Jump to content
Not connected, Your IP: 3.144.31.86

Leaderboard


Popular Content

Showing content with the highest reputation since 10/28/24 in all areas

  1. 7 points
    Hello! We're very glad to inform you that four new 10 Gbit/s full duplex servers located in New York City are available: Muliphein, Paikauhale, Terebellum, Unukalhai. They have replaced Haedus, Iklil and Lich with more powerful hardware and higher overall bandwidth. The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. The servers support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the status as usual in our real time servers monitor by clicking the names of the servers. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  2. 6 points
    Staff

    So long, airvpn...

    Thank you so much for your touching words and stellar feedback. And for your commitment in so many years. However, were you really under the illusion that you could escape so easily? Kind regards
  3. 5 points
    Staff

    2024 Black Friday Sale

    Hello! We're very glad to inform you that the Black Friday weeks have started in AirVPN! Save up to 74% when compared to one month plan price Check all plans and discounts here: https://airvpn.org/buy If you're already our customer and you wish to jump aboard for a longer period, any additional subscription will be added on top of already existing subscriptions and you will not lose any day. AirVPN is one of the oldest and most experienced consumer VPN on the market, operating since 2010. It never changed ownership and it was never sold out to data harvesting or malware specialized companies as it regrettably happened to several competitors. Ever since 2010 AirVPN has been faithful to its mission. AirVPN does not inspect and/or log client traffic and offers: five simultaneous connections per account (additional connection slots available if needed) inbound remote port forwarding with multiple pools active daemons load balancing for unmatched high performance - current 'all time high' on client side is 730 Mbit/s with OpenVPN and 2000 Mbit/s with WireGuard flexible and customizable opt-in block lists protecting you from adware, trackers, spam and other malicious sources. You can customize answers or exceptions globally, at account level or even at single device level. powerful API IPv6 full support comfortable management of your client certificates and keys AES-GCM and ChaCha20 OpenVPN ciphers on all servers Perfect Forward Secrecy with unique per-server 4096 bit Diffie-Hellman keys internal DNS. Each server runs its own DNS server. DNS over HTTPS and DNS over TLS are also supported. free and open source software client side software support to traffic splitting on an application basis on Android and Linux and on a destination basis on Windows and macOS GPS spoofing on Android application AirVPN is the only VPN provider which is actively developing OpenVPN 3 library with a fork that's currently 245 commits ahead of OpenVPN master and adds key features and bug fixes for a much more comfortable and reliable experience: https://github.com/AirVPN/openvpn3-airvpn AirVPN, in accordance with its mission, develops only free and open source software for many platforms, including Android, Linux (both x86 and ARM based systems), macOS and Windows. Promotion due to end on 2024-12-03 (UTC). Kind regards & datalove AirVPN Staff
  4. 4 points
    Staff

    [CH] Server replacement

    Hello! We inform you that due to a few problems we are forced to replace the server Kitalpha in Switzerland. A much more powerful server will replace Kitalpha in the next days and it will be connected to a 10 Gbit/s full duplex port and line. As usual, the new server will be announced in this "News" forum in due time. The new server will not only replace Kitalpha but will also provide the additional bandwidth that several users require in Switzerland. We roughly estimate that the server will be available to you by November the 25th. Kind regards & datalove AirVPN Staff
  5. 4 points
    Staff

    Eddie Desktop 2.24 beta released

    New version, mainly bug fixes, to promote it to Stable as soon as possible. A completely revamped version of the UI, no longer based on Mono (for Linux) and Xamarin (for MacOS), is in development, but we cannot currently estimate a release date. Version 2.24.3 (Wed, 06 Nov 2024 12:08:47 +0000) [bugfix] [all] CPU usage optimization [change] [all] OpenVPN 2.6.12 [bugfix] [all] Various minor fixes [change] [all] Fine-tuning of Network Lock IPv6 rules (Private & Translation) [bugfix] [linux] Hide window when minimized to tray [bugfix] [all] Fixed issue with user/password when used with third-party .ovpn files
  6. 3 points
    Rotciv

    Provide sub-regions for US region

    Provide sub-regions for US region, perhaps useast.airvpn.org, uscentral.airvpn.org, and uspacific.airvpn.org? This will minimize latency on games that try to connect you to the closest server by having your exit ip to be in the same area. Manually managing the different local region servers is a pain when some are offline while others have high packet loss. It would be nice to be connected to the best performing local region server and not the one across the country.
  7. 3 points
    Looking for the same in CHICAGO area always busy! around 70-90% nowadays!
  8. 3 points
    These replacement servers are extremely slow and only appear to have only 20% the speed of the previous NYC servers (Haeduis, Ikill, etc). What gives????
  9. 3 points
    Hello! We're very glad to inform you that three new 10 Gbit/s full duplex servers located in Los Angeles, California, are available: Maia, Sarin, Xamidimura. They have replaced Groombridge, Saclateni and Teegarden with more powerful hardware and higher overall bandwidth. The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. The new servers support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the status as usual in our real time servers monitor by clicking the names of the servers. Do not hesitate to contact us for any information or issue. Kind regards & datalove AirVPN Team
  10. 3 points
    John Gow

    So long, airvpn...

