Leaderboard
Popular Content
Showing content with the highest reputation since 12/01/25 in all areas
-
3 pointsHello! We're very glad to announce that Eddie Android edition 4.0.0 Beta 1 is now available. This is a major update: for the first time Eddie Android edition features AmneziaWG complete support. Eddie Android edition is a fully integrated with AirVPN, free and open source client allowing comfortable connections to AirVPN servers and generic VPN servers offering compatible protocols. Eddie 4.0.0 aims primarily at adding, besides the already available OpenVPN and WireGuard, a thorough and comfortable AmneziaWG support. AmneziaWG is a free and open source fork of WireGuard by Amnezia inheriting the architectural simplicity and high performance of the original implementation, but eliminating the identifiable network signatures that make WireGuard easily detectable by Deep Packet Inspection (DPI) systems. It can operate in several different ways, including a fallback, "compatibility mode" with WireGuard featuring anyway various obfuscation techniques. What's new in Eddie 4.0.0 AmneziaWG support Amnezia WireGuard API updated OpenSSL, OpenVPN3-AirVPN and WireGuard libraries see the complete changelog below AmneziaWG overview From the official documentation: https://docs.amnezia.org/documentation/amnezia-wg AmneziaWG offers: Dynamic Headers for All Packet Types (compatibility with WireGuard: YES) During tunnel initialization, the library generates a set of random constants applied to each of the four WireGuard packet formats: Init, Response, Data, Under‑Load. These constants: Replace predictable WireGuard packet identifiers; Shift offsets of Version/Type fields; Modify reserved bits. As a result, no two clients have identical headers, making it impossible to write a universal DPI rule. Handshake Length Randomization (compatibility with WireGuard: NO) In WireGuard, the Init packet is exactly 148 bytes, and the Response packet is exactly 92 bytes. AmneziaWG adds pseudorandom prefixes S1 and S2 (0-64 bytes by default): len(init) = 148 + S1 len(resp) = 92 + S2 Offsets of the remaining fields are automatically adjusted, and MAC tags are recalculated accordingly. In order to keep backward compatibility with WireGuard, S1 and S2 must be set to 0. Obfuscation Packets I1-I5 (Signature Chain) & CPS (Custom Protocol Signature) (compatibility with WireGuard: partial, with fallback) Before initiating a "special" handshake (every 120 seconds), the client may send up to five different UDP packets fully described by the user in the CPS format. In this way AmneziaWG can mimic perfectly QUIC, DNS and other protocols adding powerful methods to circumvent blocks. QUIC is particularly interesting as HTTP/3 is built on it and currently, from Chrome and other compatible browsers, 50% of traffic to/from Google is QUIC traffic. Therefore, blocking QUIC may have major disruptions for any ISP. Junk‑train (Jc) (compatibility with WireGuard: YES) Immediately following the sequence of I-packets, a series Jc of pseudorandom packets with lengths varying between Jmin and Jmax is sent. These packets blur the timing and size profile of the session start, significantly complicating handshake detection. Under‑Load Packet (compatibility with WireGuard: YES) In WireGuard, a special keep-alive packet (“Under-Load”) is used to bypass NAT timeouts. AmneziaWG replaces its fixed header with a randomized one, the value of which can be set manually. This prevents DPI from filtering short ping packets, ensuring stable tunnel connections, especially on mobile networks. How to use Eddie with AmneziaWG To enable AmneziaWG mode, just tap the connection mode available in the main and other views. It will rotate between WireGuard, AmneziaWG and OpenVPN. Set it to AmneziaWG. In its default AmneziaWG mode, Eddie will use all the possible obfuscation, except protocol mimicking, that keeps WireGuard compatibility, thus allowing connections to AirVPN servers. The default settings choice was possible thanks to the invaluable support of persons living in countries where VPN blocks are widespread. Such settings have been tested as working and capable to bypass the current blocking methods in various countries. You may consider to modify them if they are ineffective to bypass "your" specific blocks. In Settings > Advanced, you will find, at the bottom of the page, a new "Custom Amnezia WG directives" item. By tapping it you will summon a dialog that will let you customize any possible AmneziaWG parameter. You can maintain backward compatibility with WireGuard in the dialog WireGuard section, or enable the full AmneziaWG support in the Amnezia section, which is not compatible (at the moment) with AirVPN WireGuard servers. This mode will be mostly valuable in a not distant future, when AirVPN servers will start to support AmneziaWG natively. You may also enable QUIC or DNS mimicking for additional obfuscation efficacy. In order to maintain WireGuard backward compatibility, with or without QUIC or DNS mimicking, you must set: S1 = S2 = 0 Hn ∈ {1, 2, 3, 4} H1 ≠ H2 ≠ H3 ≠ H4 Furthermore, do not exceed the valid limit of the J parameters (anyway Eddie will not let you do it). In this preview version, Eddie's formal control of the input data is based on the following document. We strongly recommend you read it if you need to modify manually parameters: https://github.com/amnezia-vpn/amneziawg-linux-kernel-module?tab=readme-ov-file#configuration Please do not modify In parameters if you don't know exactly what you're doing. Eddie implements QUIC and DNS mimicking and random obfuscation packets for each specific "I" parameter (by using the corresponding "Generate" button). You can enable them with a tap on the proper buttons. You may mimic QUIC and DNS even to connect to WireGuard based servers. When you enable QUIC mimicking and you maintain WireGuard backward compatibility, you add a powerful tool against blocks, because the first packets will be actual QUIC packets. AmneziaWG will fall back to WireGuard compatibility very soon. However, when DPI and SPI tools, and demultiplexers in general, identify the initial QUIC flow, most of them will be unable to detect a WireGuard flow for several minutes. This has been tested thoroughly with deep packet inspection on Linux and FreeBSD based machines by AirVPN staff. Therefore, in different blocking scenarios the QUIC mimicking increases likelihood of successful block bypass. NOTE: the same does not happen with DNS mimicking. In this case DPI / SPI tools identify the stream initially as DNS, but are much quicker (just in a few dozens of packets) to identify the stream as WireGuard's, after the initial DNS identification. If you decide to test, please report at your convenience any bug and problem in this thread. If possible generate a report from the app in a matter of seconds: by tapping the paper plane icon on the Log view bar rightmost side you will generate a full system report which will include both log and logcat and have it sent to our servers. Then you just need to send us the link the app shows you (open a ticket if you prefer to do it in private). Download link, checksum and changelog