Leaderboard
Popular Content
Showing content with the highest reputation on 05/23/19 in all areas
-
3 points
Twelve new 1 Gbit/s servers available (NL)
Air4141841 and 2 others reacted to Staff for a post in a topic
Hello! We're very glad to inform you that twelve new 1 Gbit/s servers located in Alblasserdam (Netherlands) are available: Aljanah, Alpheratz, Aspidiske, Capella, Eltanin, Larawag, Melnick, Muhlifain, Piscium, Scuti, Suhail, Tiaki. The AirVPN client will show automatically the new servers. If you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP. Just like every other "second generation" Air server, they support OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team -
1 point
New Country: Serbia (RS) - New 1 Gbit/s server available
FromtheWalls reacted to Staff for a post in a topic
Hello! We're very glad to inform you that a new 1 Gbit/s server located in Belgrade (RS) is available: Alnitak. The AirVPN client will show automatically the new server. If you use the OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP. Just like every other "second generation" Air server, Alnitak supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/Alnitak Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team -
1 point
New Country: Brazil (BR) - New 1 Gbit/s server available
puccettone reacted to Staff for a post in a topic
Hello! We're very glad to inform you that a new 1 Gbit/s server located in São Paulo, BR, is available: Peony. Peony is our first server in South America and we are very proud to start operating there. Special thanks go to out moderator Zhang who helped us find a datacenter with particularly good connectivity The AirVPN client will show automatically the new server. If you use the OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP. Just like every other "second generation" Air server, Peony supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/peony Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team -
1 point
New AirVPN User Questions
LZ1 reacted to OpenSourcerer for a post in a topic
If you use IPv6 and have the Privacy Extensions off (which I doubt highly), yes, but inevitably only for the AirVPN server. The last half of an IPv6 address is called the Interface Identifier which consists of your MAC address and a FF:FE in the middle of it: Interface Identifier = ::E123:45FF:FE67:89AB, which means, MAC = E1:23:45:67:89:AB. The mentioned Privacy Extensions simply generate a random identifier. If they're used, no one will know the MAC address through IPv6 except for the fact that you use them (FF:FE is replaced with randoms as well). The MAC address as part of the TCP/IP protocol stack is only known in your local network. It's not even sent anywhere over your ISP connection, so no worries there. They are two completely different things. Sorry, but how did you come to this question? You must've heard or read something somewhere. Unless you're breaking into someone's network that's not yours, I see absolutely no benefit from it because, as I wrote, it's used in your local network only. Oh, and for 5) in reference to Mr. LZ1, even without NetLock. NetLock just gives you peace of mind that everything is sent through the tunnel and blocked otherwise. Not every use case needs this. -
1 point
Eddie Android Edition 2.3 beta 1 released
puccettone reacted to Staff for a post in a topic
Hello! We're glad to inform you that we are opening the beta testing phase of our free and open source software Eddie for Android version 2.3. You can participate to the beta testing by joining the beta community in the Google Play Store here: https://play.google.com/apps/testing/org.airvpn.eddie You can also download the Eddie Android 2.2 beta 1 apk directly from our repository: https://eddie.website/repository/eddie/android/2.3beta1/org.airvpn.eddie.apk The application is fully localized and we look for translators, especially for translations into Japanese, Korean and other languages. If you wish to translate (from English) please contact info@airvpn.org for every detail. Available languages: Chinese (simplified), Chinese (traditional), Danish, Dutch, English, French, German, Italian, Portuguese, Spanish, Russian, Turkish. Eddie for Android is free and open source software released under GPLv3. We invite you to check from independent 3rd parties the lack of trackers code signatures, for example here: https://reports.exodus-privacy.eu.org/en/reports/search/org.airvpn.eddie New in version 2.3: Disabled data backup on uninstall Server statistics shown in