Jump to content
Not connected, Your IP: 216.73.216.139

All Activity

This stream auto-updates     

  1. Past hour
  2. Today
  3. Yesterday
  4. Oh good! I'm glad I'm not going insane, because I couldn't figure it why it wasn't working. Thanks for the quick fix.
  5. Hello! We see the problem. Eddie Android edition 4.0.0 is affected by a bug. When Eddie generates a profile for WireGuard or AmneziaWG, it fails to add the MTU option and the IPv6 argument for the AllowedIPs option. We have immediately patched Eddie with high priority and now version 4.0.1 is available, addressing these issues. We strongly recommend that you upgrade immediately. Thank you for having reported the problems! Please see also here: https://airvpn.org/forums/topic/80030-eddie-android-edition-401-available/ At the time of this writing Eddie Android edition 4.0.1 is under review by the Google Play Store, while it is immediately available on our web site. Kind regards AirVPN Support Team
  6. Hello! We're very glad to inform you that Eddie Android edition 4.0.1 is now available. This is a patch release to fix a bug affecting AmneziaWG and WireGuard profile generation by Eddie. When generating a profile for WireGuard or AmneziaWG, Eddie 4.0.0 omits the MTU option and the IPv6 address space (even when it's necessary) in AllowedIPs option arguments. We strongly recommend that you upgrade immediately. Eddie Android edition 4.0.1 is already available on our web site and under review on the Google Play Store. Any other feature is described by the 4.0.0 version announcement, available here: https://airvpn.org/forums/topic/79743-eddie-android-edition-400-available/ Kind regards & datalove AirVPN Staff
  7. WireGuard all the way. OpenVPN only when you must bypass an outbound firewall, via TCP 443 for example.
  8. Hello. I'm new to AirVPN. So I'm trying to set up Airvpn + Qbittorrent and I'm having some troubles. I get a "Connection Refused" error when testing the port. I have opened the port in my firewall (30105) and It's also set in qbittorrent. Network Interface is also set to airvpn. I'm using the OpenVPN UDP config from the generator on the website. Continent: Europe, OS: Linux CachyOS.
  9. Last week
  10. I use WireGuard as default and OpenVPN with some special ports as "backup" in cases where I cannot connect via regular WireGuard (though this has rarely happened).
  11. +1 for the HaGeZi Multi Pro blocklist. (the Pro++ may be too aggressive and might cause things to break I think - that's why the "regular" Pro is IMHO better suited)
  12. A couple of things I observed from the "not working" log: ipv4-default-gateway: 25.255.255.254 interface: ZeroTier Virtual Port your default route is not your router (192.168.1.1) it’s your ZeroTier interface Test DNS IPv6: Failed Test Ping IPv6: Failed IPv6 seems broken ... Looks like a conflict between OpenVPN via Eddie and the ZeroTier virtual networking. Can you temporarily disable ZeroTier and check if you can connect with Eddie?
  13. There are the two configs. The first one works, generated by the site I linked to. The second one does not, and was generated by Eddie for Android 4.0. # Phoenix - Guniibuu [Interface] PrivateKey = Address = 10.191.122.99/32,fd7d:76ee:e68f:a993:4abf:faec:ddcf:7af4/128 DNS = 10.128.0.1, fd7d:76ee:e68f:a993::1 MTU = 1420 Jc = 5 Jmin = 10 Jmax = 40 S1 = 0 S2 = 0 H1 = 1 H2 = 2 H3 = 3 H4 = 4 [Peer] PublicKey = PresharedKey = AllowedIPs = 0.0.0.0/0, ::/0 Endpoint = 198.44.133.70:1637 [Interface] Address = 10.191.122.99/32, fd7d:76ee:e68f:a993:4abf:faec:ddcf:7af4/128 PrivateKey = DNS = 10.128.0.1, fd7d:76ee:e68f:a993::1 Jc = 5 Jmin = 10 Jmax = 30 S1 = 0 S2 = 0 H1 = 2 H2 = 4 H3 = 1 H4 = 3 [Peer] PublicKey = PresharedKey = Endpoint = 198.44.133.67:1637 AllowedIPs = 0.0.0.0/0
  14. Hello! We're very glad to inform you that AirVPN Suite version 2.1.0 alpha 1 is now available for x86-64 based Linux systems. Builds for ARM architectures will be available in the near future. AirVPN Suite 2.1.0 development focuses on bug fixes, improved IPv6 management and aims at a quick release. New features are planned for the major new version (probably 3.0.0) which is planned to offer complete AmneziaWG support. Main changes: very large routing table should not cause Bluetit to crash anymore more accurate detection of default gateway several IPv6 addresses management fixes more accurate detection of network availability (in progress) Changelog for the AirVPN Suite 2.1.0 (complete file available in the downloadable package): Version 2.1.0 alpha 1 - 23 April 2026 [ProMIND] updated to OpenVPN-AirVPN 3.12 (20260206) airvpntools [ProMIND] added new method capitalizeWord() network [ProMIND] getGatewayFromRouteTable(): msgBuf is now dynamically allocated (currently to 32KiB) [ProMIND] getGatewayFromRouteTable(): socket's receive buffer set to 1MiB [ProMIND] getGatewayFromRouteTable(): revised code for a more strict and reliable scan [ProMIND] added