Jump to content
Not connected, Your IP:


Popular Content

Showing content with the highest reputation since 07/21/19 in all areas

  1. 8 points

    Checking route IPv4 always fails

    Hello! Please note that we did not let the certificates expire. Deployment of new certificates always occur in due time and automatically. In this case the deployment got stuck (for a bug introduced by a human error, of course, but we are all human beings) when only a part of the VPN servers certificates were deployed. About 3/5 of the servers remained with old certificates, which expired 8 hours ago. The problem has been resolved. Kind regards
  2. 6 points
    Hello, we have experienced a problem with VPN server LetsEncrypt certificates deployment. The system procedure got stuck and failed to deploy updated certificates. In turn, such a failure caused "route check" failures on Eddie desktop editions, and ONLY on them, due to expired certificates verified by cURL during the route check phase. The problem has been affecting a wide amount of VPN servers for about 8 hours and has been resolved completely now. We deeply apologize for any inconvenience. Kind regards AirVPN Staff
  3. 5 points

    Has Air given up on Eddie for desktop?

    Hi, I'm sorry about the delay on Eddie development, but in the next release we changed all source code from the ground up, to separate what needs elevated privileges and what not. So we are re-testing all Eddie features. For example, in the next release UI runs as normal user, and this can fix or cause worse issues in different Linux distributions. Re-testing all major distributions requires a lot of time. Anyway, I hope to release it (as a beta version for feedback) when all supported OS (Win/macOS/Linux) are ready for use. This is related to the next release of 2.X branch (the same UI you know). In the meantime, we are building also the new universal UI for 3.X branch. I hope we can release the new 2.x version as soon as possible. I hope I can give you a date in a few days. Sorry again for the delay.
  4. 4 points

    Checking route IPv4 always fails

    Hello, we have experienced a problem with VPN server LetsEncrypt certificates deployment. The system procedure got stuck and failed to deploy updated certificates. In turn, such a failure caused "route check" failures on Eddie desktop editions, and ONLY on it, due to expired certificates verified by cURL during the route check phase. The problem has been affecting a wide amount of VPN servers for about 8 hours and has been resolved completely now. We deeply apologize for any inconvenience. Kind regards
  5. 4 points
    Under the "DNS" settings tab, deselect "Check AirVPN DNS", then go to the "Advanced" tab and deselect "Check if the Tunnel Works". Worked for me on v2.17.2. Just a very temporary fix.
  6. 3 points
    Yeah i do have to say i am not pleased with the response. Or rather lack thereof.
  7. 3 points
    So the issue is with Eddie. Install OpenVPN: https://openvpn.net/community-downloads/ Use the AirVPN config generator to create config files and save those under program files/OpenVPN/config. After launching OpenVPN you will be able to right click and connect to the server of your choice.
  8. 2 points

    ANSWERED unable to login

    Excellent Logged in and connected at super speeds I also disconnected and reconnected to another country which was also super fast. All seems OK now Thank You Banjo
  9. 2 points
    This is not reverting to a previous configuration or version, just setting the time back. The issue is that a certificate on a server expired (about 3 hours ago, I suspect). By setting the clock back, your computer will see the certificate's expiration date, compare it to the computer's clock, and decide that it hasn't expired yet.
  10. 2 points
    same error here Admin should post an ackowledgement of the issue and how long til they fix
  11. 2 points