https://eddie.website/repository/Android/4.0.0-Beta1/EddieAndroid-4.0.0-Beta-1.apk This is a build debug package and side load is mandatory. $ sha256sum EddieAndroid-4.0.0-Beta-1.apk 617269290a0406237646cc0885e5b10f3916252f89fe82ba9ccb947354980fcb EddieAndroid-4.0.0-Beta-1.apk Changelog 4.0.0 (VC 37) - Release date: 26 November 2025 by ProMIND Native Library [ProMIND] updated to version 4.0.0, API 10 [ProMIND] added Amnezia WireGuard API [ProMIND] updated to OpenVPN-AirVPN 3.12 (20251126) AirVPNUser.java [ProMIND] getWireGuardProfile(): added Amnezia support ConnectAirVPNServerFragment.java [ProMIND] showConnectionInfo(): added AmneziaWG logo display [ProMIND] onCreateContextMenu(): added AmneziaWG items [ProMIND] onContextItemSelected(): added AmneziaWG items [ProMIND] added method loadVPNProfile() ConnectVpnProfileFragment.java [ProMIND] added Amnezia support EddieLibraryResult.java [ProMIND] added Amnezia WireGuard API QuickConnectFragment.java [ProMIND] onCreateView(): added AmneziaWG logo display [ProMIND] updateStatusBox(): added AmneziaWG logo display SettingsActivity.java [ProMIND] added "Custom AmneziaWG directives" setting SettingsManager.java [ProMIND] added Amnezia specific settings and methods SupportTools.java [ProMIND] removed method getVPNProfile() VPN.java [ProMIND] added methods enableAmneziaWireGuard() and isWireGuardAmneziaEnabled() VPNManager.java [ProMIND] added method isWireGuardAmneziaEnabled() VPNProfileDatabase.java [ProMIND] added AMNEZIA type WebViewerActivity.java [ProMIND] EddieWebViewClient.shouldOverrideUrlLoading(): it now properly opens android asset files WireGuardClient.java [ProMIND] added WireGuard tunnel node to constructor [ProMIND] added methods for generating Amnezia's junk settings WireGuardTunnel.java [ProMIND] added support for Amnezia WireGuard [ProMIND] added Mode enum [ProMIND] added tunnel node to constructor EddieLibrary.java [ProMIND] added Amnezia WireGuard API Kind regards & datalove AirVPN Staff
-
3 points
New 10 Gbit/s server available (US)
Hypertext1071 and 2 others reacted to Staff for a post in a topic
Hello! We're very glad to inform you that a new 10 Gbit/s full duplex server located in Los Angeles, California, is available: Revati. The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. Revati supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the status as usual in our real time servers monitor , by clicking the server name. Direct link: https://airvpn.org/servers/Revati Do not hesitate to contact us for any information or issue. Kind regards & datalove AirVPN Staff -
2 points
Personal IPv6 exit IP as alternative to port forwarding
larry.munday and one other reacted to CentralPivot for a post in a topic
With IPv6 allowing practically infinite IPs it should be possible to assign a dedicated IPv6 address to each connection, allowing incoming connections to any port to be forwarded. This would be a great way to circumvent the port forwarding restrictions on IPv4 that exist because multiple clients have to share the same exit IP, and I think would make for a nice optional feature. -
2 points
ANSWERED airvpn push ipv6 on ipv4 only connection floods log
chrisjones.unixmen and one other reacted to Staff for a post in a topic
Hello! Please follow this message to quickly resolve the issue: https://airvpn.org/forums/topic/26548-linux-ip-6-addr-add-failed/?do=findComment&comment=72069 The OP problem might be different so your case should not be discussed here. Kind regards -
2 points
Minimum guaranteed rate increase
ASiC666 and one other reacted to go558a83nk for a post in a topic
I mean, the guarantee is actually in mbps. I wish they guaranteed 4gbps! -
2 pointsHello! After a year of using AirVPN I'm very happy with the product. Website has no bloat whatsoever and it's super easy to find what you are looking for. A huge plus goes out for having an active forum available! Much better option compared to social media idiocies. Also port forwarding has been executed greatly - many other VPN services miss that altogether but even those which support it can't match AirVPN's easy-to-use robust system. Config generator is a great plus too since I'm using both WireGuard app and WireSock depending on the situation and needs. Both run just fine and very few VPN's could match this level of usability. I sometimes have dissapointing speeds with P2P, but usually a simple server change fixes it. Overall very happy customer. Please have a beer AirVPN staff, you've deserved it!
-
2 pointsHi Archaon1, I'm glad I could help you. Six months ago, I was just a newbie, but thanks to the community's help, I grew rapidly. Now, I can finally help others too. That's the meaning of a community. Haha, it's really satisfying to help others. 🎉🎉🎉
-
2 points
[ENDED] 2025 Black Friday Sale
spinmaster and one other reacted to Staff for a post in a topic
Hello! We're very glad to inform you that the Black Friday weeks have started in AirVPN! Save up to 74% when compared to one month plan price Check all plans and discounts here: https://airvpn.org/buy If you're already our customer and you wish to jump aboard for a longer period, any additional subscription will be added on top of already existing subscriptions and you will not lose any day. AirVPN is one of the oldest and most experienced consumer VPN on the market, operating since 2010. It never changed ownership and it was never sold out to data harvesting or malware specialized companies as it regrettably happened to several competitors. Ever since 2010 AirVPN has been faithful to its mission. AirVPN does not inspect and/or log client traffic and offers: five simultaneous connections per account (additional connection slots available if needed) state of the art and flexible inbound remote port forwarding active daemons load balancing for unmatched high performance - current 'all time high' on client side is 730 Mbit/s with OpenVPN and 2000 Mbit/s with WireGuard flexible and customizable opt-in block lists protecting you from adware, trackers, spam and other malicious sources. You can customize answers or exceptions globally, at account level or even at single device level. powerful API IPv6 full support comfortable management of your client certificates and keys AES-GCM and ChaCha20 OpenVPN ciphers on all servers Perfect Forward Secrecy with unique per-server 4096 bit Diffie-Hellman keys internal DNS. Each server runs its own DNS server. DNS over HTTPS and DNS over TLS are also supported. free and open source software client side software support to traffic splitting on an application basis on Android and Linux and on a destination basis on Windows and macOS GPS spoofing on Android application AirVPN is the only VPN provider which is actively developing OpenVPN 3 library with a fork that's currently 330 commits ahead of OpenVPN master and adds key features and bug fixes for a much more comfortable and reliable experience: https://github.com/AirVPN/openvpn3-airvpn AirVPN, in accordance with its mission, develops only free and open source software for many platforms, including Android, Linux (both x86 and ARM based systems), macOS and Windows. Promotion due to end on 2025-12-03 (UTC). Kind regards & datalove AirVPN Staff -
