All Activity
This stream auto-updates
- Past hour
-
-
-
-
-
-
-
-
-
-
- Today
-
-
Well well well how the times have changed just switch out to a UDM pro, have not upgraded my device to Zone Base firewall yet but i guess i will.
-
-
Hi, Thanks for your reply. Just to be clear, I am not arguing either the practice of the 4/4 guarantee or I am comparing AirVPN to another provider. This discussion is based purely around the limit of 4/4. I don't think we can compare a VPN provider with an ISP; VPN is solving a very specific problem and most of the time, this "problem" comes with a lot of data on its back! I could argue that a VPN service may generally create more traffic than an ISP if we are to summarise usage data across the two In case of top users, I have reviewed the charts and also I can generate a good amount of traffic myself IF I start a large number of connections concurrently via Usenet for example. The guaranteed speed increase and the QoS I have mentioned at a later time, has to do mainly with single, time critical connections such as IPTV, VoIP, video conferencing etc. Anyway, please do not take this as "ungratefulness" from my side. I do appreciate any guarantee that comes from any service. Cheers
-
Hello! Be aware that 4 Mbit + 4 Mbit/s of guaranteed allocation is great for the pricing of AirVPN. Our competitors offer 0.0 (best effort, no minimum allocation guaranteed). Please consider that if residential ISPs in Europe had all of their customers connected simultaneously and requiring full bandwidth at the same time, the allocation by most of such ISPs (if performed equally for each customer) would be between 0.1 and 10 Mbit/s. The biggest ISPs in Europe (example: TIM in Italy) have an average per residential customer consumption (fixed lines: in mobility much less) of 190 GB/month, which on average means 0.58 Mbit/s throughout the month. Residential networks are normally designed and sized on the basis of these values with congestion control (traffic shaping) during peak hours or any unexpected event. Guaranteeing no overselling beyond 4 + 4 Mbit/s was and is even nowadays a significant effort by AirVPN. In practice, as you can see on the "Top User Speed" chart, users can easily beat 500 Mbit/s, there is no congestion. But if all customers connected at the same time (assuming a fair distribution on all servers) then everyone would anyway have 4 Mbit/s (4 + 4 server side). Kind regards
-
Stop making excuses for your homophobia ideas. The 2% of people should ignore this because you're a part of another 98%? Let me ask, how about add one more selection, "Race: White, Non-White, not telling"? And this is exactly how you loose the argument: throwing the toys out of the pram and start calling people you do not even know *phobes *ists etc when someone does not echo your personal believes back to you. When you ask people to be open minded and susceptible to new ideas and views, you should have at least the common courtesy to do the same. To the idea of having more genders, races etc on a VPN site, I would argue that this might be a giveaway of someone's personal identity. My feeling is that you want everybody around you to be aware of gender identity which might be tracked back to your actual id; not a smart move I might say...
-
Adding a bit more reasoning to the original request: In situations that a high-ish guaranteed throughput is not crucial, torrenting for example, real-time applications such as IPTV etc are struggling. Maybe some type of QoS should take place if increasing the guaranteed bandwidth will not be a feasible solution?