    Checking route IPv4 always fails

    The issue is specific to Eddie. I can use openvpn import a config file from air and it connects normally.
  12. 2 points
    Hello! AirVPN is very proud to introduce for the first time ever OpenVPN 3 support for ChaCha20-Poly1305 cipher with Eddie Android edition 2.4. The new implementation means remarkably higher performance and longer battery life for your Android device. CPUs that do not support AES New Instructions, typically ARM CPUs mounted on most Android devices, are much faster to encrypt and decrypt a stream of data with ChaCha20 than AES. At the same time, ChaCha20 offers the same security when compared to AES. https://en.wikipedia.org/wiki/Salsa20#ChaCha_variant You can test right now the new cipher. We have prepared four test servers running OpenVPN 2.5 and supporting ChaCha20 in Canada and the Netherlands. When you pick ChaCha20 as cipher in Settings, Eddie will filter properly Air VPN servers to let you connect to them. The outstanding feature has been made possible by AirVPN implementation on "OpenVPN AirVPN" of new directives, never supported before by OpenVPN 3, as well as a brand new, rationally re-engineered class for AEAD ciphers, which currently includes both AES-GCM and ChaCha20. Development of OpenVPN 3 will go on during the next months. Here's the current status: Eddie Android edition available languages are: Chinese (simplified), Chinese (traditional), Danish, Dutch, English, French, German, Italian, Portuguese, Spanish, Russian, Turkish. Eddie for Android is free and open source software released under GPLv3. We invite you to check from independent 3rd parties lack of trackers code signatures, for example here: https://reports.exodus-privacy.eu.org/en/reports/search/org.airvpn.eddie You can download Eddie Android 2.4 apk directly from our repository: https://eddie.website/repository/eddie/android/2.4/org.airvpn.eddie.apk You can also download it from the Google Play Store: https://play.google.com/store/apps/details?id=org.airvpn.eddie and in Amazon Appstore: https://www.amazon.com/Eddie-AirVPN-official-OpenVPN-GUI/dp/B07KTD6DH9/ref=sr_1_1?keywords=eddie+airvpn Source code is available in GitLab: https://gitlab.com/AirVPN/EddieAndroid/ How to enable ChaCha20 on the Data Channel Open "Settings" view, then open "AirVPN". Locate "Encryption Algorithm", tap it and set "CHACHA20-POLY1305", then tap "OK". New in version 2.4: Updated native library to OpenVPN 3.3 AirVPN ChaCha20-Poly1305 support on both OpenVPN Control and Data channels Support by OpenVPN 3 AirVPN of ncp-disable directive integrated in the app according to the cipher suite picked by the user For new features complete list, please see the changelog at the bottom of this post Main features: Free and open source OpenVPN GUI based on "OpenVPN 3.3 AirVPN" Complete ChaCha20, AES-GCM and AES-CBC support The only Android application officially developed by AirVPN Robust, best effort prevention of traffic leaks outside the VPN tunnel Battery-conscious application Low RAM footprint Ergonomic and friendly interface Ability to start and connect the application at device boot Option to define which apps must have traffic inside or outside the VPN tunnel through white and black list Localization in simplified and traditional Chinese, Danish, English, French, German, Italian, Portuguese, Russian, Spanish, Turkish Full integration with AirVPN Enhanced security thanks to locally stored encrypted data through master password Quick one-tap connection and smart, fully automated server selection Smart server selection with custom settings Manual server selection Smart attempts to bypass OpenVPN blocks featuring protocol and server fail-over Full Android TV compatibility including D-Pad support. Mouse emulation is not required. Enhancements aimed to increase accessibility and comfort to visually impaired persons AirVPN servers sorting options Customizable "Favorite" and "Forbidden" servers and countries OpenVPN mimetype support to import profiles from external applications Multiple OpenVPN profile support. The app now imports and manages multiple OpenVPN profiles Support for custom bootstrap servers Support for favorite and forbidden countries AirVPN broadcast messages support User's subscription expiration date is shown in login/connection information The app is aware of concurrent VPN use. In case another app is granted VPN access, Eddie acts accordingly and releases VPN resources Optional local networks access. In such case, local network devices are exempted from the VPN and can be accessed within the local devices Localization override. User can choose the default language and localization from one of the available ones Favorite and forbidden lists can be emptied with a single tap VPN Lock can now be disabled or enabled from settings VPN reconnection in case of unexpected OpenVPN disconnection. (It requires VPN Lock to be disabled) User can generate an OpenVPN profile for any AirVPN server or country and save it in OpenVPN profile manager Server scoring algorithm implementing the latest AirVPN balancing factors in order to determine the best server for quick connection Network name and extra information are shown along with network type Device network status management Kind regards & datalove AirVPN Staff Changelog 2.4 (VC 26) - Release date: 30 July 2019 by ProMIND [ProMIND] Production release Changelog 2.4 RC 1 (VC 25) - Release date: 26 July 2019 by ProMIND [ProMIND] OpenVPN 3.3 AirVPN fork synchronized to master OpenVPN branch [ProMIND] Native library dependencies updated to the latest releases [ProMIND] Minor bug fixes ConnectAirVPNServerFragment.java [ProMIND] connectServer(): pendingServerConnection is now properly cleared. This prevents a double call from onAirVPNLogin event (user login + user credentials loaded from AirVPN server) in case of a pending server connection going on Changelog 2.4 beta 1 (VC 24) - Release date: 19 July 2019 by ProMIND [ProMIND] Updated native library to "OpenVPN 3.3 AirVPN" supporting CHACHA20-POLY1305 cipher and ncp-disable profile option (forked from OpenVPN:master 3.2 qa:d87f5bbc04) [ProMIND] Updated default manifest to V256 airvpn_server_listview_item.xml [ProMIND] added a new layout for showing server's warning_open field AirVPNServerProvider.java [ProMIND] Added cipher filter according to user settings AirVPNServerSettingsActivity.java [ProMIND] Added encryption algorithm option for AirVPN servers AirVPNServer.java [ProMIND] Added class members to comply to Manifest V256 AirVPNServerGroup.java [ProMIND] New class for manifest V256 handling AirVPNUser.java [ProMIND] getOpenVPNProfile(): profile generator uses "cipher" and "ncp-disable" according to the user settings [ProMIND] getPasswordDialog(): soft keyboard is shown by default [ProMIND] loginDialog(): soft keyboard is shown by default CipherDatabase.java [ProMIND] New class for manifest V256 handling ConnectAirVPNServerFragment.java [ProMIND] Show a warning in yellow in case server has a warning_open status [ProMIND] Servers are now filtered according to selected encryption [ProMIND] searchDialog(): soft keyboard is shown by default ConnectionInfoFragment.java [ProMIND] Added cipher name and digest to info box OpenVPNTunnel.java [ProMIND] Added method getProtocolOptions() QuickConnectFragment.java [ProMIND] Show user selected encryption in status box SettingsActivity.java [ProMIND] Added encryption algorithm option for AirVPN servers SettingsManager.java [ProMIND] Added methods getAirVPNCipher() and setAirVPNCipher() SupportTools.java [ProMIND] Changed AIRVPN_SERVER_DOCUMENT_VERSION to 256 [ProMIND] editOptionDialog(): soft keyboard is shown by default VPN.java [ProMIND] Added class members cipherName and digest
  13. 2 points
    schwabe explained what was required to get the code merged upstream, you decided to close the PR as can be seen here. This would be the same if you were submitting a patch to the kernel, subsystem maintainers have requirements and they themselves have requirements to get it merged in the next release branch by Linus or Greg for stable. So as it turns out, he told you what needs be done and you refused. Whether his requirements are suitable is not for discussion since it's not your project. You may have requirements for PR's on Eddie branches as most OSS does. You need to comply or you can just maintain your own fork which is worse for the community as a whole. To be clear, you may see this as "see, this guy is stopping us!" but instead it's "hey, we didn't comply with the requirements of this software to get our PR merged".
  14. 2 points
    Thank you to Clodo and the staff for replying. There's no harm in communicating with the community: "hey, here's the status of Eddie". Maybe Clodo is the sole developer of the desktop version, maybe there's more than we're aware of but taking the time to talk doesn't take that long. Also, this might not be possible, but I'd love to see development builds released with the source code (if that can be built into the workflow) so the community can help you and get involved (maybe that might help or hinder, but having many people poking around, finding/fixing bugs isn't a bad thing). Of course, scaling to deal with that can be a process in itself (handling PR's, issues etc). But at least talking about the new version, the new UI, screenshots, progress reports, that can satisfy users (like me and some above) and keep them engaged. If you fall off a cliff entirely and disappear...Well threads like this happen asking "what is going on?". Air provides a superior service and client, I want to give money for the development of these clients (for Clodo, ProMind and others) because they're what I use and rely on, on a daily basis, and are by far the best clients for OpenVPN in existance. So please keep us posted, you may not realise it but some invest for exactly this reason, you're both a service provider and a software developer, I'd love to support that directly if you need more people (but I am sure finding good quality developers is not so easy. Many many people rely on code written by Clodo/ProMind so it's not an easy job).
  15. 2 points