methods isValidIPAddress(), isValidIPv4() and isValidIPv6() [ProMIND] parseIpSpecification(): fixed IPv6 specification handling wireguardclient [ProMIND] setup(): check validity for both IPv4 and IPv6 gateways [ProMIND] profileNeedsResolution(): fixed IPv6 address handling [ProMIND] setConfiguration(): fixed IPv6 address handling [ProMIND] resolveProfile(): fixed IPv6 address handling URL to download the tarball (please note that packages for ARM architectures will be available in the near future): https://eddie.website/repository/AirVPN-Suite/2.1.0-alpha1/AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz SHA-2: https://eddie.website/repository/AirVPN-Suite/2.1.0-alpha1/AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz.sha512 $ sha256sum AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz fcc74f7941b6c1b4215e9820d2fc959fb17957fbbdb7d149a1a128930f05038d AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz If you wish to test, thank you very much! Please feel free to report here any bug and malfunction you find! Kind regards & datalove AirVPN Staff
  15. @lexsilico Hello! We have AirVPN Suite 2.1.0 alpha 1 ready (only for x86-64 systems). It aims at addressing (in this alpha 1 or imminent versions) this problem. Would you like to test it and report back? It also includes IPv6 related fixes, but remember that it's still an alpha version so don't rely on it for serious purposes. ARM builds will be available soon, stay tuned. URL to download the tarball: https://eddie.website/repository/AirVPN-Suite/2.1.0-alpha1/AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz SHA-2: https://eddie.website/repository/AirVPN-Suite/2.1.0-alpha1/AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz.sha512 $ sha256sum AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz fcc74f7941b6c1b4215e9820d2fc959fb17957fbbdb7d149a1a128930f05038d AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz If you test, keep us posted! Kind regards
  16. @Pi77Bull Hello! We have AirVPN Suite 2.1.0 alpha 1 ready (only for x86-64 systems). Although it does not address directly the main problem you mentioned with network gateway check, it is undergoing various changes that could resolve the issue (either in this early alpha 1 version or in the next ones). Would you ike to test it and report back? It also includes IPv6 related fixes, but remember that it's still an alpha version so don't rely on it for serious purposes. URL to download the tarball: https://eddie.website/repository/AirVPN-Suite/2.1.0-alpha1/AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz SHA-2: https://eddie.website/repository/AirVPN-Suite/2.1.0-alpha1/AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz.sha512 $ sha256sum AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz fcc74f7941b6c1b4215e9820d2fc959fb17957fbbdb7d149a1a128930f05038d AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz If you test, keep us posted! NOTE. Before proceeding, make sure that the directory /etc/netns exists on your system. If it does not, create it before testing traffic splitting. Currently, it is assumed that /etc/netns is a system directory on Linux distributions, so, if it was removed, you (as superuser) and not Bluetit must re-create it to let the system (and Bluetit) store configuration files for different network namespaces in isolated directories. Kind regards
  17. @Posh1698 Hello! We have AirVPN Suite 2.1.0 alpha 1 ready (only for x86-64 systems). It aims at addressing this problem. Would you like to test it and report back? It also includes IPv6 related fixes, but remember that it's still an alpha version so don't rely on it for serious purposes. URL to download the tarball: https://eddie.website/repository/AirVPN-Suite/2.1.0-alpha1/AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz SHA-2: https://eddie.website/repository/AirVPN-Suite/2.1.0-alpha1/AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz.sha512 $ sha256sum AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz fcc74f7941b6c1b4215e9820d2fc959fb17957fbbdb7d149a1a128930f05038d AirVPN-Suite-x86_64-2.1.0-alpha-1.tar.gz If you test, keep us posted! Kind regards
  18. Hello! A possible reason is that Eddie generates files compliant to the latest protocol specifications and you are using an older version. If that's the case, we can compare the two different profiles (remember to delete your key), i.e. the working one and the non-working one, and check the log of your software to find out the reason. Kind regards
  19. Interestingly if I use Eddie for Android 4.0 the and export to AmneziaWG, after I email it to myself, the resulting file is renamed randomly and has no file extension. But the data is still there, so I just rename the file and add the .conf extension. However, that file never successfully connects. But if I export it from the site I linked to everything runs fine. Any idea as to why I cannot connect through Eddie exports?
