Jump to content
Not connected, Your IP: 3.234.210.89

Leaderboard


Popular Content

Showing content with the highest reputation since 10/22/19 in all areas

  1. 7 points
    Staff

    Spooky Halloween Deals

    Hello! We reluctantly have to announce gloomy news to you all: Spooky Halloween Deals are now available in AirVPN... Save up to 74% on AirVPN longer plans (*) (*) When compared to 1 month plan price Check all plans and discounts here: https://airvpn.org/plans If you're already our customer and you wish to jump aboard for a longer period any additional plan will be added on top of already existing subscriptions and you will not lose any day. Every plan gives you all the features that made AirVPN a nightmare for snoopers and a scary service for competitors: active OpenVPN 3 open source development ChaCha20 cipher on OpenVPN Data Channel for higher performance and longer battery life on tablets and smart phones IPv6 support, including IPv6 over IPv4 configurable remote port forwarding refined load balancing to squeeze every last bit per second from VPN servers free and open source software for Android, Linux, Mac and Windows easy "Configuration Generator" web interface for access through third party software guaranteed minimum bandwidth allocation GDPR compliance and very high standards for privacy protection no log and/or inspection of clients' traffic effective traffic leaks prevention by AirVPN software Tor support via AirVPN software on Linux, Mac and Windows various cryptocurrencies accepted without any intermediary crystal clear, easy to read Privacy Notice and Terms https://airvpn.org/privacy No tricks, only treats! Grim regards & datathrills AirVPN Staff
  2. 3 points
    Hello! We are very glad to introduce a new client software for Linux 64 bit and Linux Raspbian 32 bit (which is frequently installed in Raspberry PI), based on our own AirVPN OpenVPN 3 library. The software is an initial and temporary step toward a more refined product to meet right now various demands by many Linux and *BSD users. It does not have a code name yet, and it is just "AirVPN OpenVPN 3 client" at the moment. It will evolve in to an integrated client and daemon targeting Linux, Mac, OpenBSD and FreeBSD platforms. Main features: lightweight and stand alone binary no heavy framework required, no GUI tiny RAM footprint (less than 3 MB currently) lightning fast based on OpenVPN 3 library fork by AirVPN with tons of critical bug fixes from the main branch, new ciphers support and never seen before features ChaCha20-Poly1305 cipher support on both Control and Data Channel providing great performance boost on Raspberry PI and any Linux-based platform not supporting AES-NI robust leaks prevention through Network Lock based either on iptables or nftables through automatic detection proper handling of DNS push by VPN servers, working with resolv.conf as well as any operational mode of systemd-resolved additional features Versions for Mac, FreeBSD and OpenBSD will follow in the near future. The software is currently in alpha stage and it must be therefore and implicitly considered unstable and under development. Source code will be made public at the release of a stable version. If you wish to test, feel free to download the binaries here and report in this very thread any bug, glitch and anything you wish: Linux 64 bit version: https://eddie.website/repository/eddie/airvpn-static1.0alpha/airvpn-static-linux-1.0-alpha2.tar.gz Raspbian 32 bit version: https://eddie.website/repository/eddie/airvpn-static1.0alpha/airvpn-static-raspberry-1.0-alpha2.tar.gz How to install AirVPN client for Linux x86_64 and Raspberry Requirements ------------ Linux x86-64 CPU/architecture A reasonably recent 64 bit Linux distribution tar sha512sum (optional) Raspberry Linux Raspbian distribution tar sha512sum (optional) Linux Installation ------------------ Download airvpn-static-linux-1.0-alpha2.tar.gz [optional] Download airvpn-static-linux-1.0-alpha2.tar.gz.sha512 This file is required to check the integrity of the above tar archive. It is not mandatory but it is strongly advised to download this file and check the tar archive [optional] Open a terminal window [optional] Check the integrity of the tar archive by issuing this command: "sha512sum --check airvpn-static-linux-1.0-alpha.tar.gz.sha512" (without quotes) [optional] Make sure the command responds with "airvpn-static-linux-1.0-alpha.tar.gz: OK" Change your current directory to a convenient place, such as your home directory. This can be done by issuing the command "cd ~" (without quotes) Extract the tart archive by issuing this command on your terminal window: tar xvf airvpn-static-linux-1.0-alpha.tar.gz The process will create a directory airvpn-static-linux-x86_64 Issue the "cd airvpn-static-linux-x86_64" (without quotes) [optional] Check the integrity of the binary file airvpn. Issue this command from your terminal window: sha512sum --check airvpn.sha512" (without quotes) [optional] Make sure the command responds with "airvpn: OK" [optional] Check dynamic library availability. Issue the command "ldd airvpn" and make sure all the required dynamic libraries are available. No line of the output must contain "not found" the Linux client is now ready to be used and possibly copied to a different directory of your system. Please note the client needs root privileges. Your user must therefore be included in your system's "sudoers" (depending on specific Linux distribution) Raspberry/Raspbian Installation ------------------------------- Download airvpn-static-raspberry-1.0-alpha2.tar.gz [optional] Download airvpn-static-raspberry-1.0-alpha2.tar.gz.sha512 This file is required to check the integrity of the above tar archive. It is not mandatory but it is strongly advised to download this file and check the tar archive [optional] Open a terminal window [optional] Check the integrity of the tar archive by issuing this command: "sha512sum --check airvpn-static-raspberry-1.0-alpha.tar.gz.sha512" (without quotes) [optional] Make sure the command responds with "airvpn-static-raspberry-1.0-alpha.tar.gz: OK" Change you current directory to a convenient place, such as your home directory. This can be done by issuing the command "cd ~" (without quotes) Extract the tart archive by issuing this command on your terminal window: tar xvf airvpn-static-raspberry-1.0-alpha.tar.gz The