    New 1 Gbit/s server available (SG)

    Hello! We're very glad to inform you that a new 1 Gbit/s server located in Singapore (SG) is available: Lacaille. The AirVPN client will show automatically the new server; if you use any other OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP. Just like every other "second generation" Air server, Lacaille supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/Lacaille Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  16. 2 points
    Funny marketing fluff. Since AirVPN birth we allow multi-hop connections (opt-in) between different VPN servers, between VPN servers and SOCKS or HTTPS proxies, or (better solution) between VPN servers and Tor nodes. Safer and better than marketing fluff. HOWEVER, it must be known that there are some errors in the article you linked. It mixes at least two totally different attack types and makes a lot of confusion. Timing attacks can be performed anyway even on Tor network (in any low latency mix based protocol network, in general) given an adversary with enough power to monitor vast portions of the Internet., so the general analysis provided by the article is... imaginative, to say the least. Kind regards
  17. 2 points
    Hello! The datacenter operations might be impaired by the charges against the datacenter management issued on last June and related to crimes allegedly committed in 2012: https://www.cp24.com/news/owners-of-toronto-web-hosting-company-charged-in-massive-child-pornography-bust-1.4474497 Although our VPN servers in that datacenter have still IPv4 connectivity, only on some IP addresses, we can't of course count on them reliably. We are therefore shutting them down. Infrastructure in Canada remains with 31 servers capable of 1 Gbit/s bandwidth each, which provide wide redundancy, and we will anyway enlarge it whenever necessary. Kind regards
  18. 2 points

    Six servers withdrawal announcement: Canada

    Hello! We regret to inform you that we have been unable to contact one of our providers in Canada since 24 hours ago. All of its servers are down as well as its web sites. Affected servers are the following five: Almach Dheneb Grumium Kraz Rana Spica Luckily infrastructure redundancy is so high in Canada that lack of those five servers will not impact quality of service. We will update this thread with future developments, as soon as we receive any kind of information. Kind regards AirVPN Staff
  19. 2 points

    Has Air given up on Eddie for desktop?