Favorite/Forbidden/Countries & Servers groups Logout drops user credentials Native library updated to the latest openvpn3, lz4, mbedtls and asio commits Minor bug fixes Main features: Free and open source OpenVPN GUI based on OpenVPN 3 The only Android application officially developed by AirVPN Robust, best effort prevention of traffic leaks outside the VPN tunnel Battery-conscious application Low RAM footprint Ergonomic and friendly interface Ability to start and connect the application at device boot Option to define which apps must have traffic inside or outside the VPN tunnel through white and black list Localization in simplified and traditional Chinese, Danish, English, French, German, Italian, Portuguese, Russian, Spanish, Turkish Full integration with AirVPN Enhanced security thanks to locally stored encrypted data through master password Quick one-tap connection and smart, fully automated server selection Smart server selection with custom settings Manual server selection Smart attempts to bypass OpenVPN blocks featuring protocol and server fail-over Full Android TV compatibility including D-Pad support. Mouse emulation is not required. Enhancements aimed to increase accessibility and comfort to visually impaired persons AirVPN servers sorting options Customizable "Favorite" and "Forbidden" servers and countries OpenVPN mimetype support to import profiles from external applications Multiple OpenVPN profile support. The app now imports and manages multiple OpenVPN profiles Support for custom bootstrap servers Support for favorite and forbidden countries AirVPN broadcast messages support User's subscription expiration date is shown in login/connection information The app is aware of concurrent VPN use. In case another app is granted VPN access, Eddie acts accordingly and releases VPN resources Optional local networks access. In such case, local network devices are exempted from the VPN and can be accessed within the local devices Localization override. User can choose the default language and localization from one of the available ones Favorite and forbidden lists can be emptied with a single tap VPN Lock can now be disabled or enabled from settings VPN reconnection in case of unexpected OpenVPN disconnection. (It requires VPN Lock to be disabled) User can generate an OpenVPN profile for any AirVPN server or country and save it in OpenVPN profile manager Server scoring algorithm implementing the latest AirVPN balancing factors in order to determine the best server for quick connection Network name and extra information are shown along with network type Device network status management Changelog 2.3 beta 1 (VC 21) - Release date: 17 May 2019 by ProMIND AndroidManifest.xml - [ProMIND] set android:allowBackup and android:fullBackupOnly to false airvpn_server_listview_group_item.xml - [ProMIND] added server statistics layout ConnectAirVPNServerFragment.java - [ProMIND] AirVPNServerExpandableListAdapter.GroupListViewHolder: added server statistics items - [ProMIND] AirVPNServerExpandableListAdapter.getGroupView(): added server statistics items to HEADER and GROUP types - [ProMIND] createGroupList(): compute server statistics for HEADER and GROUP types AirVPNUser.java - [ProMIND] getUserLocation(): set connection timeout to SupportTools.HTTP_CONNECTION_TIMEOUT - [ProMIND] getUserLocation(): set read timeout to SupportTools.HTTP_READ_TIMEOUT - [ProMIND] logout(): user name, password and current profile are set to empty and forgetAirVPNCredentials() is called native library - [ProMIND] updated to the latest openvpn3, lz4, mbedtls and asio commits manifest.xml - [ProMIND] updated to the latest document Complete changelog for stable release 2.2: https://gitlab.com/AirVPN/EddieAndroid/blob/master/ChangeLog.txt Kind regards and datalove AirVPN Staff -
1 point
Five new 1 Gbit/s servers available (DE)
REMONTAges reacted to Staff for a post in a topic
Hello! We're very glad to inform you that five new 1 Gbit/s servers located in Frankfurt (Germany) are available: Alsephina, Dubhe, Menkalinan, Mirfak, Mirzam. The AirVPN client will show automatically the new servers. If you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP. Just like every other "second generation" Air server, they support OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team -
1 point
Eddie Android edition 2.1 beta released
Warrensmuro reacted to Staff for a post in a topic
