All Activity
This stream auto-updates
- Past hour
-
-
-
-
- Today
-
-
-
-
-
- Yesterday
-
-
-
888starzuz_gdEl started following Prevent Leaks with Linux & Firestarter (also Stop traffic when VPN Drops) ...
-
Is this the kind of socks5 proxy?
-
-
Well i think that's a new Download speed record if i'm not mistaken using Toliman in Switzerland via gluetun used for qbt only although i'm curious why upload is drasticly lower i've symetrical 8gbps fiber line so that's not it and when i run that on my host network i get 7gbps down 5/6gbps up using wireguard config on port 1637 mtu of host is at 1500 mtu of wireguard tunnel is 1320 will keep trying by increasing that to 1420 which is the theoritical best value edit 1 : new record with mtu 1420 seems to be the highest i can get to avoid fragmentation
-
I tried many script found in this forum, but seems all not work for me 1. I connected to a random server by using AirVPN UI 2. Start the "ROTATING Script" 3. I use what is my IP to check my public IP, every 24 hours, no change. Anything I did wrong ? How to make my AprVPN rotating server every 15 mins ? Please help !
- Last week
-
-
-
-
-
-
I have a Unifi Dream Machine SE (UDM-SE), configured AirVPN with wireguard client inside of it. I am trying to force all traffic inbound/outbound of my qBittorent lxc through the wireguard client. I can download torrents just fine, but I am unable to seed and upload for anyone which is killing my tracker ratio. On the UDM-SE I have LAN-In firewall rule to allow anything from my AirVPN going to my qBittorrent, I have a DNAT from any traffic on the specific AirVPN port to be translated to the qBittorrent IP, I have a policy based route taking any traffic from my qbittorrent and sending through the wireguard client. I have qbittorrent listening on the forwarded port. I'm at a loss as to "Test Open" is failing for the forwarded port I have. I'd greatly appreciate a look over from anyone
-
-
Sorry, but you are out of luck. OpenVPN (AES) puts a lot of strain on weak Synology NAS CPUs. Wireguard is an option, but I don't think DSM supports it.
-
Hi, i followed the guide on my older 1511+ (DSM 6.2) but it kills my speed. I have fiber, can download at 80Mo/s but with the vpn connected it falls to 6-8Mo/s I was told that the NAS had issues with openvpn being too load heavy and i should turn to wireguard which seems to be an IT nightmare on its own with homemade SPK and then SSH config an scripting on top of that. Is there a way to make openvpn perform that doesn't entail 3 years of advanced IT network research and learning how to linux ? (and as my nas is getting very much old is there a brand that has a UI as good as DSM or better AND is better with vpn clients ?)
-
Hello! We can't provide an ETA right now but stay tuned. Are you sure that blocks from Russia are effective when you use QUIC CPS of a real .ru website? According to a few reports, that's good to bypass current blocks. However, it must be said that different ISPs implement different blocking techniques. Kind regards
-
I'm in Iran. The only way I am able to connect to internet is through a socks5 proxy, though it's still censored. I wonder if AirVPN supports using a upstream socks5 proxy? The only other option is TOR, but I can't use it for many things, like downloading torrents.
-
I know I reply to an old question but I found a few related unanswered questions here before I tried to fix this (IPv6 not working). My router now runs OpenWrt 25.12.2 I did several tests before having both IPv4 and IPv6 working. Unlike with IPv4 where you have only a few changes to make (select Route Allowed IPs on the VPN Peer and add the VPN in Covered networks with the WAN zone) there's more needed for IPv6. I started by disabling the wan6 interface. I had to enable both DHCPv6 and SLAAC on the LAN interface to have only private IPv6 addresses. Finally a static IPv6 route to the VPN was added and IPv6 masquerading enabled.
-
Could you please provide an approximate timeline for implementing this functionality? Currently, the above-mentioned restrictions in the amnezia wg protocol settings of the airvpn servers unfortunately do not allow overcoming blocks from Russia. I have to use other services with a paid airvpn subscription. Thank you.
