handling wireguardclient [ProMIND] setup(): check validity for both IPv4 and IPv6 gateways [ProMIND] profileNeedsResolution(): fixed IPv6 address handling [ProMIND] setConfiguration(): fixed IPv6 address handling [ProMIND] resolveProfile(): fixed IPv6 address handling URL to download the tarball (please note that packages for ARM architectures will be available in the near future): https://eddie.website/repository/AirVPN-Suite/2.1.0-alpha1/AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz SHA-2: https://eddie.website/repository/AirVPN-Suite/2.1.0-alpha1/AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz.sha512 $ sha256sum AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz fcc74f7941b6c1b4215e9820d2fc959fb17957fbbdb7d149a1a128930f05038d AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz If you wish to test, thank you very much! Please feel free to report here any bug and malfunction you find! Kind regards & datalove AirVPN Staff
  18. @lexsilico Hello! We have AirVPN Suite 2.1.0 alpha 1 ready (only for x86-64 systems). It aims at addressing (in this alpha 1 or imminent versions) this problem. Would you like to test it and report back? It also includes IPv6 related fixes, but remember that it's still an alpha version so don't rely on it for serious purposes. ARM builds will be available soon, stay tuned. URL to download the tarball: https://eddie.website/repository/AirVPN-Suite/2.1.0-alpha1/AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz SHA-2: https://eddie.website/repository/AirVPN-Suite/2.1.0-alpha1/AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz.sha512 $ sha256sum AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz fcc74f7941b6c1b4215e9820d2fc959fb17957fbbdb7d149a1a128930f05038d AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz If you test, keep us posted! Kind regards
  19. @Pi77Bull Hello! We have AirVPN Suite 2.1.0 alpha 1 ready (only for x86-64 systems). Although it does not address directly the main problem you mentioned with network gateway check, it is undergoing various changes that could resolve the issue (either in this early alpha 1 version or in the next ones). Would you ike to test it and report back? It also includes IPv6 related fixes, but remember that it's still an alpha version so don't rely on it for serious purposes. URL to download the tarball: https://eddie.website/repository/AirVPN-Suite/2.1.0-alpha1/AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz SHA-2: https://eddie.website/repository/AirVPN-Suite/2.1.0-alpha1/AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz.sha512 $ sha256sum AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz fcc74f7941b6c1b4215e9820d2fc959fb17957fbbdb7d149a1a128930f05038d AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz If you test, keep us posted! NOTE. Before proceeding, make sure that the directory /etc/netns exists on your system. If it does not, create it before testing traffic splitting. Currently, it is assumed that /etc/netns is a system directory on Linux distributions, so, if it was removed, you (as superuser) and not Bluetit must re-create it to let the system (and Bluetit) store configuration files for different network namespaces in isolated directories. Kind regards
  20. @Posh1698 Hello! We have AirVPN Suite 2.1.0 alpha 1 ready (only for x86-64 systems). It aims at addressing this problem. Would you like to test it and report back? It also includes IPv6 related fixes, but remember that it's still an alpha version so don't rely on it for serious purposes. URL to download the tarball: https://eddie.website/repository/AirVPN-Suite/2.1.0-alpha1/AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz SHA-2: https://eddie.website/repository/AirVPN-Suite/2.1.0-alpha1/AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz.sha512 $ sha256sum AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz fcc74f7941b6c1b4215e9820d2fc959fb17957fbbdb7d149a1a128930f05038d AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz If you test, keep us posted! Kind regards
  21. Hello! A possible reason is that Eddie generates files compliant to the latest protocol specifications and you are using an older version. If that's the case, we can compare the two different profiles (remember to delete your key), i.e. the working one and the non-working one, and check the log of your software to find out the reason. Kind regards
  22. Interestingly if I use Eddie for Android 4.0 the and export to AmneziaWG, after I email it to myself, the resulting file is renamed randomly and has no file extension. But the data is still there, so I just rename the file and add the .conf extension. However, that file never successfully connects. But if I export it from the site I linked to everything runs fine. Any idea as to why I cannot connect through Eddie exports?
