Leaderboard
Popular Content
Showing content with the highest reputation on 01/07/24 in all areas
-
1 pointHello! We're very glad to inform you that a new 10 Gbit/s (full duplex) server located in Los Angeles (California, USA) is available: Saclateni. Saclateni supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server. You can check the status as usual in our real time servers monitor: https://airvpn.org/servers/Saclateni Do not hesitate to contact us for any information or issue. Kind regards and datalove
-
1 pointHello! The Kaspersky VPN interface causes a critical error to OpenVPN: To solve the problem please set Eddie to ignore any alien interface: Select from Eddie's main window Preferences > Networking, write eddie in the "VPN interface name" field click Save. You may also consider to switch to WireGuard to bypass the alien interface. You can do it in Preferences > Protocols window. Uncheck Automatic, select a WireGuard connection mode and click Save. Kind regards
-
1 pointHello, we're glad to inform you that we will be launching a 3 Gbit/s full duplex guaranteed (on a 10 Gbit/s port, burstable) server in North Carolina around mid-January, please stay tuned. Additional expansions in Florida and Georgia will be under discussion later on, as usual according to bandwidth demand. Meanwhile, expansion on the other side of the USA (California) is ongoing: after the recent 10 Gbit/s addition in Los Angeles, two more 3 Gbit/s servers (burstable to 10 Gbit/s) are expected in San Jose for mid-January. They will replace the current three 1 Gbit/s servers in California marked with "Imminent withdrawal". Kind regards
-
1 pointReaaly? Yeah no. Mullvad currently has all western US IPs blacklisted in on form or another. A lot of sites have been recently refusing them, like reddit.
-
1 pointHello! It's indeed a dubious solution which we can bet wouldn't work. The other class of servers should monitor and log the traffic to promptly ban users (and report them to police, if strictly necessary under specific circumstances) at each complaint, and keep IP addresses "clean" . This is exactly what your ISP already does, so in this case why should anyone rely on a VPN instead of his/her own ISP or some other VPN service which already logs and monitors traffic? Furthermore, there are indeed black lists aimed at exclusively blocking VPN, Tor and anonymous proxy addresses. Logging and monitoring would not resolve the problem you report at all in all those cases (and they are many) for which a service wants to block VPN and Tor unconditionally, no matter how "clean" an IP address is. Why? With a clear a mission and terms of service we think that the whole service is more transparent and honest, so that anyone can make an informed decision. A real problem would be the opposite, i.e. stating a mission and a contractual agreement and then surreptitiously or not break them. Kind regards
-
1 point
-
1 pointHello! Thank you very much. Sabik, Merope and Alkes IP addresses are already located in Los Angeles, in the IANA / ARIN databases, so any geo-location database which reports otherwise is poorly maintained. However, we have decided (breaking news 🙂 ) that those servers will be withdrawn in early 2024 and replaced by more powerful hardware in the LA area (please follow the "News" forum in the next weeks). Kind regards
-
1 point
New 10 Gbit/s server available (US)
Tubular reacted to cabbage_fork for a post in a topic
Been wanting a 10 Gbps server that's close to me for the longest time. This feels like an early Christmas present. Thank you AirVPN staff - this is amazing! -
1 point
New 10 Gbit/s server available (US)
Tubular reacted to Firebolt059 for a post in a topic
This is great! Keep up the good work! -
1 pointOK, I was in contact with AirVPN support who were asking for the version of OpenVPN (it's 2.5.8 in DSM 7.2) and also for the OpenVPN log. I couldn't find it and, while googling the subject, came across a post by someone having similar problems with a different VPN provider. This worked for me: - Go to the config generator - Select Router - Don't click on Advanced, just select UDP 443 (I believe that's selected by default) - Select your server/country/whatever you like - Generate the ovpn file In DSM: - Create a VPN profile - Give it a name - Enter your AirVPN credentials - Select the ovpn file you just generated - Click the checkboxes in the next screen - Click Connect and it should connect... worked here anyway. This had been driving me nuts for a few hours. I even tried another VPN (free trial) which didn't work, so I was really wondering if the server's VPN module was broken!
-
1 pointHello! The main reason of complaints and black list presence of IP addresses are attacks via HTTP(S) and spam mails. A server with blocked outbound ports 80 and 443 blocked would be avoided by anyone, we think, while we might consider to block outbound ports 465 and 587 (outbound port 25 is already blocked on all servers) and renounce to our fight to defend net neutrality. This will require however a mission as well as Terms of Service modification, as noted by @OpenSourcerer , so it's not a viable solution for the current management administration and the contracts with our current users. Out there you can already find tons of VPNs which violate net neutrality by inspecting your traffic and blocking (or shaping) applications, protocols and ports. Or you can just use your own ISP. The peculiarity of AirVPN is that it doesn't enforce that rubbish.. If one asks for traffic inspection, ports blocking and so on and so forth to get a "cleaner" IP address, then he/she probably "deserves" a pervasive surveillance and must take into account that his/her personal information and his/her behavior will be sooner or later used against him/her, as it already happened to millions and millions of people around the world in the last years. Kind regards
-
1 point
AirVPN Servers blacklisted
Tubular reacted to OpenSourcerer for a post in a topic
The moment this happens is the moment half of AirVPN's users lose trust in the provider. -
1 point
AirVPN Servers blacklisted
Tubular reacted to OpenSourcerer for a post in a topic
IPLeak once checked with some Tor server lists if the server one is connected to is on it, but I don't see that feature any more. Probably removed because it was "laggy", so to speak. Thing is: Those lists are maintained by people other than those associated with AirVPN. So AirVPN cannot exhaustively know if a server is on a list or not. You could have some luck with list providers offering an API for automated checks, building a little application around it, but to my knowledge there is no such thing (it might exist, maybe even as a FLOSS project, but probably discontinued… dunno).