Jump to content
Not connected, Your IP: 3.235.176.80

Leaderboard


Popular Content

Showing content with the highest reputation since 04/19/22 in Posts

  1. 4 points
    Staff

    Eddie Desktop Edition 2.21.6 released

    Eddie 2.21.6 Desktop Edition released Hello! We're very glad to inform you that a new stable release of Eddie is now available for Linux (various ARM based architectures included, making it compatible with several Raspberry Pi systems), Mac, Windows. Special thanks to all the beta testers, whose invaluable contributions and suggestions in the last 9 months have helped developers fix several bugs and improve the overall stability of the software. Eddie is a free and open source (GPLv3) OpenVPN GUI and CLI by AirVPN with many additional features such as: traffic leaks prevention via packet filtering rules DNS handling optional connections over Tor or a generic proxy customizable events traffic splitting on a destination IP address or host name basis complete and swift integration with AirVPN infrastructure with OpenVPN and WireGuard white and black lists of VPN servers ability to support IPv4, IPv6 and IPv6 over IPv4 What's new in Eddie 2.21.6 WireGuard support including thorough and swift integration with AirVPN enhanced wintun support in Windows, resolving TAP driver adapter issues and boosting performance, and now set by default as a replacement of TAP driver (which remains optionally available) updated Hummingbird 1.2.0 support in Linux and macOS for increased performance (up to 120% boost in macOS i7 and M1 systems when compared against OpenVPN 2) new ping engine updated Portable and AppImage bundles for improved Linux distributions compatibility constant monitoring of resolv.conf in Linux to mitigate and resolve DNS interference refined network interface management and driver detection in Windows bootstrap servers IPv6 address support unquoted service fix aimed at security hardening in Windows updates of all underlying linked libraries as well as dynamic link against some libraries providing enhanced robustness resolution of memory leaks in Windows starting to occur after numerous usage hours several bug fixes Operating and architectural notes Eddie GUI and CLI run with normal user privileges, while a "backend" binary, which communicates to the user interface with authentication, gains root/administrator privileges, with important security safeguards in place: strict parsing is enforced before passing a profile to OpenVPN in order to block insecure OpenVPN directives external system binaries which need superuser privileges (examples: openvpn, iptables, hummingbird) will not be launched if they do not belong to a superuser Eddie events are not run with superuser privileges: instead of trusting blindly user's responsibility and care when dealing with events, the user is required to explicitly operate to run something with high privileges, if strictly necessary Backend binary is written in C++ on all systems (Windows included), making the whole application faster. Settings, certificates and keys of your account stored on your mass storage can optionally be encrypted on all systems either with a Master Password or in a system key-chain if available. Download Eddie 2.21.6 Eddie 2.21.6 can be downloaded here: https://airvpn.org/linux - Linux version (several architectures and various distribution specific packages for easier installation) https://airvpn.org/macos - Mac version https://airvpn.org/windows - Windows version Eddie is free and open source software released under GPLv3. Source code is available on GitHub: https://github.com/AirVPN/Eddie Complete changelog can be found here. Kind regards & datalove AirVPN Staff
  2. 3 points
    tray-icon under Linux will be reactivated at the next release (experimental), under testing, expected next week. Please have patience.
  3. 2 points
    airvpnforumuser

