Leaderboard
Popular Content
Showing content with the highest reputation on 04/10/20 in all areas
-
1 pointHello! We're very glad to inform you that a new stable release of Eddie is now available for Linux, Mac and Windows. Eddie is a free and open source (GPLv3) OpenVPN GUI and CLI by AirVPN with many additional features such as: traffic leaks prevention via packet filtering rules DNS handling optional connections over Tor or a generic proxy customizable events traffic splitting on a destination IP address or host name basis complete and swift integration with AirVPN infrastructure Eddie 2.18.9 has been extensively rewritten to increase speed, stability, security and compatibility with the latest OS versions. It is the outcome of a massive work which took care to meet very many requests from our community and got rid of some issues affecting Eddie previous stable release when running in latest OS releases. Eddie GUI and CLI now run with normal user privileges, while only a "backend" binary, which communicates with the user interface with authentication, gains root/administrator privileges, with important security safeguards in place: stricter parsing is enforced before passing a profile to OpenVPN in order to block insecure OpenVPN directives external system binaries which need superuser privileges (examples: openvpn, iptables) will not be launched if they do not belong to a superuser Eddie events are no more run with superuser privileges: instead of trusting blindly user's responsibility and care when dealing with events, now the user is required to explicitly operate to run something with high privileges, if necessary Backend binary has been completely rewritten in C++ on all systems (Windows included), making the whole application faster. On top of that various optimizations have been implemented. Now Eddie provides you with higher responsiveness and an improved overall feel and comfort. CLI version has been improved as well, featuring numerous glitch and bug fixes. Compatibility for macOS Catalina and latest Linux distributions, including DNS handling, has been enhanced. Settings, certificates and keys of your account stored on your mass storage can optionally be encrypted on all systems either with a Master Password or a system key-chain if available. For Windows systems, wintun support has been added. You can now, if you wish so, replace the driver for OpenVPN virtual network interface with the new wintun for higher throughput (OpenVPN 2.5 tech preview required). In Linux and Mac systems, Eddie can also launch Hummingbird, which is very fast and is based on OpenVPN3-AirVPN library, replacing OpenVPN 2.x. In this way you can have at once a GUI for Hummingbird (which lacks it), the usual great amount of features and options Eddie is packed with, and faster connections/disconnections, as OpenVPN3-AirVPN is exceptionally faster than OpenVPN 2 during connection and disconnection phases. Eddie 2.18.9 can be downloaded here: https://airvpn.org/linux - Linux version https://airvpn.org/macos - Mac version https://airvpn.org/windows - Windows version Eddie 2.18.9 is free and open source software released under GPLv3. Source code is available on GitHub: https://github.com/AirVPN/Eddie Eddie 2.18 changelog shows you the massive work behind it and all those implemented changes that remained necessarily not mentioned in this announcement. Complete changelog can be found here. Kind regards & datalove AirVPN Staff Version 2.18.9 (Thu, 02 Apr 2020 12:14:10 +0000) [add] - Windows - Added DotNet 4.5 check & install in Installer edition [bugfix] - Linux - Resolved an elevation issue in some Linux distribution (Raspbian mainly) [bugfix] - Fixed a bug that intermittently ignores --connect Version 2.18.8 (Thu, 26 Mar 2020 12:59:48 +0000) [bugfix] Windows - Support of OpenVPN2.5 tech-preview (also with new wintun driver) [bugfix] MacOS - -mmacosx-version-min=10.9 on all binary [bugfix] Service reinstalls automatically when version-incompatibility detected [change] Code cleanup for stable release [change] Enforcement of operation allowed by Elevation [change] Enforcement of service checking [change] Windows - Elevated converted from C# to C++ [change] Little score adjustment in UI [change] Better feedback in CLI edition (mainly latency check steps) [new] Linux - enabled CLI-only packages in all editions [change] Minor changes Version 