2 points
[ENDED] 2025 Black Friday Sale
matts9 and one other reacted to Marcus.Aurelius for a post in a topic
Logbook of an old salt, written on the first day of a fresh two-year voyage aboard the proud AirVPN fleet: Brethren and sister privateers, The yearly discount chest has been opened once again, and I have filled my hold with twenty-four more months of wind. While the quartermaster counts the gold, let this weathered mariner raise a weather-beaten voice: We need a berth in Poland. One single, sturdy server flying the white-and-red banner would save an entire nation of sailors from slow death by a thousand of exceptions. Behold the enemies that lie in wait in Polish waters: The heavy galleon Poczta Polska (Polish Post) and her tender Envelo (online postage)The ironclad banks that fire broadsides the moment a foreign IP drops anchorThe judicial fortresses and their batteriesLegal archives, university libraries, and even honest merchant carracks All of them roar: “No foreign keel shall pass!” The only way to trade with them is to rip plank after plank from our own hulls – dozens, sometimes hundreds of holes in iptables so the cannonballs of “access denied” fly straight through. (Call it split-tunneling if ye be landlubbers; we call it scuttling the ship to save the cargo.) I have sailed these waters for years in the AirVPN flotilla, and the oceans grow darker every season. Ports that once welcomed us now slam the gates. The great YouTube leviathan mistakes every one of our frigates for a pirate bot and demands we strike our colours and show papers none of us will ever sign. So we dance the server hornpipe – Netherlands to Switzerland to Sweden to Canada – tacking frantically until one harbour opens its arms for a fleeting moment, only to chase us out again before the song is over. Need to see them Canadian iron beasts racing the prairie? We glide in under Japanese colours, drop anchor for a fleeting moment of peace… then, the instant the port starts sniffing at our false ensign, we cut the cable and fly before the black-list cannonade roars. This be not the fault of our admirable Admiral and the crew – ‘tis the spirit of the age trying to chain the very sea itself – but one safe haven on Polish soil would turn a gauntlet of fire into a calm inland lake for all local hands. May fair winds fill AirVPN sails forever! May the fleet grow stronger every year! Hail Poland! Hail AirVPN! Hail all ye beautiful bastards and bitches who still believe the high seas should be free! Yours in rum and packets, An old Polish privateer 🇵🇱 -
2 points
We have kept the OP message to show the pervasiveness of the PRC's propaganda lackeys. We consider Taiwan (Republic of China) to be independent and autonomous from the PRC (People's Republic of China), as it is in fact. ipleak uses MaxMind and IANA databases to display results, and we are pleased that these are aligned with an anti-imperialist and democratic vision that is clearly unpalatable to the dictatorial regime of the PRC, which sees it as an obstacle to its expansionist ambitions. -
2 points
ANSWERED AirVPN does not recognize ICANN authority anymore
derechte and one other reacted to Staff for a post in a topic
AIRVPN DOES NOT RECOGNIZE ANYMORE VERISIGN, AFILIAS AND ICANN AUTHORITY. OUR COMMITMENT AGAINST UNITED STATES OF AMERICA UNFAIR AND ILLEGAL DOMAIN NAMES SEIZURES. The United States of America authorities have been performing domain names seizures since the end of 2010. The seizures have been performed against perfectly legal web-sites and/or against web-sites outside US jurisdiction. Administrators of some of those web-sites had been previously acquitted of any charge by courts in the European Union. The domain name seizures affect the world wide web in its entirety since they are performed bypassing the original registrar and forcing VeriSign and Afilias (american companies which administer TLDs like .org, .net, .info and .com) to transfer the domain name to USA authorities property. No proper judicial overview is guaranteed during the seizure. Given all of the above, we repute that these acts: - are a violation of EU citizens fundamental rights, as enshrined in the European Convention on Human Rights; - are an attack against the Internet infrastructure and the cyberspace; - are a strong hint which shows that decision capacities of USA Department of Justice and ICE are severely impaired; and therefore from now on AirVPN does not recognize VeriSign, Afilias and/or ICANN authority over domain names. AirVPN refuses to resolve "seized" domain names to the IP address designated by USA authorities, allowing normal access to the original servers' websites / legitimate Ip addresses. In order to fulfil the objective, we have put in place an experimental service which is already working fine. If you find anomalies, please let us know, the system will surely improve in time. Kind regards AirVPN admins -
2 points
ANSWERED Linux ip -6 addr add failed
chrisjones.unixmen and one other reacted to Staff for a post in a topic
Hello! This is interesting. We are gradually activating IPv6 on every server, but you have IPv6 disabled at OS level, and this causes a fatal error. For the moment, you can: - Reactivate IPv6 No good reason is known to disable IPv6 at OS level. If you are scared about IPv6 leak when connecting to servers without IPv6 support, a cleaner solution is simply blocking IPv6 traffic with ip6tables. OR - Append the following directives in your .ovpn files: pull-filter ignore "route-ipv6" pull-filter ignore "redirect-gateway ipv6" pull-filter ignore "dhcp-option DNS6" pull-filter ignore "tun-ipv6" pull-filter ignore "ifconfig-ipv6" redirect-gateway def1 bypass-dhcp This will skip IPv6 configuration of tunnel and avoid your error. We are considering related options to Config Generator. Kind regards -
1 point
ANSWERED Plex Media server port forwarding issue
KnightRiderX420 reacted to Staff for a post in a topic
Thank you very much. For the readers: the key information here and other threads where the problem could be resolved swiftly is that it does not matter how you configure it, Plex will always listen to port 32400 of the VPN interface. Therefore, AirVPN's port "re-mapping" function comes handy. Once you choose a random port for your Plex server on your AirVPN account port panel, fill the "Local" field with "32400". Reach the Plex server from the Internet on the port remotely forwarded and the VPN server will take care to forward the packets to port 32400 of your local VPN interface. Kind regards -
1 pointHello! Many thanks for all these information and insight. Indeed I completely agree with what you state. Meanwhile, I identified the culprit of plasmashell crashing: a system resource plasmoid I use on the Plasma desktop background. If I remove it, no crashes happen anymore. So the safe solution is to report it to its owner/author. Despite this I was unable to crash and end Eddie GUI gracefully, so I might have misidentified this happening. That said I will keep an eye and report again if I find a reproducible way. And I understand this is beyond your control and thank you very much for the feedback. Kind regards!