process will create a directory airvpn-static-raspberry Issue the "cd airvpn-static-raspberry" (without quotes) [optional] Check the integrity of the binary file airvpn. Issue this command from your terminal window: sha512sum --check airvpn.sha512" (without quotes) [optional] Make sure the command responds with "airvpn: OK" [optional] Check dynamic library availability. Issue the command "ldd airvpn" and make sure all the required dynamic libraries are available. No line of the output must contain "not found" the Raspberry/Raspbian client is now ready to be used and possibly copied to a different directory of your system. Please note the client needs root privileges. Your user must therefore be included in your system's "sudoers" Running the Client ------------------ Run the client and display its help and become familiar with its options. From your terminal window issue this command: sudo ./airvpn --help After having entered root password, the client responds with: AirVPN OpenVPN 3 Client 1.0 alpha 1 usage: ./airvpn [options] <config-file> [extra-config-directives...] --help, -h : show this help page --version, -v : show version info --eval, -e : evaluate profile only (standalone) --merge, -m : merge profile into unified format (standalone) --username, -u : username --password, -p : password --response, -r : static response --dc, -D : dynamic challenge/response cookie --cipher, -C : encrypt packets with specific cipher algorithm (alg) --proto, -P : protocol override (udp|tcp) --server, -s : server override --port, -R : port override --ncp-disable, -n : disable negotiable crypto parameters --network-lock, -N : enable/disable network filter and lock (on|off, default on) --gui-version, -E : set custom gui version (text) --ignore-dns-push, -i : ignore DNS push request and use system DNS settings --ipv6, -6 : IPv6 (yes|no|default) --timeout, -t : timeout --compress, -c : compression mode (yes|no|asym) --pk-password, -z : private key password --tvm-override, -M : tls-version-min override (disabled, default, tls_1_x) --tcprof-override, -X : tls-cert-profile override (legacy, preferred, etc.) --proxy-host, -y : HTTP proxy hostname/IP --proxy-port, -q : HTTP proxy port --proxy-username, -U : HTTP proxy username --proxy-password, -W : HTTP proxy password --proxy-basic, -B : allow HTTP basic auth --alt-proxy, -A : enable alternative proxy module --dco, -d : enable data channel offload --cache-password, -H : cache password --no-cert, -x : disable client certificate --def-keydir, -k : default key direction ('bi', '0', or '1') --force-aes-cbc, -f : force AES-CBC ciphersuites --ssl-debug : SSL debug level --google-dns, -g : enable Google DNS fallback --auto-sess, -a : request autologin session --auth-retry, -Y : retry connection on auth failure --persist-tun, -j : keep TUN interface open across reconnects --peer-info, -I : peer info key/value list in the form K1=V1,K2=V2,... --gremlin, -G : gremlin info (send_delay_ms, recv_delay_ms, send_drop_prob, recv_drop_prob) --epki-ca : simulate external PKI cert supporting intermediate/root certs --epki-cert : simulate external PKI cert --epki-key : simulate external PKI private key --recover-network : recover network settings after a crash or unexpected exit The client needs a valid OpenVPN profile in order to connect to a server. You can create an OpenVPN profile by using the config generator available at airvpn website in your account "Client Area" To start a connection: sudo ./airvpn your_openvpn_file.ovpn To stop a connection, just type CTRL+C. The client will initiate the disconnection process and will restore your original network settings according to your options. To start a connection with a specific cipher: sudo ./airvpn --ncp-disable --cipher CHACHA20-POLY1305 your_openvpn_file.ovpn Please note, in order to properly work, the server you are connecting to must support the cipher specified with the "--cipher" option. If you wish to use CHACHA20-POLY1305 cipher, you can find AirVPN servers supporting it in our real time servers monitor https://airvpn.org/status : they are marked in yellow as "Experimental ChaCha20". To disable the network filter and lock: sudo ./airvpn --network-lock off your_openvpn_file.ovpn To ignore the DNS servers pushed by the VPN server: sudo ./airvpn --ignore-dns-push your_openvpn_file.ovpn Please note: the above options can be combined together according to their use and function. Note on network filter and lock ------------------------------- The client's network filter and lock uses natively iptables and nftables. The client will automatically use the infrastructure available on your system. Please note: services firewalld and ufw may interfere with the client's network filter and lock and you are strongly advised to not issue any firewall related command while the VPN connection is active. Note on DNS ----------- The client currently supports both resolv.conf and systemd-resolved service. When the client is running you are strongly advised to not issue any resolved related command (such as resolvectl) or change the resolv.conf file in order to make sure the system properly uses DNS pushed by the VPN server. Please note: DNS system settings are not changed in case the client has been started with "--ignore-dns-push". In this specific case, the connection will use your system's DNS. Recover your network settings ----------------------------- The client is currently in alpha stage and it must be therefore and implicitly considered unstable and under development. In case the client crashes or it is killed by the user (i.e. kill -9 `pidof airvpn`) as well as in case of system reboot while the connection is active, the system will keep and use all the network settings determined by the client; hence, your network connection will not work as expected, every connection is refused and the system will seem to be "network locked". To restore and recover your system network, you can use the client with the "--recover-network" option sudo ./airvpn --recover-network Please note in case of crash or unexpected exit, when you subsequently run the client it will warn you about the unexpected exit and will require you to run it again with the "--recover-network" option. It will also refuse to start any connection until the network has been properly restored and recovered. Kind regards and datalove AirVPN Staff
  3. 3 points
    renehoss