-
Hello! Try to increase MTU even further, up to 1420 bytes (you can also try 1440 bytes if you never use IPv6). The reason to lower MTU is that the frame on some network is not big enough to contain 1420 bytes of WireGuard, but if you can enlarge (your network supports larger WireGuard MTU) then do it, because performance will improve. https://lists.zx2c4.com/pipermail/wireguard/2017-December/002201.html Disabling the setting you mention about geo-routing on AirVPN DNS through your account panel can improve performance should the test you perform pass through a "geo-server", which would cause a bottleneck. These geo-servers are meant essentially to bypass geo-location based blocks and they are not suitable to perform massive speed tests. If the destination node which is instrumental for your tests is routed through one of these micro-servers you will get a remarkable bias. By disabling the feature you cancel any forced "geo" or "micro" routing. Kind regards
-
Hello! We're very glad to announce a special promotion on our long terms Premium plans. You can get prices as low as 2.20 €/month with a three years plan, which is a 68% discount when compared to monthly plan price of 7 €. You can also send an AirVPN plan as a gift: you have the option to print or send a colorful, dedicated picture with the code to activate the plan. You can do it in your account Client Area -> Your membership: Purchase and credit -> Print X-Mas after you have bought a coupon. If you're already our customer and you wish to stay aboard for a longer period, any additional subscription will be added on top of already existing subscriptions and you will not lose any day. Please check plans special prices on https://airvpn.org and https://airvpn.org/buy --- Promotion will end on January the 8th, 2026 (UTC). AirVPN does not inspect and/or log client traffic and offers: five simultaneous connections per account (additional connection slots available if needed) inbound remote port forwarding unmatched high performance - current 'all time high' on client side is 730 Mbit/s with OpenVPN and 2100 Mbit/s with WireGuard flexible and customizable opt-in block lists protecting you from adware, trackers, spam and other malicious sources. You can customize answers or exceptions globally, at account level or even at single device level. powerful API IPv6 full support comfortable management of your client certificates and keys AES-GCM and ChaCha20 OpenVPN ciphers on all servers Perfect Forward Secrecy with unique per-server 4096 bit Diffie-Hellman keys internal DNS. Each server runs its own DNS server. DNS over HTTPS and DNS over TLS are also supported. free and open source software client side software support to traffic splitting on an application basis on Android and Linux and on a destination basis on Windows and macOS GPS spoofing on Android application AirVPN, in accordance with its mission, develops only free and open source software for many platforms, including Android, Linux (both x86 and ARM based systems), macOS and Windows. Promotion due to end on 2026-02-08 (UTC). Kind regards & datalove AirVPN Staff
-
- Yesterday
-
Hmm, yeah... Apparently, Mbps does not even register as measurement in my head😁 Thanks for pointing that out!
-
-
-
You are making absolutely zero sense with that comparison. It's 98% of people who don't bother changing profile settings. Which also means, 98% of profiles will be hidden, as the default visibility setting of the profile is Hide for all. Now, you could, of course, change that setting for you yourself, open up to the community, and provide that info, especially to explicitly provide your gender as to foster correct referrals to your person. I sincerely believe, that's what this is all about: Reducing the risk of hurting someone in a conversation. But, let's explore this situation a little. Suppose someone wants to find out how to refer to some other poster around here. First hurdle: 98% of profiles are hidden. Means, one in fifty is open. So the profile is clicked to find out "so, do I say him, do I say them?" and, oh darn, hidden profile. Then that person answers another person, clicks the profile, oh darn, hidden again. And a third, hidden. And a fourth, hidden. That person quickly learns: "Why bother, all the profiles are hidden, anyway", and defaults to "he", "he/she" or "them". Or even "per". So even if you sincerely wanted to do so, correctly referring to another person without the chance of having the necessary info left of every post gets tedious and downright impossible to do with all the profiles being hidden. Hence why the gender info might provide the choices for many genders, but what's the point if no one can look at it? Even if one of those profiles was opened, it doesn't mean all the fields were filled. The probability of finding a correct pronoun for referral gets even lower. As I wrote, we are here for discussions around AirVPN and VPN technology in general (actually, tech support for AirVPN), with some related topics around it. It would be a first for me to find out that gender is important in discussions about VPN tech. You are right that, in the past, I mostly defaulted to the masculine form when referring to any one poster (I prepended a Mr. to every username when referring to that user) but am shifting to @ mentions instead, those are neutral and even cause notifications. That's probably the most scandalous thing in regard to genders one can accuse me of. Homophobia… just really isn't. And, please, do not start the race thing. There is a good, tangible reason to publish pronouns. There is absolutely no reason to publish race, so it's incomparable. A little bit of warning: I will move this discussion to off-topic as, while it refers to the forums software of AirVPN, it does not relate to AirVPN tech directly. Don't think anything bad about the move, it is not an attempt to silence you. Simple moderator chore: Every post to the correct subforum. I am futhermore happy to continue discussing this matter with you (and everyone may join, I might add). But, should your tone of discussion not shift to be more constructive, with less baseless slander against any one person here, I'm putting a warning point on the table. This will come with being put on moderator queue which will see all your posts being screened before publication (as is actually the case right now as you're a new poster). Thank your for your understanding in this matter, and to a good, fruitful discussion. 🍷
-
-
I mean, the guarantee is actually in mbps. I wish they guaranteed 4gbps!