  20. Hello! You may get a lot of data from here: https://airvpn.org/forums/topic/65417-amneziawg-config-patcher-cps-db/ If you have an Android device or emulator, by running Eddie Android edition 4 you can generate ready to use AmneziaWG configuration files which are fully integrated with AirVPN (i.e. you can generate profiles for specific AirVPN servers, countries and so on), even relying on a large CPS QUIC database of real web sites if needed to bypass the blocks. You can then share them with your Windows machine. Important: Eddie Android edition generates files compatible with v2.0 Amnezia protocol, so you need this latest version. Kind regards
  21. Hello! Possible causes: Streaming services (Netflix, YouTube, etc.) often rate-limit or deprioritize known VPN exit IP addresses, or IP addresses assigned to specific ASNs. Speed tests don’t trigger this, but video streams do. Try different AirVPN servers. Too large virtual network interface MTU causing excessive fragmentation, optionally with broken MTU path discovery. Streaming uses sustained flows that are more sensitive to MTU mismatches than bursty speed tests. Shrink MTU to 1280 bytes to check whether you get any improvement. If not, consider MSS clamping, just in case the PMTU discovery is broken upstream (not an uncommon case). Set MSS to 40 bytes less than MTU, for example MTU 1320 bytes, MSS 1280 bytes. On Asus routers you'll need to do this via iptables: as far as we know there's no option to do it on the Web UI. Asus Adaptive QoS or Bandwidth Limiter on the router. Check and disable such tools if they are active. If DNS is outside the VPN but traffic is inside you can hit far-away CDN nodes, causing slow streams. Make sure to enforce strict DNS settings on the router so that it will query only VPN DNS. Kind regards
  22. I stumbled upon this online WG converter. Is it safe to use? Is so, which settings are recommended? I'm using WG configs with Wiresock because Eddie drastically slows boot-up speeds, often not loading and connected before the wifi disconnects. AmneziaWG supports obfuscation that Eddie does not.
  23. Many users might think it's unnecessary, since using a proxy is sufficient to bypass the Firewall. I'd like to share my perspective: proxy providers only promise to offer specialized technology for circumventing the firewall, without guaranteeing user privacy or maintaining network neutrality. Furthermore, proxies are usually cheaper than VPNs, meaning some low-priced providers might profit from user information. Using only a proxy puts your information at risk. For a while, I only used a proxy to bypass the GFW, and I received a lot of spam, which was extremely annoying. Therefore, I decided to use a proxy in conjunction with a VPN. My traffic is encrypted through OpenVPN and forwarded by AirVPN servers, significantly increasing the difficulty for proxy providers to obtain my information, thus protecting my privacy. AirVPN didn't disappoint in terms of privacy protection; I didn't receive any spam while using it. Simultaneously, by utilizing proxy protocol technology, I can use numerous protocols to bypass the GFW's interference and blocking, which is superior in terms of obfuscation, privacy, and network neutrality.
  24. The actual experience is quite good. The speed is on par with AmneziaWG, or even faster. If a dedicated proxy node is used, it may be able to run at full bandwidth, with speeds far exceeding SSH and SSL.
  25. The IP address was detected as an AirVPN server IP, which was leaked via WebRTC. The IP was traced back to the proxy node IP, and could not be traced back to the local machine IP, so it can be considered secure.
  26. Of course. The steps are as follows: 1. Configure Clash (agent software) Import proxy nodes using a proxy vendor link (proxy nodes can use any protocol). Clash settings - Port - Socks port - Enable - Set to 10000 (the port number can be anything). 2. Configure Eddie Eddie settings - Proxy/Tor - Type - socks - When - Always - Host - 127.0.0.1 - Port-10000 - Authentication - none Eddie Settings - Protocol - Select OpenVPN TCP 443 Eddie Settings - Network Lock - Uncheck "Ensure in Session" save 3. Connection To use it, first open Clash and connect to the proxy node using the system proxy mode, then open Eddie and connect to the server. 4. Diversion With this setup, all software still uses the proxy node and does not go through the AirVPN server, so traffic splitting is necessary. (There may be professional software for setting up traffic splitting rules, but I didn't use it; I'm just sharing my approach.) For browsers, the ProxySwitch plugin can be used to select direct connection mode. For other applications, they can listen on port 10003 of the AirVPN port forwarding service (this is different from the Socks port; it's the port number for port forwarding set in the AirVPN panel; it can also be any port). This allows you to route traffic through a proxy node for obfuscation before it passes through the AirVPN server, effectively enhancing the obfuscation effect.
  27. I have the exact same issue, no matter which server I'm using. Did a lot of experimenting with different regions and servers to unfortunately bad results. I have a backup VPN just for this use case...
  28. that is very cool and easy but how are leaks handled?
  29. I remember many people asking for direct Shadowsocks and other protocol support, which won't be implemented anytime soon, especially if usage of these protocols is possible in parallel with Eddie (and other VPN software supporting proxies). If it's not a big ask, could you provide a guide on how to set this up? I think you will meet some tangible demand.
  1. Load more activity
×
×
  • Create New...