    Spooky Halloween Deals

    I for one am not happy about this gigantic popup on my computer screen every time I start a VPN session. This pop up is reason for me to _not_ prolong my subscription at this time and will decide at the moment it ends. Surely disappointed. I am a paying customer and do _not_ whish to be spammed by irrirating popups. Please fix this by making this kind of advertisments an option in the settings.
  4. 3 points
    BlueBanana

    ANSWERED Eddie and torrenting

    Disable µTP in the settings, as it is known to slow down your speeds. Forward a port in the AirVPN client area, enter it in qBittorrent and disable UPnP. Don't forget turn on AirVPNs Network Lock; better safe than sorry! Regards, BB
  5. 2 points
    Staff

    Two new 1 Gbit/s servers available (CA)

    Hello! We're very glad to inform you that two new 1 Gbit/s servers located in Vancouver (Canada) are available: Nahn and Sham. The AirVPN client will show automatically the new servers; if you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). Servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP. Just like every other "second generation" Air server, Nahn and Sham support OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check servers status in our real time servers monitor: https://airvpn.org/servers/Nahn https://airvpn.org/servers/Sham Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  6. 2 points
    Hello! We're very glad to inform you that three new 1 Gbit/s servers located in Chicago (Illinois, USA) are available: Fang, Kruger and Sneden. Note that the aforementioned servers replace Alkaid, Microscopium and Pavonis which do not meet anymore our technical requirements in terms of uptime and line reliability and will be withdrawn at the end of November. AirVPN clients will automatically show new servers; if you use OpernVPN or some other OpenVPN frontend, you can generate all the files to access any server through our configuration/certificates/key generator (menu "Client Area" -> "Config generator"). Servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP. Just like all the other AirVPN servers do, Fang, Kruger and Sneden support OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols, smart load balancing between OpenVPN daemons and hardened security against various attacks with separate entry and exit-IP addresses. You can check servers status as usual in our real time servers monitor: https://airvpn.org/servers/Fang https://airvpn.org/servers/Kruger https://airvpn.org/servers/Sneden Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  7. 2 points
    BlueBanana

    OpenVPN 2.4.8 released

    Hello, to whom it may concern, OpenVPN 2.4.8 has been released today: https://openvpn.net/community-downloads/ Happy Helloween! BB
  8. 2 points
    Hello! @giganerd Bug detected and fixed, a new testing version is almost ready to be deployed. Thanks! @QueenSasha Thank you, actually speed, efficiency and low RAM footprint have been a priority in OpenVPN 3.3 AirVPN design. Glad to hear that you get remarkable performance boost in Raspberry. Our OpenVPN 3 development goes on and is aimed as usual to bug fixing and new features implementation. Developer will answer soon to your technical questions, in the meantime feel free to keep us posted if you find any glitch or bug. @usr32 Great comparison thank you! We are surprised that you could beat AES with ChaCha20 in an AES-NI supporting machine. Can you please specify the whole architecture? We would like to make some verifications with OpenVPN 3+mbedTLS for AES-NI support in specific archs. @GJElde So you made an OpenVPN text configuration file +x and you tried to run it? @maxandjim Thank you, we will investigate asap. Kind regards
  9. 2 points
    spiderdisco

    Spooky Halloween Deals

    A notice about saving money is fine in an email. Having a popup on my computer telling me to "save money now!" is not the appropriate way to convey this information. Maybe it would have been in 1998, but its 2019 and popup ads are frowned upon by most people. There is a reason every modern web browser blocks pop up ads by default. Its an annoying and disrespectful way to get someones attention. We are paying customers and you already have our email addresses, just send us an email. That's how every other business communicates with their customers. I'm very happy with my AirVPN service, but I feel this type of notification should be handled differently.
  10. 2 points
    ssling

    Spooky Halloween Deals

    I don't think so. Giving better prices only month after this promo wouldn't be fair for customers.
  11. 2 points
    Staff