    Whoever just helped me, I am literally crying. That was so nice. Jeez.
  11. 2 points
    mp92

    I like AirVPN

    Hi, I just wanted to say I appreciate the simple, easy 3 day trial. I have one more thing I want to try tonight, but I really like this website, I like the ease of the app and connection, and from looking around the forum, it appears the community is competent and very friendly. I unfortunately do not have the budget to purchase a 3 year plan at the present moment, so I will wait for the next sale and make sure I purchase 3 years. Thank you all!
  12. 2 points
    Clodo

    Eddie Desktop 2.24 beta released

    This bug is an issue with Mono on Linux, and there’s not much we can do. A UI without Mono is in the works. Yes, there is a bug on Linux with the NetworkLock when the OS has iptables-legacy instead of clean iptables or nftables. This issue affects several Arch users. It will be fixed in version 2.24.4, which we will release today or tomorrow. > OTHER We are evaluating all other issues as well, thank you for the feedback.
  13. 2 points
    Jotta009

    eddie client -die! die! die!

    The eddie client is just shit. Clunky. Slow. Unreliable. <Ad deleted by Staff - forbidden ads> Sometimes it hangs under Linux/Ubuntu. Good luck killing it. pkill -9 or -15 eddie* will not shut dont the tray process, the tray eddie will immediately reappear. Today I tried the pkill command instantely several times. Managed to kill it somehow but now I get "an instance of eddie is still running". Once eddie hangs, there is no option except rebooting the system. You have no idea how much I hate eddie.
  14. 2 points
    John Gow

    So long, airvpn...

    To the great staff and founders and the helpful (non-toxic) community, Recent unanticipated life things are forcing me to cut all but the most essential things from my "budget," which is not much. I've been using the veep for nearly 8 years, that's a long time to stick with a single service in internet time. I have recommended airvpn countless times and continue to do so, often in the same breath as "...but there's also ProtonVPN and Mullvad, and Duckduckgo which I have yet to try." In other words, airvpn is always at the top of recommendations. I still believe in the essential mission and need of services like AirVPN. When you find how difficult it is to actually research corporate VPNs like Nord, which do not have the best track record, it can be difficult because their parent companies own some of the top review outlets (PC Magazine, tomshardware) or influence them with ad revenue. Even the "anti-scammer" youtube celebrities take sponsorship deals from sketchy or at least unverifiable VPN companies, because Nord and Express and Ghost etc. aren't open source, so we have to rely on a fly-by-night "auditing authorities," which don't answer to regulations or transparent oversight either. It's a battle not many people feel is worth paying attention to, but I have tried. You will find my trails of AirVPN recommendations across forums over the past 7 years, and I hope they helped. Maybe I'll be back in a month. Maybe a year. I don't know with my life right now. Goodbye! Gow
  15. 2 points
    kityafnsd

    So long, airvpn...

    This is honestly one of the most inspiring things I've read lately. It solidifies why we're all here, either as a customer, contributor, or whatever. I have used nord for the last few years and never thought twice about it. After recent life changes I decided to take the time to invest into my understanding of networking, the internet, etc. On top of future proofing myself I want to learn how to be less reliant on services that I can't trust to not sell every last ounce of privacy I have left. This is some next level community support, I love to see it, and hope nothing but the best for you and those who helped / continue to help every day.
  16. 2 points
    I am noticing the same performance issues. As a quick real-world test, I set up a torrent between a torrent client connected to 1 of the 4 servers and another torrent client connected to one of the other 4 servers. The speeds as indicated in the screenshot below (this is from the uploading client) barely got above 3 MB/s. In previous tests that I did following this same methodology using the M247 servers when they were active, I was able to see speeds of usually 8-10 MB/s. I also downloaded an Ubuntu ISO via BitTorrent on one of the clients. Using this as a test I was able to see download speeds above 25 MB/s for the torrent as a whole, and for a single peer, up to 13 MB/s. Possibly as @ScanFarer stated, this could be worse routing from my ISP to Tzulo, whereas the route from Tzulo to my ISP seems to be fine based on the download speed observed for the Ubuntu torrent.
  17. 2 points
    Hello! Bug reproduced, it is an undersized variable's overflow. You will see the fix very soon, in the next 3.2.1. Thank you for your tests! Kind regards
  18. 2 points
    I’m noticing the route my ISP is taking to these servers isn’t great—speeds are noticeably slower. Or at least, I think it’s just on my end. I’m getting much better performance with the M247 servers; to be exact, it’s around 100 Mbps compared to the 500 Mbps+ I’d get with the Haedus server. It’s no big concern for me; just wanted to bring it up.
  19. 1 point
    iwih2gk