    Independent Audits

    Doesn't it appear 'odd' to say the least it seems cure53 are in the market of auditing VPN companies? Quite frankly this is nothing more than marketing fluff only designed to trick the most gullible of users. Those with the paranoia of Snowden know not to trust such feeble attempts at trying to 'prove' their claims. AirVPN knows the best method is to practice what they preach and verify outwardly in everything they do - notice that, for as long as I've known AirVPN I can't remember any single major controversy in how they have acted, or concerns regarding their conduct/behavior. Most importantly, however, is that AirVPN is the undisputed king of OpenVPN software by a long distance. A VPN company is both a software dev (clients for ease of access) and a network provider (servers, configuration). I consider both Air and Mullvad pioneers in this regard (Mullvad for example is experimenting with diskless servers and allows users to pay in cash which is a payment method I'd love to see Air support). Thing is, AirVPN offers unrivaled support for virtually any OS/configuration you can think of - apps for Windows (even XP!), Mac, Linux, Android...They have made their service accessible to as many people as possible, even those from hostile regimes. From what I can see, they offer the ability to change the protocol from a choice of TCP, UDP, SSH->TCP, and all on various ports to attempt to thwart blocks by ISPs, I can't think of a single other VPN provider in this space that offers such extensive means of accessing their servers, in addition to very carefully considered Wireguard support (note they were not the fastest or even first on the scene, but took their time understanding the protocol carefully before adding support for it in their clients). One thing to remember is it took them over 500 days between stable Eddie releases, and over a year between Android eddie releases, sure it's frustrating but it shows their dedication to 'getting it right' and ensuring and prioritizing stability. A user commented on why it took so long and well, the Staff's honest reply speaks for itself ([2]) in how seriously they take their software development. ALL of their clients code is open source, builds are reproducible and verifiable so you don't need to trust their binaries, they published in-depth guide (see [1]) to how their infrastructure works allowing anyone to essentially re-implement their clients and quite frankly affords the most transparency of ANY major VPN provider. They also support Linux natively in ways not a single other VPN provider does, not even Mullvad offers such in-depth, integrated Linux support AND AirVPN's software supports other providers too! So with all that being said, what use would an 'audit' provide? It's pathetically easy to design an aduit to reveal a favorable outcome, the Staff would even say the same thing if you know the aduit was happening. It'd be trivial to only give access to 'select' servers, or make a script to change some settings. Remember, an audit proves for only a few seconds whether or not a provider logs. Imagine the following: config.sh: logging: /user_logs.txt -> /dev/null There, done. Now I do not log! Once the aduit is complete, time to change it back again. If this is what you want then AirVPN is not the choice for you, people choose AirVPN because of their unparalleled hacktivist work and the essential fact at no point in the last 10 years of their operation have they been under scrutiny for a mistake or caused doubt that they are not trustworthy. In fact, the opposite is true, their work on OpenVPN-AirVPN branch shows their commitment to advancing the privacy cause, by adding new features (all open-source so you know they didn't add a backdoor for example, and if they did, someone, somewhere would reveal such information). How many other providers changed OpenVPN? Or even have a developer who is able to? It requires in-depth, expert knowledge to change the fundamental protocol their service is built on. This is why I use AirVPN and why they have explicit trust. An "audit" would cause me to cancel and leave because it'd be a pathetic attempt to try and somehow convince users they are to be trusted. But hey, the choice is yours if that makes you happy and you purchase a multiple years-long subscription then it worked. (Oh, btw, AirVPN also supports Tor over AirVPN [3] or AirVPN over Tor, seamlessly integrated into their client so you can even hide from AirVPN your 'real' IP address, which again I can't think of a single other provider offering and reaffirms their commitment to true, total, 100% privacy as much as they are able to). [1]: https://airvpn.org/forums/topic/49671-bluetit-developers-reference-manual/ [2]: https://airvpn.org/forums/topic/49638-eddie-desktop-221-beta-released/?do=findComment&comment=174856 [3]: https://airvpn.org/tor/
  4. 1 point
    Oh its too late, should've came back and made it aware I deleted openSUSE Leap from my KVM because of other issues. But I have NOT gotten this message from MX Linux or Windows. These are the only OS I'm using it on, but will try to install it on my pfSense. Having trouble trying to figure out how to allow local connections wile connected to the VPN. Thanks for replying!...
  5. 1 point
    Every troubleshooting effort, every attempt at support, starts with the description of the problem from the one requesting help, and with information gathering from the one willing to help. It's a quid pro quo: This for that. Fair change. The requester is in most cases relatively inexperienced when it comes to giving information, because most people are no magicians when it comes to computers. They can't know where to look for the right info. And they don't need to, that's okay! Because those willing to help usually do! Remember, quid pro quo: You give me your symptoms, I give you some questions. You give me answers, and I give you more questions. It continues until we eventually reach the diagnosis. I'm your doctor, while you are the patient with a problem. This thread deals with an early stage of this process in regards to AirVPN and the Eddie client, where the most helpful bit of info comes from what is referred to as the system report, or support file. I want to write about where to find it exactly, how it looks like and what to do with it. This obviously does not apply to cases where Eddie is not used, where the OpenVPN logs must be copied instead, if possible with a higher than normal verbosity (another topic). What is it? Nomen est omen, the system report is a snapshot of the current configuration and state of the Eddie client and includes extra info on system configuration relevant for connectivity to AirVPN or functionality of the client. Where do I find it? Open Eddie and navigate to the Logs tab on the left side. The window is filled with log output from Eddie and the programs it uses. On the right side you've got four buttons: From the top, they are Clear Logs, Copy to Clipboard and Save to File which do exactly what they say, no strings attached… The fourth button with a lifebelt or donut icon is the System Report button. Clicking it will open another window with another box for text output and more buttons: Copy to Clipboard and Save to File on the right, and if you're running a recent stable or beta version an Upload to paste URL in support ticket button in the bottom left. What you're seeing all over the window is the actual system report. What do I do with it? Life Pro Tip: This thing is editable! Apply some privacy if you want (see further down), then deal with it in one of the following ways. PASTE: Click the top right button to copy the report to your clipboard. Open the thread you want to paste it in and CTRL + V. UPLOAD: Click the second button from the top to save it to a file. Give it a name and save it somewhere, then open the thread you want to upload it to, drag the file into the editor and click on the file to add it to your post. LINK: Click the button in the bottom left. Eddie uploads the report to eddie.website and shows you a link to it. Copy the link, open the thread you want to paste it in, then paste it there. System Report sections explained Sections are separated by an army of dashes (----------------------------). Section 1: General information Program and OS versions, config paths and some connectivity test results. It gives people the chance to try and reproduce the problem in a virtual machine or an old device running your OS, kernel and program versions. This is done to either pinpoint or rule out used program versions as the problem. Section 2: Options not at defaults Every setting in Eddie has a unique key in the simple notation [category.]setting: value[,value,…]. There is a default setting for everything. For example, the default is to not have a username/password saved, but if you save it, they will show up here as setting keys login and password. This section shows options you manually changed and help tremendously to understand how you configured Eddie. This info opens up the chance for people to getting closer to your setup because they can set Eddie to use your config and see if they get a similar behavior. Section 3: Logs Eddie logs all events from itself and the programs it runs, most prominently OpenVPN and Wireguard. This is the info that is shown in picture 2 above, and the reason this section exists is why copying only the logs is too little. Note that this is a snapshot of what is in the log buffer when you clicked on the donut. If you clear the logs in the second picture, this section will be just as empty. Section 4: Interfaces and routes You are surely aware of the fact this is a VPN program which needs to change networking configuration of the system to function, so information on the current state of that networking configuration is kinda important. This is the section printing info about it in JSON format. Not too easy to read and notice stuff in there, even more difficult to somehow reproduce it, but it does present the chance to notice something in the first place. Sections after it: Output of OS-specific networking information programs On Windows this would be something like ipconfig /all, on Linux it's output from ifconfig or ip address show/ip link show. Similar goal as with section 4, to open up the chance to notice things. Golden Rules Read carefully what is requested of you! If a system report is requested, eat the donut! Do not copy the logs alone! I cannot stress this enough. They are part of the system report, eat the donut! Guidelines on applying privacy to the system report output For privacy, you can anonymize the report a little before saving: As written, the box where Eddie prints the system report is editable! Eat the donut, edit the output and then click one of the buttons. In the box, pay special attention to possible user names in Section 1 (general info) and MAC/IPv6 addresses after Section 4 (Interfaces/Routes and OS-specific network info). IPv4 addresses are almost surely in the private space and cannot be used in any way to trace or connect to you, they can be left as is. I hope this provides something people can refer to in the future. Don't hesitate to provide suggestions and corrections if you've got something. Thank you for your time.
  6. 1 point
    madrat