    Eddie Desktop 2.18beta released

    Version 2.18.5 (Wed, 30 Oct 2019 15:03:32 +0000) [new] Linux - systemd service [change] Code cleanup for stable release [bugfix] Windows - Service installation issue in Windows 7 [bugfix] Windows - SSL connections [bugfix] Suppression of some unwanted elevated log [bugfix] Windows bug 'Do you want to reset Eddie to default settings?' [bugfix] Fix for occasional error on exit, 'Object reference not set to an instance of an object'. All other reported issues are under investigation.
  12. 1 point
    i thought as much, but wanted to ask to be sure. thanks for clarifying.
  13. 1 point
    YLwpLUbcf77U

    ANSWERED AirVPN’s Twitter…

    I still see Air's Twitter is stuck on tweeting about Assange. When there are so many other instances of journalists being threatened and even killed, why does Air just focus on this one guy for months on end? Here's a good report by the UN I suggest they read: https://reliefweb.int/sites/reliefweb.int/files/resources/Intensified attacks%2C new defences - Developments in the fight to protect journalists and end impunity.pdf
  14. 1 point
    Hello! We're very glad to inform you that two new 1 Gbit/s servers located in Los Angeles (California, USA) are available: Groombridge and Teegarden. Note that Groombridge and Teegarden replace Heze and Persei which do not meet anymore our technical requirements in terms of uptime and line reliability and will be withdrawn at the end of November. AirVPN clients will automatically show new servers; if you use OpernVPN or some other OpenVPN frontend, you can generate all the files to access Groombridge and Teegarden through our configuration/certificates/key generator (menu "Client Area" -> "Config generator"). Servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP. Just like all the other AirVPN servers do, Groombridge and Teegarden support OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols, smart load balancing between OpenVPN daemons and hardened security against various attacks with separate entry and exit-IP addresses. You can check servers status as usual in our real time servers monitor: https://airvpn.org/servers/Groombridge https://airvpn.org/servers/Teegarden Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  15. 1 point
    Flx

    Cloudflare WARP VPN

    Yup useless to the users. The only one thing it is good for "Collecting data and more data".
  16. 1 point
    DeSegura

    [Request] Danish Routing Server

    Having used AirVPN for a couple of years, I'm generally satisfied with the overall service, but I find it kinda annoying that I cannot access certain content on sites like DR (https://www.dr.dk/tv), DPlay, Viafree, etc. while connected to one of AirVPN's servers, or just out of the country. Which is why I would like to request a Danish routing server. Have a nice weekend! Some old, but similar requests:
  17. 1 point
    Hmm, I'm sorry, but it's still mixing up v4 and v6... $ sudo ./airvpn -N off -i -6 yes IPv6.ovpn AirVPN OpenVPN 3 Client 1.0 alpha 2 - 7 November 2019 CONNECTING... Starting thread Thu Nov 7 18:28:12.805 2019 OpenVPN core 3.3.2 AirVPN linux x86_64 64-bit Thu Nov 7 18:28:12.809 2019 Frame=512/2048/512 mssfix-ctrl=1250 Thu Nov 7 18:28:12.812 2019 UNUSED OPTIONS 3 [resolv-retry] [infinite] 4 [nobind] 5 [persist-key] 6 [persist-tun] 7 [auth-nocache] 8 [route-delay] [5] 9 [verb] [3] 10 [explicit-exit-notify] [5] 18 [pull-filter] [ignore] [dhcp-option DNS] Thu Nov 7 18:28:12.812 2019 EVENT: RESOLVE Thu Nov 7 18:28:12.813 2019 WARNING: Network filter and lock is disabled Thu Nov 7 18:28:12.813 2019 Contacting [2001:ac8:20:2b:fbca:14fa:873e:4051]:443 via UDP Thu Nov 7 18:28:12.813 2019 EVENT: WAIT Thu Nov 7 18:28:12.813 2019 net_route_best_gw query IPv6: 2001:ac8:20:2b:fbca:14fa:873e:4051/128 Thu Nov 7 18:28:12.813 2019 sitnl_route_best_gw result: via fe80::9a9b:cbff:fe6d:a378 dev enp35s0 Thu Nov 7 18:28:12.813 2019 Thu Nov 7 18:28:12.813 2019 EVENT: DISCONNECTED connect error: ipv4_exception: error parsing IPv4 address '2001:ac8:20:2b:fbca:14fa:873e:4051' : Invalid argument Thread finished STATS: Profile is the same.
  18. 1 point
    When eddie-ui opened up, I selected the 'Settings' icon - this brought up the 'Settings Menu'. On the Settings Menu, there is a 'Layer IPv6' option. On the drop-down tab next to it, I selected 'Blocked'. After that, I was able to access the Airvpn service. Thank you very much for your kind help. I was a little worried things wouldn't work out - but I'm very happy to report I now have a properly running Airvpn service. This would not be possible without your contribution. Thank you so much! I am eternally grateful
  19. 1 point
    Trying a clean Raspian install on a Pi4 and noticed typos in the instructions. Files are named alpha and the shell commands are alfa.
  20. 1 point
    sorry, i am deeply ashamed, what a stupid mistake.
  21. 1 point
    usr32