2.18.7 (Wed, 29 Jan 2020 13:54:35 +0000) [bugfix] - Update notification for beta versions [bugfix] - Windows - Message when driver installation is denied [bugfix] - macOS - Fix of error "hummingbird not allowed: Not owned by root". [bugfix] - Linux - Fix of error "Client not allowed: [...] parent process (spot mode)", CLI edition with sudo [bugfix] - Fix of error "Failed to connect to ... port 89: Connection refused" when using Hummingbird in SSL/SSH mode [bugfix] - Better exception management to avoid some crash (especially when related to Mono) [bugfix] - Linux - Arch deployment and AUR management [bugfix] - Tor Cookie/Password detection in every supported OS [bugfix] - Updated 'curl' binary in Windows and CA file [change] - macOS - Minor info.plist update in CLI edition [change] - Windows/Linux - OpenVPN Management skip [change] - In 'Latency mode', now load and users have minor impact on score. Version 2.18.6 (Fri, 17 Jan 2020 13:46:48 +0000) [change] Bug fixes and code cleanup [change] OpenVPN 2.4.8 [change] Windows - Tap driver (Win7-Win10) upgraded from 9.23.3-i601 to 9.24.2-i601 [new] New option 'Skip promotional messages'. [change] macOS - New menubar icons [bugfix] macOS - 'Rules not loaded' in some environment [change] Hummingbird integration (experimental) Version 2.18.5 (Wed, 30 Oct 2019 15:03:32 +0000) [new] Linux - systemd service [change] Code cleanup for stable release [bugfix] Windows - Service installation issue in Windows 7 [bugfix] Windows - SSL connections [bugfix] Suppression of some unwanted elevated log [bugfix] Windows bug 'Do you want to reset Eddie to default settings?' [bugfix] Fix for occasional error on exit, 'Object reference not set to an instance of an object'. Version 2.18.4 (Wed, 02 Oct 2019 18:20:00 +0000) [bugfix] OpenVPN > Error: Not supported OpenVPN config [bugfix] Linux - Crash "Unexpected crash of elevated helper:Elevated communication closed" during IPv6 block, if IPv6 not available [bugfix] macOS - Autorestart service if upgraded, avoid error "unknown command" [bugfix] Enforce Elevated compatibility check [change] macOS - KeepAlive in launchd [change] Minor changes [new] New deploy/build scripts Version 2.18.3 (Fri, 27 Sep 2019 11:07:42 +0000) [change] Switched 'ping' method in Linux and macOS [change] Code cleanup [change] macOS - Direct invocation with AuthorizationExecuteWithPrivileges for superuser privileges [change] Linux - "Minimize to tray" false by default [change] Linux - Mono, Portable and AppImage editions [change] Minor UI improvements [change] Better log of issues [change] Better log of dns flush actions [bugfix] Linux - Icon and Window glitch in KDE [bugfix] macOS - SSH connection [bugfix] macOS - Show/Hide Main Window issues [bugfix] OS Keyring conflicts with multiple profiles [bugfix] Linux - Raspberry, ARMHF build, fixed issue 'file_getasroot' [bugfix] Linux - Fixed a fatal crash with some UI tray icon issues [bugfix] Linux - Detect and use iptables-legacy (nft transition) [bugfix] Linux - Fixed a SSL connection issue (related to error 'Cannot create pid file') [bugfix] Parser of OpenVPN version [new] Linux - WM_CLASS registration [new] Linux - New IPv6 block [new] Latency test only about servers in whitelist [deprecated] Option "Remove Default Gateway" (routes.remove_default) removed [deprecated] Windows - Option "Switch DHCP to Static" (windows.dhcp_disable) removed Version 2.18.2 (Thu, 12 Sep 2019 15:59:45 +0000) [change] Linux - FIxed a Lintian error on some distributions [bugfix] Linux - Netlock issue if IPv6 is disabled via GRUB ('Address family not supported by protocol' error) [bugfix] Linux - Sometimes Eddie doesn't close [bugfix] Linux - Arch issue with elevation, also restored .xz packages [bugfix] Windows - Issues with username with spaces [bugfix] macOS - Dump PF output and file in logs in case of failure [change] macOS - Notifications, better layout with icons [change] Added Boost in Libraries [bugfix] Minor UI changes Version 2.18.1 (Wed, 11 Sep 2019 09:11:31 +0000) [change] Core Engine partially rewritten [new] UI doesn't run as root anymore in every OS [new] Profile data encryption in any OS, either through OS keychain if available or "master" password [bugfix] Linux - DNS resolv.conf issue [change] New formula to compute "best server" [bugfix] Windows - Windows10 SSH [new] No log for inconsistent cipher or keysize directives when