    Eddie Desktop Edition 2.21.6 released

    Thanks you for this info. Now running Eddie 2.21.7, with Hummingbird box checked, no path to the binary file, on iMac 10.14.6, and my log shows it is running like a charm. Starting up Eddie is way faster than before. Great work to all the staff!!
  7. 1 point
    Not entirely true, but the feature's availability does depend on the ROM used. Official LineageOS builds support this starting from around version 16-17 (Android 9-10) (Connection > Hotspot and Tethering > Allow clients to use VPN). Inofficial LineageOS builds from XDA or 4PDA and stock/original ROMs from the manufacturers are a tedious hit and miss, but maybe it's more or less widely implemented with Android 11 or 12, who knows.
  8. 1 point
    Tray-icon working here. Thanks
  9. 1 point
    That is because OpenVPN only sets a route for the subnet of the interface from which it's connecting. Everything else is routed inside the VPN, and so are the connections from 192.168.2.0/24. What you need to do is add a custom route, either via Preferences > Routes or via the route directive in Preferences > OpenVPN directives. The directive would be: route 192.168.2.0 255.255.255.0 net_gateway In Routes you'd set: IP/Host/Range: 192.168.4.0/24 When connected: Outside tunnel Notes: [optional] Be advised: If you set the option to use Hummingbird in Preferences > Advanced, the directive won't work. In this case try using the setting in Routes.
  10. 1 point
    OpenSourcerer