    AirVPN client based on OpenVPN 3.3 AirVPN

    That is great news, thank you, keep up the good work. I performed a small benchmark for fun, comparing the throughput in a VM. What is weird is the Tx/Rx "reversal" with OpenVPN 2.4.4 versus 3.3.2 but probably just the peak values are relevant. ~30% more performance is something. Expected a little more but the CPU is heavily throttled (and supports AES-NI), so I guess this is a very good result. Here is the test. ### All tests performed on lowest cheapo cloud instance with Luhman ## No VPN # Baseline iperf3 Network Speed Tests (IPv4): --------------------------------- Provider | Location (Link) | Send Speed | Recv Speed | | | Bouygues Telecom | Paris, FR (10G) | 967 Mbits/sec | 7.44 Gbits/sec Online.net | Paris, FR (10G) | 962 Mbits/sec | 7.88 Gbits/sec Severius | The Netherlands (10G) | 966 Mbits/sec | 2.72 Gbits/sec Worldstream | The Netherlands (10G) | 966 Mbits/sec | 7.51 Gbits/sec wilhelm.tel | Hamburg, DE (10G) | 948 Mbits/sec | 7.20 Gbits/sec Hostkey | Moscow, RU (1G) | 624 Mbits/sec | 909 Mbits/sec Velocity Online | Tallahassee, FL, US (10G) | 878 Mbits/sec | 958 Mbits/sec Airstream Communications | Eau Claire, WI, US (10G) | 834 Mbits/sec | 294 Mbits/sec ## With OpenVPN 2.4.4 and AES-256-GCM # Test 1 iperf3 Network Speed Tests (IPv4): --------------------------------- Provider | Location (Link) | Send Speed | Recv Speed | | | Bouygues Telecom | Paris, FR (10G) | 200 Mbits/sec | 162 Mbits/sec Online.net | Paris, FR (10G) | 210 Mbits/sec | 120 Mbits/sec Severius | The Netherlands (10G) | 183 Mbits/sec | 67.5 Mbits/sec Worldstream | The Netherlands (10G) | 206 Mbits/sec | 68.5 Mbits/sec wilhelm.tel | Hamburg, DE (10G) | 216 Mbits/sec | 59.7 Mbits/sec Hostkey | Moscow, RU (1G) | 135 Mbits/sec | 78.7 Mbits/sec Velocity Online | Tallahassee, FL, US (10G) | 69.6 Mbits/sec | 61.6 Mbits/sec Airstream Communications | Eau Claire, WI, US (10G) | 62.6 Mbits/sec | 45.4 Mbits/sec # Test 2 iperf3 Network Speed Tests (IPv4): --------------------------------- Provider | Location (Link) | Send Speed | Recv Speed | | | Bouygues Telecom | Paris, FR (10G) | 216 Mbits/sec | 104 Mbits/sec Online.net | Paris, FR (10G) | 252 Mbits/sec | 101 Mbits/sec Severius | The Netherlands (10G) | 198 Mbits/sec | 84.6 Mbits/sec Worldstream | The Netherlands (10G) | 226 Mbits/sec | 73.3 Mbits/sec wilhelm.tel | Hamburg, DE (10G) | 238 Mbits/sec | 62.4 Mbits/sec Hostkey | Moscow, RU (1G) | 129 Mbits/sec | 160 Mbits/sec Velocity Online | Tallahassee, FL, US (10G) | 62.1 Mbits/sec | 75.7 Mbits/sec Airstream Communications | Eau Claire, WI, US (10G) | 77.9 Mbits/sec | 67.6 Mbits/sec ## With AirVPN OpenVPN 3 Client 1.0 alpha 1 and CHACHA20-POLY1305 # Test 1 iperf3 Network Speed Tests (IPv4): --------------------------------- Provider | Location (Link) | Send Speed | Recv Speed | | | Bouygues Telecom | Paris, FR (10G) | 40.3 Mbits/sec | 303 Mbits/sec Online.net | Paris, FR (10G) | 56.7 Mbits/sec | 264 Mbits/sec Severius | The Netherlands (10G) | 83.2 Mbits/sec | 213 Mbits/sec Worldstream | The Netherlands (10G) | 47.8 Mbits/sec | 283 Mbits/sec wilhelm.tel | Hamburg, DE (10G) | 83.5 Mbits/sec | 285 Mbits/sec Hostkey | Moscow, RU (1G) | 65.4 Mbits/sec | 106 Mbits/sec Velocity Online | Tallahassee, FL, US (10G) | 48.9 Mbits/sec | 106 Mbits/sec Airstream Communications | Eau Claire, WI, US (10G) | 12.0 Mbits/sec | 55.6 Mbits/sec # Test 2 iperf3 Network Speed Tests (IPv4): --------------------------------- Provider | Location (Link) | Send Speed | Recv Speed | | | Bouygues Telecom | Paris, FR (10G) | 134 Mbits/sec | 333 Mbits/sec Online.net | Paris, FR (10G) | 166 Mbits/sec | 274 Mbits/sec Severius | The Netherlands (10G) | busy | 254 Mbits/sec Worldstream | The Netherlands (10G) | 121 Mbits/sec | 334 Mbits/sec wilhelm.tel | Hamburg, DE (10G) | 157 Mbits/sec | 304 Mbits/sec Hostkey | Moscow, RU (1G) | 50.2 Mbits/sec | 208 Mbits/sec Velocity Online | Tallahassee, FL, US (10G) | 45.9 Mbits/sec | 92.5 Mbits/sec Airstream Communications | Eau Claire, WI, US (10G) | 98.3 Mbits/sec | 74.1 Mbits/sec
  22. 1 point
    A problem....... error
  23. 1 point
    colorman