    Fiber Connection & Low VPN Performance

    Just confirming that it must be an ISP or hardware issue. I am on fiber and using multiple AirVpn relays in a chain (thousands of miles long through 3 different countries). I am still getting just under 500 meg. That is NOT counting when I am also going through 3 TOR relays such as now making this post.
  20. 1 point
    orangechicken

    2024 Black Friday Sale

    Thanks for the deal! Have been trying AirVPN out for the last 3 months, that deal just confirmed I will be switching for good
  21. 1 point
    theradgrad

    Prevent leaks with *BSD & pf

    Greetings! In this guide I'll help walk you through configuring pf to prevent leaks when your OpenVPN connection drops. I'm using OpenBSD 7.6, so all steps should work as-is under that, but other OSes that also use pf, like FreeBSD and macOS, should still be compatible with a few changes in commands to achieve the same result. Setting up the OpenVPN daemon Before you do anything, I strongly suggest you make a backup of your current /etc/pf.conf and /etc/rc.conf.local like so, in case something doesn't work right for you and you want to revert back to how it was before (you will need [to be careful with your] root privileges to do nearly all of the tasks I discuss): $ su - Password: # cp -p /etc/pf.conf /etc/pf.conf.bak # cp -p /etc/rc.conf.local /etc/rc.conf.local.bak # exit $ Okay! I will assume you already have doas (or sudo) configured (I recommend you do) and will prefix it to the below commands, but if you really don't want to do that, you should be able to su -, as above, for essentially the same result. From here you should download the OpenVPN command line client and configure it to run in the background (i.e. a "daemon") automatically on startup. On OpenBSD we use pkg_add to add new software: # pkg_add -U openvpn If prompted to choose between openvpn-x.x.xx and openvpn-x.x.xx-mbedtls, choose the former unless you face issues. Create an OpenVPN config file here, and then move it to a typical place: # mkdir -p /etc/openvpn # mv -iv /path/to/downloaded/AirVPN-Config.ovpn /etc/openvpn Enable, configure, and start the openvpn daemon. On OpenBSD we use rcctl for daemon manipulation: # rcctl enable openvpn # rcctl set openvpn flags --config /etc/openvpn/AirVPN-Config.ovpn # rcctl start openvpn Be sure to use the same OpenVPN config filename as the one you moved in the previous step. Now that we have OpenVPN's client daemon set up, it's time to create a "kill switch" for it! Configuring a "kill switch" to prevent leaks during OpenVPN disconnects Edit your /etc/pf.conf (using something like vi) to look similar to mine (I omitted some unrelated/sensitive details): # Define macros: ext_if = "bge0" # 1Gb Ethernet interface (physical) vpn_if = "tun0" # OpenVPN interface (virtual) # Don't filter on loopback interfaces: set skip on lo # Block everything by default (we'll whitelist the VPN exclusively further # down): block # Enforce antispoofing measures: block in quick from urpf-failed # From https://dylanharris.org/blog/2017/b28.shtml: # I had to turn "pf.conf's" urpf check off. This is a protection to ensure # that naughty routing isn't being attempted. When a packet is received, # "urpf-check" verifies that, if the sender can be reached by the default # route, then any packets returned would use the default route's network # interface. # # Unfortunately, this check is defeated by the standard configuration of # OpenVPN under OpenBSD. When OpenVPN starts up, it does not change the # default route; rather it adds a couple of specialised routes to use the # VPN tunnel, routes that happen to cover the entire IPv4 address space. In # consequence, any packets that come in on the old interface will fail the # urpf check. # # If this is what you want to happen, that all data leaves on the VPN # interface, and all other external communication is blocked, then that's # good. That, however, is not what I want. I want to maintain contact with # my ISP. So I disable the check [by commenting out that line.] # We most definitely want all data leaving on the VPN interface, and never # outside it, so it should be enabled in our case. # Whitelist incoming/outgoing protocol/port connections over LAN: pass $ext_if proto {tcp udp} from $ext_if:network to $ext_if port 22 # * 22 : SSH pass in on $ext_if proto icmp from $ext_if:network to any # Ping to this computer from another over LAN. pass out on $ext_if proto icmp from any to $ext_if:network # Ping from this computer to another over LAN. # Allow DNS (for server IP lookup): pass quick proto {tcp udp} from any to any port 53 keep state # From https://daemonforums.org/showthread.php?t=11666. # Whitelist VPN IP addresses: include "/etc/pf.conf.d/vpn_server_ips.conf" pass on $vpn_if all To go with our pf.conf, as you might've seen on the second-to-last line of it, I have a file, /etc/pf.conf.d/vpn_server_ips.conf, that stores all of AirVPN's server IPs. You can create one yourself with these commands: # pkg_add -U curl jq # mkdir -p /etc/pf.conf.d # touch /etc/pf.conf.d/vpn_server_ips.conf # chmod 0600 /etc/pf.conf.d/vpn_server_ips.conf # chmod 0700 /etc/pf.conf.d To fill/update it, just run this every-so-often (please DO NOT SPAM): # curl -so- 'https://airvpn.org/api/status/' | jq -r ' .servers[] | .public_name as $server | .location as $city | .country_name as $country | .continent as $continent | to_entries | map(select(.key | test("^ip_v[46]_in[0-9]+$"))) | map(select(.value != null)) | map(select(.value | test("^(((25[0-5]|(2[0-4]|1[0-9]|[1-9]|)[0-9])\\.){3}(25[0-5]|(2[0-4]|1[0-9]|[1-9]|)[0-9])|([0-9a-fA-F]{1,4}:){7,7}[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,7}:|([0-9a-fA-F]{1,4}:){1,6}:[0-9a-fA-F]{1,4}|([0-9a-fA-F]{1,4}:){1,5}(:[0-9a-fA-F]{1,4}){1,2}|([0-9a-fA-F]{1,4}:){1,4}(:[0-9a-fA-F]{1,4}){1,3}|([0-9a-fA-F]{1,4}:){1,3}(:[0-9a-fA-F]{1,4}){1,4}|([0-9a-fA-F]{1,4}:){1,2}(:[0-9a-fA-F]{1,4}){1,5}|[0-9a-fA-F]{1,4}:((:[0-9a-fA-F]{1,4}){1,6})|:((:[0-9a-fA-F]{1,4}){1,7}|:)|fe80:(:[0-9a-fA-F]{0,4}){0,4}%[0-9a-zA-Z]{1,}|::(ffff(:0{1,4}){0,1}:){0,1}((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])\\.){3,3}(25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])|([0-9a-fA-F]{1,4}:){1,4}:((25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9])\\.){3,3}(25[0-5]|(2[0-4]|1{0,1}[0-9]){0,1}[0-9]))$") )) | .[] | "pass out on $ext_if proto {tcp udp} from any to \(.value) # AirVPN (\($server)) - \($city), \($country), \($continent)" ')" > /etc/pf.conf.d/vpn_server_ips.conf This step will require su - in particular so the shell can redirect output to the vpn_server_ips.conf file. Finally, we use pfctl to apply all of the changes we made to pf.conf. I recommend doing a dry-run first: # pfctl -nvvf /etc/pf.conf Looking good? Reload pf with its modified config file (or reboot) if so: # pfctl -vvf /etc/pf.conf and if not, you can troubleshoot what went wrong, or simply restore your earlier backups: # cp -p /etc/pf.conf.bak /etc/pf.conf && pfctl -vvf /etc/pf.conf # cp -p /etc/rc.conf.local.bak /etc/rc.conf.local && rcctl stop openvpn && rcctl disable openvpn Testing out the "kill switch" Now it's time to give it a whirl! I have OpenVPN already running in the background via its daemon. Let's first try pinging AirVPN's web site in another terminal emulator window: $ ping airvpn.org PING airvpn.org (5.196.64.52): 56 data bytes 64 bytes from 5.196.64.52: icmp_seq=0 ttl=46 time=116.912 ms 64 bytes from 5.196.64.52: icmp_seq=1 ttl=46 time=119.857 ms 64 bytes from 5.196.64.52: icmp_seq=2 ttl=46 time=122.434 ms ... With that running, let's find openvpn's PID (with pgrep), kill it (with kill), and see what happens: # pgrep -x openvpn 91357 # kill 91357 ... 64 bytes from 5.196.64.52: icmp_seq=13 ttl=46 time=118.249 ms 64 bytes from 5.196.64.52: icmp_seq=14 ttl=46 time=123.583 ms 64 bytes from 5.196.64.52: icmp_seq=15 ttl=46 time=121.109 ms ping: sendmsg: Permission denied ping: wrote airvpn.org 64 chars, ret=-1 ping: sendmsg: Permission denied ping: wrote airvpn.org 64 chars, ret=-1 ping: sendmsg: Permission denied Look at that beauty! Working exactly as expected. You can start the openvpn daemon again either via doas rcctl restart openvpn or doas openvpn --daemon /etc/openvpn/AirVPN-Config.ovpn. Closing Thank you to OpenSourcerer for helping steer me in the right direction, and everybody else in the blog posts, forum posts, and URLs I hotlinked in this guide & in my initial thread. Hopefully this helps out anyone else in a similar situation. Cheers and happy net surfing!
  22. 1 point
    Staff

