Jump to content
Not connected, Your IP: 3.236.122.9

Leaderboard


Popular Content

Showing content with the highest reputation since 04/18/21 in Posts

  1. 6 points
    I am getting the exact same error. Probably everyone else does as well as the SSL certificate seems to be invalid.
  2. 5 points
    Eddie V2.20.0 suddenly won't connect using Windows 10, 20H2. It starts to connect, then disconnects, then restarts again - all in a continuous loop. Any ideas on a solution? Thanks.
  3. 4 points
    Reporting this issue as this started today, I get this on three different machines, 2x running 2.20.0, 1x running 2.19.7: AirVPN goes into an endless connect/cancel/re-connect loop, logs state: "Fetch url error:SSL peer certificate or SSH remote key was not OK" Already rebooted modem and router, flushed DNS on all machines, re-installed Eddie, reset Win firewall....did not help. The only way to get AirVPN to connect is to uncheck "Check if the VPN tunnel works" and "Check Air VPN DNS" (and still use Network lock)... Is this a known issue ? Thanks.
  4. 2 points
    I'm not the expert here, but jumping in anyway... It's not frequent. I've watched the US servers for a year and a half or so, and I think I've seen one retirement. It caused some squawking from users who were using it as their all-the-time server. I believe I also remember Air bailing out of France awhile back over adverse changes to the legal/privacy privacy. My impression is that retirement is more likely to be over serious datacenter issues or the legal environment deteriorating re privacy and not just because usage is down. Enough users choose the load-balancing domains like us3.vpn.airdns.org to keep all servers reasonably busy. And server removal is announced weeks ahead of time here on the website. If you want to experience frequent arbitrary server removal with no notice though, there's always NordVPN. I've seen a list of two dozen working servers become a list of no working servers in under two years, all done silently.
  5. 2 points
    From Staff: "We have been informed that It is currently disabled for a malfunction, it will be re-enabled as soon as a certain bug has been resolved."
  6. 2 points
    gamuza

    Stuck with "Checking IPv4"

    Hi, I just downloaded the program, but when I choose a server it gets stuck in "checking IPv4." These are the logs. Anybody knows how to fix this? Thanks! ! 2021.04.22 18:59:19 - Connecting to Libra (United States of America, Atlanta, Georgia) . 2021.04.22 18:59:20 - OpenVPN > OpenVPN 2.5.1 x86_64-apple-darwin19.5.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Mar 9 2021 . 2021.04.22 18:59:20 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2021.04.22 18:59:20 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.04.22 18:59:20 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.04.22 18:59:20 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.04.22 18:59:20 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.04.22 18:59:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.69:443 . 2021.04.22 18:59:20 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144] . 2021.04.22 18:59:20 - OpenVPN > UDP link local: (not bound) . 2021.04.22 18:59:20 - OpenVPN > UDP link remote: [AF_INET]64.42.179.69:443 . 2021.04.22 18:59:20 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.69:443, sid=6acc667d 9ca89c94 . 2021.04.22 18:59:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2021.04.22 18:59:20 - OpenVPN > VERIFY KU OK . 2021.04.22 18:59:20 - OpenVPN > Validating certificate extended key usage . 2021.04.22 18:59:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.04.22 18:59:20 - OpenVPN > VERIFY EKU OK . 2021.04.22 18:59:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Libra, emailAddress=info@airvpn.org . 2021.04.22 18:59:20 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.04.22 18:59:20 - OpenVPN > [Libra] Peer Connection Initiated with [AF_INET]64.42.179.69:443 . 2021.04.22 18:59:20 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2021.04.22 18:59:20 - OpenVPN > route: writing to routing socket: File exists . 2021.04.22 18:59:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.23.14.1,dhcp-option DNS6 fde6:7a:7d20:130e::1,tun-ipv6,route-gateway 10.23.14.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:130e::10d2/64 fde6:7a:7d20:130e::1,ifconfig 10.23.14.212 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2021.04.22 18:59:20 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2021.04.22 18:59:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2021.04.22 18:59:20 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2021.04.22 18:59:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2021.04.22 18:59:20 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.04.22 18:59:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2021.04.22 18:59:20 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.04.22 18:59:20 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.04.22 18:59:20 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.04.22 18:59:20 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.04.22 18:59:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.04.22 18:59:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.04.22 18:59:20 - OpenVPN > ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=en0 HWADDR=a4:83:e7:1f:e8:90 . 2021.04.22 18:59:20 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2021.04.22 18:59:20 - OpenVPN > ROUTE6_GATEWAY fe80::5ab1:fff:fe6c:586e IFACE=en0 . 2021.04.22 18:59:20 - OpenVPN > Opened utun device utun4 . 2021.04.22 18:59:20 - OpenVPN > /sbin/ifconfig utun4 delete . 2021.04.22 18:59:20 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2021.04.22 18:59:20 - OpenVPN > /sbin/ifconfig utun4 10.23.14.212 10.23.14.212 netmask 255.255.255.0 mtu 1500 up . 2021.04.22 18:59:20 - OpenVPN > /sbin/route add -net 10.23.14.0 10.23.14.212 255.255.255.0 . 2021.04.22 18:59:20 - OpenVPN > add net 10.23.14.0: gateway 10.23.14.212 . 2021.04.22 18:59:20 - OpenVPN > /sbin/ifconfig utun4 inet6 fde6:7a:7d20:130e::10d2/64 mtu 1500 up . 2021.04.22 18:59:20 - OpenVPN > add_route_ipv6(fde6:7a:7d20:130e::/64 -> fde6:7a:7d20:130e::10d2 metric 0) dev utun4 . 2021.04.22 18:59:20 - OpenVPN > /sbin/route add -inet6 fde6:7a:7d20:130e:: -prefixlen 64 -iface utun4 . 2021.04.22 18:59:20 - OpenVPN > add net fde6:7a:7d20:130e::: gateway utun4: File exists . 2021.04.22 18:59:20 - OpenVPN > /sbin/route add -net 64.42.179.69 192.168.43.1 255.255.255.255 . 2021.04.22 18:59:20 - OpenVPN > add net 64.42.179.69: gateway 192.168.43.1 . 2021.04.22 18:59:20 - OpenVPN > /sbin/route add -net 0.0.0.0 10.23.14.1 128.0.0.0 . 2021.04.22 18:59:20 - OpenVPN > add net 0.0.0.0: gateway 10.23.14.1 . 2021.04.22 18:59:20 - OpenVPN > /sbin/route add -net 128.0.0.0 10.23.14.1 128.0.0.0 . 2021.04.22 18:59:20 - OpenVPN > add net 128.0.0.0: gateway 10.23.14.1 . 2021.04.22 18:59:20 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:130e::1 metric -1) dev utun4 . 2021.04.22 18:59:20 - OpenVPN > /sbin/route add -inet6 :: -prefixlen 3 -iface utun4 . 2021.04.22 18:59:20 - OpenVPN > add net ::: gateway utun4 . 2021.04.22 18:59:20 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:130e::1 metric -1) dev utun4 . 2021.04.22 18:59:20 - OpenVPN > /sbin/route add -inet6 2000:: -prefixlen 4 -iface utun4 . 2021.04.22 18:59:20 - OpenVPN > add net 2000::: gateway utun4 . 2021.04.22 18:59:20 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:130e::1 metric -1) dev utun4 . 2021.04.22 18:59:20 - OpenVPN > /sbin/route add -inet6 3000:: -prefixlen 4 -iface utun4 . 2021.04.22 18:59:20 - OpenVPN > add net 3000::: gateway utun4 . 2021.04.22 18:59:20 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:130e::1 metric -1) dev utun4 . 2021.04.22 18:59:20 - OpenVPN > /sbin/route add -inet6 fc00:: -prefixlen 7 -iface utun4 . 2021.04.22 18:59:20 - OpenVPN > add net fc00::: gateway utun4 . 2021.04.22 18:59:20 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.23.14.1, fde6:7a:7d20:130e::1) . 2021.04.22 18:59:20 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.23.14.1, fde6:7a:7d20:130e::1) . 2021.04.22 18:59:20 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.23.14.1, fde6:7a:7d20:130e::1) . 2021.04.22 18:59:20 - Routes, added a new route, 64.42.179.67 for gateway 10.23.14.1 . 2021.04.22 18:59:20 - Routes, added a new route, 2605:9f80:6000:81:290c:19de:1964:88cd for gateway fde6:7a:7d20:130e::1 . 2021.04.22 18:59:20 - Flushing DNS . 2021.04.22 18:59:20 - Flush DNS via dscacheutil . 2021.04.22 18:59:20 - Flush DNS via nDNSResponder I 2021.04.22 18:59:20 - Checking route IPv4 . 2021.04.22 19:04:21 - Fetch url error:Timeout was reached . 2021.04.22 19:04:21 - OpenVPN > Initialization Sequence Completed ! 2021.04.22 19:04:21 - Disconnecting . 2021.04.22 19:04:21 - Routes, removed a route previously added, 64.42.179.67 for gateway 10.23.14.1 . 2021.04.22 19:04:21 - Routes, removed a route previously added, 2605:9f80:6000:81:290c:19de:1964:88cd for gateway fde6:7a:7d20:130e::1 . 2021.04.22 19:04:21 - Sending soft termination signal . 2021.04.22 19:04:21 - OpenVPN > event_wait : Interrupted system call (code=4) . 2021.04.22 19:04:21 - OpenVPN > SIGTERM received, sending exit notification to peer . 2021.04.22 19:04:26 - OpenVPN > /sbin/route delete -net 64.42.179.69 192.168.43.1 255.255.255.255 . 2021.04.22 19:04:26 - OpenVPN > delete net 64.42.179.69: gateway 192.168.43.1 . 2021.04.22 19:04:26 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.23.14.1 128.0.0.0 . 2021.04.22 19:04:26 - OpenVPN > delete net 0.0.0.0: gateway 10.23.14.1 . 2021.04.22 19:04:26 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.23.14.1 128.0.0.0 . 2021.04.22 19:04:26 - OpenVPN > delete net 128.0.0.0: gateway 10.23.14.1 . 2021.04.22 19:04:26 - OpenVPN > delete_route_ipv6(::/3) . 2021.04.22 19:04:26 - OpenVPN > /sbin/route delete -inet6 :: -prefixlen 3 -iface utun4 . 2021.04.22 19:04:26 - OpenVPN > delete net ::: gateway utun4 . 2021.04.22 19:04:26 - OpenVPN > delete_route_ipv6(2000::/4) . 2021.04.22 19:04:26 - OpenVPN > /sbin/route delete -inet6 2000:: -prefixlen 4 -iface utun4 . 2021.04.22 19:04:26 - OpenVPN > delete net 2000::: gateway utun4 . 2021.04.22 19:04:26 - OpenVPN > delete_route_ipv6(3000::/4) . 2021.04.22 19:04:26 - OpenVPN > /sbin/route delete -inet6 3000:: -prefixlen 4 -iface utun4 . 2021.04.22 19:04:26 - OpenVPN > delete net 3000::: gateway utun4 . 2021.04.22 19:04:26 - OpenVPN > delete_route_ipv6(fc00::/7) . 2021.04.22 19:04:26 - OpenVPN > /sbin/route delete -inet6 fc00:: -prefixlen 7 -iface utun4 . 2021.04.22 19:04:26 - OpenVPN > delete net fc00::: gateway utun4 . 2021.04.22 19:04:26 - OpenVPN > Closing TUN/TAP interface . 2021.04.22 19:04:26 - OpenVPN > /sbin/route delete -inet6 fde6:7a:7d20:130e::10d2 . 2021.04.22 19:04:26 - OpenVPN > delete host fde6:7a:7d20:130e::10d2 . 2021.04.22 19:04:26 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2021.04.22 19:04:26 - Connection terminated. . 2021.04.22 19:04:26 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic) . 2021.04.22 19:04:26 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic) . 2021.04.22 19:04:26 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic) I 2021.04.22 19:04:26 - Cancel requested. ! 2021.04.22 19:04:26 - Session terminated.
  7. 1 point
    Hi, I have setup a port forward in airpvn client area with one free port listed. So far so good. My openvpn is configured correctly on pfsense 2.5.1 (I can use this tunnel with a vm that get the correct ip from the air vpn tunnel). Now I try ot test the port forward. - Setup a web server that listen on my port forward (this vm can access to airpvn) - Added a nat in pf to allow port forward to this vm's ip - Checked all firewall rules on this opn vpn interface to allow the trafic But any tests I made show that the trafic never reach pfsense.. I try a low level tcpdump on the openvpn interface and never see the trafic on that port. So maybe there is an issue before pfsense... I am wondering if you guys see this kind of issue recently. Thanks for any help or advices.
  8. 1 point
    @Staff Thank you for taking the time to write such a detailed and informative reply. It is much appreciated. I'm unfortunately starting to think that Hummingbird just isn't ready to be used as a drop-in replacement for OpenVPN -- at least on my system. Perhaps that was never your intention and I simply misread the situation. While I am sure it is a perfectly good back-end for Eddie, I am less confident about its capabilities as a standalone VPN client for a number of reasons. First, as you yourself have noted, the profile parser still looks to be "work in progress" that seems not to have been fully tested. Perhaps the OpenVPN 3 developers will get around to fixing the persist-tun problem but the issue as I see it is that you have committed to using OpenVPN 3 code that is arguably not yet ready for production use -- and the OpenVPN devs are probably under little pressure to get things fixed asap. If you are going to have to wait for fixes to arrive from upstream developers, that might not be a comfortable position to be in. I was also a little disappointed to see that up and down scripts are not supported in Hummingbird (or, it would seem, in OpenVPN 3). This is not noted in the documentation. I was also rather surprised to see that the system log shows further OpenVPN directives that are being "unused", including persist-key and auth-nocache, and this behaviour is, once again, undocumented. If you are going to diverge from OpenVPN 2.5 methods of working, which is what most of us will be familiar with, you really do need to highlight the differences more clearly in the documentation. I have reluctantly come to the conclusion that I am not yet ready to use Hummingbird "live". It has some great innovations, such as DNS handling and firewalling, but I believe that a security product needs to be well tested and built on solid foundations. I am not confident that either of these requirements is currently being met. I wish you every success with the future development of your suite of programs and I will no doubt revisit them at some point in the future.
  9. 1 point
    OpenSourcerer

    iPadOS: OpenVPN & iTorrent

    Disable NAT-PMP and UPnP. I think it opened the port on your ISP router. Also disable uTP, it has a tendency to break throughput.
  10. 1 point
    Depends on the systemd config of your distribution. Generally, I'd say it might do the trick, but it's better to check the manual page of systemd.unit beforehand to see if there are special paths for unit files. Does /etc/systemd/system/ exist? If yes, you could use that.
  11. 1 point
    $ sudo pkill -15 openvpn .
  12. 1 point
    Not much changed today. There's also some talk about problems with BT but much less than Virgin. No or very little info about other providers as far as I remember, but do try searching for providers' names around here.
  13. 1 point
  14. 1 point
    $ sudo chown root:root /usr/sbin/nscd There is nothing to fix on Eddie's side. Ah, wait, I see it, you're right. Eddie should instead simply check if it's executable or something.
  15. 1 point
    I'm not sure if it's a dependency issue because it's not exclusive to Debian. Here's a possible workaround, if not solution:
  16. 1 point
    Staff

    Linux: AirVPN Suite 1.1.0 beta available

    @air2157 Hello! We confirm that Hummingbird does not enforce restrictions on profile name and that OpenVPN 3 enforces restriction on the suffix of the file name. We managed to reproduce the issue easily, even when a merge is not requested. The merge.hpp class has been modified very recently (25 days ago) and that might perhaps explain why the problem has never been reported in years. We will seriously consider to remove this limitation. Kind regards
  17. 1 point
    Enabling Network Lock is a choice, that's why.
  18. 1 point
    Staff