    IP switchs often to 85.17.225.221

    Positive sample first: After the gateway it stays in M247 space most of the time, then gets handed off to what appears to be Cloudflare's Netherlands IX until finally arriving at the destination. # traceroute -T icanhazip.com traceroute to icanhazip.com (104.18.115.97), 30 hops max, 60 byte packets 1 10.27.6.1 (10.27.6.1) 11.186 ms 11.769 ms 11.774 ms 2 vlan27.as11.fra4.de.m247.com (141.98.102.177) 12.033 ms 12.152 ms 12.392 ms 3 vlan2919.agg2.fra4.de.m247.com (212.103.51.150) 11.761 ms 11.998 ms 12.004 ms 4 37.120.220.117 (37.120.220.117) 12.389 ms 12.388 ms 12.386 ms 5 193.27.15.223 (193.27.15.223) 11.994 ms 37.120.128.129 (37.120.128.129) 21.342 ms 37.120.128.253 (37.120.128.253) 12.092 ms 6 cloudflare.equinix-fr4.nl-ix.net (193.239.118.138) 13.699 ms 13.936 ms 12.635 ms 7 104.18.115.97 (104.18.115.97) 23.921 ms 172.70.248.3 (172.70.248.3) 12.412 ms 172.70.244.3 (172.70.244.3) 12.928 ms Negative sample: There is a redirection happening to another private v4 directly after the gateway, then through Leaseweb space until the handoff to Cloudflare at hop 8. Interesting detail, that redirection… traceroute -T iplocation.net traceroute to iplocation.net (188.114.97.10), 30 hops max, 60 byte packets 1 10.27.6.1 (10.27.6.1) 10.888 ms 10.888 ms 11.110 ms 2 10.252.128.1 (10.252.128.1) 19.355 ms 19.609 ms 19.611 ms 3 85.17.225.252 (85.17.225.252) 20.100 ms 20.102 ms 20.272 ms 4 po-123.ce16.ams-01.nl.leaseweb.net (212.7.201.132) 20.349 ms po-123.ce15.ams-01.nl.leaseweb.net (212.7.201.128) 20.270 ms 20.346 ms 5 81.17.35.64 (81.17.35.64) 20.832 ms 20.833 ms 81.17.35.60 (81.17.35.60) 20.576 ms 6 po-117.agg01.ams-01.leaseweb.net (31.31.38.40) 20.569 ms po-117.agg02.ams-01.leaseweb.net (31.31.38.44) 19.026 ms po-118.agg02.ams-01.leaseweb.net (31.31.38.46) 19.262 ms 7 et-49-1.agg01.ams-01.leaseweb.net (31.31.34.200) 19.498 ms et-49-1.bb01.fra-13.leaseweb.net (31.31.34.53) 26.650 ms 26.536 ms 8 162.158.84.10 (162.158.84.10) 27.514 ms 30.762 ms et-53-1.bb01.fra-13.leaseweb.net (31.31.34.51) 26.500 ms 9 172.70.244.3 (172.70.244.3) 27.738 ms 172.70.248.3 (172.70.248.3) 27.962 ms 27.960 ms 10 172.70.240.3 (172.70.240.3) 27.704 ms 27.602 ms 188.114.97.10 (188.114.97.10) 27.861 ms Second negative sample: Find the difference in these pictures… traceroute -T whatsmyip.com traceroute to whatsmyip.com (188.114.96.3), 30 hops max, 60 byte packets 1 10.27.6.1 (10.27.6.1) 11.139 ms 11.165 ms 11.165 ms 2 10.252.128.1 (10.252.128.1) 19.192 ms 19.440 ms 19.445 ms 3 85.17.225.252 (85.17.225.252) 19.675 ms 19.866 ms 19.885 ms 4 po-123.ce15.ams-01.nl.leaseweb.net (212.7.201.128) 19.845 ms 19.854 ms 19.873 ms 5 81.17.35.60 (81.17.35.60) 20.143 ms 81.17.35.62 (81.17.35.62) 20.390 ms 81.17.35.58 (81.17.35.58) 20.370 ms 6 po-118.agg01.ams-01.leaseweb.net (31.31.38.42) 20.129 ms 19.202 ms 19.197 ms 7 et-49-1.bb01.fra-13.leaseweb.net (31.31.34.53) 26.684 ms 26.388 ms et-50-1.agg01.fra-10.leaseweb.net (31.31.34.29) 26.145 ms 8 162.158.84.10 (162.158.84.10) 28.820 ms 28.846 ms 29.111 ms 9 162.158.84.10 (162.158.84.10) 29.117 ms 172.70.248.3 (172.70.248.3) 28.810 ms 162.158.84.10 (162.158.84.10) 28.353 ms 10 172.70.248.3 (172.70.248.3) 27.594 ms 188.114.96.3 (188.114.96.3) 28.788 ms 28.586 ms … they're the same pictures! Well, not exactly, but you'll notice a striking similarity. 10.252.128.1. This redirection is all that causes the ghost IP change. And it must be AirVPN-internal because there is no other explanation for a private v4 gateway followed by another private v4 address in the next hop. It ends up in a subnet from LeaseWeb in hop 3, and I believe the NL rerouting server is a LeaseWeb server (that's where the IP address you see comes from). Does the server IP address change? No. Is there a cause for concern? I strongly disagree. Should Staff be informed? I think so. At least to check on whether there are rerouting rules for these IP APIs. Don't panic. None you can directly connect to, no. Though, strictly speaking, a request rerouted through a rerouting server makes that rerouting server a de-facto exit node. Provide a list of servers and optionally a list of users reporting that. Probably a misconfiguration instead. They don't. Staff don't read every thread. See above, and by not panicking. Provide a list of servers you observed showing this IP API result.
  11. 1 point
    @harold.lewis: I run Ubuntu 22.04 and I also have disabled IPv6 at system level. Network Lock works fine. I can however only choose from "None", "Automatic" and "Linux nftables" in the dropdown menu. Not iptables. Maybe the issue is solved if you install nftables as well with "sudo apt install nftables". Best regards, BB.
  12. 1 point
    2.21.6 has an issue with NetLock when IPv6 is disabled at OS level (Linux only). This is fixed in the next release, please be patient a couple of days.
  13. 1 point
    Staff