    ANSWERED Issues with Dutch servers?

    Hello! No issues at the moment. You can check on https://airvpn.org/status - the packet loss and round trip times are measured from very many servers around the world. Click a server name to see all the details including problem history (even a moderate packet loss will be recorded in the history). Kind regards
  23. 1 point
    Mister85

    Plex (Remote) with AirVPN Guide

    hello, thats is possible I do it tonight in dutch. greetz
  24. 1 point
    Staff

    New 1 Gbit/s server available (ES)

    Hello! We're very glad to inform you that a new 1 Gbit/s full duplex server located in Madrid (Spain) is available: Jishui. The AirVPN client will show automatically the new server. If you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts OpenVPN connections on ports 53, 80, 443, 1194, 2018 UDP and TCP, and WireGuard connections on ports 1637, 47107 and 51820. Just like every other Air server, Jishui supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/Jishui Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  25. 1 point
    dragen

    Norway needs more servers

    Norway's servers are over 60% most of the day. Can you ship a couple of Sweden's unused servers to Oslo? There's like 5 not being used.
  26. 1 point
    cheeze

    Eddie Desktop 2.24 beta released

    Doing an update from 2.24.2 > 2.24.3, eddie crashes and the network lock turns off and can't be turned on again. F 2024.11.09 17:16:35 - Exception: ip6tables-restore v1.8.10 (legacy): multiple -d flags not allowed F 2024.11.09 17:16:35 - Error occurred at line: 30 F 2024.11.09 17:16:35 - Try `ip6tables-restore -h' or 'ip6tables-restore --help' for more information Tried rebooting, and same thing happens.
  27. 1 point
    Hello! Yes, that's probably why it is no more available. It was a FAQ and then removed as outdated. @Abstain9194 please ignore the out of date recommendation. Kind regards
  28. 1 point
    Aah, please don't use ipv6-test.com anymore, it's been severely undermaintained for at least two years now. The v6 tests work maybe 10% of all times, and even the v4 tests are very slow to show. Kind of a bane to quote a post from five years ago; I wasn't even sure those Firefox options were still in effect but at least they still are. Day by day it seems nothing is changing but look back and everything is different.
  29. 1 point
    There was some form of discussion at the end there which turned a bit toxic, if I remember correctly. netsh interface ipv6 show prefixpolicies looks very similar.
  30. 1 point
    I think programmatically building the pf.conf is necessary here. You can use the API to fetch the server list and their IP addresses, filter the returned JSON with jq and fill in the blanks in the script that way. It will require learning the jq syntax in addition to the pf syntax, but if that works, whenever the infrastructure changes, you'll just have to execute that script and the pf.conf will be updated. And, by the way, IPLeak features an API, too.
  31. 1 point
    Same - capacity in the northeast US is currently in really bad shape. Seems like all servers in new york are showing reoccurring hours-long outage and PA has one server that is taking a huge bandwidth hit. I'm not sure there is any diversity in providers in this region or what that looks like as a whole. The PA server is a different upstream company than the new york servers, i do know that.
  32. 1 point
    Oh, right, you just generally wrote you were using a BitTorrent software, not qBittorrent in particular. Okay, if it's really the BitTorrent client from BitTorrent Ltd., then it does not support binding to an interface. You must enter the IP address of the VPN interface (the one starting with 10.x.x.x), but I don't recommend you do that because this one changes with generally every connection; you'd be playing whack-a-mole with the mentioned net.bind_ip setting. I seriously recommend qBittorrent going further, and not simply because it's open source.
  33. 1 point
    I am on Verizon Fios. Traffic to a new (Tzulo) server is routed through NTT for me, where the previous (M247) went through Lumen.
  34. 1 point
    Thank you, fixed.
  35. 1 point