    I asked support directly about the state of eddie on Mac OS and they just pointed me to the experimental releases which is knocking on a year old nearly. The experimental release doesn't fix any issues on Mac OS. I agree with @airnoob that not updating your software for over a year is bad practice even if it 'works' and for a VPN company this is unacceptable. IMO I think they have got side tracked with Eddie for Android and put Eddie for PC on the backburner. Either way I for one am getting impatient with the lack of updates on this 'new eddie' they've been talking about for months now! An update would be very welcome.
  20. 2 points
    The Android app seems to require a master password - this looks to (very often) block reconnection attempts (esp. overnight) leaving the phone without a VPN connection. Is there a way to remove this requirement? Seems other VPN providers do not need it. Thanks
  21. 2 points
    Confirmed [SOLVED]. I tried both with and without Use custom DNS, and my AdGuard DNS addresses are conclusively blocking ads in a known situation. So my custom DNS addresses are indeed using upstream servers that don't show up in my DNS leak test — false alarm! A big thanks and tip o' the hat to giganerd and Staff!
  22. 2 points
    This has been driving me nuts ever since I updated to the latest version of Eddie. However this has worked for me (so far).. Open Eddie Main Window Select Preferences Select Networking Against Layer IPv4 select Inside tunnel (must be supported) Untick Switch to ‘block’ if issue is detected Against Layer Ipv6i select Block Untick Switch to ‘block’ if issue is detected Against Internet Protocol used for connection select IPv4, IPv6 Against Interface used for connection select Automatic It seems to be a problem of IPv4/ IPv6 settings so try experimenting with different ones if the above doesn’t work for you.
  23. 1 point
    Hello! At this stage we can say that the cause of this specific problem was essentially a ban against IP addresses, a ban which extended on all of our infrastructure to defend Air against attacks. To be banned an IP address has to fail several login attempts in a row in a short time. As the whole matter involved at least 40 persons, probably some more, who did not change IP address in the last days, we can't say how it's possible that their IP addresses were all banned. We are searching for flaws in our anti-flood system. It is the same system that has been working fine with no modifications in the last 18-20 months so if there's some bug it's really well hidden and comes out so rarely. Even if it's a bug, why it did not affect, say 1000, 5000 or 20000 or ALL users, but just a tiny tiny fraction? While a few cases might be explained by infected machines, when the owner is not even aware that the system performs attacks, we can't realistically assume that all of a sudden the machines of more than 40 users were infected all in the last 2-3 days, and all infected with the same peculiar malware which attacked AirVPN (too or exclusively). We will keep you posted if we find anything relevant. In the meantime please keep reporting whether everything is fine or the problem comes back. Kind regards
  24. 1 point
    Thanks to all the software health-care professionals, there, for bringing Eddie back to health. Ciao from New World.
  25. 1 point

    Checking route IPv4 always fails

    Apologies for the confusion. Seems like things have been fixed now. For future reference, ~/someFile is a Unix-y (Linux, MacOS, and the like) short hand for a file named "someFile" in your user's home directory (the ~/ part).
  26. 1 point

    Checking route IPv4 always fails

    Excellent and prompt response as always. That's why I spend my money here. 😁😁😁
  27. 1 point
    Hello, we have experienced a problem with VPN server LetsEncrypt certificates deployment. The system procedure got stuck and failed to deploy updated certificates. In turn, such a failure caused "route check" failures on Eddie desktop editions, and ONLY on them, due to expired certificates verified by cURL during the route check phase. The problem has been affecting a wide amount of VPN servers for about 8 hours and has been resolved completely now. We deeply apologize for any inconvenience. Kind regards
  28. 1 point
    Here are 2 temporary solutions which work for me: 1. Set your system clock back. The cert expired less than 24 hours ago, so set it back at least a couple of days before that (hopefully Support can get this fixed in the meantime). 2. Generate a config file for Curl.exe and use the --insecure option to bypass the SSL warning. If you are running Windows, the Curl config file is named _curlrc and it is placed in your HOME directory or your <USER PROFILE>\Application Data directory. You can also put it in the same location with Curl.exe. This will be your Eddie program directory. Admin rights will be needed. I did this. Use your text editor to save a text file with "insecure" (without the "") on the first line and save it with the name _curlrc and put it in any one of the above mentioned locations. That's all it takes. YMMV. Update: It's been reported that unchecking "Check if the tunnel works" under Eddie Preferences > Advanced does the trick as well.
  29. 1 point