  23. Hello! You may get a lot of data from here: https://airvpn.org/forums/topic/65417-amneziawg-config-patcher-cps-db/ If you have an Android device or emulator, by running Eddie Android edition 4 you can generate ready to use AmneziaWG configuration files which are fully integrated with AirVPN (i.e. you can generate profiles for specific AirVPN servers, countries and so on), even relying on a large CPS QUIC database of real web sites if needed to bypass the blocks. You can then share them with your Windows machine. Important: Eddie Android edition generates files compatible with v2.0 Amnezia protocol, so you need this latest version. Kind regards
  24. Hello! Possible causes: Streaming services (Netflix, YouTube, etc.) often rate-limit or deprioritize known VPN exit IP addresses, or IP addresses assigned to specific ASNs. Speed tests don’t trigger this, but video streams do. Try different AirVPN servers. Too large virtual network interface MTU causing excessive fragmentation, optionally with broken MTU path discovery. Streaming uses sustained flows that are more sensitive to MTU mismatches than bursty speed tests. Shrink MTU to 1280 bytes to check whether you get any improvement. If not, consider MSS clamping, just in case the PMTU discovery is broken upstream (not an uncommon case). Set MSS to 40 bytes less than MTU, for example MTU 1320 bytes, MSS 1280 bytes. On Asus routers you'll need to do this via iptables: as far as we know there's no option to do it on the Web UI. Asus Adaptive QoS or Bandwidth Limiter on the router. Check and disable such tools if they are active. If DNS is outside the VPN but traffic is inside you can hit far-away CDN nodes, causing slow streams. Make sure to enforce strict DNS settings on the router so that it will query only VPN DNS. Kind regards
  25. I stumbled upon this online WG converter. Is it safe to use? Is so, which settings are recommended? I'm using WG configs with Wiresock because Eddie drastically slows boot-up speeds, often not loading and connected before the wifi disconnects. AmneziaWG supports obfuscation that Eddie does not.
  26. Many users might think it's unnecessary, since using a proxy is sufficient to bypass the Firewall. I'd like to share my perspective: proxy providers only promise to offer specialized technology for circumventing the firewall, without guaranteeing user privacy or maintaining network neutrality. Furthermore, proxies are usually cheaper than VPNs, meaning some low-priced providers might profit from user information. Using only a proxy puts your information at risk. For a while, I only used a proxy to bypass the GFW, and I received a lot of spam, which was extremely annoying. Therefore, I decided to use a proxy in conjunction with a VPN. My traffic is encrypted through OpenVPN and forwarded by AirVPN servers, significantly increasing the difficulty for proxy providers to obtain my information, thus protecting my privacy. AirVPN didn't disappoint in terms of privacy protection; I didn't receive any spam while using it. Simultaneously, by utilizing proxy protocol technology, I can use numerous protocols to bypass the GFW's interference and blocking, which is superior in terms of obfuscation, privacy, and network neutrality.
  27. The actual experience is quite good. The speed is on par with AmneziaWG, or even faster. If a dedicated proxy node is used, it may be able to run at full bandwidth, with speeds far exceeding SSH and SSL.
  28. The IP address was detected as an AirVPN server IP, which was leaked via WebRTC. The IP was traced back to the proxy node IP, and could not be traced back to the local machine IP, so it can be considered secure.
  29. Of course. The steps are as follows: 1. Configure Clash (agent software) Import proxy nodes using a proxy vendor link (proxy nodes can use any protocol). Clash settings - Port - Socks port - Enable - Set to 10000 (the port number can be anything). 2. Configure Eddie Eddie settings - Proxy/Tor - Type - socks - When - Always - Host - 127.0.0.1 - Port-10000 - Authentication - none Eddie Settings - Protocol - Select OpenVPN TCP 443 Eddie Settings - Network Lock - Uncheck "Ensure in Session" save 3. Connection To use it, first open Clash and connect to the proxy node using the system proxy mode, then open Eddie and connect to the server. 4. Diversion With this setup, all software still uses the proxy node and does not go through the AirVPN server, so traffic splitting is necessary. (There may be professional software for setting up traffic splitting rules, but I didn't use it; I'm just sharing my approach.) For browsers, the ProxySwitch plugin can be used to select direct connection mode. For other applications, they can listen on port 10003 of the AirVPN port forwarding service (this is different from the Socks port; it's the port number for port forwarding set in the AirVPN panel; it can also be any port). This allows you to route traffic through a proxy node for obfuscation before it passes through the AirVPN server, effectively enhancing the obfuscation effect.
  1. Load more activity
×
×
  • Create New...