    Hello! We're very glad to inform you that in the coming days, according to our infrastructure expansion and improvement plan, all the servers in Los Angeles, New York City and Phoenix will be replaced. The new servers will have much more powerful hardware and all of them will be connected to a 10 Gbit/s (full duplex) port with guaranteed bandwidth. Therefore, the infrastructure in the mentioned locations will be entirely upgraded to new 10 Gbit/s servers, with 3 servers in LA, 3 servers in Phoenix and 4 servers in New York City. The current servers will be decommissioned on November the 1st. Please note that all the new servers will have new IP addresses. Connectivity will be very similar, with the notable addition of GTT and Zayo as fiber and tier1 transit providers. Kind regards and datalove AirVPN Staff
  36. 1 point
    Noticed this a few hours ago with great speeds. Airvpn is awesome!
  37. 1 point
    Hello! We're very glad to inform you that three new 10 Gbit/s full duplex servers located in Phoenix, Arizona, are available: Gunibuu, Kambalia, Sheratan. They have replaced Chalawan, Indus, Phoenix and Virgo with more powerful hardware and higher overall bandwidth. The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. The servers support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the status as usual in our real time servers monitor by clicking the names of the servers. Do not hesitate to contact us for any information or issue. Kind regards & datalove AirVPN Team
  38. 1 point
    Wireguard in Eddie? Or wireguard the app? Wireguard in Eddie
  39. 1 point
    make sure to try wireguard if you haven't already
  40. 1 point
    You want to bind qB to the VPN interface. In ~/.config/qBittorrent/qBittorrent.config, look for the [Preferences] section and add or edit: Connection\Interface=tun0 Restart the running nox client. I'd also recommend to only use TCP. uTP != UDP, and uTP in a VPN tunnel is detrimental to the protocol performance.
  41. 1 point
    This is indeed great news! Well done AirVPN! Does it include Saclateni, which was recently deployed late of last year? If so, are the new servers more powerful than Saclateni? And will each of these servers have full-duplex bandwidth of 20 Gbps? As you can see from the attached screenshot, connecting to Saclateni from Anaheim, CA, it shows similar latency (~ 8-9 ms) to other servers (Groombridge and Teegarden) in Los Angeles, CA. However, it's always puzzled me why I'd get similarly low latency (~ 8-9 ms) to other servers (Bootes, Chalawan, Indus, and Virgo) in Phoenix, AZ. How is it possible? It defies the laws of physics! Anaheim, CA to Los Angeles, CA is a shorter distance than to Phoenix, AZ. And latency is definitely affected by distance. Unless these ISPs figure out a way to tunnel packets through a worm hole! I call shenanigans! 😁
  42. 1 point
    Dia

    ANSWERED How to stop Eddie notification popup

    Seems to be working OK so far.
  43. 1 point
    OpenSourcerer

    Hot-spot Device VPN issue's

    There is an option for that starting from around Android 12 or so; it's found in the connection, hotspot or VPN settings and is called something like Allow clients to use VPN. If it's not there, you will need root because your manufacturer has not enabled this option in its Android distribution.
  44. 1 point
    wwshake

    Block vpn in Russia?

    Currently in Russia, I can confirm that OpenVPN UDP without any extra config (on any port) works on some US, NL and LV servers on mobile networks (MegaFon, MTS). On household connections, regular OpenVPN does not seem to work at all, but regular WireGuard sometimes does. When it doesn't work, the connection handshake usually succeeds, but no traffic passes. But what I wanted to share is that I've had near 100% success (on both household and mobile connections) using the AmneziaWG client with many (most?) AirVPN servers. This is a client that introduces modified handshake parameters intended to fool DPI, while remaining compatible with the vanilla WireGuard server implementation, and it's available for all platforms (you can always compile from source, but at the time of writing there are binaries available at least for Windows, iOS and Mac OS and Android. Linux kernel modules and binaries are also available on Github). Note: there is also an "AmneziaVPN" GUI client but I prefer to use the bare protocol implementation instead. These additional parameters are needed in the WireGuard config file generated by the Config Generator (check the Amnezia documentation for a detailed explanation), and have been verified to work: [Interface] Jc = 3 Jmin = 40 Jmax = 70 S1 = 0 S2 = 0 H1 = 1 H2 = 2 H3 = 3 H4 = 4
  45. 1 point
    OpenSourcerer