-
Somehow --verb 4 was not applied, it's still verbosity level 3. I would've expected a complete listing of all OpenVPN directives first, to see what OpenVPN actually applied. But no matter, I'm seeing that you didn't filter out redirect-gateway ipv6 and tun-ipv6. But what's more alarming, OpenVPN does not print out that it actually ignored those pushed options. Somehow I doubt your manual changes in the config are applied at all, so can you please check on that first?
-
Hey all, On a Win 11 machine, trying to install a TAP Windows Adapter to use (I have my reasons). This is offered from within Eddie's advanced settings. Can't get it to work unfortunately. It keeps trying to reinstall the adapter over and over again. Even if I manually install, I can't get Eddie to actually use it. Selecting interface or similar, but also unsure about what to select in the driver settings (none?). Any suggestions on how to get this to work? Any help is very appreciated. Thanks.
-
Eddie Android edition 4.0.0 preview available
kirkusss replied to Staff's topic in News and Announcement
Hello, that's not working for .Ru on the android. Maybe someone can advice parametrs to avoid ISP blocks for .Ru -
-
No leak. You're good.
-
-
-
-
I recently move from my trusty pfsense to unifi as the come along with a good kill switch for a vpn. I been testing it and just need a second set of eyes on dns leakage. From the two screenshots am i leaking dns or not?
-
wavydavy155 reacted to a post in a topic:
Will not connect in macOS Tahoe 26.1, MacMini running M4 ...
-
Eddie Android edition 4.0.0 preview available
Staff replied to Staff's topic in News and Announcement
Hello! Jc will be capped to 10 in this beta 1 version, but this does not defeat the purpose of randomization as Jc tells the quantity of junk packets that must follow CPS, not their size. However it will be important to allow more than 10 junk packets because we have reports from you and other persons according to whom an higher Jc seems to imply a higher probability to circumvent specific blocks. As usual you can force any value by editing and importing a profile, of course. Beta 2 is anyway imminent. Kind regards -
-
Eddie Android edition 4.0.0 preview available
EMULE replied to Staff's topic in News and Announcement
I see. So AmneziaWG 1.5 has updated the allowed range for parameters. Does that mean Eddie's random parameter generator also needs to limit the parameter range? For example, should we restrict the Jc parameter to be randomly generated within the 0–10 range? Otherwise, if the generated Jc always exceeds 10, it will just be capped at 10, which would defeat the purpose of randomization, right? -
-
airvpn push ipv6 on ipv4 only connection floods log
willowvpn replied to willowvpn's topic in Troubleshooting and Problems
Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: Note: --data-ciphers-fallback with cipher 'AES-256-CBC' disables data channel offload. Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: OpenVPN 2.6.14 aarch64-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] [DCO] Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: library versions: OpenSSL 3.0.18 30 Sep 2025, LZO 2.10 Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: DCO version: N/A Mon Dec 15 10:16:00 2025 daemon.warn openvpn(airvpn)[3559]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.90:443 Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: Socket Buffers: R=[131072->131072] S=[16384->16384] Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: Attempting to establish TCP connection with [AF_INET]194.187.251.90:443 Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: TCP connection established with [AF_INET]194.187.251.90:443 Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: TCPv4_CLIENT link local: (not bound) Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: TCPv4_CLIENT link remote: [AF_INET]194.187.251.90:443 Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: TLS: Initial packet from [AF_INET]194.187.251.90:443, sid=045ec4f4 d2c2a118 Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: VERIFY KU OK Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: Validating certificate extended key usage Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: VERIFY EKU OK Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Capricornus, emailAddress=info@airvpn.org Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519 Mon Dec 15 10:16:00 2025 daemon.notice openvpn(airvpn)[3559]: [Capricornus] Peer Connection Initiated with [AF_INET]194.187.251.90:443 Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: TLS: tls_multi_process: initial untrusted session promoted to trusted Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: SENT CONTROL [Capricornus]: 'PUSH_REQUEST' (status=1) Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.12.177.1,dhcp-option DNS6 fde6:7a:7d20:8b1::1,tun-ipv6,route-gateway 10.12.177.