used with custom Data Channel cipher [bugfix] Linux - Flush DNS with systemd-resolve [change] Linux - Better performance when netlock is activated at application start [change] Windows - Tun driver updated to 9.23.3 [change] OpenVPN 2.4.7 [change] Removed TOS window. [removed] Linux - resolvconf DNS switch method [removed] Insecure OpenVPN directives [new] binaries run with root privileges must belong to superuser Version 2.17.2 (Sun, 23 Sep 2018 11:55:26 +0000) [bugfix] macOS/Linux - Crash at boot if Network Lock is active Version 2.17.1 (Sat, 22 Sep 2018 13:19:08 +0000) [change] Better Lifebelt Test network report [bugfix] Windows - Recovery issue about routes (slowdown, no security issue) [bugfix] Misc UX fixes [bugfix] IPv6 route check failure with OpenVPN versions older than 2.4 [change] Force usage of .Net Framework >=4 in every Windows OS [bugfix] Improved check of custom directive names [new] New option "netlock.allow_dhcp" true by default [bugfix] Multiple "Bootstrap failed" windows [new] New Eddie version notification [change] Linux - Faster Network lock (build iptables-save format and apply directly) [bugfix] Linux - Flush DNS in some distro [bugfix] Linux - Glitch on black window when minimized in some distro (tested in Ubuntu 18.04) [change] macOS - Better detection of DNS servers in DHCP mode
-
1 pointHello! We inform you that all of our Lithuanian servers are being withdrawn and dismissed. The datacenter provider, Cherry Servers, has just asked for a block of all outbound ports except a few ones they called "standard ports" (sic) to prevent any possible future "copyright infringement" (to be noted: no infringement in the past has ever been proved). It is clearly an unacceptable request for us, and we guess for everyone, and it also reveals the true face of Cherry Servers datacenter as an enemy of the Internet. For us, it's also an option to finally get rid of the last servers still not supporting IPv6. Cherry Servers was one of our last providers still lacking IPv6 support, a fact that should have given us a "head up!" about Cherry Servers poor commitment to providing decent services. We will be actively looking for an alternative datacenter. We will be looking for datacenters where the concept of mere conduit is understood, and IPv6 infrastructure is available. In the meantime keep in mind that we offer several servers in the Baltic region as well as other, nearby countries. Kind regards
-
1 pointSame problem as BengChai above on Win7 32 bit machine from time to time but especially when trying to re-connect after waking up from sleep condition. Seem to have resolved the problem by, in addition to BengChai's suggestion: Preferences > Networking > Layer IPv6 > Outside tunnel Hope this hasn't comprised security/privacy. Assume not if connections are limited to IPv4 only. Any advice gratefully received.
-
1 point
AirVPN Server listed as Tor Exit Node
Jacon reacted to User of AirVPN for a post in a topic
I am going to stop conversing with you as this is a circular conversation and it seems that you would like to be confrontational for no good reason, you keep repeating all these unfounded accusations such as I "snitched" on another user or that I published someone's "personal information". when I did not make any mention of any other user or users at all and the only "information" mentioned was the servers which were being used as tor nodes. Please do show me exactly how I have "snitched" on others and exactly whose information I have allegedly publicized. I also find it a bit strange that you keep insisting that I want AirVPN to block any protocol, as I am all for net neutrality and If I wanted block protocols I would use my home internet without VPN, but obviously this is not the case. Lastly I would like to clarify that I never attempted to chase after or identify anyone running these servers , nor do I wish to, ,just listed the VPN servers affected so other users can be aware. I have no ill will towards anyone at all because of what protocols they are using, and no desire for protocols to be censored/blocked, if that is what you got from my post then you have misunderstood it. The most anyone can ask is for the operators of the exits in question to be informed about the effects of running them . Anyway, unless you would like to say something constructive, I'm going to leave you to it. Good day, sir