    Checking route IPv4 always fails

    Isn't that kind of like saying that because the oil needed changing in your Chevrolet you're going to be switching to a Ford? This is obviously a temporary glitch/maintenance issue that will be fixed. I still trust AirVPN far more than any other VPN service, and this sort of thing can happen with any of them. It's hard to be patient I know when we're paying for a service. Just my opinion FWIW.
  30. 1 point
    Having the same problem here MacOS.. I put the clock back a week to the 11th August. Can connect now with no problems. Hopefully this is a simple work around until it is fixed. I have to say though I have been with AirVPN for years now and never a hiccup, its unfortunate but these things do happen, we are lucky this is a very rare thing and hopefully it will be fixed quickly. I still have total faith in AirVPN and their services.
  31. 1 point
    i have the same issue. How/what do you mean by setting the date back a couple of days?
  32. 1 point
    If it fails on the ipv4 check you need to set your date back a couple days until there's a fix.
  33. 1 point
    I have same problem using linux.
  34. 1 point
    Same problem here on Linux version. "IPv4 checking route failed" "certificate has expired"
  35. 1 point
    Thanks for the answer. Yes, I'm only talking about the latest Android version. I don't consider past versions secure for usage anymore, not just in terms of VPN leaks. I do think that Android 9 reliably pushes its entire traffic through the designated VPN app under any circumstance, when Android's VPN lock is enabled on Android 9. Leaks can obviously occur, when the VPN app then does not handle things properly and allows connections before the tunnel has been fully built, but that would not be the fault of Android. Will gladly await a comment from the developers on this.
  36. 1 point

    Has Air given up on Eddie for desktop?

    I mean, depending who you ask will depend what answers they will give. Personally, I support AirVPN for the service it provides in both its hardware and software. For sure the clients both Android and Windows et al are the most advanced, which is why I place such urgence in their support. It's vital to me these clients are kept up to date and have frequent releases, ProMIND has done an excellent job with Android (although, there are features I'd love to see as other comments have posted before). My point was, to me, I care more for AirVPN and the service it provides and as such, I place an emphasis on understanding where Air is in its vital operations (I'd also have concerns if the servers quality was diminishing, but that's never been the case). Anything else Air does I personally do not care about, I just want good servers and good software, and frequent releases are an essential part of my engagement with AirVPN, reassurance from Clodo is very welcome and I look forward to seeing future Eddie improvements. To be clear, I use Eddie software 24/7, exclusively Eddie desktop and Eddie Android, they must be kept updated, secure and bug free, the Android app needs a few tweaks to make it perfect but again, since they are of such importance I make a fuss about them (if they break, or are a hassle to use, I cannot use the internet, because I refuse to use anything but Eddie to use the internet).
  37. 1 point

    Has Air given up on Eddie for desktop?

    Sorry but what does it have to do with Eddie? Eddie will run the OpenVPN binary you tell it to run. Kind regards
  38. 1 point
  39. 1 point
    Awesome response, thanks so much. This is why I use airvpn over all the others. Keep up the good work.
  40. 1 point