    AEAD Decrypt Error

    I've had this with DOCSIS on Vodafone Kabel Deutschland, too. Yes, this is the principal reason why it's slowing down. Packets are too far out of order, so OpenVPN assumes this might be a replay attack and drops those packets. One can calibrate the replay window to suit the connection better. The default is a window of 64 packets in 15 seconds which works for most but not all connection technologies. To calibrate this window, the verbosity can temporarily be increased to 4 (In Eddie, one can enter this in Preferences > OVPN directives): verb 4 When you connect and let it run for a bit while using the connection, you will see replay window backtrack occured [x] kind of messages when such an AEAD Decrypt error occurs. x indicates how far out of order a received packet is. Look at what its max value is over time, then set the replay window to that max plus maybe 5 or 10 (or round it to the next 10, or base 2, or whatever; basically, make it slightly higher than the max): replay-window x .
  46. 1 point
    fsy

    Full of lies VPN comparison table

    How I spend my time is none of your business. I don't give a *about your morbid obsession for this thread but I do care when an AirVPN moderator tries to shut down a thread that contains factual reports complete of quoted sources suddenly and without explanations. The factual reports protect airvpn business and reputation while they reveal a network of lies against independent vpn services, so to me your position is inexplicable. Your statement that the table is "not hurting anyone" is disproved by yourself, see yourself what you then write: Holy *, then it's clear to you too that the table may bring damage to AirVPN! but just to write something against me and other posters here your mind derails (you even defined my factual reports as "rants", bravo! congrats! that's a really ethical moderator, wow) and you support two antithetical thoughts on the same day. "Sure you can do that" my a*. If it were for you or some moderator, the thread would be locked, someone from staff or support had to re-open it. Fair enough, I will behave and it couldn't be otherwise as I have total respect for AirVPN mission, the AirVPN founder and for what he did when I was a teen (send him all my datalove), but I expect the same from you all. What about explaining why one of your moderators locked a thread without explanations and you had to overrule the decision, to begin with? Thank you a lot, it's important to receive confirmations of similar occurrences, they help define a pattern.
  47. 1 point
    nutcracker

    Full of lies VPN comparison table

    Hi folks, for what it matters I'm gonna test AirVPN after I read this thread. I picked Nord several months ago and I based my decision mainly on the Reddit VPN comparison table and I always have been disappointed by the poor performance on Nord servers. Now that I have checked that the table really is biased on many features with plain wrong data I will ask for an AirVPN free trial on this weekend. I feel deceived by this comparison table and by looking closer I noticed that so many messages have been deleted on the Reddit thread of the VPN comparison table. Now that stinks! I read that the policy of that subreddit forbids to mention any VPN, so how can you point out a specific error on that public thread if it's forbidden to mention VPN names? It's ridiculous, we have a thread to compare VPN with a table mentioning VPN names where it's forbidden to name VPN. It could be a cherry-picked policy to prevent constructive criticism and corrections. I am unsure on what to do to report this table false data apart from writing to the author, though, I will think about it. If you guys decide to build up your own comparison table please inform us here too. All the best -- nutcracker
  48. 1 point
    fsy