    eddie-ui_2.13.6_linux_x64

    Am now trying out the latest AirVPN client based on OpenVPN 3.3 AirVPN. No problems discovered so far.
  24. 1 point
    Thank you for the comprehensive reply. I fully agree, my request only for practicality. Not for paranoia or more security. Not being able to refresh the ip from the modem, it seemed to me the solution to my problem. Anyway thanks.
  25. 1 point
    The most provocative question one can ask about such things is: Can you explain the benefits? The overwhelming majority cannot answer this question without ultimately revealing they're paranoid for no reason. I propose that your paranoia is to be destroyed. You are not even remotely as important for prying eyes as you believe. Unless you are a regime critic, a war correspondent, a certain kind of politician or anyone else who'd have a very good reason to be prosecuted, expecting a jail sentence I mean, but then a VPN shouldn't be your only layer of "protection". Tor is a better alternative for these people. This option will force a full reconnect, causing noise in networks. Those who cause noise are more likely noticed. So from whom exactly are you trying to hide? Once or twice this feature was asked for by users, I believe Staff once even answered but I can't for the love of it find the posts again, sorry. Anyway, back then it wouldn't happen, and I think today little changed, if at all.
  26. 1 point
    robertoohoho

    Spooky Halloween Deals

    Hi, The popup showed twice on my system (OS X). This method doesn't match what I expect from AirVPN, no matter the good intentions behind. Anyways, I renewed. Regards.
  27. 1 point
    Flic

    AirVPN becomes an EFF Super Major Donor

    Now this is great news. Well done Air. I have done lots of checking up on EFF, and I am a fan of their work. Now it feels to me that your 'super contributions' to EFF includes just a little bit from me via my Air subscription.... ... I like it
  28. 1 point
    Staff

    AirVPN becomes an EFF Super Major Donor

    Hello! We proudly announce that today AirVPN has become an Electronic Frontier Foundation "Super Major Donor". The Electronic Frontier Foundation is the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development. We work to ensure that rights and freedoms are enhanced and protected as our use of technology grows. https://www.eff.org Check our mission page: https://airvpn.org/mission Kind regards and datalove AirVPN Staff
  29. 1 point
    B3nB3n

    Spooky Halloween Deals

    I have to say I am very very happy about the pop up! as long as it is only from time to time and really just about changelogs or promos, you can continue. I dont check my emails always and I would have missed this. Another 3 years... thanks
  30. 1 point
    maxx0r

    Spooky Halloween Deals

    Thanks, Guys! Renewed for another year.
  31. 1 point
    spiderdisco

    Spooky Halloween Deals

    I appreciate the deal but the popup notification in eddie is really obnoxious. It shows up on every device whenever I launch eddie and made me think I had adware installed for a second. Its really not a good look. Maybe just send an email when there are sales and give us an option to opt out of them in our account settings, like so many other services do.
  32. 1 point
    This was what I was looking for! Vielen Dank!
  33. 1 point
    scgt1

    Spooky Halloween Deals

    I really like the Eddie Client notice about this deal. I missed the Birthday promo due to not even knowing about it. The client notice is a very nice change. Can't help but wonder if the Black Friday promo may be a larger discount. Looking back on the Facebook page there wasn't even a Halloween promo offered and BF 2018 was a 67.5% discount. So debating pulling the trigger now or holding out for BF. hmmm choices choices. Please thought keep with the Eddie Client notices about promos that was a very nice change.
  34. 1 point
    LZ1

    Spooky Halloween Deals

    Hello! Haha, this sudden orange onslaught did provide a slight scare, I must admit. But this is new: you're now doing Halloween celebrations. Staff, I suggest you also do Chinese New Year celebrations around January/February. That, coupled with the Black Friday, Christmas/New Year and Birthday celebrations, will ensure you've got the VPN market cornered from November to May. Leaving only a few months of summer for the competition, where in many places of the world, it'll be too hot to be sitting inside using a VPN anyway . At any rate, I think you've used up the last 9 years of marketing budget getting that font to work .
  35. 1 point
    mdoverl

    ANSWERED Port Forwarding with Calibre

    It's a good idea, although I'd prefer something like nslookup.info because it's minimalistic but covers all features of a DDNS service. Also, it's open source. I'll look into that, thank you. I'm experimenting with a few this being that this is my first server I'm building. It's pretty fun and exciting.
  36. 1 point
    giganerd