    Eddie Desktop Edition 2.21.6 released

    Hello! Yes, you still need to, for the current version did not set Hummingbird as default choice. Kind regards
  14. 1 point
    DragonAge2

    Energized block list

    https://docs.microsoft.com/en-us/windows/privacy/windows-endpoints-21h1-non-enterprise-editions Few weeks ago I found out Microsoft does post what domains it contacts. Check out if there's any problems
  15. 1 point
    It's German, but I highly recommend reading a bit through this. Try to get help from a fellow German with translation or use a translator. Your situation is frequently encountered here and you may have a few aces up your sleeve to counter this. https://www.abmahnwahn-dreipage.de/abmahnung-was-nun-was-tun/ I understand your uncertainty right now, but let's try using precise words to describe exactly what the VPN gets you. No, the encryption is for your traffic. The VPN server pseudonymizes your IP address: If your address is 1.2.3.4 and that of the VPN server is 5.6.7.8, any IP you connect to will see that the connection comes from 5.6.7.8. No VPN guarantees your safety. But it helps, especially with the correct configuration. They are. All servers can be used for P2P. The "kill switch" is called Network Lock here and is not a kill switch in the classical sense. It's a set of firewall rules that only allow connections to the VPN servers. This is more robust because the kill switch is a reactive technique (reacts to a failed ping or a change of IP address, etc.) while the firewall is proactive (rules are rules and are application-independent). IPLeak is AirVPN's own IP API. But people use others as well. Start your journey with Mr. LZ1's New User Guide. There's good detail for people not familiar with VPNs. Welcome to AirVPN! Happy to have you here, enjoy your stay
  16. 1 point
    Staff

    No x509 Verification?

    Hello! WireGuard does not support authentication via certificate at all. OpenVPN does, and we have it implemented of course, but not with specific fields. If we implemented it we would force all of our customer to change certificate every time they change server, which is not a viable solution in most router and pfSense machines. Totally unacceptable. You must also consider that in order to impersonate a server, not only would the attacker need to steal the secret WireGuard key or the various OpenVPN certificate/key pairs, but she would also need to cage the target and hijack route via IP addresses, because the target can not be actively reached (forbidden in OpenVPN settings). Also, DH keys are unique in each VPN server, so the attacker can't even try an impersonation from another server while the connection is ongoing to a real server. Kind regards
  17. 1 point
    7481217113

    No x509 Verification?

    Why is this important? This works exactly like your browser when you access a HTTPS website. Say you visit reddit.com, when you enter the URL into your address bar, your browser connects to the Reddit servers which sends a TLS certificate over the wire for reddit.com. Your browser then checks the certificate to see if reddit.com is indeed present in the common name or SANs (subject alternative names), that it is not expired, and that it was signed by a publicly trusted certificate authority (CA). If these conditions are true the website will load. If they are not true then you will be presented with an insecure connection error. The OpenVPN client, by default, does NOT verify that the server you are connecting to is the server that you expect it to be (ie. the hostname you connect to is in the certificate’s common name). The only thing it does is verify is: The certificate has been issued/signed by the Certificate Authority that is trusted inside the <ca> block in the config The certificate is not expired Unless x509 verification is in place, the client will trust ANY server that presents a certificate that was generated by the Certificate Authority as long as it’s not expired. With that in mind, a breach of a single server, regardless of the unique certificate being deployed there, gives the attacker the ability to impersonate ANY other server for that VPN provider.
  18. 1 point
    Hello, Using Eddie 2.21.6 on Win 10. Eddie never succeed to connect to any servers. Looking at the Log the issue migh be related to TUN .OpenVPN > All wintun adapters on this system are currently in use or disabled. .OpenVPN > Exiting due to fatal error --> Got it fixed! Apparently wintun drivers from Avast VPN were used (Avast SecureLine Wintun Adapter). Un-installed Avast Secureline and Wintun drivers got installed on the next run of Eddie. Thanks in advance. B
  19. 1 point
    Ah okay, I see. Then I propose, as I already tried to propose in the AUR comments, to include hummingbird in optdepends, since on Arch Hummingbird is not shipped.
  20. 1 point
    Staff

    New 1 Gbit/s server available (IE)