    Full of lies VPN comparison table

    Hi there, you guessed it, it's here on Reddit: https://www.reddit.com/r/vpnreviews/comments/so9w1v/vpn_comparison_table The author writes "Table last updated: Mar 21, 2023". I don't want to advertise here other VPN services but it's too strange that the only independent VPN like Windscribe, TorGuard and AirVPN are the most penalized with false data. Everything looks shady, as if pre-computed to put the large majority of VPN below all the Kape conglomerate ones and the Nord, in other words the VPNs that pay you if you publish a table somewhere with a channel/formu/blog etc. with at least 10k followers or a minimum amount of views and you rate at least two of the conglomerate in the top positions. I stress once more that this author "paperplans5" is informed on the errors damaging scores of Windscribe, AirVPN etc. in multiple sectors, from Ads blocker to protocols, from servers on RAM to owned servers, but so far I see no fix.
  49. 1 point
    Hello! I thought it was time to try and collect some of the wisdom floating around and see if we can't create a single thread for solving some of the most common and annoying repeat-issues. So how about it ! I define "common problems" as: if I'm getting a deja-vu every third time I post . Staff will have broken the Matrix by this point. Each problem will have its own headline and then with any number of solution-oriented links appended underneath. For this reason, this grand list isn't final and is meant to be updated continually. Naturally, the higher the link number for a solution, the more obscure the solutions are probably getting. Warning: solutions aren't guaranteed. As with anything technical, trial and error is a core skill Problem: Bootstrap Failed.Solutions:https://airvpn.org/topic/30824-bootstrap-failed-since-a-week/Problem: No Internet connection after shutting down AirVPN and/or can only use Internet while AirVPN is on.Solutions:https://airvpn.org/topic/14829-can-only-connect-to-the-internet-browser-through-airvpn/?do=findComment&comment=30509 Windows only: https://airvpn.org/topic/13584-connection-problem-when-not-using-airvpn/?p=38800 MacOS only: https://airvpn.org/topic/27993-cant-connect-to-internet-without-using-airvpn/ https://airvpn.org/topic/21194-virtualbox-is-this-air-vpn-also-cant-connect-internet-unless-signed-in/Problem: Cannot connect to any AirVPN server.Solutions:https://airvpn.org/topic/22140-cannot-connect-to-german-servers-anymore/ https://airvpn.org/topic/22066-cant-seem-to-connect-to-any-servers/ https://airvpn.org/topic/21418-new-to-airvpn-installed-avpn-on-surface-wwindows-10-cannot-connect-at-school-can-connect-fine-at-most-other-locations/?p=55515Problem: Issues with Curl.Solutions:https://airvpn.org/topic/27369-cannot-login-curl-is-required/Problem: Bad packet ID (may be a replay)Solutions:https://airvpn.org/topic/14094-weird-log-entries/Problem: Being censored and/or speeds being throttled/shaped by ISP or Government.Solutions:https://airvpn.org/topic/28847-connections-from-china/ Problem: MacOS client can't connect.Solutions:https://airvpn.org/topic/18251-airvpn-mac-client-problems/ Problem: Checking route IPv6 Failed.Solutions:https://airvpn.org/topic/29401-checking-route-ipv6-failed-cannot-connect-to-vpn-server-using-eddie/ Problem: Waiting for TUN/TAP to come up.Solutions:https://airvpn.org/topic/26072-route-gateway-is-not-reachable-on-any-active-network-adapters-10401/?do=findComment&comment=70761 Windows only: https://airvpn.org/topic/17440-guide-fix-for-tap-adapter-in-windows/ Windows only: https://airvpn.org/topic/30043-taptun-interface-wont-come-up/ Problem: Experiencing slow and/or fluctuating speeds in general.Solutions:https://airvpn.org/topic/30739-every-vpn-is-slow-for-me-despite-the-well-reviewed-vpns-im-trying-is-it-possible-my-isp-is-causing-this-i-feel-like-someones-playing-a-joke-on-me/?p=80014 https://airvpn.org/topic/18635-looking-for-fast-server-eu-that-goes-beyond-30-40mbit/?p=44998 For online gaming: https://airvpn.org/topic/30135-frequent-spikes-lag-on-videogames/?p=79046 https://airvpn.org/topic/1947-for-those-wondering-about-speed-performance/?p=1967 https://airvpn.org/topic/26157-airvpn-slowing-down-other-machines-in-network/ https://airvpn.org/topic/26117-slow-speed-sort-of/?p=70906 https://airvpn.org/topic/20812-very-very-slow-dns-lookup/ https://airvpn.org/topic/23743-download-speeds-dropping-to-zero-and-going-up-and-down/ Problem: Slow torrent speeds and/or disconnects.Solutions:https://airvpn.org/topic/28082-torrent-on-airvpn-speed-is-very-poor/ https://airvpn.org/topic/26218-slow-torrent-speeds/ https://airvpn.org/topic/23936-repeatedly-getting-disconnects-while-torrenting/ https://airvpn.org/topic/23499-slow-torrenting-speed/ https://airvpn.org/topic/23070-solved-p2p-slow-over-udp-and-fast-over-tcp/ https://airvpn.org/topic/22716-poor-torrenting-connection/Solutions are in link form without any explanatory text - at least not yet - so that the thread OP stays looking simple and uncluttered, where it's easy to find out what your problem is . Feel free to contribute with your own helpful links. The more feedback this thread gets, the quicker it can be improved and hopefully made useful.
  50. 1 point
    OpenSourcerer

    Airvpn and Dynamic DNS

    Go to Forwarded ports and forward a new port. In the DDNS field, enter a DDNS name, for example, myserver. When you click on +Add, and after some waiting, your connected client can be reached through myserver.airdns.org.
×
×
  • Create New...