Leaderboard
Popular Content
Showing content with the highest reputation on 08/08/23 in all areas
-
1 point
[Feature Request] Per City load balancing
Ytvgxedetxtrdt reacted to eStolkYw for a post in a topic
I propose to add an additional option to generate a config file per City (https://airvpn.org/generator/) that will connect to the most optimal server for that city based on server load. This would work similar to how when you connect via Country or Continent. What I mean is when generating config files (https://airvpn.org/generator/) you can only select the specific servers for each city, rather than selecting just the city itself. The problem with connecting via Country or Continent is it will often connect you to a less than optimal server relative to your location. For example, Chicago based connections might be connected to Florida etc. which ultimately leads to connections with bad latency and lower speeds. -
1 point
Will We See More 10 Gigabit Servers in the US Soon?
ScanFarer reacted to go558a83nk for a post in a topic
Yeah, in the last few months (since other VPN providers stopped providing port forwarding) the usage of the Dallas servers has gone from negligible to huge. They certainly could use some attention. P.S. if you look at Dallas server usage don't trust the "bar" of bandwidth used. Go into the server page and look at the daily usage charts. For some reason the Dallas servers often report incorrect instantaneous usage. -
1 point
Gudja already on the blocklists
SurprisedItWorks reacted to OpenSourcerer for a post in a topic
Everyone calm down for a moment. I am in agreement with your points, but not with the way they are conveyed. This forum is a warning medium for others to chime in and provide possible workarounds should they find any. In some cases, there is simply no answer, but under no circumstances are we to bash people. The reaction you got is totally warranted. I am in agreement with your points as well, but also not with the way they are conveyed. Sassy reactions do not help, though I acknowledge that the other side inspired them more or less. Your warnings are appreciated, please do not refrain from posting. I'd say you retract that statement and apologize. The warnings posted in this forum are appreciated, and they are in fact here for others to chime in and provide workarounds, as stated above. -
1 point
Eddie android client on f-droid
nexsteppe reacted to OpenSourcerer for a post in a topic
It'd probably be interesting if airvpn.org/android/eddie/repo/ (or eddie.website/android/repo or something) pointed to an F-Droid-compatible repository. You could also automate deployment from GitLab (see link 2) and increase "trust" with official signatures (link 3) and builds being reproducible (link 4). Installation Nightly builds Signing Reproducible builds The repo I once hosted was a basic one built with fdroidserver (link 1), but the APKs there were simply official APKs enriched with some F-Droid metadata and manually dumped onto some webspace. -
1 point1/ 10G servers. What is this 2009..? Nearly all your servers should be 10G by now. I can't get more than 400-600Mbit from the least loaded severs. 2/ The WireGuard files names are *horrible*. WireGuard .conf files should conform to linux interface naming specs as best practice is to name the tunnel interface after the .conf file name. air-{2 digit country code}-{2 or 3 digit region code}{number}.conf example: air-us-va4.conf DONE 3/ WireGuard conf download should just give me every server config as a zip file. I can pick which one later. These are all basic table stakes best practices that many competitors(Mullvad, iVPN, etd) have had for years. 4/ The port forwarding setup is pretty good. Really no complaints there. Overall I give AirVPN D+ or C- (Honestly if not for port forwarding there would be no reason at all to choose AirVPN over its competitors)
-
1 point@galbeedee Thank you for your review! We would like to point out some features of our service that you probably missed according to your review, so that you will be able to use them. You can use per-session WireGuard key, to overcome the questionable design of WireGuard under this respect (WireGuard does not offer dynamic address management at all). It's not very important that your private key is held by you when WireGuard demands that, server side, each public key is linked in files to the VPN IP address and to the public IP address of the client. Therefore, thanks to our design, you are able to use a one session key if necessary. You can renew your key either through the web site or through the API in order to patch this problem. On our side, we actively remove WireGuard entries to public IP addresses when a session is over. We do not understand the link you claim between the key and your browser, feel free to clarify if you wish so. File names of the generated profiles are very descriptive and they reflect community requirements. Community majority currently prefers descriptive file names and wants that the system is not tweaked to accommodate terrible WireGuard design under this respect (WireGuard wants to name the virtual interface with the file name regardless of the system