    OpenVPN 3 development by AirVPN

    Hello! It is not planned at the moment but we can of course keep your suggestion into consideration. What's the purpose? By knowing the scenario we can make better decisions. Kind regards
  41. 1 point
    Thank you very much FIX for answering me. My problem is now solved. The excellent AirVPN team responded quickly and attentively. I tried to uninstall Eddy with an uninstall program, but some files were not deleted. This is the default configuration file that was corrupted. At the suggestion of a member of the Air team, I destroyed it using the terminal and the complete reset of Eddy fixed everything. Best regards,
  42. 1 point
    I do agree with you, mostly because it's inconsistent with how it works on Linux. There you execute eddie-ui with your account, Eddie asks for sudo (which is similar to Run as Admin on Windows, I suppose), and writes configs into the user's /home, albeit as root. I keep repeating myself that a rewritten version of Eddie is in the works and will probably solve all the issues people keep reporting on the forums. ETAs can only be given by the coders if they decide to share, so no guarantees there. What's definite is that Eddie v3 is coming.
  43. 1 point
    Hello! We can't reproduce the issue... Please upgrade to Eddie 2.3, or 2.4 beta 1 and test again at your convenience. Also, do not enter custom directive "block-outside-dns": that's a directive implemented only on OpenVPN 2.3.x and higher version for Windows, which is a system with incomplete DNS implementation (lack of global DNS). Kind regards
  44. 1 point
    On my Shield TV the difference in speed was a matter of 45mbit/s vs 35mbit/s. Not that significant a speed increase with chacha20. This using the same speedtest server, same VPN server, same port and protocol. Only thing that changed was stream cipher. AES-256-GCM vs chacha20. But, perhaps my speed from that VPN server just never will be that high anyway.
  45. 1 point
    ChaCha20 really increases the speed, and the experimental servers work well! Speed went up to 146mbit/s, while before 110mbit/s was the limit Battery life has increased as well! Eddie battery consumption used to be about 40%, and now it is down to 15-20% (both at intense smartphone usage) However, I noticed that speedtest only works with TCP. If I connect with UDP, it can´t find any server to connect to, and loads endlessly. Any idea why this happens? Non-experimental servers work on both protocols.
  46. 1 point
    Hello! Today we're starting AirVPN ninth birthday celebrations! From a two servers service located in a single country providing a handful of Mbit/s, the baby has grown up to a wide infrastructure in 22 countries in three continents, providing now 230,000+ Mbit/s to tens of thousands of people around the world. Software related development has also been powered up. Eddie Android edition is now a fully mature application which features an exclusive best effort method to prevent traffic leaks and a complete integration with AirVPN. In 2019 AirVPN has also started operating in South America, on top of Asia, Europe and North America, and the infrastructure has grown significantly, counting now on more than 260 bare metal servers, whose traffic is mainly powered by tier1 and tier2 transit providers. AirVPN has also become recently an EFF "Super Major Donor" member. Furthermore, and we're very glad to announce it here publicly for the first time, development for OpenBSD and FreeBSD has started. We are also integrating OpenVPN 3 on new software which will couple Eddie on UNIX-like systems, including Linux, during the second half of 2019. GDPR compliance was already a de facto standard for AirVPN way before the Regulation entered into force, mainly because we don't collect personal data, period. By the way the compliance is now fully formalized (check details in our Privacy Notice and Terms https://airvpn.org/privacy ). AirVPN provides probably the strongest protection to your data, not only personal data but all data, you can find on any service. If you are an AirVPN customer or user, you are probably aware that our service is radically different than any other VPN service you might have met anywhere. No whistles and bells, no marketing fluff, no fake locations, no advertising on mainstream media, a transparent privacy policy, no trackers on the web site or in mobile applications, no bullshit of any kind in our infrastructure to sell your personal data to any personal data merchant, and above all a clear mission which is the very reason which AirVPN operates for. https://airvpn.org/mission Many of you know that when you buy AirVPN service, you not only support yourself and improve your ability to exercise your fundamental rights, but you also support AirVPN mission. However, while AirVPN in itself has flourished, AirVPN mission aims and values related to fundamental rights have experienced, in 2018 and 2019, a grim time. Australia "encryption-busting" monstrous law is fully in force; the European Union has definitively approved the bad Copyright Directive, mandating automated filters, which will unavoidably limit freedom of expression on big boards, and making the first step to undermine the liability exemptions of mere conduits and web publishers alike; new threats to citizens' privacy are becoming real through plans of wide face recognition deployment, indiscriminate DNA databases proposals, more pervasive and efficient profiling (possibly even through AI), and strict cooperation between Internet tech giants and intelligence agencies; the persecution of journalists, publishers and whistleblowers all around the world has reached unprecedented levels, revealing a widespread plan to suppress freedom of the press and freedom of expression even in so called "Western democracies". One of the greatest journalists and publishers of all times, Julian Assange, nominated seven times for the Nobel Peace prize and winner of many journalistic prizes and awards, has been and is prosecuted and persecuted for having merely published the truth about war crimes, corruption, torture and more, with a 100% accuracy, and for having protected his sources as any good investigative journalist does. He has been detained arbitrarily and illegally, as widely ascertained and recognized by the UN. He has been victim of an abominable smear campaign based on ignominious lies and defamation, a campaign aimed to turn the public opinion against him and distract from WikiLeaks publications content exposing war criminals in governments key positions, warmongers, torture maniacs, systematic illegal surveillance, endemic privacy violations and plots to limit and reduce fundamental rights. He is currently detained in solitary confinement 23 hours a day, with no access to books, maximum two visits per month, forbidden in practice to coordinate a defense with his lawyers, in a tiny cell of a maximum security UK prison which has been designed for dangerous murderers and terrorists, while UK will decide whether to extradite him to the USA to face a potential 175 years imprisonment. Whistleblowers like Chelsea Manning, who should be regarded as a hero, as Noam Chomsky, John Pilger, Daniel Ellsberg and other titans of our times pointed out, have been tortured and are still persecuted by the very same criminals whose crimes were exposed. Privacy activists and software developers, like Ola Bini in Ecuador, are imprisoned without charges, simply for having showed friendship to Assange or WikiLeaks, or for having developed software aimed to protect privacy through encryption. And the list can go on and on and on. But make no mistake: the dark times we are living in, the environment of fear and intimidation that various governments are building against the exercise of those fundamental rights which our mission forces us to protect to the best of our abilities, the mounting attacks against "encryption for everyone" and the awareness that enemies of human rights nestle inside government agencies, have not undermined our determination. Quite the opposite: they have convinced us that our service is even more necessary now and we are resolute to do even more. Our mission has been and will be empowered by the ongoing support to projects and NGOs which aim to the protection of privacy, personal data and freedom of expression, now more than ever. We have confirmed our support to Tor and we will progressively add support to champions of freedom of expression and privacy in any way our capacities and abilities will allow us. If you're curious to know something about a series of fortunate events which gave birth to AirVPN, have a look here: https://airvpn.org/aboutus To worthily celebrate AirVPN ninth birthday, we're glad to inform you that starting from now we will offer a 20% discount on all long term plans. Hurry up, this special offer will end on June the 11th, 23:59:59 UTC! Check the new prices here. Kind regards and datalove AirVPN Staff
  47. 1 point
    Hello and welcome! All are equal because Eddie takes care of them all. Every OS has its special settings you should take care of if you want to be "safe". For example, disabling smart DNS in Windows or taking note of the differences between the distribution's implementations of networking. I am a Linux user, proudly switched from Windows a few years ago and never looked back for a second. It's quite easy here to setup leak prevention because of the network profiles you can configure. Switch with two clicks on any desktop environment. I am not sure whether this is possible on Windows, I can only remember 7, 8 and 8.1 where you need to switch network settings manually. Not sure if Windows 10 finally gives you the opportunity to create multiple profiles. Depends on the changes, I guess. Which one did you have in mind for an example? No matter. Use Eddie and a webbrowser for things like port forwarding, they give you all the possibilities. Also, it all sounds like you haven't read LZ1's New User Guide, link in my signature. Take 30 minutes of your time and go through it, it answers a load of questions, even if you need to read quite a lot (which by the way is how you learn Linux mostly ).
  48. 1 point