Hello! That means that Android restarts the app. It is possible that the issue is related to ARM32, we are investigating, but for sure we have detected problems between asio library and ARM32 processors. Can you confirm that your device is based on some ARM 32 bit processor? Kind regards -
1 point
Black Friday Week
Warrensmuro reacted to Reso for a post in a topic
Excellent. Extended by a year -
0 points
Eddie Android edition 2.1 beta released
Warrensmuro reacted to amazake for a post in a topic
Hello! It sounds like some crash at some level, do you have the option to send us a logcat? Does it happen with 2.1 beta 2 and not with 2.0.1? What are your exact device model and your Android version? Kind regards I'm having the same problem. After roughly an hour or so the app just crashes/hard restarts. Although the notification says that it's connected it isn't and no VPN lock in place, thus leaking the traffic. The app also asks for the master password again after such a crash. The log in the app doesn't show anything worthwhile since it's a fresh log. I'm using a Fire 10 Tablet (FireOS, which is Android 5.1.1) -
0 points@kaymio Our assigned ULAs are in fde6:7a:7d20::/48 which is inside the range officially reserved to ULA so we don't understand why a browser should discriminate against them in favor of a local IPv4 address... Kind regards
-
0 pointsWow, good idea! Will add it. Not sure why you added other part? If VPN is off, current script will start it (when cronjob runs). If VPN is ON, but it's in error state (not letting traffic trough) it will kill VPN and start it again. EDIT: Added your contribution to tutorial. Changed some parts of tutorial. You no longer need to copy script to /usr/ folder. It's better if it stays in shared folder of your choice since there it will survive system upgrades.
-
0 pointsAssuming you mean Virgin Media UK. How did you determine this? Why would they mess with DNS to the web site rather than routing to the actual OpenVPN servers? Its a nice web site but not even that important to AirVPN users who only actually need it for initial setup. This is a curiosity only question as the solution of using an alternative DNS doesn't seem to have any downsides.
-
0 points
Using AirVPN with Debian Network Manager (NOT RECOMMENDED)
Shaynepeshy reacted to Staff for a post in a topic
UPDATE Due to multiple, critical problems in network-manager-openvpn which after years have not been solved we recommend to NOT use it. Please understand that we will not provide support to network-manager-openvpn. In GNU/Linux we recommend that you run our free and open source software "Eddie", or our free and open source software "Hummingbird", or OpenVPN directly 21/04/2014: network-manager-openvpn runs OpenVPN so that OpenVPN does not check the server certificate. Therefore we DO NOT RECOMMEND usage of network-manager for security reasons. This issue is already fixed in newest version not yet available in Debian 7 Wheezy Download your configuration file from the page Config Generator Select "Advanced Mode" Tick "Separate certs/keys from .ovpn files" Save the downloaded zip-file somewhere, say in ~/.airvpn. Unzip it. Five files should be extracted. Try to make sure nobody but you can read the file user.key, because that one is secret. Erase the zip-file. Or at least, make sure only you can read it (since it contains the secret user.key file inside) Install the package named network-manager-openvpn-gnome, which is a plugin to NetworkManager handling OpenVPN connections. The install will automatically include all needed packages, like openvpn etc. Perhaps you'll have to log out and log in again, or even restart the computer or something. To check that openvpn plugin was properly installed in NetworkManager, click on the nm-applet (the NetworkManager icon) => VPN Connections => Configure VPN. In the little window that comes up, click the Add button. Is there an OpenVPN option in the menu? Good. But don't click on it. Just close the windows. This was just a check. Click on the nm-applet (the NetworkManager icon) => VPN Connections => Configure VPN In the little window that comes up, click the Import button. In the file chooser that comes up, find the previously downloaded file air.ovpn (perhaps you stored it in the ~/.airvpn directory?) A new little window comes up. It is pre-filled with the necessary airvpn-configuration stuff. Click the NetworkManager applet. Under VPN-connections, you should now be able to select the VPN-connection named air. After a little while, the applet icon should be decorated with a little padlock. For any comment or feedback, you can find the discussion here. Thanks to HugeHedon for this article.