-
-
ignore the green block, that's my addition to the screenshot
-
by leaks if you mean when your vpn drops out wiresock comes with a killswitch feature so your good @flat4 edit: nevermind I don't know how english works and i didn't catch what you meant, and i still kinda dont sorry
-
I dropped the Wiregard approach as while i found and spk, after that it's mostly SSh as there is no native UI and that's somehow above my paygrade (and as said all the guide i find for syno/wireguard are taylored for the server side or access point, no as an exit strategy). I saw some post about raspberry middle box and i'll look into it thanks.
-
Highly seconding the demand for per-app traffic splitting in Eddie, would love love love to have that feature without the need for other applications.
-
-
-
In China, Airvpn can works well? Some one uses it in China? I want to use a VPN for long terms and don't expect it is blocked.
-
-
Why do AirVPN DNS servers hate the website usps.com so much? At first, I couldn’t figure out why I could load usps.com on my FreeBSD machine but not on my Android smartphone. Then I realized that, on FreeBSD, the DNS fallback mechanism configured in /etc/resolv.conf was causing a DNS leak: usps.com would load in Chromium because my ISP’s DNS servers were being used. I had to make sure that resolv.conf was automatically configured to use AirVPN DNS first and, from now on, to fall back to Cloudflare DNS or Google DNS instead of my ISP’s DNS. But I’m curious: why can’t AirVPN DNS resolve usps.com?
-
Linux: AirVPN Suite 2.1.0 preview available
colorman replied to Staff's topic in News and Announcement
I'll keep looking. Thanks Update: AirVPN Bluetit Client 2.0.0 - 22 July 2025 (check 2.1.0 the same notifications) The message I saw earlier is gone after a fresh start. There are still 2 warnings with openvpn. There are still 2 warnings. 2026-04-27 13:56:58 WARNING: firewalld is active on this system and may interfere with network filter and lock (With Wireguard, only this message.) 2026-04-27 13:56:59 WARNING: NetworkManager is active on this system and may interfere with DNS management as well as causing DNS leaks -
Hello! Syntax error. Check our previous message and fix accordingly, there's an undue space character between "Nftables" and "TableOwner" that must be deleted, otherwise the option is not recognized. Kind regards
-
Linux: AirVPN Suite 2.1.0 preview available
colorman replied to Staff's topic in News and Announcement
This is what I did in firewald.conf I still see the message. # firewalld config file # default zone # The default zone used if an empty zone string is used. # Default: public DefaultZone=public # Clean up on exit # If set to no or false the firewall configuration will not get cleaned up # on exit or stop of firewalld. # Default: yes CleanupOnExit=yes # Clean up kernel modules on exit # If set to yes or true the firewall related kernel modules will be # unloaded on exit or stop of firewalld. This might attempt to unload # modules not originally loaded by firewalld. # Default: no CleanupModulesOnExit=no # Lockdown # If set to enabled, firewall changes with the D-Bus interface will be limited # to applications that are listed in the lockdown whitelist. # The lockdown whitelist file is lockdown-whitelist.xml # Default: no Lockdown=no # IPv6_rpfilter # Performs a reverse path filter test on a packet for IPv6. If a reply to the # packet would be sent via the same interface that the packet arrived on, the # packet will match and be accepted, otherwise dropped. # The rp_filter for IPv4 is controlled using sysctl. # Note: This feature has a performance impact. See man page FIREWALLD.CONF(5) # for details. # Default: yes IPv6_rpfilter=yes # IndividualCalls # Do not use combined -restore calls, but individual calls. This increases the # time that is needed to apply changes and to start the daemon, but is good for # debugging. # Default: no IndividualCalls=no # LogDenied # Add logging rules right before reject and drop rules in the INPUT, FORWARD # and OUTPUT chains for the default rules and also final reject and drop rules # in zones. Possible values are: all, unicast, broadcast, multicast and off. # Default: off LogDenied=off # FirewallBackend # Selects the firewall backend implementation. # Choices are: # - nftables (default) # - iptables (iptables, ip6tables, ebtables and ipset) # Note: The iptables backend is deprecated. It will be removed in a future # release. FirewallBackend=nftables # FlushAllOnReload # Flush all runtime rules on a reload. In previous releases some runtime # configuration was retained during a reload, namely; interface to zone # assignment, and direct rules. This was confusing to users. To override this # behavior set this to "yes". # Default: no FlushAllOnReload=no # ReloadPolicy # Policy during reload. By default all traffic except for established # connections is dropped while the rules are updated. Set to "DROP", "REJECT" # or "ACCEPT". Alternatively, specify it per table, like # "OUTPUT:ACCEPT,INPUT:DROP,FORWARD:REJECT". # Default: ReloadPolicy=INPUT:DROP,FORWARD:DROP,OUTPUT:DROP ReloadPolicy=INPUT:DROP,FORWARD:DROP,OUTPUT:DROP # RFC3964_IPv4 # As per RFC 3964, filter IPv6 traffic with 6to4 destination addresses that # correspond to IPv4 addresses that should not be routed over the public # internet. # Defaults to "yes". RFC3964_IPv4=yes # NftablesFlowtable # This may improve forwarded traffic throughput by enabling nftables flowtable. # It is a software fastpath and avoids calling nftables rule evaluation for # data packets. This only works for TCP and UDP traffic. # The value is a space separated list of interfaces. # Example value "eth0 eth1". # Defaults to "off". NftablesFlowtable=off # NftablesCounters # If set to yes, add a counter to every nftables rule. This is useful for # debugging and comes with a small performance cost. # Defaults to "no". NftablesCounters=no Nftables TableOwner=no -
Hello! We already told you where to look at and you already provided evidence of the duplicate and exposing Bluetit's bug, don't worry and thank you. No further action is required at the moment. You must see that Bluetit's warning about exclusive tables ownership disappears and Network Lock now works properly. firewalld exclusive tables ownership prevents Network Lock from working properly on any Suite version, obviously. Kind regards
-
Gotta admit, I ditched the setup and ran back to windows...
-
-
-
Linux: AirVPN Suite 2.1.0 preview available
colorman replied to Staff's topic in News and Announcement
I checked the YAST network settings, but I only see 1 route. Just to be sure, I also checked the cockpit; I don't see anything unusual. By the way, I use openSUSE Slowroll. I have no idea where else to look. I didn't have any problems with the previous version. Exactly. Add it (you can edit the file with any text editor with root privileges), set it to "no" and verify that the issue gets resolved. NftablesTableOwner=no then re-start firewalld. This is vital to let Bluetit operate "Network Lock" properly. Exclusive ownership of the firewall tables must be pondered on a case by case basis. In this case if you wish to enable "Network Lock" you can't assign exclusive ownership of the tables to firewalld. I added it, but I don't see any change. I restarted the firewall and restarted the PC myself. For now, I think I'll just go back to the previous version. I will test it for you again later (I enjoy doing that). As far as my knowledge allows. -
Thanks for your support. I cannot test as I'm running the arm64 architecture. If you would like me to test it on arm, let me know when the build is available.
-
Hello! Exactly. Add it (you can edit the file with any text editor with root privileges), set it to "no" and verify that the issue gets resolved. NftablesTableOwner=no then re-start firewalld. This is vital to let Bluetit operate "Network Lock" properly. Exclusive ownership of the firewall tables must be pondered on a case by case basis. In this case if you wish to enable "Network Lock" you can't assign exclusive ownership of the tables to firewalld. You have two default routes via 192.168.178.1 on the same interface (enp6s0), one without explicit metric (so metric 0) and one with metric 100. Such duplicates are harmless in general but Bluetit detects them, probably fails to understand that the metric of one of them is 0, and throws a critical error believing that the metric is the same for both. We'll work on the matter carefully. In the meantime just delete the duplicate route and configure your interface either fully static or fully DHCP to keep on testing Kind regards