    5 years of AirVPN

    It's been a while since my last "review" - 2.5 years to be somewhat exact. My first one even dates back to 2014. Both are interesting reads if you want to know more about my story and how I used AirVPN over the years - along with my experiences with AirVPN, of course. I quite can't believe it myself that I'm still here after five years. It's not like I expected Air to fail miserably, but I sure expected that after 3-4 years maybe the time will come to try something new because AirVPN wouldn't be able to satisfy me for some reason.. But no, I'm still here. And it's not because other VPN providers looked less promising (there was a brief moment when I really wanted to try out IVPN for a change), it's because AirVPN beautifully adapts to problems and trends in the market while staying true to their mission and not breaking anything in the process! The company's strategy is well thought out, both in handling technical challenges and managing users, and I actually enjoy being here. I can wholeheartedly say that I trust AirVPN's decision-making and it's a no-brainer for me to entrust them with "handling" my traffic, because I cannot fully trust my ISP. [h2]What happened since the last review? A year or so ago I was more or less forced to subscribe to Vodafone Cable because I moved to another city and the DSL lines are not as fast here as I expected them to be. It was sad to terminate my subscription to Deutsche Telekom (referred to as DTAG from here) because of this - OpenVPN works extremely well over their network and I was able to reach both my maximum upload and download throughput. And their network is rock-solid, you pay for some numbers and you actually get it in full, no strings attached. I am more than ready to pay slightly higher prices for bullshit-free network access like this. Only downside is that the Snowden leaks revealed NSA's direct access to DTAG customers' traffic... which is just another good reason to always be protected connected. Now, Vodafone is a more cheeky fella. I compare them to Verizon a bit (or was it Virgin?), that one provider who injects (or did inject) advertisements into customers' traffic. I really believe they will start doing this as well one rainy day, so surfing via AirVPN is a must for me, so as to not give them any data to train some AI. Unfortunately, this comes with a price: bad packet ID warnings are a common sight, but they seem to appear irregularly and roughly correspond to the times when I think I don't get the throughput I subscribed to. I think there's some packet reordering happening in the background - rerouting traffic over other nodes or lines, who knows. [h2]Throughput / Server quality and features With AirVPN via Vodafone I was rarely able to reach some 40 MiB/s in download, but 20-30 MiB/s is more common and stable (till the next bad packet ). I see the same symptoms with upload throughput: 50 Mbit/s ordered, I rarely get it uploading on torrents, and I didn't determine numbers by other means. Recently I noticed that specific server/port combinations can reach stable 5 MiB/s. But there are moments when a few simple bad packet ID warnings manage to disrupt even this. Upload throughput fluctuates apart from that between as low as 500 KiB/s and 3 MiB/s. There is a new development here, see below. I use vanilla OpenVPN on Linux with the most recent three servers in Germany, namely Intercrus, Serpens and Tucana, all ports except 53, rotating by route-random. In my ovpn file I made a few comments on some servers: On Intercrus, qBittorrent has a steady 5 MiB/s upload and downloads from my favorite Debian repo with 30 MiB/s more often than any other server.Tucana works extremely well on UDP/41185.Adhara and Cervantes are prone to low throughput. Errai and Ogma are "good", whatever I wanted to tell myself with this. In short: Most german servers can handle 40 MiB/s in download and definitely can hit 5 MiB/s in upload. I won't go into the server's security too much because whatever AirVPN offers should be "industry standard" by now. AirVPN offers little choice on the encryption parameters used - it's always AES-256 with RSA-4096 keys. It's solely there to ensure the max of achievable security across all users and their devices. Use the maximum - it's in the interest of AirVPN and you. [h2] A few remarks on the different client softwares Eddie is so feature-rich, it's almost the go-to OpenVPN client on PC. It runs on all major platforms and can handle itself and some nasty OS situations. Needs more support for external ovpn configs and it needs to drop Mono. Like, now. Please? There's an Android app now, and it uses OpenVPN 3. Mr. Schwabe's client does, too, via setting, and I can tell v3 connects blazing fast and gives more thorough log output. The decision to go with v3 was not a bad one. Unfortunately, this thing is written with Xamarin, using C#, therefore it depends on MonoDroid. Please? We were promised Eddie 3 on GTK+ and Eddie-Android without Mono. The community is awesome (more on that later ). So awesome, it gave birth to Qomui by fellow forum member corrado - an alternative Qt-based AirVPN client for Linux. I don't use any of these - vanilla on Linux and Mr. Schwabe's client on Android do the job for me. I help test Eddie on Android when I have some free time, though. [h2] The community is awesome. Seriously. These forums are a gold mine if you look for knowledge, wisdom, might and magic about pretty much any topic related to (Air)VPN and general computer tech. As I said a few times in the past, the decision to create these forums for AirVPN users might just be one of the more important factors why AirVPN is held in high regard, even if regularly being called out as being "more technical that others". Honestly, you can ask some dumb question and you will not be called dumb - people who love talking to newbies like you will be there. Or, you can ask a very thorough question with lots of tech words in it and concepts one must work with to understand and you will be treated more professionally - people who love minds like yours will be there to advise you. Of course there's a nag here and there, but they are such a rarity that I almost believe writing this is not necessary. But still. Staff is a book chapter for itself. Regularly active on the forums, managing the flood of support tickets, raising an undead army of community forum moderators. You can generally count on their posts to be helpful in their own special way. And yes, you read right: Some of the moderators here were regular users like me and you! And through their engagement with the community and good, helpful practice they got "promoted" to forum moderators. I've known most of them for some time now and they all deserved it very much. If something like that can happen, you know that Staff is not afraid of their users - they encourage contact among them. [h2] Anything more to say? I must realize I'm not the most thorough writer of "reviews". Generally, I let my mind speak for me. So there are definitely some things I, willingly or unwillingly, didn't mention. If you want to find out everything about AirVPN as a VPN provider, you might just register and, I don't know, see for yourself?! You will not regret this. I thank you for your time. Update: I replaced my DOCSIS modem and the throttling is gone! Now I reach stable 4 to 5 MB/s upload throughput! It doesn't seem to have much to do with my ISP in the end. Some uncontrollable feature of the modem, I guess, and no, I am not willing to look deeper.
  49. 1 point