    Linux: AirVPN Suite 1.1.0 beta available

    Hello! Acknowledged. The documentation is not only online, it's included in the package too so you can consult it anytime, even if you're offline. Kind regards
  19. 1 point
    Thanks @OpenSourcerer for clarifying this for me
  20. 1 point
    Eddie Preferences > General > Don't ask elevation every run (when checked, installs a systemd service)
  21. 1 point
    The OpenVPN config file, in your case AirVPN_TCP-443-Entry4.ovpn. It's not ideal because OpenVPN will exit with a non-zero return code. If you've got some logic checking if OpenVPN exited cleanly, it will break that. If v6 is disabled anyway, there is no real reason to endure those errors. But it's your choice in the end, OpenVPN will work despite them.
  22. 1 point
    By not requesting IPv6 routes from the server. If you look closely, it only happens if OpenVPN wants to set -6 routes. Your system seems to have no support for that, or you disabled it intentionally. In the config, comment out or delete this line: # UV_IPV6 = yes .
  23. 1 point
    To do the same on macOS you have to generate PF rules and load them. Depends on your tech skills, you can read PF rules from Eddie source code, write it to the file, do small changes and load them via /sbin/pfctl. You can read about how to use pfctl command by running in your terminal: man pfctl You can use AirVPN console client named hummingbird which can do network lock too. Another option is to use third party tools to archive the same goal. For example you can use killswitch or netlock tools which will generate PF rules for you. If you use third party VPN client, like Viscosity or Tunnelblick you have to think about DNS leaks on reconnect. Using configs with server names instead of ips requires to resolve dns name on connection. To mitigate this you can use special dns server to resolve airdns domains. This can be done using dnscrypt-proxy or dnsmasq.
  24. 1 point
    lucky0

    Disabling Network lock outside of Eddie?

    I suppose you have already unlocked your internet connection, as the topic was started in 2020. By the way if anyone will look here, Eddie on macOS uses PF firewall for Network Lock. To disable it, open terminal and run: sudo /sbin/pfctl -d It will disable macOS firewall.
  25. 1 point
    Seems to be fixed on my end, at least for now. I'll keep my fingers crossed.
  26. 1 point
    ria76z

    Ipleak.net shows real ip adress.

    It worked, thank you for your help
  27. 1 point
    We need an API function for this.
  28. 1 point
    colorman

    Linux: AirVPN Suite 1.1.0 beta available

    Yes Bluetit deamon starts with boot. But Goldcrest is not running. (update) Found this? localhost:~ # journalctl | grep bluetit Apr 22 07:31:44 localhost bluetit[2107]: Starting Bluetit - AirVPN OpenVPN 3 Service 1.1.0 RC3 - 16 April 2021 Apr 22 07:31:44 localhost bluetit[2107]: OpenVPN core 3.7 AirVPN linux x86_64 64-bit Apr 22 07:31:44 localhost bluetit[2107]: Copyright (C) 2012-2020 OpenVPN Inc. All rights reserved. Apr 22 07:31:44 localhost systemd[1]: bluetit.service: Control process exited, code=exited status=1 Apr 22 07:31:44 localhost bluetit[2107]: Hummingbird client is running or it did not exit gracefully. Exiting. Apr 22 07:31:44 localhost systemd[1]: bluetit.service: Unit entered failed state. Apr 22 07:31:44 localhost systemd[1]: bluetit.service: Failed with result 'exit-code'. And this... (update) test with Bluetit - AirVPN OpenVPN 3 Service 1.0.0 - 7 January 2021 all fine! * bluetit.service - AirVPN Bluetit Daemon Loaded: loaded (/etc/systemd/system/bluetit.service; enabled; vendor preset: disabled) Active: failed (Result: exit-code) since Thu 2021-04-22 07:31:44 CEST; 38s ago Process: 2107 ExecStart=/sbin/bluetit (code=exited, status=1/FAILURE) Apr 22 07:31:44 localhost systemd[1]: Starting AirVPN Bluetit Daemon... Apr 22 07:31:44 localhost bluetit[2107]: Starting Bluetit - AirVPN OpenVPN 3 Service 1.1.0 RC3 - 16 April 2021 Apr 22 07:31:44 localhost bluetit[2107]: OpenVPN core 3.7 AirVPN linux x86_64 64-bit Apr 22 07:31:44 localhost systemd[1]: bluetit.service: Control process exited, code=exited status=1 Apr 22 07:31:44 localhost systemd[1]: Failed to start AirVPN Bluetit Daemon. Apr 22 07:31:44 localhost systemd[1]: bluetit.service: Unit entered failed state. Apr 22 07:31:44 localhost systemd[1]: bluetit.service: Failed with result 'exit-code'.
  29. 1 point
    Staff

    Linux: AirVPN Suite 1.1.0 beta available

    @colorman Good! Now network lock works with Goldcrest/Bluetit, when you force nftables. Momentarily, do not forget to force it, otherwise network lock will fail. We will be investigating on this bad issue. Correction: it does not work with nftables as well. About Hummingbird, thank you: we see that Hummingbird crashes when it is invoked in that way, as Eddie does, so we have now a track to understand what happens. We'll investigate on it as well, of course. Kind regards
  30. 1 point
    I would rather to keep AirVPN as a underdog because they been consistent with their excellent services. The issues is that when people start to "advertise", the VPN provider will become too popular and will led to subpar quality of services or the resources stretched too thin. This been a case for many VPN providers (NordVPN, ExpressVPN, PIA, etc), truly you can see the effect on NordVPN after their YouTube ad-explosion few years ago. If people naturally come to VPN provider, then it will be easier for the providers to expands their services (or not if VPN providers get greedy). I would rather people to come to AirVPN naturally (like word-of-mouth) than dealing with huge volume of new users daily. This is the reason why I don't advertise AirVPN.
  31. 1 point
    Staff

    Apple Silicon version?

    @c69c7kfrv48fuJ8Re44C Hello! Exactly. Maybe it's worth pointing out even in this thread that we released highly optimized Hummingbird for Apple M1 machines. If you have more than 100 Mbit/s available, you should see around 100% performance boost when compared against OpenVPN. In the download page: https://airvpn.org/macos/hummingbird/ you can clearly identify the Intel and the M1 version. Kind regards
  32. 1 point
    I will never trust Apple as long as I live. That's for many reasons over the years, but just as an example of why I hate them so much now... I have just wiped a Macbook Pro ready to sell it. I made my own bootable USB installer for Catalina. I booted to recovery volume, then formatted the internal SSD, competely wiped clean I then installed Catalina for the next owner. During the setup I decline all the crap, Siri, network setup etc. I actually ticked "this computer does not connect to the internet". Catalina finished installing and loaded up into the fresh account. I then see it wants to install updates. How? It isn't on the internet?! YES IT IS. It has turned on WiFi and connected to my WiFi WITH a very secure password. Now I am thinking, how the F*CK does it know the password to my wifi? Where did it store that info if I formatted the internal drive? What if the new user drove to my house and sat outside, he could F*CKING connect to MY wifi?! Someone blow up Apple, PLEASE!
  33. 1 point
    Staff

    Blocking Apple Processes in Mac OSX

    @OpenSourcerer 1) Sure. That's where the kernel filtering table may save you, while a filtering method based on the API itself can't. Proof of concept to exploit the NetworkExtension exceptions exist since months it's not FUD. Of course future research might find even newer methods and Apple decision to cancel those exceptions might even be related to security considerations, more than customer's respect. But even without those possible exploits, the behavior has been highly criticized by many Apple customers and is rightly seen as not acceptable.. 2) Yes, it was a very risky move by Apple, and no surprise they have moved away from that after a few months. On top of that you need to consider all the other 50 apps which may expose your real IP address involuntarily to the other end, not necessarily Apple, which is always a very bad thing The expansion of the attack surface with such a decision was remarkably high. Kind regards
  34. 1 point
    If you cannot verify using signatures (like GPG; preferred!), you can use two external sources for a verification that the published hash sums have remained the same or are the same as the ones you see: archive.org offers a historical lookup for the page search engine caches offer you a second perspective of the page
  35. 1 point
    @foDkc4UySz Hello! Your memory does not fail. At that time, the infamous "anti-encryption" framework was not law in Australia. Later on, the "anti-encryption" laws were enforced. It is currently the main problem in Australia which prevents us from operating VPN servers there (we operate only geo-routing ones). Kind regards
  36. 1 point
    I have paid twice to renew my subscription and on each occasion it remains pending, the first time was two a day wait, so I cancelled the payment. I have used two different cards. Is there some issue with the payment system, I have been using AirVPN for years now and never had a problem before.
  37. 1 point
    One point where you can eliminate your concerns would be to add the AirVpn signing key. Then using apt-get to always do your updates (even automatically by the way) your updates MUST match the needed signature to be used. Nobody can replicate that process unless they have the private key and the password to it. Its the way to go. Easy and most secure way to do it. I like easy and fast, but combine that with fully secure and its a keeper!
  38. 1 point
    I have been researching privacy stuff for years. Yes I saw a few of Knudsen's videos, pretty good basic round up especially for beginners. But there is SO much more Apple does now which he (and nobody else) covers. I honestly dont think many people realise just how sneaky Apple are being lately. In a word, BASTARDS.
  39. 1 point
    Heads up: Last I heard, Apple robbed the system interfaces Little Snitch uses of its teeth. Some Apple services, including telemetry, are unblockable with this on Big Sur and up.
  40. 1 point
    Newest I could find off the cuff https://www.vpnuniversity.com/routers/use-selectivepolicy-routing-kill-switch-asuswrt-merlin
  41. 1 point
    OpenSourcerer