    Hello! We're very glad to inform you that a new 1 Gbit/s full duplex server located in Dublin, Ireland, is available: Minchir. The AirVPN client will show automatically the new server; if you use any other OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637 UDP for WireGuard. Minchir supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/minchir Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  21. 1 point
    As an actual update to this, the issue was not fixed, just happened to work once for some unknown reason. Anyways the issue started happening, once again, only on the Chicago U.S servers. What ended up fixing it for me, was changing the port used. It now connects every time without issue. Quite weird if you ask me, since i could connect to every other server fine, but thought I would post an update in case someone else runs across this issue and maybe this will work for them too.
  22. 1 point
    Hi, I did as you suggested and the Elevation Service was not running. However when I tried to start it there was an error message. I decided to uninstall Eddie and do a clean install of 2.21.6 but it would not install with various error messages. I then did a windows System Restore to a date before these problems started - I started the last version of Eddie sucessfully so I just re-downloaded 2.21.6 and the istallation went perfectly. Thanks for your input and help - the problem was solved although I'm not completely sure of what caused it or how I rectified it ! Regards
  23. 1 point
    Hmm, seems there may be a problem here. If I check my IP address using this site and this site, I can reliably get 85.17.225.221, but any other IP checkers (https://ipleak.net, https://icanhazip.com/, https://checkip.amazonaws.com/, https://ipinfo.io/ip) all show the correct exit address. As far as I know, exit IP addresses should never change.
  24. 1 point
    That's it pretty much. You can look in the Stats-Tab for the "VPN Type" which should state "Wireguard". You also can confirm by activating the "Expert Mode" in Settings -> Advanced -> Expert Mode. Next you can connect to a server and you should see the extended verbose connection information. Those information should also be listed in the Eddie Logs.
  25. 1 point
    You should open a support ticket if you want an official reply. Staff is not obligated to reply, or even read, every topic posted to this community forum. That said, you're more likely to get responses here if you include a System Report (Logs > Lifebelt icon), steps you've tried to fix it, any recent changes you've made to your computer or network.
  26. 1 point
    Was an error, fixed, now in "other versions" the "latest stable" link to 2.21.6. Thanks for the feedback.
  27. 1 point
    Clodo

    Eddie Desktop Edition 2.21.6 released

    No need to reinstall, same version number = no difference
  28. 1 point
    Try installing it. It contains iptables-legacy, too. $ pacman -Fy /usr/bin/iptables-legacy […] usr/bin/iptables-legacy ist in core/iptables 1:1.8.7-1 enthalten usr/bin/iptables-legacy ist in core/iptables-nft 1:1.8.7-1 enthalten Preferences > Protocols > Deselect Automatic > Select Wireguard in the list.
  29. 1 point
    Anyone else has huge latency results in new Eddie? I mean for almost all servers in my case latency is about 80 - 220ms, while Eddie 2.20.0 was showing around 30-40ms for same machines.. Connecting to an actual server and checking speed results shows ping as it should be: 27-40. Weird 🙄
  30. 1 point
    madrat

    Eddie Desktop Edition 2.21.6 released

    Working just fine, so far, on MacOS Mojave. Great work staff!!
  31. 1 point
    You do need the systray icon, but XFCE is another desktop environment than K(Ubuntu) so you need to do following. Close EDDIE. Open a terminal In that terminal type: eddie-ui Please copy what the terminal window is saying. You really need the systray icon to make EDDIE hidden, minimazing EDDIE on Linux causes strange results, while hiding with the systray icon works fine. K(Ubuntu) are KDE or GNOME desktops, very different. Please provide running 'eddie-ui' from a terminal and copy paste it, make sure to hide sensitive personal info. You probably need an entire different library. Previous versions of EDDIE on Manjaro for example needed nftables to manually be installed e.g. but that is no longer so. But you require the systray icon. Linux is not like windows, Linux is not a one size fits all, wheter windows is a one size fits all.
  32. 1 point
    IG-11

    Eddie Desktop Edition 2.21.6 released

    According to changelog it was temporarily removed since version 2.21.5
  33. 1 point
    Yeah, WireGuard! The best VPN just keeps getting better. No major issues updating from 2.20.0, but I noticed Eddie's tray icon is missing. Is there any way to get it back? Someone in the 2.21 beta thread posted a log showing they were missing "libappindicator.so.1", but I don't have any errors when starting Eddie. I have libappindicator-gtk2 and libappindicator-gtk3 already installed. I'm running Manjaro XFCE edition.
  34. 1 point
    I remember this fix, it's for a specific version change only, something along the lines of 2.17 or 2.18 to 2.20. You needed to delete a certain registry key related to the elevation helper for Eddie to work. Where I didn't see a connection is that Eddie didn't show for you. For others it always showed an error about not being able to raise privileges. But you fixed it yourself, very good. Enjoy
  35. 1 point
    https://fruho.com is an open-source, zero-configuration VPN manager. It supports automatic setup and allows easy switching between VPN providers. AirVPN is supported, and this could be a great alternative to anyone who chooses to use this instead of Eddie, for example in case your distribution is not officially supprted by it. The developers always add new providers so it might soon become a very promising project. Which VPN services are supported? Curently we support "one click" import from the following providers: VpnBook (free)SecurityKISS (free or premium)Mullvad (free trial or premium)HideIpVPN (free trial or premium)VyprVPN (free trial or premium)AirVPN (premium only)CactusVPN (free trial or premium)ibVPN (free trial or premium)
  36. 1 point
    Staff

    Eddie Desktop 2.21 beta released

    We released version 2.21.6. This version will be moved as it is to "stable" soon. Version 2.21.6 (Sat, 23 Apr 2022 12:06:52 +0000) [bugfix] [macos] username and password issue on some macOS [change] Net Framework 4.8 and other libraries updates [bugfix] Other minor fixes
  37. 1 point
    OpenSourcerer

    Independent Audits

    An independent audit paid by the audited is de-facto dependent. A truly independent audit would be a crowdfunded audit, where users are both the payer and the stakeholder. Wouldn't that be a revolutionary idea of a VPN audit, where auditors, users and the VPN provider sit at a round table and steer the audit collectively, keeping everyone in the loop? I tend to agree with some points Mr. airvpnforumuser made. With the development of the AirVPN-Suite and the in-dev TUI and GUI for Bluetit I'd say, yes, 1: The costs far outweigh the benefits right now. There are no plans posted anywhere for that I believe, so it's a personal assumption, but I think Eddie will be replaced sooner or later by this suite on macOS and Linux, then a general code cleanup must be done for Eddie to focus on functionality and security on Windows and .NET instead of also taking care of the eventuality that it may be running in Mono.
  38. 1 point
    That's exactly the reason I simply don't install NoScript any more. It got old trying to find out which script sources provide functionality and which ones provide analytics. Sometimes one doesn't work without the other, that's where uMatrix usually came in handy, but that's an even bigger source of work. And I don't want to work, I want to surf the web. So my current approach is to simply let them eat cake. Use Librewolf with a slightly different policy config, periodically purge website data and cookies, things like that. Don't know about "essential" but if you're all about sending as little data as possible: uBlock Origin as your AdBlock Plus-compatible, open source request blocker. Obviously. uMatrix if you want absolute and unyielding control of all requests. Keep in mind, this is work everytime you visit a website. CanvasBlocker, so you can enjoy Canvas without having a unique signature. Sends a random one everytime it's used. Some may suggest Decentraleyes or similar so you don't use Google APIs everytime a website needs jQuery or such. Caused more problems than it solved for me. SmartReferer which lets you define global and per-site rules which referer is sent to websites (aka where you came from). Some websites need you to come from the same site, like driver downloads from AMD, they prevent direct linking to the files with that. Privacy Redirect, to use Invidious for YouTube, Nitter for Twitter, Bibliogram for Instagram and other substitutes. Only ever worked with YouTube and Twitter for me, almost all Bibliogram instances are permablocked by Instagram. SkipRedirect, maybe. Some websites direct you to an intermediate page before directing you to your actual destination (I'm also looking at you, AirVPN). This addon skips this. It's possible because most intermediate pages are like "https://my.page/intermediate.php?url=https://the.actual.page/destination.php". Addon extracts the url= parameter and connects you there instead. NeatURL, which removes common (and your custom) URL parameters like campaign trackers (utm_* and others) before the request is sent. Hundreds more, probably.
  39. 1 point
    OpenSourcerer

    VPNLab.net takedown

    If you market a VPN for the darker clientele, sooner or later the chickens will come home to roost.
  40. 1 point
    OpenSourcerer

    VPNLab.net takedown

    You reap what you sow, aka "play stupid games, win stupid prizes"
  41. 1 point
    Staff

    Two new 1 Gbit/s servers available (JP)

    Hello! We're very glad to inform you that two new 1 Gbit/s full duplex servers located in Tokyo, Japan, are available: Albaldah and Bharani. The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and port 1637 UDP for WireGuard. Albaldah and Bahrani support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check servers status as usual in our real time servers monitor: https://airvpn.org/servers/albaldah https://airvpn.org/servers/bharani Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  42. 1 point
    Staff

    New 1 Gbit/s server available (JP)

    Hello! We're very glad to inform you that a new 1 Gbit/s full duplex server located in Tokyo, Japan, is available: Fleed. The AirVPN client will show automatically the new server; if you use any other OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and port 1637 UDP for WireGuard. Fleed supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/fleed Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  43. 1 point
    @maasenstodt Hello! Currently Eddie does not re-download automatically any new certificate/key pair: in Eddie main window, log your account out and then log it in again, in order to force Eddie to re-download client certificate(s) and key(s). A detailed guide is available here: https://airvpn.org/forums/topic/26209-how-to-manage-client-certificatekey-pairs/ Kind regards
  44. 1 point
    useracgt

    Unable to start (No socket)