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:8b1::1000/64 fde6:7a:7d20:8b1::1,ifconfig 10.12.177.2 255.255.255.0,peer-id 0,cipher CHACHA20-POLY1305,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: OPTIONS IMPORT: --ifconfig/up options modified Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: OPTIONS IMPORT: route options modified Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: OPTIONS IMPORT: route-related options modified Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: OPTIONS IMPORT: tun-mtu set to 1500 Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_route_v4_best_gw query: dst 0.0.0.0 Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_route_v4_best_gw result: via 192.168.8.8 dev wan Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: GDG6: remote_host_ipv6=n/a Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_route_v6_best_gw query: dst :: Mon Dec 15 10:16:01 2025 daemon.warn openvpn(airvpn)[3559]: sitnl_send: rtnl: generic error (-101): Network unreachable Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' is enabled Mon Dec 15 10:16:01 2025 daemon.notice netifd: Network device 'tun0' link is up Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' has link connectivity Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' is setting up now Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: TUN/TAP device tun0 opened Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_iface_mtu_set: mtu 1500 for tun0 Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_iface_up: set tun0 up Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_addr_v4_add: 10.12.177.2/24 dev tun0 Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' is now up Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_iface_mtu_set: mtu 1500 for tun0 Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_iface_up: set tun0 up Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: net_addr_v6_add: fde6:7a:7d20:8b1::1000/64 dev tun0 Mon Dec 15 10:16:01 2025 daemon.warn openvpn(airvpn)[3559]: sitnl_send: rtnl: generic error (-13): Permission denied Mon Dec 15 10:16:01 2025 daemon.err openvpn(airvpn)[3559]: Linux can't add IPv6 to interface tun0 Mon Dec 15 10:16:01 2025 daemon.notice openvpn(airvpn)[3559]: Exiting due to fatal error Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53 Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53 Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53 Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for lan Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' is now down Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53 Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using nameserver 10.4.0.1#53 Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for test Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for onion Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for localhost Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for local Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for invalid Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for bind Mon Dec 15 10:16:01 2025 daemon.info dnsmasq[1]: using only locally-known addresses for lan Mon Dec 15 10:16:01 2025 user.notice firewall: Reloading firewall due to ifup of airvpn (tun0) Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' is disabled Mon Dec 15 10:16:01 2025 daemon.notice netifd: Network device 'tun0' link is down Mon Dec 15 10:16:01 2025 daemon.notice netifd: Interface 'airvpn' has link connectivity loss -
Eddie Android edition 4.0.0 preview available
Staff replied to Staff's topic in News and Announcement
Thank you very much! Noted, Jc, S1 and S2 limits come from the documentation here https://docs.amnezia.org/documentation/amnezia-wg The allowed ranges will be fixed according to logic, new documentation and source code. The crashes are under investigation. Thank you for your tests and bug reports! Kind regards -
no views on the subject?
-
-
I've run Eddie on my previous MacMin with no issues, but every time I connect on my new one it auto disconnects. I have manually added Winguard and followed all the instructions for that but it still happens and I'm now flummoxed. I'm sure it's something simple, but clearly I am simpler. Any help gratefully received Log:
