Jump to content
Not connected, Your IP:


Popular Content

Showing content with the highest reputation since 12/28/19 in Posts

  1. 7 points
    Hello! We inform you that all of our Lithuanian servers are being withdrawn and dismissed. The datacenter provider, Cherry Servers, has just asked for a block of all outbound ports except a few ones they called "standard ports" (sic) to prevent any possible future "copyright infringement" (to be noted: no infringement in the past has ever been proved). It is clearly an unacceptable request for us, and we guess for everyone, and it also reveals the true face of Cherry Servers datacenter as an enemy of the Internet. For us, it's also an option to finally get rid of the last servers still not supporting IPv6. Cherry Servers was one of our last providers still lacking IPv6 support, a fact that should have given us a "head up!" about Cherry Servers poor commitment to providing decent services. We will be actively looking for an alternative datacenter. We will be looking for datacenters where the concept of mere conduit is understood, and IPv6 infrastructure is available. In the meantime keep in mind that we offer several servers in the Baltic region as well as other, nearby countries. Kind regards
  2. 4 points

    New 1 Gbit/s server available (LT)

    Hello! We're very glad to inform you that a new 1 Gbit/s server located in Siauliai (LT) is available: Tarf. The AirVPN client will show automatically the new server; if you use any other OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP. Just like every other "second generation" Air server, Tarf supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/Tarf Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  3. 3 points
    Hello! UPDATE 29-Nov-19: macOS, Linux x86-64 bit and Raspbian beta versions now available. UPDATE 06-Dec-19: beta 2 version has been released UPDATE 10-Dec-19: Release Candidate 1 has been released UPDATE 19-Dec-19: Release Candidate 2 has been released UPDATE 27-Dec-19: version 1.0 has been released UPDATE 24-Jan-20: version 1.0.1 has been released We are very glad to introduce Hummingbird, a new client software for: Linux x86-64 bit Linux Raspbian 32 bit (frequently installed in Raspberry PI) Linux ARM 64 bit (tested under Raspberry 4 Ubuntu 19.10) Mac (minimum required version macOS Mojave) based on our own AirVPN OpenVPN 3 library. The software meets various demands by many users. Furthermore, it will evolve in to an integrated client and daemon targeting Linux, Mac, OpenBSD and FreeBSD platforms. Main features: lightweight and stand alone binary no heavy framework required, no GUI tiny RAM footprint (less than 3 MB currently) lightning fast based on OpenVPN 3 library fork by AirVPN with tons of critical bug fixes from the main branch, new ciphers support and never seen before features ChaCha20-Poly1305 cipher support on both Control and Data Channel providing great performance boost on Raspberry PI and any Linux-based platform not supporting AES-NI. Note: ChaCha20 support for Android had been already implemented in our free and open source Eddie Android edition https://airvpn.org/forums/topic/44201-eddie-android-edition-24-released-chacha20-support/ robust leaks prevention through Network Lock based either on iptables, nftables or pf through automatic detection proper handling of DNS push by VPN servers, working with resolv.conf as well as any operational mode of systemd-resolved additional features Versions for FreeBSD and OpenBSD will follow in the future. Source code is available here: https://gitlab.com/AirVPN/hummingbird In the above repository you can also find binaries, general instructions, usage instructions and build instructions. Linux x86-64 64 bit version: https://eddie.website/repository/hummingbird/1.0.1/hummingbird-linux-x86_64-1.0.1.tar.gz Raspberry 64 bit / Linux ARM 64 bit version: https://eddie.website/repository/hummingbird/1.0.1/hummingbird-linux-aarch64-1.0.1.tar.gz Raspbian 32 bit version: https://eddie.website/repository/hummingbird/1.0.1/hummingbird-linux-armv7l-1.0.1.tar.gz macOS version: https://eddie.website/repository/hummingbird/1.0.1/hummingbird-macos-1.0.1.tar.gz How to install AirVPN client for Linux x86_64, Raspberry and macOS Requirements ------------ Linux x86-64, ARM 32 or ARM 64 bit CPU A reasonably recent Linux distribution tar sha512sum (optional) Raspberry Linux Raspbian distribution or Linux ARM 64 bit distribution tar sha512sum (optional) Mac macOS Mojave or higher version tar shasum (optional) otool (optional) Linux x86-64 Installation ------------------ Download hummingbird-linux-x86_64-1.0.1.tar.gz [optional] Download hummingbird-linux-x86_64-1.0.1.tar.gz.sha512 This file is required to check the integrity of the above tar archive. It is not mandatory but it is strongly advised to download this file and check the tar archive [optional] Open a terminal window [optional] Check the integrity of the tar archive by issuing this command: "sha512sum --check hummingbird-linux-1.0.1-x86_64.tar.gz.sha512" (without quotes) [optional] Make sure the command responds with "hummingbird-linux-x86_64-1.0.1.tar.gz: OK" Change your current directory to a convenient place, such as your home directory. This can be done by issuing the command "cd ~" (without quotes) Extract the tar archive by issuing this command on your terminal window: tar xvf hummingbird-linux-1.0.1.tar.gz A new directory will be created: hummingbird-linux-1.0.1 Move into the new directory with command "cd hummingbird-linux-1.0.1" (without quotes) [optional] Check the integrity of the binary file hummingbird-linux-1.0.1. Issue this command from your terminal window: sha512sum --check hummingbird.sha512" (without quotes) [optional] Make sure the command responds with "hummingbird-linux-1.0.1: OK" [optional] Check dynamic library availability. Issue the command "ldd hummingbird" and make sure all the required dynamic libraries are available. No line of the output must contain "not found" the Linux client is now ready to be used and possibly copied to a different directory of your system. Please note the client needs root privileges. Your user must therefore be included in your system's "sudoers" (depending on specific Linux distribution) Raspberry/Raspbian/Linux ARM 32 bit Installation ------------------------------- Download hummingbird-armv7l-1.0.1.tar.gz [optional] Download hummingbird-linux-armv7l-1.0.1.tar.gz.sha512 This file is required to check the integrity of the above tar archive. It is not mandatory but it is strongly advised to download this file and check the tar archive [optional] Open a terminal window [optional] Check the integrity of the tar archive by issuing this command: "sha512sum --check tar xvf hummingbird-armv7l-1.0.1.tar.gz.sha512" (without quotes) [optional] Make sure the command responds with "hummingbird-armv7l-1.0.1.tar.gz: OK" Change you current directory to a convenient place, such as your home directory. This can be done by issuing the command "cd ~" (without quotes) Extract the tar archive by issuing this command on your terminal window: tar xvf hummingbird-armv7l-1.0.1.tar.gz A new directory will be created: hummingbird-armv7l-1.0.1 Enter the new directory with command "cd hummingbird-armv7l-1.0.1" (without quotes) [optional] Check the integrity of the binary file hummingbird. Issue this command from your terminal window: "sha512sum --check hummingbird.sha512" (without quotes) [optional] Make sure the command responds with "hummingbird: OK" [optional] Check dynamic library availability. Issue the command "ldd hummingbird" and make sure all the required dynamic libraries are available. No line of the output must contain "not found" the Raspberry/Raspbian client is now ready to be used and possibly copied to a different directory of your system. Please note the client needs root privileges. Your user must therefore be included in your system's "sudoers" Raspberry/Linux ARM 64 bit Installation ------------------------------- Download hummingbird-linux-aarch64-1.0.1.tar.gz [optional] Download hummingbird-linux-aarch64-1.0.1.tar.gz.sha512 This file is required to check the integrity of the above tar archive. It is not mandatory but it is strongly advised to download this file and check the tar archive [optional] Open a terminal window [optional] Check the integrity of the tar archive by issuing this command: "sha512sum --check hummingbird-linux-aarch64-1.0.1.tar.gz.sha512" (without quotes) [optional] Make sure the command responds with " hummingbird-linux-aarch64-1.0.1.tar.gz: OK" Change you current directory to a convenient place, such as your home directory. This can be done by issuing the command "cd ~" (without quotes) Extract the tar archive by issuing this command on your terminal window: "tar xvf a hummingbird-linux-aarch64-1.0.1.tar.gz" (without quotes) A new directory will be created: hummingbird-linux-aarch64-1.0.1 Enter the new directory with command "cd hummingbird-linux-aarch64-1.0.1" (without quotes) [optional] Check the integrity of the binary file hummingbird. Issue this command from your terminal window: "sha512sum --check hummingbird.sha512" (without quotes) [optional] Make sure the command responds with "hummingbird: OK" [optional] Check dynamic library availability. Issue the command "ldd hummingbird" and make sure all the required dynamic libraries are available. No line of the output must contain "not found" the Raspberry/Raspbian client is now ready to be used and possibly copied to a different directory of your system. Please note the client needs root privileges. Your user must therefore be included in your system's "sudoers" macOS installation -------------------- Download hummingbird-macos-1.0.1.tar.gz [optional] Download hummingbird-macos-1.0.1.tar.gz.sha512 This file is required to check the integrity of the above tar archive. It is not mandatory but it is strongly advised to download this file and check the tar archive [optional] Open a terminal window [optional] Check the integrity of the tar archive by issuing this command: "shasum -a 512 -c hummingbird-macos-1.0.1.tar.gz.sha512" (without quotes) [optional] Make sure the command responds with "hummingbird-macos-1.0.1.tar.gz: OK" Change your current directory to a convenient place, such as your home directory. This can be done by issuing the command "cd ~" (without quotes) Extract the tar archive by issuing this command on your terminal window: "tar xvf hummingbird-macos-1.0.1.tar.gz" (without quotes) A new directory will be created: hummingbird-macos-1.0.1 Move into the above directory by entering command "cd hummingbird-macos-1.0.1" (without quotes) [optional] Check the integrity of the binary file hummingbird-macos-1.0.1. Issue this command from your terminal window: "shasum -a 512 -c hummingbird.sha512" (without quotes) [optional] Make sure the command responds with "hummingbird: OK" [optional] Check dynamic library availability. Issue the command "otool -L hummingbird" and make sure all the required dynamic libraries are available. No line of the output must contain "not found". "otool" is distributed with Xcode the Mac client is now ready to be used and possibly copied to a different directory of your system. Please note the client needs root privileges. Note on Checksum Files We do strongly suggest you to check the integrity both of the distribution tar.gz file and the hummingbird binary in order to make sure you are installing a binary created and fully supported by AirVPN. Hummingbird is an open source project and, as such, its source code can be downloaded, forked and modified by anyone who wants to create a derivative project or build it on his or her computer. This also means the source code can be tampered or modified in a malicious way, therefore creating a binary version of hummingbird which may act harmfully, destroy or steal your data, redirecting your network traffic and data while pretending to be the "real" hummingbird client genuinely developed and supported by AirVPN. For this reason, we cannot guarantee forked, modified and custom compiled versions of Hummingbird to be compliant to our specifications, development and coding guidelines and style, including our security standards. These projects, of course, may also be better and more efficient than our release, however we cannot guarantee or provide help for the job of others. You are therefore strongly advised to check and verify the checksum codes found in the .sha512 files to exactly correspond to the ones below, that is, the checksum we have computed from the sources and distribution files directly compiled and built by AirVPN. This will make you sure about the origin and authenticity of the hummingbird client. Please note the files contained in the distribution tarballs are created from the very source code available in the master branch of the official hummingbird's repository. Checksum codes for Version 1.0 The checksum codes contained in files hummingbird-<os>-<arch>-1.0.1.tar.gz.sha512 and hummingbird.sha512 must correspond to the codes below in order to prove they are genuinely created and distributed by AirVPN. Linux x86_64 hummingbird-linux-x86_64-1.0.1.tar.gz: f2cbc2acded6335c996271d9e86818a0375f4f46712b9edb7147494038bff48a1e72f666b319790a8250298e437a87dd8173313156da0497529c0eace3924fea hummingbird: bbfb5951a54c1bfd271d7a56ac52a8674a31f295a699698332996c7e49a194974b61526accff0936a7512986c26c92489cd2c0c731999fcb224eaf118bc91a89 Linux ARM32 hummingbird-linux-armv7l-1.0.1.tar.gz: ad5ef28d6904089f474c065ca01dae222e35b2eb999a24de13481f2e4f41228c9fe5c7cb1e623c24b5498339f1c033f7b47717bd3f42e6467f42477129102b88 hummingbird: 3ed0d105a1fece008793575945836d7e2dc38b79698856dfaeb1ffadf871004bf6f8dfd101561322c661df8192a5a8861d39266e89dad2d5db0947cb4d7f675f Linux ARM64 hummingbird-linux-aarch64-1.0.1.tar.gz: 1c1042ae91fac572a3835ee03b97633a597d4f9abfba8c1ef8a65f3dcdae854c9cec254fead542d629e501449d6db44d7450da810328dfc2328ed4784eb8b1f1 hummingbird: af218c2f53d62feead87fc6731e2b8fad4a6f884fe65103045cb3eafc7eb4f63b76737e2d2176c1fbf6647c1fd3ecad95311c4a000117531055c3cf65926516c macOS hummingbird-macos-1.0.1.tar.gz: ecf4c9123fb974561dc4a49676cd4a76c887b74553e380c23f5b879995d4f95c9028c4882a6cce5870c5223dbd2aee1aab39ee06d754774ec708d9050c6ffc23 hummingbird: b389e95c7362290d0349035a018d57d496433ed4d7eab5f6f62e5bb92764615db04c5375362bf8f5c6582ecb775f04d3c4fd261633ab8a1a93b79dccdebe464c Running the Hummingbird Client Run hummingbird and display its help in order to become familiar with its options. From your terminal window issue the following command: sudo ./hummingbird --help After having entered your root account password, hummingbird responds with: Hummingbird - AirVPN OpenVPN 3 Client 1.0 - 27 December 2019 usage: ./hummingbird [options] <config-file> [extra-config-directives...] --help, -h : show this help page --version, -v : show version info --eval, -e : evaluate profile only (standalone) --merge, -m : merge profile into unified format (standalone) --username, -u : username --password, -p : password --response, -r : static response --dc, -D : dynamic challenge/response cookie --cipher, -C : encrypt packets with specific cipher algorithm (alg) --proto, -P : protocol override (udp|tcp) --server, -s : server override --port, -R : port override --ncp-disable, -n : disable negotiable crypto parameters --network-lock, -N : enable/disable network filter and lock (on|off, default on) --gui-version, -E : set custom gui version (text) --ignore-dns-push, -i : ignore DNS push request and use system DNS settings --ipv6, -6 : combined IPv4/IPv6 tunnel (yes|no|default) --timeout, -t : timeout --compress, -c : compression mode (yes|no|asym) --pk-password, -z : private key password --tvm-override, -M : tls-version-min override (disabled, default, tls_1_x) --tcprof-override, -X : tls-cert-profile override (legacy, preferred, etc.) --proxy-host, -y : HTTP proxy hostname/IP --proxy-port, -q : HTTP proxy port --proxy-username, -U : HTTP proxy username --proxy-password, -W : HTTP proxy password --proxy-basic, -B : allow HTTP basic auth --alt-proxy, -A : enable alternative proxy module --dco, -d : enable data channel offload --cache-password, -H : cache password --no-cert, -x : disable client certificate --def-keydir, -k : default key direction ('bi', '0', or '1') --force-aes-cbc, -f : force AES-CBC ciphersuites --ssl-debug : SSL debug level --google-dns, -g : enable Google DNS fallback --auto-sess, -a : request autologin session --auth-retry, -Y : retry connection on auth failure --persist-tun, -j : keep TUN interface open across reconnects --peer-info, -I : peer info key/value list in the form K1=V1,K2=V2,... --gremlin, -G : gremlin info (send_delay_ms, recv_delay_ms, send_drop_prob, recv_drop_prob) --epki-ca : simulate external PKI cert supporting intermediate/root certs --epki-cert : simulate external PKI cert --epki-key : simulate external PKI private key --recover-network : recover network settings after a crash or unexpected exit Open Source Project by AirVPN (https://airvpn.org) Linux and macOS design, development and coding: ProMIND Special thanks to the AirVPN community for the valuable help, support, suggestions and testing. Hummingbird needs a valid OpenVPN profile in order to connect to a server. You can create an OpenVPN profile by using the config generator available at AirVPN website in your account's Client Area Start a connection: sudo ./hummingbird your_openvpn_file.ovpn Stop a connection: Type CTRL+C in the terminal window where hummingbird is running. The client will initiate the disconnection process and will restore your original network settings according to your options. Start a connection with a specific cipher: sudo ./hummingbird --ncp-disable --cipher CHACHA20-POLY1305 your_openvpn_file.ovpn Please note: in order to properly work, the server you are connecting to must support the cipher specified with the --cipher option. If you wish to use CHACHA20-POLY1305 cipher, you can find AirVPN servers supporting it in our real time servers monitor: they are marked in yellow as "Experimental ChaCha20". Disable the network filter and lock: sudo ./hummingbird --network-lock off your_openvpn_file.ovpn Ignore the DNS servers pushed by the VPN server: sudo ./hummingbird --ignore-dns-push your_openvpn_file.ovpn Please note: the above options can be combined together according to their use and function. Network Filter and Lock Hummingbird's network filter and lock natively uses iptables, nftables and pf in order to provide a "best effort leak prevention". Hummingbird will automatically detect and use the infrastructure available on your system. Please note: Linux services firewalld and ufw may interfere with the hummingbird's network filter and lock and you are strongly advised to not issue any firewall related command while the VPN connection is active. DNS Management in Linux Hummingbird currently supports both resolv.conf and systemd-resolved service. It is also aware of Network Manager, in case it is running. While the client is running, you are strongly advised to not issue any resolved related command (such as resolvectl) or change the resolv.conf file in order to make sure the system properly uses DNS pushed by the VPN server. Please note: DNS system settings are not changed in case the client has been started with --ignore-dns-push. In this specific case, the connection will use your system's DNS. Furthermore, please note that if your network interfaces are managed by Network Manager, DNS settings might be changed under peculiar circumstances during a VPN connection, even when DNS push had been previously accepted. DNS Management in macOS DNS setting and management is done through OpenVPN3 native support Recover Your Network Settings In case hummingbird crashes or it is killed by the user (i.e. kill -9 `pidof hummingbird` ) as well as in case of system reboot while the connection is active, the system will keep and use all the network settings determined by the client; therefore, your network connection will not work as expected, every connection is refused and the system will seem to be "network locked". To restore and recover your system network, you can use the client with the --recover-network option. sudo ./hummingbird --recover-network Please note: in case of crash or unexpected exit, when you subsequently run hummingbird it will warn you about the unexpected exit and will require you to run it again with the --recover-network option. It will also refuse to start any connection until the network has been properly restored and recovered. Changelog -------- Changelog.txt URL: https://gitlab.com/AirVPN/hummingbird/blob/master/Changelog.txt Changelog 1.0.1 - 24 January 2020 - [ProMIND] Updated to OpenVPN3-AirVPN 3.6.2 *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* Changelog 1.0 - 27 December 2019 - [ProMIND] Production release *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* Changelog 1.0 RC2 - 19 December 2019 - [ProMIND] Better management of Linux NetworkManager and systemd-resolved in case they are both running - [ProMIND] Log a warning in case Linux NetworkManager and/or systemd-resolved are running *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* Changelog 1.0 RC1 - 10 December 2019 - [ProMIND] Updated asio dependency *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* Changelog 1.0 beta 2 - 6 December 2019 - [ProMIND] Updated to OpenVPN 3.6.1 AirVPN - [ProMIND] macOS now uses OpenVPN's Tunnel Builder - [ProMIND] Added --ignore-dns-push option for macOS - [ProMIND] Added --recover-network option for macOS *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* Changelog 1.0 beta 1 - 28 November 2019 - [ProMIND] Added a better description for ipv6 option in help page - [ProMIND] --recover-network option now warns the user in case the program has properly exited in its last run - [ProMIND] NetFilter class is now aware of both iptables and iptables-legacy and gives priority to the latter *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* Changelog 1.0 alpha 2 - 7 November 2019 - [ProMIND] DNS resolver has now a better management of IPv6 domains - [ProMIND] DNS resolver has now a better management of multi IP domains - [ProMIND] Minor bug fixes *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-* Changelog 1.0 alpha 1 - 1 November 2019 - [ProMIND] Initial public release Kind regards and datalove AirVPN Staff
  4. 3 points

    TLS keydir direction usage

    @Air4141841 Hello! key-direction 1 when you use TLS Auth key (i.e. you connect to entry-IP addresses 1 and 2). Omit it when you use TLS Crypt (i.e. you connect to entry-IP addresses 3 and 4), because it's not pertaining to TLS Crypt. For an explanation, look for secret file [direction] and –key-direction in the manual https://openvpn.net/community-resources/reference-manual-for-openvpn-2-4/ If you run OpenVPN 2.4 or higher version, TLS Crypt is recommended because it encrypts the whole Control Channel, with the important side effect to make OpenVPN "fingerprint" not detectable by Deep Packet Inspection (some ISPs, when they detect OpenVPN "fingerprint", enforce traffic shaping). Kind regards
  5. 3 points
    @inc Hello! A GUI is planned, when the Hummingbird "backend" will run as a daemon. We are already working on it, right now. At the moment you can see the information you need on the standard output, and rightly so! Hummingbird 1 "branch" must remain a light and stand alone binary with no graphic requirement of any kind. If you need a GUI at the moment please run Eddie. The problem you mention looks like a failure to DHE. Do you notice a similar problem with OpenVPN 2.x or not? Kind regards
  6. 3 points
    You may well know that it's a DDoS protection mechanism. You may also be as far as knowing that aek_v is version (currently 14, as seen in your screenshot; your blur is ineffective, I'm afraid) and aek_url is where to redirect the browser after a successful check. Now, the /entry webpage has some JavaScript code there which I didn't read too closely. But it suggests that the browser is to run some calculations, the result of which will be checked against what the server calculated. The aek_id might identify the calculation on the server against which the result of the browser is checked. If they match, you may pass. I assume this checks whether JavaScript runs and whether it runs correctly (as in, it's not a dummy/stub) on the client. DDoS against web servers is usually not done by normal browsers but by automated programs mimicking them. As such, they don't usually run JavaScript. So those bots keep attacking the shell of a clam (that checking server) and the pearl inside is safe (AirVPN forums). Edit: I found a related Stack Exchange question about CloudFront's protection mechanism (the infamous Checking your browser, you will be redirected in five seconds page).
  7. 3 points
    Hello! NEWS We have a name for the software! Stable version of Hummingbird has just been released! Please check the first post in this thread for updated links, instructions and changelog. Kind regards
  8. 2 points

    Hummingbird 1.0.1 released

    @Staff After doing a fair amount of investigation and research into iptables and nftables I found that my iptables in use only covered a default basic firewall setting without any additions that would hopefully not cause a problem to any programmes or system settings if removed. I read up on converting iptables to nftables, did so, deleted iptables, and started using nftables. I can now use hummingbird with network lock working correctly. As a result of these changes there are no entries in the log anymore showing any problems with IPv6 . I am grateful of your explanations and help p.s I would not have made these changes and alterations without a decent backup programme in place to use if all went 'pear-shaped' I recommend for linux : https://github.com/teejee2008/timeshift
  9. 2 points

    Address info

    please note the IP address is NOT
  10. 2 points

    airvpn.org censored

    @tlc Hello! Look: $ dig @ airvpn.org +short $ dig @ airvpn.org +short which is correct. However considers airvpn.org an adult only web site or a porn site. Just another proof of how idiotic censorship is, how web site filtering is exploited by hidden political agenda eventually, and how stupid the persons who gladly look for censorship and delegate their choices to a third party are. Kind regards
  11. 2 points
    No more problems shutting it down. It starts without needing to enter your admin password. It connects to servers quickly (with previous the experimental version I was using, I had to wait 15 to 30s after the network lock activated before it would connect to a server). I've had no problems at all with it after using it a few weeks.
  12. 2 points
    @hawkflights Hello! Can you please tell us your exact Linux distribution version? @colorman Hello! TLS Crypt encrypts the whole OpenVPN Control Channel. Therefore DPI can't detect anymore any typical OpenVPN "fingerprint", thus can't trigger traffic shaping against OpenVPN, or similar. TLS Crypt in an agnostic network does not improve or affect negatively performance, as most of the time is spent on encryption and decryption of the Data Channel. Therefore, if you experience a better throughput with TLS crypt, a plausible explanation is that your ISP enforces traffic shaping. @inc Hello! Should the re-keying errors re-appear, can you tell us your exact Linux distribution version? @funkoholic Hello! Connection over Tor is not planned for the next major release, which is focused on creating an Hummingbird daemon and two different frontends, one of them in Qt, without adding major new features at least for the first release cycle. Connection over Tor is a special case of the more general connection over a SOCKS proxy, with the addition of communications with Tor to obtain the Tor entry-node IP address and route it outside the VPN, preventing the infinite routing loop problem. Hence, we need to review the code of the library pertaining to connections over a proxy, which we did not touch. Kind regards
  13. 2 points
    There is one thing you absolutely need to do: Bind qBittorrent to your TAP adapter! In Advanced section, look for a "Bind to interface" setting and select the TAP adapter from the drop-down menu when you're connected. This causes qBittorrent to only use the TAP adapter when talking to the outside world, and if that adapter is not in a connected state it won't be able to talk. Easy. It's like a kill switch: If the connection dies, all connections of qB die. If you reconnect, qB will reconnect to peers. In Speed section, set your max upload to whatever your uplink is you're subscribed to, -10%. The "problem" you might be facing is that a connection between computers is a two-way street. When you're downloading packets, you're also sending packets back which ACKnowledge that you received the package. As your download throughput increases, so does the amount of ACKs sent back. Plus, if other clients download from you, the bottleneck is perfected. If you carelessly ignore the max upload setting, you allow the torrent client to fill your uplink with packets.
  14. 2 points

    Is AirVPN's fork of OpenVPN safe to use?

    @airdev Hello! Why is a cryptographic "verification" required on OpenVPN 3 library? mbedTLS and OpenSSL libraries are there to play their role. We have not implemented proprietary ciphers or proprietary algorithms to mimic a cipher which would need, indeed, a thorough review. If you need audits on CHACHA20 consult the proper literature. If you need audits on CHACHA20 implementation in mbedTLS and OpenSSL, consult the respective library audits. OpenVPN 3 AirVPN included with Hummingbird is linked against mbedTLS 2.16.3 but you can build it and link it against OpenSSL if you prefer so. Why did nobody ask for audits about CHACHA20 implementation in OpenSSL, as OpenVPN 2.5 has been using it since almost a year and by default it is linked against OpenSSL? AirVPN servers providing CHACHA20 run OpenVPN 2.5. If OpenVPN 3 AirVPN library fork were either unreliable or incomplete it would simply not work with OpenVPN 2.5. But, surprise surprise, it works great. Last but not least, audit yourself. Build it by yourself and monitor everything. nmap is your friend. Wireshark is too. Let's fix some lies and misleading claims. First, OpenVPN 3 linked against updated mbedTLS and OpenSSL libraries went under testing with AirVPN's Eddie Android edition in spring 2018. Second, we forked OpenVPN 3 only after OpenVPN 3 main branch maintainer refused our pull requests. When we pulled a commit request we had already tested extensively the content of the commits. Verify yourself that we forked only after the pull request was refused and note WHY it was refused. Of course, on the basis of the refusal, we did not waste time with them anymore to pull more requests while we fixed more and more bugs and implemented new features. Specifically, CHACHA20 implementation was completed in April 2019 and tested for 3 months before we committed a pull request for it. Thus, when it was integrated into Eddie Android edition, it had been thoroughly tested internally, and then it went into public beta testing, exactly like we routinely do and like the best practices recommend. The public beta testing ended successfully at the end of July 2019. Third, CHACHA20-POLY1305 have both been under heavy scrutiny since 2008 or so. Fourth, mbedTLS and OpenSSL are also audited, and anyway what other library would you suggest to link OpenVPN 3 AirVPN against? No OpenVPN 3 fork supports CHACHA20 as far as we know and OpenVPN 3 main branch does not even run correctly in Linux. Again, build it and see how miserably it fails. Also, OpenVPN 3 is a library, OpenVPN 2 is not. If you want CHACHA20 without OpenVPN AirVPN, you can run OpenVPN 2.5 beta, and renounce to have a C++ library. Or simply use the OpenVPN 3 library main branch and renounce to everything (it will not even run). You will have then the marvelous joy to (not) run the software of the "highest standards" OpenVPN development team, which does not even know that in C you need to initialize data structures. You have no idea how many crashes OpenVPN causes because of that endemic error spread throughout the whole source code. OpenVPN 3 team was unable to implement CHACHA20 in Data Channel after many years of development. They did not resolve 10 years old reported bugs. They systematically ignore / forget to initialize data structures. They use "goto" in C. They still have a non-working version for Linux. We can't waste time with them anymore in commits (which have been all refused anyway) and/or bug fixing. we must fix and implement ourselves, but we'll do our best to keep our fork aligned with (and of course ahead) the main branch within the possible range, see also the loyal sync work with the master performed by fork maintainer. Kind regards
  15. 2 points
    In your qBittorrent settings "Enabled prtotcol" should be only "TCP" and not "TCP and µTP", because using µTP could slow your speeds down. You should also bind qBittorrent to your VPN interface in the "Advanced settings". Then it shouldn't leak your real IP: Provided that you have Eddies' Network Lock enabled, there should be no IP leak. Before starting your torrent client, check your connection with http://ipleak.net Regards BB P.S.: Have you enabled IPv6 in Eddie? You seem to have a Dual - Stack connection, so it is mandatory to enable IPv6 in Eddie. If you don't need IPv6, you can consider disabling it altogether. It really isn't needed for torrents in my opinion. It could furthermore be a security risk if not configured properly in the VPN.
  16. 2 points
    You didn't set a maximum upload throughput value. This should be set to your max upload which is still an unknown after looking at all your content posted here. Next, try setting the max connections value to 100. Then, if you have uTP enabled, disable it. Could be in the Network tab of the settings. Your video reminded me of my own problems with a very narrow uplink of just 450 kbit/s many years ago, which is only 40 kB/s. Such a rekey would also disconnect me. It got better after I got a wider uplink from my provider. To support that, in your last screenshot with your speedtest there seems to be a problem with upload in general. Can you do a speedtest on Ookla, please?
  17. 2 points
    Hello! Thanks for the link. Nice that they talk about it, while it's sad to see that some people "suspect" about something weird when the code is open and a simple diff will tell you everything, even in relation to the bug fixes and new features. If you read our forum you already know why the major changes and critical bug fixes are not in the main branch: AirVPN commits have been refused with pathetic motivations which have NEVER been technical reasons. Arne Schwabe even talked about coding standards when the code he (or OpenVPN 3 maintainers) approved previously is infested by "goto" (!!!), "break", wrong indentations and totally crazy stuff, while AirVPN code is very elegant even according to the Art of Computer Programming books. Therefore, now OpenVPN 3 library is bugged, obsolete, without CHACHA20 support and unusable in Linux (just verify the critical bug in re-connections inside a session, which has been patched by us), while OpenVPN 3 AirVPN fork has CHACHA20 support (in Data Channel too), ncp-disable, a new class to handle AEAD ciphers, and works nicely in Android, Linux x86-64 - ARM 32 - ARM 64 and macOS. Kind regards
  18. 2 points
    Thanks for those links Lee47. I think I might set up a monitor. Having trawled various forums looking into this (and for the benefit of anyone looking into this in the future), my understanding is that certain configurations of traffic going through the hub (a certain number of connections perhaps?) triggers the CPU into going into some 'high priority maintenance mode' for a time. When this occurs, traffic throughput drops to about 15%, packet loss occurs, latency goes up etc. It's an inherent problem with devices using this Intel Puma 6 chipset and this is why it happens in both router mode and modem mode. Supposedly it was a lot worse in the past (especially with regard to latency) but has been improved with firmware updates over time. Someone said they had some positive results by wrapping their VPN traffic inside a SSH tunnel. They thought maybe the hub treated those packets differently and made it less likely to trigger this fault on the device. Others said it happened less often in router mode so they set it up like that and put up with the double NATing. Perhaps the other VPN provider is sending traffic in a particular way which just-so-happens to not trigger this issue as much?
  19. 2 points
    Thank you @Staff for your transparency and hard work.
  20. 2 points
    I am going to stop conversing with you as this is a circular conversation and it seems that you would like to be confrontational for no good reason, you keep repeating all these unfounded accusations such as I "snitched" on another user or that I published someone's "personal information". when I did not make any mention of any other user or users at all and the only "information" mentioned was the servers which were being used as tor nodes. Please do show me exactly how I have "snitched" on others and exactly whose information I have allegedly publicized. I also find it a bit strange that you keep insisting that I want AirVPN to block any protocol, as I am all for net neutrality and If I wanted block protocols I would use my home internet without VPN, but obviously this is not the case. Lastly I would like to clarify that I never attempted to chase after or identify anyone running these servers , nor do I wish to, ,just listed the VPN servers affected so other users can be aware. I have no ill will towards anyone at all because of what protocols they are using, and no desire for protocols to be censored/blocked, if that is what you got from my post then you have misunderstood it. The most anyone can ask is for the operators of the exits in question to be informed about the effects of running them . Anyway, unless you would like to say something constructive, I'm going to leave you to it. Good day, sir
  21. 2 points
    In all honesty, I read the domain only and went on browsing in that forum to see what it's all about. You drew the attention to it. Now justify yourself! (Don't) I once found myself searching the internet for the most obvious things, things you'd normally know about, like what trees are or as low as sexual intercourse. Does that mean I'm weird? In my eyes, this simply means that I'm more curious than most. If Wikipedia teaches us one thing, it's surely the amount of (scientific) viewpoints you can have on something. Is there anything that we associate more closely with intelligence than curiosity? Every intelligent species on Earth is attracted to the unknown. Our methodologies are full of riddles and mysteries and divine knowledge. Even the word 'apocalypse'. Even the word 'apocalypse' means 'revelation'. It seems like our ancestors always imagined that even at the very end we would solve one last mystery. Alexandra Drennan, The Talos Principle
  22. 2 points
    We can agree on not posting any "updates" here because they are next to useless for the problem at hand. We can also agree on Net Neutrality as a principle to uphold. Sure it's sometimes stressing, as this recent demonstration has shown, but hey, so is democracy! Would you put someone in the pillory because that person does not share your opinion? No, you wouldn't. So why are we chasing after Tor exit operators? We shouldn't. They will continue doing their thing unless we address them directly with arguments, as we would do in a working democracy. That thread I linked gained so much traction on AirVPN back then, we noticed a drop in exit node flags. Our call even reached the Tor entry page which can be admired there to this day.
  23. 2 points
    This is very exciting to me. I've been trying to find a good openvpn cli for Docker (with network lock, reconnects, etc), and upon initial testing I think this might be it. The Eddie cli has always been painful and unreliable in Docker. This doesn't appear to be a great desktop solution, though I did set it up to run in a tmux session at boot. It's nice to have a status icon either via Eddie or Gnome's vpn interface. That said, this is a great addition to my VPN client arsenal.
  24. 2 points

    Netflix sees I'm on a VPN

    Hello! Netflix USA and only USA is accessible from AirVPN servers as usual if and only if your system queries AirVPN DNS (which happens by default with our software). EXCEPTION: the following servers can not reach Netflix USA at the moment;: Kruger Sneden Fang Nahn Sham Also note that Netflix application has been reported as maliciously bypassing system DNS or exploiting other techniques to disclose your real location. You will be blocked if you are not in the USA in Netflix' app belief, but it's not a fault of our system. Deleting application's cache and then running it only and uniquely when the device is connected to the VPN has been reported as solving the problem in various cases. @giganerd Connecting through a VPN to stream Netflix USA when you are in the USA makes sense in any case (check the wars of major USA ISPs/transit providers against Netflix to get paid by Netflix in order to not block its traffic). Unfortunately Netflix at the end of the day sided with those who have contributed to dismantle the Internet and Net Neutrality in some countries of the world and in this sense it's just another enemy of that very same infrastructure and technology that made its fortunes. Kind regards
  25. 2 points
    Running 1.0 on Arch Linux, so far so good. What would be the recommended way to automatically run $ sudo ./hummingbird your_openvpn_file.ovpn at startup? Thanks.
  26. 2 points
    @AirVPNconsumer @containermalt Hello! Please test Hummingbird binary now available on GitLab, it has been rebuilt in a different environment and now it requires older libraries. Please keep us informed. EDIT: the binary is now available in our repository too and replaces the previous build. https://gitlab.com/AirVPN/hummingbird/tree/master/binary Kind regards P.S. Radical solution is simply building Hummingbird directly in your system (detailed instructions on GitLab).
  27. 2 points
    same problem on openSUSE 15.1 ldd hummingbird ./hummingbird: /usr/lib64/libstdc++.so.6: version `GLIBCXX_3.4.26' not found (required by ./hummingbird) linux-vdso.so.1 (0x00007fffd21f7000) libstdc++.so.6 => /usr/lib64/libstdc++.so.6 (0x00007ff4a24d8000) libm.so.6 => /lib64/libm.so.6 (0x00007ff4a21a0000) libgcc_s.so.1 => /lib64/libgcc_s.so.1 (0x00007ff4a1f88000) libpthread.so.0 => /lib64/libpthread.so.0 (0x00007ff4a1d6a000) libc.so.6 => /lib64/libc.so.6 (0x00007ff4a19b0000) /lib64/ld-linux-x86-64.so.2 (0x00007ff4a2862000) * tested on openSUSE Tumbleweed (virtualbox), no problems there! * After update to gcc9 (9.2.1+r279103 ) it works! That is the version on Tumbleweed.
  28. 1 point

    Updated AirVPN Video Review

    I find it a bit difficult to look at the max throughput and basing a rating on that since it mostly depends on the setup of the clients. As you said it yourself in the video, you are using DOCSIS 3.x from Vodafone Kabel Deutschland. I too was a subscriber once on a 400/50 Mbit/s line and while I would reach 40-50 MiB/s download throughput with qBittorrent (they were short-lived downloads whatsover, content would be downloaded in a jiffy), it was significantly more difficult to maintain a good upload throughput for seeding. Something throttled me to exactly 1.5 MiB/s. It would usually start in the most busy hours of the day, usually in the evenings, and stop at midnight ± 2 hours. At weekends I was throttled the whole time. I moved back to Telekom with a 250/40 Mbit/s plan last year, the upload was going up to 4 MiB/s but was never really stable. So then I noticed a very high load on the HDD and thought it wouldn't keep up with the random reads, so I replaced it with an SSD and now I can't stop crying tears of joy over the most beautiful, calm, straight line at exactly 4 MiB/s. It looks a bit like a calm ocean's surface now. Oh, and regarding support, thank you for completely omitting the forums. Although it's not strictly speaking support, the community does solve many of the problems you'd normally create a ticket for. Some users praised it as a trove of knowledge, even if it can get quite technical. But it's at least another way people get this VPN up and running.
  29. 1 point

    Eddie Desktop 2.18beta released

    I disabled latency check to avoid this issue.
  30. 1 point
    Version 2.18.6 (Fri, 17 Jan 2020 13:46:48 +0000) [change] Bug fixes and code cleanup [change] OpenVPN 2.4.8 [change] Windows - Tap driver (Win7-Win10) upgraded from 9.23.3-i601 to 9.24.2-i601 [new] New option 'Skip promotional messages'. [change] macOS - New menubar icons [bugfix] macOS - 'Rules not loaded' in some environment [change] Hummingbird integration (experimental) All other reported issues are under investigation. (Linux Arch package is not yet available, fix coming soon).
  31. 1 point

    Address info

    Hello! Consult the RIPE database too. If someone compiles a private database in which an addresses pool is assigned to the Flying Spaghetti Monster, would it be sufficient for you to believe that it is indeed assigned (and eventually used by) the Flying Spaghetti Monster? $ whois % This is the RIPE Database query service. % The objects are in RPSL format. % % The RIPE Database is subject to Terms and Conditions. % See http://www.ripe.net/db/support/db-terms-conditions.pdf % Note: this output has been filtered. % To receive output for a database update, use the "-B" flag. % Information related to ' -' % Abuse contact for ' -' is 'abuse@global-layer.com' inetnum: - netname: NL-AIR descr: AirVPN.org country: NL descr: **************************************************** descr: Alblasserdam datacenter descr: AirVPN IP Space descr: NL, Europe descr: **************************************************** --- cut --- Kind regards
  32. 1 point
    Thank you giganerd. I solved the DNS issue, thanks a lot. The port forward problem was that I did not spot that the external and internal ports are different No. When those are the same it works perfect
  33. 1 point

    Dramatic low speed on ASUS RT68U

    40mbit/s is actually a really good result with that router. The CPU is limiting.
  34. 1 point
    Linux user here. I'm using virgin's m500 service with a superhub 3, had it for literally a week. I was previously with another VPN provider and noticed Virgin were throttling the openvpn connection I was using and said provider had no real information on what was going wrong and how I should fix this. Through various attempts at googling I found some posts mentioning that if you run openvpn over stunnel on port 443 you should be able to evade this which is what led me to airvpn. I followed one of the tutorials on here and did a stunnel (443)/openvpn/port forward implementation. Raw : ISP: Virgin Media Latency: 18.65 ms (0.27 ms jitter) Download: 547.18 Mbps (data used: 807.1 MB) Upload: 36.84 Mbps (data used: 36.6 MB) With airvpn : ISP: *** Latency: 26.50 ms (26.09 ms jitter) Download: 24.78 Mbps (data used: 43.3 MB) Upload: 32.97 Mbps (data used: 54.6 MB) To be fair to airvpn I do occasionally hit 80Mbps but it's not consistent. I've not yet managed to max out my connection but it's a marked improvement on where it was before. I have a stand alone linux machine which I run transmission on which has stunnel/openvpn running constantly. Like I say, I've only been with Virgin for about a week so I'm still researching the best way to do this.
  35. 1 point
    Hummingbird landed on HN: https://news.ycombinator.com/item?id=21997261
  36. 1 point
    I've had a 4TB Seagate external drive for 2+ years now. No problems, and it runs cool, 90 F(+ or - same as an internal laptop drive). I also have a 6TB Toshiba for 2 years, no problems, BUT in summer it runs up to 150 degrees F, so I shut it off until I need it. In winter months it runs around 120 F. These are both 3 1/2" format. I tried the smaller 2 1/2" externals but two out of two failed in first week. Internal drives are western digital 2 1/2", 2 x 2TB(one is in CD tray with adapter), very good, and cool running(completely clean your laptop exhaust port regularly, from heatsink-fan to port). Seagate has some 2 1/2" internal drives(2TB=7mm high, 3,4,5TB=9.5 high). Transfer rates on the 6TB were very poor(you cut out bottom of laptop case, insert drive w 6" ribbon with a 180 degree twist). Purchase any above by comparing different site prices. Be careful of purchasing a drive that came out of an external case, whether 3 1/2" or 2 1/2", it will probably be unwarranted. And Seagate 2,3,4,5, 2 1/2 drives are difficult to get "New". They usually have no warranty from various sellers. You can't get them directly from Seagate.
  37. 1 point

    ANSWERED Eddie cant connect ?

    okay it was my routers firewall that went to restrictive. cross tested with my phone, it’s all good now mayne a firmware update from the provider.. solved !
  38. 1 point
    Hello Lee47 I just did a quick speed test (I’m on virgin UK : supposed to be 350 mbps downstream, > 20 mbps upstream). Connected to an airVPN server, I get just above 100mbps down and 32mbps up. VPN connection directly handled by router (consumer ASUS model) I used to have speed issues (possibly ISP throttling, but could never be certain) and tested multiple VPN services (all the big names) before settling on Air. Speed issues were roughly similar from one service to another, except one of the big names (there’s a thread on it on this forum I believe) which was always super slow. OpenVPN requires lots of processing power. Check if you are limited by the machine where you run the vpn. 100mbps down (130mbps down+up) is likely the max my ASUS router’s CPU can deliver on OpenVPN. I hope it helps. PS: ran multiple speed tests today, and my connection speed appears roughly stable
  39. 1 point
    Hello! Currently you need to build Hummingbird directly on your system. Please follow the instructions in GitLab: https://gitlab.com/AirVPN/hummingbird#building-hummingbird-from-sources Kind regards
  40. 1 point

    Netflix sees I'm on a VPN

    How is a more adequate answer than the one given to you supposed to look? Through five servers you are unable to watch Netflix as of now, this is confirmed by that same Air Staff quoted by you. If it happens with others and you think they're also affected, post them at your convenience, and be sure to also give some more info about your setup (server, port, protocol, device, etc.) After all, it's not your thread, you just came along and posted a nearly empty "I have the same issue" post, by mentioning an even less helpful piece of information about your renewal. I don't see you meaningfully contributing with a workaround, or any piece of info enabling everyone to enjoy Netflix via AirVPN again. Maybe a server that works for you with certain connection settings? – Since you gave no info about which server shows the symptoms you described. Maybe with a certain app? We have 30+ US servers. Surely one is working? And have you followed Staff's suggestion with the cache as of now? Let us help you help yourself, and maybe others, too…
  41. 1 point

    Airvpn.org onion address?

    As much I'd love for more people to use Tor for their daily browsing, accessing the onion service will frustrate many users — among other things, external links will (deliberately) not take you away from the AirVPN website, and conventional payments will almost certainly be declined by payment processors. It's not a good default for many users.
  42. 1 point
    Hi I have a OneVanilla Visa Debit Gift Card and I am not able to purchase a VPN Plan It'll keep denying my card in both PayPal and 2Checkout I am able to pay my internet bill and Xbox Store Currency with it though?
  43. 1 point
    I've the same output trying to run the precompiled 'hummingbird' binary on Slackware Linux 14.2 stable (x86-64) — my version of libstdc++ was fine for RC2 but unexpectedly this 1.0 Stable binary requires a newer version than I've installed. Figuring I could just build a binary I could run on my system from source, I cloned AirVPN's repo of OpenVPN3 and installed some missing dependencies (asio 1.14.1, mbedtls 2.16.2, liblz4 1.9.2) to attempt a "dynamic" build of the hummingbird binary; alas, it seems I'm still missing something. I've attached the redirected compiler warning/error output. building-hummingbird_20191228.txt Any thoughts on how I can get this to build on my system would be appreciated. N.B. I appreciate the option to build against openssl (-DUSE_OPENSSL -lssl) instead of mbedtls (-DUSE_MBEDTLS -lmbedtls -lmbedx509 -lmbedcrypto) should I want to, and hope this feature is retained in future versions of OpenVPN3 (and hummingbird).
  44. 1 point

    Christmas 2019 Sale

    Hello! We're very glad to announce a special promotion on our long terms Premium plans. You can get prices as low as 2.20 €/month with a three years plan, which is a 68.6% discount when compared to monthly plan price of 7 €. You can also send an AirVPN plan as a gift: you have the option to print or send a colorful, dedicated picture with the code to activate the plan. code shown in the above picture is an example, not a real code If you're already our customer and you wish to stay aboard for a longer period, any additional subscription will be added on top of already existing subscriptions and you will not lose any day. Please check plans' special prices on https://airvpn.org and https://airvpn.org/buy Kind regards & datalove AirVPN Staff
  45. 1 point
    Hello! OpenVPN AirVPN 1.0 beta 2 has just been released! Please check the first post in this thread for updated links, instructions and changelog. Kind regards
  46. 1 point
    @giganerd Thank you! We will have to dig deeply. Who knows, it might be one of those bugs that stayed there for years in the main branch, we have already hunted down and fixed many of them. Step by step we are determined to resolve everything. In the Android app, in "Settings", you have the option "Use IPv6 over IPv4". When it's on, it enforces "yes" to the same class member in the Android OpenVPN 3 AirVPN library. If you enable "Use IPv6 over IPv4", do you see the same error? We will get informed about Mono debugging tools. Just to avoid any confusion to the readers we remind that OpenVPN 3 AirVPN client and library have nothing to do with Mono, they are entirely written in C++ Kind regards
  47. 1 point
    I am trying to find a solution for the issue of blocked AirVPN servers by Amazon Prime Video. Could somebody help me out with an iptables based solution to circumvent vpn and connect directly to their (Amazons) servers (but still routing all other traffic through the vpn tunnel)? Currently I am using: iptables -I FORWARD -i br0 -o tun1 -j ACCEPT iptables -I FORWARD -i tun1 -o br0 -j ACCEPT iptables -I FORWARD -i br0 -o vlan2 -j DROP iptables -I INPUT -i tun1 -j REJECT iptables -t nat -A POSTROUTING -o tun1 -j MASQUERADE vlan2 is my virtual interface for the wan port. What would be the best option to implement a target specific routing? I am running the AirVPN client on a ddwrt router.
  48. 1 point
    .. even I am a bit astounded.. there is nothing off-topic here, so what the actual hell, mods/Staff/whoever? Mistakes were made. There are a few topics mentioning Telus/Teksavvy/Shaw: Download speed heavily reduced with AirVPN Canadian ISP Shaw throttling VPN connections
  49. 1 point

    What about Eddie for Ios ?

    Hello! It's a delicate matter because GPL (and other licenses) are incompatible with Apple policy. Executive summary: Apple will not approve free and open source software, and we like to release only free and open source software. Apple business model on mobile devices is heavily based on restricting customers freedom (even the most trivial operations are locked in Apple devices). It would be irrational to allow software released with a license that's a major menace to a business model which works great. Longer analysis of the aforementioned incompatibility can be found in FSF articles and others. Kind regards
  50. 1 point
    For my American friends, or really anyone who still uses Windows 7 etc. (no judgment, as I am guilty of having an older Gaming PC with JC3, GTA V etc) Be warned: Its experimental/under dev https://bitbucket.org/ancile_development/ancile/overview Perhaps this would be of assistance. The latest Senate vote in your country really shows the hostility/ignorance to privacy/encryption. However I am certain hopefully this will be a golden opportunity for provides like AirVPN. I'm sure VPN use will also most likely be up! However, just a matter of time before they try to kill/outlaw Encryption. But we will be ready! The most likely scenario of repealing Net Neutrality in the states will be most likely a boost to torrents and decentralizing information once again. As monopolistic ISP will most likely attempt to monetize unsecured data and secure data from partners (Google, Apple, Twitter, Facebook, etc) as soon as they can if they haven't already have systems in place. Throttling, all the old tricks. Charging more for Hulu, Spotify, Netflix etc. Solarmovie, 123Movies, or sites not on the "basic" package of the approved internet will most likely be charged more. However, the market will most likely push for specialty niche ISPs like in my home country. I do not know how it works in the states. Think of it as self-regulation in order to maximize profit off of you, the consumer. The good news is: Young people in particular care passionately about this. Go do something about it! I personally gave EFF a donation. If you live in the US don't let your public officials get away with it. Keep the heat on them. Watch out Canada I'm sure you are next. Sorry to go off topic, For my primary machine I use a series of Vboxes, and the host is of course Linux. I personally like the Mint Linux flavor, but to each his/her own!
  • Create New...