    I had the same problem and I was ablte to fix it with these instructions sent to me by AirVPN Support Team: If you still can't open it, I suggest you add a few exceptions to your firewall for the airvpn program (probably not only one) and try again.
  45. 1 point
    Hi everyone, I've been struggling for some time now to make Microsoft OneNote (2016 or win 10) and Word login to my account successfully through AirVPN. So far no luck, the only way I managed it to work is by changing the DNS server which I do NOT want to do that for security reasons. Has anyone found a better solution? Thank you very much!
  46. 1 point
    What a tangle, this has proven to be a bridge-too-far for this newbie. I wish I hadn't started down this rabbit hole when a simpler solution would suffice for me. My torrents don't need to be active without interruption 24/7, it's fine if they chug away overnight but when I need to videoconference or access comcast xfinity web streams then I need VPN to be shut off as it completely chokes on those use cases. Sure it would be nice to whitelist non-torrent activity, but I see in this years-long four page, intermittent success, Gen2 servers and everying else, that torrent-only VPN is far from being a newbie-friendly prospect. Instead, a pair of batch files that shut down qBittorent and Eddie-UI when I need to videoconference would be good enough. It would save me some hassle and prevent me from inadvertently shutting off Eddie while leaving torrents active. The second batch file would restart Eddie and then qBittorrent once my videoconference or xfinity-stream is over. In fact, my shortcut to Zoom/Jitsi/Skype and to qBittorent could invoke the batch files every time. That would be a user-centered design solution to achieves health without surgery! But I'm a newbie with batch files as well, so my question is this... will Network-Lock terminate along with Eddie if I'm using taskill /IM Eddie-UT.exe /T /F in my batch file? Should I taskill conhost.exe and openvpn.exe as well?
  47. 1 point
    Staff

    Privacy Notice and Terms

    Piwik is specifically configured to respect users privacy. Usage of piwik is internal and does not enable us (or any third party of course) to extract any personally identifiable information or any personal data of any user, for example IP addresses are not collected and visitors logs are not kept. At the same time Piwik allows us to see the global amount of page views, web site visits and the amount of time our web server needs to generate a page to users. Such mentioned data are not, and can not be considered as, personal data of any user. Kind regards Addendum: Piwik main options have been always remained unused by us, so why keep it when it can cast such doubts even in a long time customer like you? Therefore it has been disabled, so anybody with doubts like yours can now have peace of mind and usual confidence in every field handled by AirVPN. Kind regards AirVPN founders
  48. 1 point
    telemus

    Using VPN in Australia

    Hi there. I've lived in Australia for a while. The internet is rubbish: expensive, unreliable, often slow and compromised (data retention). I had better internet in China! Airvpn does not have a server in Australia. There are posts in the forum on why not, but they revolve round the exorbitant cost (cost of living is often higher than the Scandi countries, without access to Europe and the culture. Beaches kind of do not make up for that.) And the data retention / surveillance state. This has been turned into a fine art in Australia. On the whole, Airvpn works well, but some of its servers have been blacklisted, by for instance Netflix or the BBC. You might need for those sites to get another VPN - but I would urge you to stick with Airvpn for all other activities. Why? Several reasons. Australia does not have a bill of rights, or even guaranteed freedom of speech (some political speech is protected, sort of). Politicians learned long ago they could simply lie to the voters, scare them or ignore the voters' criticisms - so overt control of the press was not required. In any case, one half of the press landscape is controlled by Murdoch. So, they do not need to, in any case. It is easy for the authorities to obtain a warrant, merely by saying they suspect X of doing Y - even if they do not have a lot of evidence. The judiciary is compliant. There is data retention too. The Federal Police (kind of like a cheap FBI) were caught accessing journalists data, without warrant. It was an "accident", they said. [see: http://www.zdnet.com/article/ombudsman-finds-australian-federal-police-unaware-of-journalist-metadata-requirements/; https://www.theguardian.com/australia-news/2017/apr/28/federal-police-admit-accessing-journalists-metadata-without-a-warrant; https://www.theregister.co.uk/2017/11/28/australian_federal_police_did_not_delete_metadata_as_promised/; https://www.theguardian.com/world/2016/apr/14/federal-police-admit-seeking-access-to-reporters-metadata-without-warrant]. So, all the promises that the data would be used only in extreme cases were hollow. As predicted. The other problem is that unlike the US, where information illegally obtained, and anything flowing from it, can't be used in court (the doctrine of the fruit of the poisoned tree) - no such prohibition exists in Australia. It is up to the judge. So, information can be used even if there was no valid warrant. Additionally, the domestic intelligence service is largely unaccountable; for instance, its evidence to court proceedings and coronal inquests is usually not published (and so cannot be tested) - unlike the US. And indeed, all records of those courts are usually not available publicly, on grounds of "privacy". [Contrast with the US and what happened in the lead up to 9/11. such public disclosure would not occur in Australia.] So, in short, if you live in Australia, you should be using a good quality VPN . They are not yet illegal - but there have been discussions from time to time of making them so. And stay off social media.
  49. 1 point
    Select it with a file manager.
  50. 1 point
    I don't buy that, look at the ToS: If they have the ability to terminate accounts for "crimes", they do log and should be avoided. You are either a VPN provider or a court judge, but you can't be both. These guys made it clear on which side they are.
×
×
  • Create New...