limits). This is an understandable point of view and we will respect it. We will change according to community suggestions. Far from being "best practice", in our opinion, and in the current opinion of the community, that would be the practice to lower a service standard to meet the terrible design of somebody else, something reminding the old, awful but widespread, practice to develop flawed web sites to circumvent Internet Explorer bugs and accommodate its non-W3C compliant dialect. That said, we can of course add some options to make life more comfortable for anyone who should be wearied by the exhausting effort of renaming a set of files. The QR code anyway is already available for Android and iOS (in the Configuration Generator), so you don't need renaming in mobility, just shoot the code from inside wg. This is a key which is necessary when you want an additional encryption layer, and this is a great WireGuard feature. Useful for example in a post-quantum world, when a decent cryptographic algorithm is found (as the wg core has ciphers hard coded by design). Read the WireGuard documentation for more details. Currently pre-shared keys are implemented because a significant part of the community insisted that we got prepared to beat powerful quantum computers, not because we strongly believe that a post-quantum world is imminent. Relevant considerations on the topic can be found here: https://airvpn.org/forums/topic/45608-quantum-computing-and-encryption/?do=findComment&comment=218988 It is anyway considered best practice by various experts to get prepared. Since you mention Mullvad as your opinion of service operating in accordance with best practices, then be informed that pre-shared keys have been recently implemented by them too. We offered this option 13 years ago, well before WireGuard or many other VPN companies even existed. Then they were inspired by our CG. You can pick zip, 7zip, tarball, and compressed tarballs (tar.gz, tar.xz, tar.bz2). You can operate either through the API or web site, as you prefer, to generate and download the package(s) containing the profiles. Note that today the button which would let you select all the servers at once is disabled because of work in progress, but it will be re-enabled very soon. It's a good performance in our infrastructure, but you can improve it (check the top user speed table in the server status page and open a ticket to fine tune WireGuard). About the infrastructure, in 2009 the industry standard was between 20 and 100 Mbit/s, and we are very careful to offer an excellent balance between price and service quality. Since you mention iVPN as an example to follow, please compare AirVPN prices with theirs. Lupus in fabula, the following message by one of our fans reminds us of the consequences of an unwise investment policy. https://airvpn.org/forums/topic/56425-two-new-1-gbits-servers-available-us/?do=findComment&comment=223857 Remember that AirVPN is the only one offering a rigorous no overselling commitment shown by a transparent and verifiable server monitor, that's why most users enjoy higher throughput than with any competitor, and after all we are pleased to see that you are an unsatisfied customer but with 600 Mbit/s throughput and with some requirements for features that are already available. Criticisms help us improve our service, except when required features are already available, as in that case we can't implement them twice. Kind regards
-
1 point
ANSWERED [SOLVED] Qbitorrent not seeding
fivehorizons reacted to OpenSourcerer for a post in a topic
Please state how. You posted because you needed help; I'm sure others will need it in the future, too. -
1 point
Newbie to all of this (torrenting related)
spacejamerzs reacted to Guest for a post in a topic
I can explain very simply with qbittorrent. 1. Launch airvpn, connect to a server (preferably lowest ping, closest to you) 2. Login on airvpn.org, go to client area and then forwarded ports. Forward any port that is available (just choose a random port that is available) 3. Download qbittorrent and install. Launch https://www.qbittorrent.org/download.php 4. In qbittorrent, go to options, connection. Put your forwarded port that was in step 2. Uncheck upnp/nat-pmp 5. In qbittorrent, go to options, advanced. Choose Ethernet 2 (or whatever your tap adapter is, it is usually ethernet 2 if you don't have any other vpn installed) 6. Click OK and restart qbittorrent. 1. You must connect to airvpn before launching qbittorrent and 2. you should see DHT: x nodes go up on the bottom right when you start qbittorrent if everything is normal. 3. The plug picture should turn green once you download things. You can also enable "Execution log" by going to View-->log-->check show on qbittorrent. By doing this, you can check at startup if everything is working by checking the ip address (should show airvpn ip address on log) If you launch qbittorrent without connecting to airvpn first, you will see a bunch of red lines on log which indicates things aren't normal. The rest of the settings on qbittorrent are not vpn related and can be adjusted to your preference. Ex.) connection limits http://infinite-source.de/az/az-calc.html