    ANSWERED Port Forwarding with Calibre

    In a command prompt/PowerShell window: nslookup servername_exit.airvpn.org If you hover over it, you can see the error code and a short explanation. It's not about the ports. All your ports are forwarded to all connected devices, so when you open somename.airdns.org:12345 it can try connecting to the first device although you wanted to reach the second. It's not ideal, and the workaround is to stay connected to AirVPN on the server you're running Calibre on, finding out its exit IP and always use that. This also means to not use any of the *.airdns.org addresses to connect to AirVPN servers to not make your life difficult. Pick one and stick to it, it's a server, anyway. Please stop testing port 8080 from the outside, you'll never reach it. It's the local port forwarded to the internal 10.x.x.x address of your OpenVPN tunnel and therefore "invisible" to all connecting to the Calibre server. If it doesn't go through, check on which interface/address Calibre is listening. Maybe even disable all firewalls. If you use antivirus, disable all functionality of it temporarily as well.
  37. 1 point
    Hello! Vulnerable IPMI, iDRAC etc. which are then kept not updated and whose access is not even communicated to the customer is a negligent and intolerable behavior, however it's not impossible. Good datacenters keep such an access restricted to a VPN, but it's plausible that in some cases access is exposed to some public Internet address. Speaking only about Dell's iDRAC, a study led in 2018 evaluated that tens of millions of servers are critically vulnerable. And that's only Dell, while other management systems add other vulnerabilities. As disabling a remote management system is not a comfortable solution, because it could be needed for any emergency remote OS installation/maintenance/reboot/whatever, since AirVPN birth we verify IPMI, DRAC, iLOM etc. etc., restrict access to them to a tiny pool of IP addresses reserved to Air management if the server is exposed to the Internet (if it's in a VPN, the risk is remarkably reduced, as the attacker should find a way to enter the VPN first and discover the address inside the VPN) and keep it up to date (datacenters sometimes do not even bother to give you an updated system). That said, inside jobs can potentially crumble any and each caution, that's why it's important to rely on reputable datacenters; furthemore, if NordVPN statement is true, as incredible as it may sound, then the datacenter committed an outstanding negligence which perhaps might even be considered malicious in court, for having failed to inform NordVPN about the existence of a remote management system capable to bypass any server defense. However, we would like to read a statement from the datacenter company, before jumping to conclusions. Eliminating hazards completely is impossible, but risk mitigation is a task which must be always pursued with due diligence. Kind regards
  38. 1 point
    Clodo

    Has Air given up on Eddie for desktop?

    About Eddie 3.x : we are still working on that, but we can't give out right now 'screenshot', as the UI is in draft/debug stage, sorry. Development of 3.x depends on some core-changes that we made directly in 2.x series in the latest months. We have released a beta version of the new 2.X series here: Still under testing in different OS and configs due to a lots of internal changes.We hope to improve the reactivity and feedback with this release, promote it as a stable version as soon as possible, and restart with frequent releases.
  39. 1 point
    The discussion about Eddie has become a real hot topic in the past weeks. And understandably so, given the fact that "Eddie" is a core element of the whole service and a highly sophicticated one too. But i think that one has to consider the fact that AIR has to develop software for 4 OS'es (WIndows, Linux, Mac and Android) if i am not mistaken. That's a hell lot of work to do and it takes lots of time to develop a fully functioning client from scratch. There are other VPN services out there that give a shit about their client, hell, they don't even have one for Linux, let alone for Mac OS X. The community itself is a little "spoiled" in this regard, if i may say so. I am a bit impatient too and i am awaiting the release of the new client quite eagerly. But it doesn't help much if the community puts pressure on the devs. If they release the new client too early with a lot of bugs, then the community complains about a buggy client, and all hell breaks loose. So just let the devs make their job and i am confident that a new version is coming soon. Regards, BB
  40. 1 point
    What follows is me, unable to type non-quoted text: Happy 9th, I am very satisfied with your service. Great news, looking forward to this release.
  41. 1 point
    air521745