-
1 point
Red UI jumpscare reaction
Hypertext1071 reacted to Tech Jedi Alex for a post in a topic
Yeah. You could say it's been defaced. Use the 😈 goddamn 👺 emojis "<evil grin>" this is so cringe lmao -
1 pointHello! An update: https://www.eff.org/deeplinks/2025/12/after-years-controversy-eus-chat-control-nears-its-final-hurdle-what-know Kind regards
-
1 pointHello! Be aware that 4 Mbit + 4 Mbit/s of guaranteed allocation is great for the pricing of AirVPN. Our competitors offer 0.0 (best effort, no minimum allocation guaranteed). Please consider that if residential ISPs in Europe had all of their customers connected simultaneously and requiring full bandwidth at the same time, the allocation by most of such ISPs (if performed equally for each customer) would be between 0.1 and 10 Mbit/s. The biggest ISPs in Europe (example: TIM in Italy) have an average per residential customer consumption (fixed lines: in mobility much less) of 190 GB/month, which on average means 0.58 Mbit/s throughout the month. Residential networks are normally designed and sized on the basis of these values with congestion control (traffic shaping) during peak hours or any unexpected event. Guaranteeing no overselling beyond 4 + 4 Mbit/s was and is even nowadays a significant effort by AirVPN. In practice, as you can see on the "Top User Speed" chart, users can easily beat 500 Mbit/s, there is no congestion. But if all customers connected at the same time (assuming a fair distribution on all servers) then everyone would anyway have 4 Mbit/s (4 + 4 server side). Kind regards
-
1 point
Can't connect suddenly
Tech Jedi Alex reacted to EMULE for a post in a topic
Okay, I'll listen to you. You're more professional than me.😊😊😊 -
1 pointWhile I love that you continue to support OpenVPN would you please reconsider a few WireGuard‑only 10–20 Gbit servers to quantify the uplift for users who prioritize raw speed and low latency? It’s my understanding that OpenVPN server processes are single‑threaded and CPU‑intensive. Co‑hosting OpenVPN and WireGuard on the same high‑capacity host (10–20 Gbit) can constrain aggregate throughput under load because per‑core bottlenecks caps per‑host headroom when many OpenVPN clients are active. In cities where you have multiple 20 Gbit servers like New York dedicating one to Wireguard doesn't seem unreasonable? Thank you for your consideration.
-
1 point
ANSWERED Monitor IPs for OpnSense
Ph0enix reacted to go558a83nk for a post in a topic
Are you sure you don't have an option somewhere in the gateway settings to prevent opnsense making static routes for monitor IP? I have that in pfsense. I usually trace the route through the VPN interface to anything (e.g. 9.9.9.9) and then use the first or second hop as the monitor address for that gateway. In past experience I've had times where gateway monitoring said everything was fine but reaching the internet wasn't happening. That's why I've taken to pinging something on the other side of the VPN gateway. -
1 pointFor the sake of so-called security, Windows' system permission design can sometimes be quite annoying. When I installed Windows, I configured Huorong Security Software with the highest privileges, locking the core Windows processes from being tampered with. For any operations requiring high privileges, I use Huorong Security Software's toolbox, which can solve the problem with a single click, saving me a lot of trouble.
-
1 pointEmule, I'm glad to see that this side of internet isn't dead! Little question if i may : i used unlocker to get rid of the files. Windows was saying that i needed the authorisation of ThrustDLL or something like that. How would you have granted yourself a higher authority...on your own pc? (The classic windows "I bought you, I assembled you...I OWN YOUUUU")
-
1 pointPlease add more tunneling options! Day by day censorship around the world becomes worse and worse, OpenVPN and Wireguard is already completely blocked in many countries because it is easily detectable using DPI. Since the mid 2010's people out there have been working very hard on much more censorship-resilient solutions rather than simple-to-detect SSH and SSL-wrapping. The days of the games of privacy are over, now VPNs are more and more used by the people around the world to break the information bubbles created by their oppressive governments. Here are some examples of the new tunneling methods that you could add to your services: https://github.com/erebe/wstunnel https://github.com/cbeuw/Cloak https://github.com/v2fly/v2ray-core https://github.com/XTLS/Xray-core
-
1 pointI installed AmneziaVPN, downloaded generated configuration (Nederland) UPD 1637 and connected. It works with and without these changes in [Interface] section. I did not change any other config values in AmneziaVPN. Now, I tried to use EddieUI with default params and it works too! Looks like domestic regulators have holiday in Uzbekistan... I will try again tomorrow.
-
1 pointYes, the addition of the AmneziaWG protocol can solve the connection problems for most people at present, and I hope that AmneziaWG can be used for a long time. If in the future, when the existing protocol can no longer connect, I believe that AirVPN will add a new protocol to solve the connection problem. I will always believe in your technology and capabilities, and I believe that you will always let us breathe real internet. I will always love you, AirVPN. Keep it up!😘😘😘
-
1 pointTraveling to Uzbekistan. I cannot connect to any AirVpn server anymore. It worked fine in USA. Any protocol available in Eddie UI do not work. Unfortunately I paid for the whole year of AirVPN service. Looks like the XRay or something similar is the way to go...
-
1 point
Personal IPv6 exit IP as alternative to port forwarding
larry.munday reacted to CentralPivot for a post in a topic
Privacy is not the only only reason to use a VPN. Also, while it would be possible to assert that traffic going to a specific IP is tunneled to the same end user, going through a VPN means you still don't know who that end person is or where they're located based on their IP. And since we're talking about incoming traffic, this kind of analysis is already possibly by also looking at the destination port of the incoming connection. This wouldn't affect IPv4 port forwarding. All IPv4 connections would still use a shared IPv4 exit address. It wouldn't even affect port forwarding for IPv6 users that don't enable this feature. This would just be an option to get a dedicated exit IP that would forward all traffic statelessly. Traffic going to the shared exit IPs would go through the same port forwarding translations it already does. -
1 point
Air VPN API
Antti Simola reacted to joako233 for a post in a topic
Good morning! First of all, congratulations on the amazing work behind AirVPN. I'm writing to request the option to connect to a server through the API. There is an option to disconnect, but the option to automatically connect to a server does not seem to be available. I was wondering if it would be possible to add this functionality. Best regards, and thank you in advance. -
1 pointThese are the AmneziaWG parameters I use in China. This set of parameters can reliably bypass the GFW. Staff can take a look. Jc = 20; Jmin = 50; Jmax = 1000; S1 = 0; S2 = 0; H1 = 3; H2 = 1; H3 = 4; H4 = 2;
-
1 pointGreat! Eddie finally supports AmneziaWG, and UDP finally has a masquerade protocol. Another protocol has been added to the list of protocols for bypassing China's Great Firewall.
-
1 point
Best internet providers for geeks in Germany?
edrix reacted to Tech Jedi Alex for a post in a topic
Read Finanztip's article on internet providers first, it's got most of that info. No such thing with DSL or Fiber. Though, you should care about latency as it impacts the throughput. Well, I've been using Telekom for more than a decade now (with a short two year pause when I lived in Hannover where I had to use Vodafone Kabel DE, it was enough to never subscribe to them again). Never had problems with VPN connections with Telekom. -
1 point@oilers You know I was playing around with transmission and have come to the same conclusion - just stay with what works! qBittorrent it is!!!
-
1 point@zimbabwe @AG999 @Upre1943 @Stalinium @Nonsense @H12345h12345 Hello! Eddie Android edition 4.0.0 preview implements full AmneziaWG support: https://airvpn.org/forums/topic/77633-eddie-android-edition-400-preview-available/ Feel free to test and report back (bug, glitches...)! Kind regards & datalove AirVPN Staff
-
1 point
Request for adding more genders
rids57 reacted to Tech Jedi Alex for a post in a topic
That's because the AirVPN team didn't write a forums software from scratch, they picked an existing software and adapted it to the special needs of their infrastructure. A gender field in users' profiles is not a special need, given that 98% of people around here don't bother changing profile settings, let alone edit their profile. IP.Board is a "generic" forums software which can be used in many environments. In some of them contact info, birthdays and genders make sense. In some of them, including airvpn.org, they don't. -
1 pointHello! We're very glad to inform you that two new 10 Gbit/s full duplex servers located in Amsterdam, the Netherlands, are available: Taiyangshou and Vindemiatrix. The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. They support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the status as usual in our real time servers monitor : https://airvpn.org/servers/Taiyangshou https://airvpn.org/servers/Vindemiatrix Do not hesitate to contact us for any information or issue. Kind regards & datalove AirVPN Staff
-
1 pointthis is actually a post....... Ich bin ein Berliner
-
1 point
Getting Linux Suite working on NixOS
nicoty reacted to 183aTr78f9o for a post in a topic
I've started using NixOS a few weeks ago and I've been trying to get Linux Suite working on it lately. I have zero experience writing Nix derivations so I basically tried to replicate the install.sh script from the tarball. Note that I've been trying to get it working for my use case (x86_64 only). What I got working: Binaries / resource files copied to the Nix Store and binaries somewhat working i.e. I can run ❯ goldcrest --version Used nix-ld for this: programs.nix-ld = { enable = true; libraries = with pkgs; [ dbus openssl libgcc ]; }; Since bluetit seems to expect resource files to be present in /etc/airvpn, I used environment.etc to copy them from the Nix store. Regarding D-Bus config files, since /etc/dbus-1 directory already exists and is a symlink to /etc/static/dbus-1, I wasn't able to write in this directory. I had to use system.activationScripts to copy the two D-Bus config files in one of the possible paths (see get_dbus_path() function in the install script). airvpn group created (I don't need airvpn user) bluetit.service / bluetit-suspend.service / bluetit-resume.service units written with systemd.services Nix option Custom bluetit.rc with my own settings and sensitive values set as agenix secrets. Zsh completions (only added Zsh because that's my interactive shell, I don't use Bash) Ideally of course, a proper Nix derivation would "Nixify" everything: airvpn user/group creation, all bluetit.rc options, whether the systemd units should be enabled or not, shell completions... but that's far beyond my abilities. What I couldn't get working: cuckoo binary ownership and permissions The installer script has: chown root:airvpn $BIN_DIR/cuckoo chmod u+s $BIN_DIR/cuckoo but I couldn't replicate this. Nix would give "permission denied" every time when rebuilding the system. root:airvpn ownership wouldn't work because the airvpn group wasn't created yet. I tried setting a gid to the airvpn group and use root:1000 instead but that didn't make any difference. Likewise, chmod u+s would result in "permission denied" error. I guess we're just not supposed to change files ownership in the Nix Store. Not sure why the chmod u+s wouldn't work though, considering the other chmod commands work. Maybe it's not that big of a deal, I don't know. any VPN connection This is obviously the biggest issue, making the program completely useless for now. Despite having binaries apparently working, I couldn't connect to any AirVPN server. First, I got DNSManagerException: systemctl: command not found: ❯ journalctl -b -u bluetit.service systemd[1]: Starting AirVPN Bluetit Daemon... bluetit[21208]: Starting Bluetit - AirVPN WireGuard/OpenVPN3 Service 2.0.0 - 22 July 2025 bluetit[21208]: OpenVPN core 3.12 AirVPN (20250606) linux x86_64 64-bit bluetit[21208]: Copyright (C) 2012- OpenVPN Inc. All rights reserved. bluetit[21208]: SSL Library: OpenSSL 3.4.2 1 Jul 2025 bluetit[21208]: AirVPN WireGuard Client 2.0.0 Linux x86_64 64-bit bluetit[21242]: Bluetit daemon started with PID 21242 bluetit[21242]: Reading run control directives from file /etc/airvpn/bluetit.rc bluetit[21242]: Network check mode is airvpn bluetit[21242]: Creating AirVPN Boot server list systemd[1]: Started AirVPN Bluetit Daemon. bluetit[21242]: Added server http://63.33.78.166 bluetit[21242]: Added server http://54.93.175.114 bluetit[21242]: Added server http://82.196.3.205 bluetit[21242]: Added server http://63.33.116.50 bluetit[21242]: Added server http://[2a03:b0c0:0:1010::9b:c001] bluetit[21242]: Added server http://bootme.org bluetit[21242]: Boot server http://bootme.org resolved into IPv4 82.196.3.205/32 IPv6 2a03:b0c0:0:1010::9b:c001/128 bluetit[21242]: AirVPN Boot server list successfully created. Added 6 servers. bluetit[21242]: AirVPN connectivity attempt 1 in progress bluetit[21242]: Successfully connected to AirVPN server <redacted> bluetit[21242]: External network is reachable via IPv4 gateway <redacted> through interface <redacted> bluetit[21242]: Successfully connected to D-Bus bluetit[21242]: DNSManagerException: systemctl: command not found bluetit[21242]: Sending event 'event_end_of_session' bluetit[21242]: Bluetit successfully terminated systemd[1]: bluetit.service: Main process exited, code=exited, status=1/FAILURE systemd[1]: bluetit.service: Failed with result 'exit-code'. systemd[1]: bluetit.service: Consumed 37ms CPU time, 7.3M memory peak, 12.4M read from disk, 120K written to disk, 60B incoming IP traffic, 164B outgoing IP traffic. I first tried adding Environment = "PATH=/run/current-system/sw/bin:$PATH"; to systemd.services.bluetit.serviceConfig, but that didn't make any difference. Creating a symlink allowed to get rid of the error: ❯ sudo ln -s /run/current-system/sw/bin/systemctl /bin/systemctl But still: With networklockpersist on: "NetFilterException: No usable firewall found in this system" With networklockpersist iptables: "NetFilterException: iptables or iptables legacy is not available in this system" With networklockpersist nftables: "NetFilterException: nftables is not available in this system" Creating symlinks also allowed to get rid of the errors: ❯ sudo ln -s /run/current-system/sw/bin/iptables /bin/iptables ❯ sudo ln -s /run/current-system/sw/bin/iptables-save /bin/iptables-save ❯ sudo ln -s /run/current-system/sw/bin/iptables-restore /bin/iptables-restore ❯ sudo ln -s /run/current-system/sw/bin/ip6tables /bin/ip6tables ❯ sudo ln -s /run/current-system/sw/bin/ip6tables-restore /bin/ip6tables-restore ❯ sudo ln -s /run/current-system/sw/bin/ip6tables-save /bin/ip6tables-save ❯ sudo ln -s /run/current-system/sw/bin/nft /bin/nft Then, more errors. With networklockpersist iptables: Goldcrest - AirVPN Bluetit Client 2.0.0 - 22 July 2025 Reading run control directives from file /root/.config/goldcrest.rc Bluetit - AirVPN WireGuard/OpenVPN3 Service 2.0.0 - 22 July 2025 OpenVPN core 3.12 AirVPN (20250606) linux x86_64 64-bit Copyright (C) 2012- OpenVPN Inc. All rights reserved. OpenSSL 3.4.2 1 Jul 2025 AirVPN WireGuard Client 2.0.0 Linux x86_64 64-bit Successfully restored DNS and network filter settings WARNING: Backup copy of resolv.conf not found. DNS settings do not need to be restored. Scanning for system DNS addresses Found system IPv4 DNS <redacted> Found 1 system DNS address Command not found Command not found WARNING: Backup copy of network filter not found. Network settings do not need to be restored. Network filter and lock are using /bin/iptables ERROR: system 'modules.builtin' does not exist. ERROR: system 'modules.builtin' does not exist. ERROR: system 'modules.builtin' does not exist. ERROR: system 'modules.builtin' does not exist. ERROR: system 'modules.builtin' does not exist. ERROR: system 'modules.builtin' does not exist. ERROR: system 'modules.builtin' does not exist. ERROR: system 'modules.builtin' does not exist. ERROR: system 'modules.builtin' does not exist. ERROR: system 'modules.builtin' does not exist. Network filter successfully initialized Private network is allowed to pass the network filter Ping output is allowed to pass the network filter IPv6 NDP is allowed to pass the network filter Network Lock Error: Unknown error 256 (stderr: iptables-restore: line 1 failed) Bluetit session terminated With networklockpersist nftables: Goldcrest - AirVPN Bluetit Client 2.0.0 - 22 July 2025 Reading run control directives from file /root/.config/goldcrest.rc Bluetit - AirVPN WireGuard/OpenVPN3 Service 2.0.0 - 22 July 2025 OpenVPN core 3.12 AirVPN (20250606) linux x86_64 64-bit Copyright (C) 2012- OpenVPN Inc. All rights reserved. OpenSSL 3.4.2 1 Jul 2025 AirVPN WireGuard Client 2.0.0 Linux x86_64 64-bit Successfully restored DNS and network filter settings WARNING: Backup copy of resolv.conf not found. DNS settings do not need to be restored. Scanning for system DNS addresses Found system IPv4 DNS <redacted> Found 1 system DNS address Network filter successfully restored Network filter and lock are using nftables ERROR: system 'modules.builtin' does not exist. Network filter successfully initialized Private network is allowed to pass the network filter Ping output is allowed to pass the network filter IPv6 NDP is allowed to pass the network filter Persistent network filter and lock successfully enabled. Private network is allowed. Bluetit session terminated With networklockpersist off (default): bluetit[8754]: Starting WireGuard boot connection bluetit[8754]: ERROR: system 'modules.builtin' does not exist. bluetit[8754]: ERROR: cannot load wireguard system module bluetit[8754]: Cannot load wireguard system module bluetit[8754]: Logging out AirVPN user 183aTr78f9o bluetit[8754]: AirVPN Manifest successfully retrieved from server bluetit[8754]: AirVPN Manifest update interval is now set to 30 minutes bluetit[8754]: Session network filter and lock are now disabled bluetit[8754]: Sending event 'event_end_of_session' At this point, I don't know what do try next. The main issue is likely that due to NixOS not following FHS (Filesystem Hierarchy Standard), bluetit can't find anything (binaries, kernel modules...) to work. Since Nixpkgs no longer accepts package requests, I thought I'd just ask here if someone could help or even write a proper derivation from scratch. My (terrible/sadly broken) derivation: { config, lib, pkgs, ... }: let version = "2.0.0"; airvpn-linux-suite = pkgs.stdenv.mkDerivation { pname = "airvpn-linux-suite"; inherit version; src = pkgs.fetchurl { url = "https://eddie.website/repository/AirVPN-Suite/${version}/AirVPN-Suite-x86_64-${version}.tar.gz"; # sha256 = lib.fakeSha256; sha256 = "Jt83PPHwBv/GraubQV4I7Shn+UwMvkVW2q9VIAbYDw0="; }; installPhase = '' mkdir -p $out/sbin mkdir -p $out/bin mkdir -m=750 -p $out/etc/airvpn mkdir -p $out/etc/dbus-1/system.d mkdir -p $out/etc/systemd/system mkdir -p $out/share/zsh/site-functions cp --preserve=mode bin/bluetit $out/sbin/ for f in "goldcrest" "hummingbird" "cuckoo" "airsu"; do cp --preserve=mode bin/$f $out/bin done for f in "airvpn-manifest.xml" "connection_priority.txt" "connection_sequence.csv" \ "country_continent.csv" "country_names.csv" \ "continent_names.csv" "nsswitch.conf"; do cp etc/airvpn/$f $out/etc/airvpn/ done chmod 660 $out/etc/airvpn/* cp etc/dbus-1/system.d/* $out/etc/dbus-1/system.d/ chmod 644 $out/etc/dbus-1/system.d/org.airvpn.* cp etc/site-functions/* $out/share/zsh/site-functions/ ''; meta = with lib; { description = "AirVPN free and open source suite based on AirVPN OpenVPN 3 library fork"; homepage = "https://www.airvpn.org/"; license = licenses.gpl3Plus; platforms = [ "x86_64-linux" ]; maintainers = [ maintainers.183aTr78f9o ]; }; }; customBluetitRC = # ini '' # full bluetit.rc here with custom settings ''; in { environment.systemPackages = [ airvpn-linux-suite ]; users.groups.airvpn = { }; systemd.services = { bluetit = { description = "AirVPN Bluetit Daemon"; unitConfig = { After = [ "network-online.target" "firewalld.service" "ufw.service" "dbus-daemon.service" "dbus.socket" ]; Wants = [ "network-online.target" "firewalld.service" "ufw.service" "dbus-daemon.service" "dbus.socket" ]; }; serviceConfig = { Type = "forking"; PIDFile = "/etc/airvpn/bluetit.lock"; ExecStart = "${airvpn-linux-suite}/sbin/bluetit"; Environment = "PATH=/run/current-system/sw/bin:$PATH"; TimeoutStopSec = 90; KillSignal = "SIGTERM"; KillMode = "mixed"; SendSIGKILL = "no"; }; wantedBy = [ "multi-user.target" ]; }; bluetit-resume = { description = "AirVPN Bluetit Daemon Resume after Suspend, Sleep, Hibernate"; unitConfig = { After = [ "network-online.target" "firewalld.service" "ufw.service" "dbus-daemon.service" "dbus.socket" "suspend.target" "suspend-then-hibernate.target" "hibernate.target" "hybrid-sleep.target" "sleep.target" ]; Wants = [ "network-online.target" "firewalld.service" "ufw.service" "dbus-daemon.service" "dbus.socket" ]; }; serviceConfig = { Type = "forking"; ExecStart = "${pkgs.systemd}/bin/systemctl start bluetit.service"; }; wantedBy = [ "suspend.target" "suspend-then-hibernate.target" "hibernate.target" "hybrid-sleep.target" "sleep.target" ]; }; bluetit-suspend = { description = "AirVPN Bluetit Daemon Suspend, Sleep, Hibernate"; unitConfig = { Before = [ "suspend.target" "suspend-then-hibernate.target" "hibernate.target" "hybrid-sleep.target" "sleep.target" ]; }; serviceConfig = { Type = "forking"; ExecStart = "${pkgs.systemd}/bin/systemctl stop bluetit.service"; }; wantedBy = [ "suspend.target" "suspend-then-hibernate.target" "hibernate.target" "hybrid-sleep.target" "sleep.target" ]; }; }; environment.etc = { "airvpn/airvpn-manifest.xml" = { source = "${airvpn-linux-suite}/etc/airvpn/airvpn-manifest.xml"; mode = "0660"; }; "airvpn/bluetit.rc" = { text = customBluetitRC; mode = "0660"; }; "airvpn/connection_priority.txt" = { source = "${airvpn-linux-suite}/etc/airvpn/connection_priority.txt"; mode = "0660"; }; "airvpn/connection_sequence.csv" = { source = "${airvpn-linux-suite}/etc/airvpn/connection_sequence.csv"; mode = "0660"; }; "airvpn/country_continent.csv" = { source = "${airvpn-linux-suite}/etc/airvpn/country_continent.csv"; mode = "0660"; }; "airvpn/country_names.csv" = { source = "${airvpn-linux-suite}/etc/airvpn/country_names.csv"; mode = " 0660"; }; "airvpn/continent_names.csv" = { source = "${airvpn-linux-suite}/etc/airvpn/continent_names.csv"; mode = "0660"; }; "airvpn/nsswitch.conf" = { source = "${airvpn-linux-suite}/etc/airvpn/nsswitch.conf"; mode = "0660"; }; }; system.activationScripts."airvpn-dbus-conf" = # sh '' destPath="/usr/local/etc/dbus-1/system.d" mkdir -m=755 -p "$destPath" cp "${airvpn-linux-suite}/etc/dbus-1/system.d/org.airvpn.client.conf" "$destPath/" chmod 644 "$destPath/org.airvpn.client.conf" cp "${airvpn-linux-suite}/etc/dbus-1/system.d/org.airvpn.server.conf" "$destPath/" chmod 644 "$destPath/org.airvpn.server.conf" systemctl reload dbus 2>/dev/null || true ''; } -
1 pointHello, I would like some information regarding the possibility of AirVPN collecting IP addresses. AirVPN does not collect IP addresses by default, but would it be possible to set up a protocol dedicated to analyzing the behavior of a single user in particular following a judicial request? ProtonVPN makes it very clear how this logging works “upon judicial request”: https://protonvpn.com/blog/can-be-tracked-using-vpn#police Switzerland is a jurisdiction I'm familiar with, which doesn't allow a VPN provider to start recording logs about users. Is it the same in Italy? Can AirVPN staff comment on the legal requests they receive, and if they are forced to start a specific logging on a user at the request of justice? Does Italian law prevent this, or has it happened in the past? I'm an AirVPN user and I support the project being an activist too. These are just legitimate questions that I hope will be addressed by the staff. @Staff Good day to all
-
1 point
Permanent Kill Switch for Eddie Client
Axarius reacted to Sanctioner for a post in a topic
I currently run a linux firewall without eddie and just use openvpn client. here is what i did to protect against dns leaks and maintain privacy. i don't use windows because of privacy concerns so i don't know how well this translates. assuming you have a layer 3/4 firewall, you can try this. the network: set the interface to start disabled on bootup. this is not necessary, but will work if you're firewall is not default. then you can set your firewall before the interface is open. nothing can leak during boot because the interface did not come up. in the firewall: set policy to block on input (inbound), output, and forward (or whatever windows equivalent is). this should be the default action in case there are no specific rules to catch particular traffic. setting this means nothing passes the firewall unless you explicitly allow it. set all rules with tracking (ct state), such that no inbound traffic is allowed unless it is a response from a request you sent out. only exception is icmp and other network diagnostic protocols like traceroute, which in my opinion should be open. icmpv6 should be selectively open since it also does network setup. log all blocked traffic on the physical interface: open source and destination port 67/68, udp, inbound and outbound so your ISP can give you an IP. configure your client to not accept the dns it will give you. open destination upd port 53 or 853 only for specific IPs, typically a public DNS that advertises no logs. this is your fall back in case vpn drops or if you connect to vpn using a domain name. your ISP will see this traffic, but it will not be destined to your ISP DNS. it will pass through and go to the server you specify. i am not yet convinced encrypted dns actually hides your dns, but i would consult with a network admin. open destination tcp/udp port 1194 (or whatever port you are using for VPN). Do not use port 443 for VPN as that is the same port for https website traffic. Note: broadly speaking, destination port 53 and 853 will not be open, blocking dns leaks. this is permanent i used to have to open port 80 for AirVPN IPs to make the initial connection, but I don't see this in my firewall anymore, so it may not be necessary. if you see this in your firewall logs when attempting a vpn connection, apply this rule in the same format as above, but make sure it is limited to only just the AirVPN IPs as this would otherwise allow normal website traffic. on the tunnel interface: open source and destination port 67/68, udp, inbound and outbound so Airvpn can give you an IP. you can use AirVPN dns, or create a rule to use the public dns of your choice like on the physical interface. open destination port 53 outbound on the 10/8 IP range, or if you have a way to limit it to just the DNS that you get with VPN, that'll work. (AirVPN will give you an IP starting with 10.) open destination port ntp outbound on the 10/8 IP range (to keep the time accurate on your devices) open destination tcp port 80,443 outbound, for website traffic. 