    Wireguard

    I can confirm it is coming. Even though wg matured a bit, it's still got technical and privacy caveats Staff will make very clear when the first experimental servers hit the scene. However, I cannot say when. Stay tuned for more info on the Announcements forum.
  42. 1 point
    MOS6581

    Need servers in Northwest USA

    Hello, I wanted to offer my suggestion of potentially adding at least 2 servers to the northwest area of the United States, such as Seattle, Boise (which is a good center of the northwest), Las Vegas, or some other cities. I know that a few other VPN services offer servers in both Seattle and Las Vegas, and it would greatly benefit those of us in this area. Thank you
  43. 1 point
    YLwpLUbcf77U

    Need servers in Northwest USA

    Sorry to bump an old thread, but is there any update to this? Pacific Northwest USA (Seattle and Portland in particular) would be ideal places for AirVPN to add a new server or three. I'm aware of the Vancouver servers, but having a US IP address from that region would be useful.
  44. 1 point
    MOS6581

    Need servers in Northwest USA

    Whats wrong with the servers in California and Texas? Ping should only be 40-80ms there. Most days, yeah it's not too bad from California, but it's still not as good as it could be from Las Vegas, Portland, Boise, or Seattle, especially if you're someone who lives far in the northwest (like IN Seattle). All I'm saying is that perhaps it would be a good, viable option for them and their customers.
  45. 1 point
    greenclaydog

    Need servers in Northwest USA

    Whats wrong with the servers in California and Texas? Ping should only be 40-80ms there.
  46. 1 point
    baneofthesith

    Withdrawal announcement: Crucis

    Sorry to hear that some people are using this service to trick others give them a few bucks ... It is a pitty because it affects all of us who just want to protect a bit our privacy, skip geolocation and download some copyrighted material. Anyway hope they do not put in a lot of trouble because we appreciate what you are doing and you are by far the best on market!
  47. 1 point
    Staff

    Routing ALL Traffic through AirVPN

    Hello! Thank you for your subscription! The pushed routing table and default gateway by our OpenVPN servers force all the client traffic to be tunneled. The only way to escape this behavior are programs that take control of the system with administrator (root) privileges and bind to the "wrong" interface. Does your MMO game client pretends to run with high privileges? You can check the traffic flowing in your machine with programs like Wireshark (very powerful) or the network activity monitor (a limited tool, but good for your purpose) of the Comodo firewall. If you find that your game client takes control of your system and overrides your system routing table you might try to force it to bind to the TUN adapter (in Windows TAP-Win32 Adapter V9...) with this code/DLL injector: http://www.r1ch.net/stuff/forcebindip In general, programs which behave in that way should be considered near to malware (overriding a system routing table without the system owner explicit authorization may be a very dangerous operation in a lot of countries and anyway it is an unacceptable violation of the system security) and customers of such programs, in our opinion, should contact the software house and pretend that the problem is solved. Kind regards
×
×
  • Create New...