    AirVPN becomes an EFF Super Major Donor

    Just wanted to add my thanks as well. Private companies are under no such obligations, so every gesture in helping out like this is really appreciated. Couldn't find Air's banner on the EFF's Thanks page though, so make sure they actually add it at some point. Next stop; FSFE.org.
  42. 1 point
    Essentially, passive TCP/IP fingerprinting by analyzing some timings. The developer of WITCH? once wrote an article on Medium about it.
  43. 1 point
    Hello! We're glad to inform you that we support the journalistic work of Caitlin Johnstone, "rogue journalist". Her journalistic work is entirely supported by her readers. Her articles are not copyrighted and she gives unconditional permissions to republish them or part of them free of charge. https://caitlinjohnstone.com Check our mission page: https://airvpn.org/mission Kind regards and datalove AirVPN Staff
  44. 1 point
    Problem solved: Enable UDP for tracker support was disabled. /Close thread.
  45. 1 point
    Greeting everyone. I tried few different solutions like disabling IPv6 which cause Eddie to freak out and restart the connect since it will try to reattempt to connect IPv6. After looking around and found a right solution for this issue. It is something to do with the gateway that OpenVPN don't have the support for. Office 365 and Microsoft product relies on gateway for detecting network activity. The way Eddie/OpenVPN are designed to keep the gateway blank is the cause of the issue. The I found the solution from this forum, Here is the link to the actual solution of the problem. I can confirm it finally working with Eddie running. https://www.macwheeler.com/windows-10-office-365-cannot-connect-over-openvpn-fixed/ It like what JimDandy posted. The guide recommend putting 192.168.0.1 in TAP's gateway in IPv4 Advanced option. The link have the guide step by step how to do it. I can confirm it works for me. And I haven't got any complaints from OneDrive and Office 365 with this guide.
  46. 1 point
    What are your thoughts? Is this more spyware? Or is this a better option that things like Silverlight for playing video via HTML5? Should it be disabled if you are not immediately using it? Or should it be disabled altogether? I do not trust Google. But it does work well for things like Amazon Prime Video.
  47. 1 point
    Yelp.com is being blocked from all airvpn servers, any counntry. Checked routing tool, it gives 301 for HTTP status for all the servers. Please fix this. Surprised, no one has posted about this. Thanks!
  48. 1 point
    I have solved the problem. It had to do with the DOS Defense protection of my Draytek router's firewall. I now use TCP instead of UDP and I now get full speed! So take a look at your router's firewall if you are experiencing the same problems. Edit: Some Swedish servers are also slow for me, but that's another issue.
  49. 1 point
    Staff

    A review on another site

    @ThatOnePrivacyGuy Thank you for your extensive reply. Unfortunately, we think that it does not address our corrections at all. First of all, this is not the original sentence of your article, The original sentence is: "Do a search for “AirVPN review” and just try to find one that isn’t written by someone paid to do so." which clearly suggests that an overwhelming majority of reviews are paid by us. This is false and defamatory because we don't pay for any review. Additionally, at the moment of this writing and at the moment of the publication of your article, most of the reviews did/do not even contain a referral link. Tom's Hardware, Torrentfreak, vpnMentor, your own and even other reviews you can find on the first Google Search page are all reviews which not only have not been paid, but do not even include a referral link. Therefore, if the aim of this thread is having a fair exchange of opinions to improve both sides, we would recommend that you do not apply old rhetoric tricks (admitting that a sentence is wrong to replace it with a different but equally false sentence) to twist your sentences in the mind of the readers, according to your own requirements of trust and transparency and your calls for "ethical" behaviors. This is your opinion. We can respect it but we can't share it. The requirement of a disclaimer for a review including a referral link is in our opinion correct and we already ask for it to our few, major referrals (who have of course the right to refuse if the applicable law for their web site does not require that). Of course we can't check all the referrals, it's humanly impossible, but we check all the referrals that refer to us more than 5-6 users per week. The referrals who don't refer any user to us can be checked randomly, but of course have a lower priority since they don't harm anybody. About copyright enforcement we are in total disagreement. In the first place we are not copyright enforcers. It is not our duty, not our competence and not our will. Under this respect, your requirement is in our opinion unreasonable and legally unsustainable . And since you stress a lot on "ethics" throughout your whole message, we think that your requirement is contradictory. Copyright is one sector of the wide set of different laws and international trade agreements pertaining to intellectual monopolies, which in the last century have been severely damaging innovation, harming and limiting freedom of expression, imposing barriers to seek and impart information and access to culture, science and art, and above all have been causing and are causing millions of deaths and dreadful suffering to hundreds of millions of people. We can discuss endlessly about the horrors and the good of intellectual monopolies, but asking us to act as a copyright enforcer against some third-party web site is not only unreasonable under a legal point of view, but also unethical, because we would become a small part of that huge "machinery" that promotes one of the set of laws and one of those "mind attitudes" which are one of the causes (and not a negligible one, for what you can see in the last decades) of humankind pain especially in developing countries. Let's leave this task to the "competent authorities". That's correct. If you have time, please feel free to inform us if some review containing a referral link infringes the legal framework of the European Union on this subject. While we check all the referrals which bring to us customers, it's impossible for us to check all of those that don't send referred persons, so we leave the task to the public authorities who have the competence and duty to do so. Last but not least, feel free to cite the reviews that in your opinion talk about our service with undeserved terms. We ask because we usually see that the reviews, even those that contain referral links, miss the strong points of our service, in our opinion - but of course we underline that it's impossible to read them all. Kind regards
  50. 1 point
    Paypal is a thoroughly evil company that should be avoided at all costs. One of their management once bragged about how they love ot help out law enforcement, and they blocked donations to Wikileaks and other groups on behalf of the American government so they are very politically motivated. I have no doubt that they would give up lists of names if they were ever asked. If there was an easy way to buy Bitcoin reliably, I think it would be easy to get rid of Paypal as an option completely.
×
×
  • Create New...