    ANSWERED dnsmasq & routing

    First, I apologize if this has already been addressed, but I searched the forums and how-to guides and couldn't find an answer. I'm using pfsense with dnsmasq (DNS Forwarder). In my General Setup, I set the DNS server to and select AirVPN as the gateway. Unfortunately, this doesn't seem to work as the AirVPN "gateway" is the same as my AirVPN IP address. If I look at the route table, it adds an entry for, but sets the netif to lo0 instead of the appropriate ovpnc#, resulting in DNS queries not working. If I set the gateway to none and manually add the route to the gateway (my AirVPN IP address with the last by replaced with .1), everything works. Obviously, this is a routing issue, but I can't figure out how to get pfsense to correctly enter the route into the routing table. I know I can use unbound (DNS Resolver) and that does work. I also know that I can push AirVPN's DNS server to clients and that also works. However, I've been using dnsmasq for the last 18+ months with a different VPN provider without any problems. However, I am evaluating switching to AirVPN as I like many of its other features/functions (and cost!) much better than my current VPN provider. As of now, everything else I've setup works great with AirVPN except for this 1 annoying issue. So...is anyone else using dnsmasq? If so, how did you solve/workaround this routing issue?
  50. 1 point
    If it's not a tunnel within a tunnel, what's the purpose? We think about multi-hopping as a way to solve the problem of a wiretapped VPN server: the traffic transiting through the first hop defeats the wiretapping purposes because the "real payload" is still encrypted. But if the traffic in the first hop is not tunneled into the second hop tunnel, but it is just decrypted, re-encrypted and routed/forwarded to another server operated by the same company, the wiretapping is successful in any case. So, the REAL multi-hopping is what we already provide. The useless "multi-hopping" which is just a way to make your routing longer and nothing else is probably marketing fluff and as usual we will provide neither marketing fluff nor bloat-ware. If we miss something really useful for our mission in multi-hopping without multi-tunneling, please feel free to comment. Kind regards
  • Create New...