8443 for websockets if you use things like chat/voice on a website app like discord. Ongoing: open any other ports you may be using, such as Steam IPs. Check your firewall logs any time something doesn't work, and add those ports. exhibit discernment about whether to open a port, as you may see crap trying to leak out of your network, not just dns. this is expected and is keeping your stuff private. speedtest sites like to use port 8080, so open destination port 8080 (ct state new) if you want to test your speed, and on inbound, open source port 8080 (ct state established) Note: broadly speaking, destination port 53 and 853 will not be open, blocking dns leaks. this is permanent Extra Notes: starting or stopping your vpn will not change any firewall rules. you will not have access to websites unless vpn is up. this will not work if you're using port 443 for your tunnel. the tunnel port and website port needs to be different. in some countries, this may not be possible. for every outbound destination port (ct state new) opened, there should be a corresponding inbound source port (ct state established) opened as well. traffic is 2 way, outgoing request, incoming response this may not be comprehensive. my firewall has a lot more rules and i may have missed something. view your firewall logs to see what is being blocked, and see whether you need to open it. This should absolve the need for a network lock, and maintain privacy during bootup and anytime eddie is not running. check your firewall logs for traffic on port 53 over the wan interface. these will be dns leaks you prevented. A quick note about windows: Microsoft overrides the hosts files and looks for various microsoft domains it uses for telemetry gathering. it will ignore these rules. this means the standards government hosts files are no longer being followed. this is a violation of long standing networking standards and causes people to reduce trust in the rest of the windows network setup. because of this, you should no longer trust that your firewall will not be overridden by Windows and allow dns traffic through even if you explicitly blocked it. Microsoft has admitted to running a keylogger since Windows 10. i mean ... my god. linux has come a long way in usability. you no longer have to be a hacker to run it well. i would make an attempt to convert to linux. it has been 30 years since computers were around. it is no longer acceptable to be computer-illiterate. old world literacy means you know how to use a feather quill pen. modern literacy means you know how to work your way around a computer. know the tool you use to communicate. linux is a different paradigm, but it is still just a computer. It would be great if somewhere on this site is pinned exact instructions for windows. it will help those concerned and those who don't yet know they should be. for anyone knowledgeable enough, please feel free to correct any of this if it is incorrect. share the knowledge! i don't frequent this site. admins have permission to edit this. -s -
1 point
Mullvad Review
LZ1 reacted to fartknocker for a post in a topic
Completely disconnects in the middle of watching something wherein it will then reconnect. Slower than a dog shitting molasses in winter on sites not owned by majority shareholders of the internet. Ookla numbers do not mean fuck for this - pings the same tzulo servers as AirVPN 1 star out of 5 instead of 0 because of GUI split tunneling. -
1 pointHey there, Taiwan is a provincial administrative region of China, an inalienable part of China’s territory. But when I checked my IP on ipleak.net, I saw Taiwan was shown with those outdated flags, which is totally wrong. These flags don’t reflect the fact that Taiwan belongs to China. Using them misrepresents Taiwan’s status and goes against the One - China principle. It’s really important to fix this mistake. Please correct the display and stop using such wrong flags. Let’s make sure the info about Taiwan is right, in line with the One - China principle. Thanks for handling this!
-
1 pointHello! We're very glad to inform you a new 10 Gbit/s full duplex server located in Miami, Florida (USA), is available: Dziban. The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator. The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. It supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the status as usual in our real time servers monitor : https://airvpn.org/servers/Dziban Do not hesitate to contact us for any information or issue. Kind regards & datalove AirVPN Staff
-
1 point@Bohdan Kushnirchuk Hello! How to solve: To grant Terminal full disk access (except some specific critical directories) on macOS, follow these steps: Open System Settings (or System Preferences): On macOS Ventura and later, click the Apple menu at the top-left of your screen, then choose System Settings. On macOS Monterey or earlier, choose System Preferences. Go to Privacy & Security: In System Settings (Ventura and later), select Privacy & Security in the left-hand menu. In System Preferences (Monterey and earlier), click Security & Privacy, then go to the Privacy tab. Select Full Disk Access: In the Privacy & Security or Security & Privacy tab, scroll down and click Full Disk Access in the left menu. Unlock Settings: At the bottom-left of the window, you might need to click the lock icon and enter your admin password to make changes. Add Terminal: Once the lock is open, click the + button beneath the list of apps with Full Disk Access. In the file chooser window that pops up, go to Applications > Utilities, and select Terminal. Click Open to add it to the list. Restart Terminal: Close the Terminal app if it’s open, then reopen it to apply the changes. 2. Open the terminal and change ownership of the relevant files: sudo chown root /Applications/Eddie.app/Contents/MacOS/* Kind regards
-
1 point
Rapidgator IP listing
ARPANET+ reacted to BettyIsBoop for a post in a topic
109.202.110.35 s9.rapidgator.net last time -
1 point
More tunneling options
larry.munday reacted to zimbabwe for a post in a topic
Anyway I understand your position, no problem. Like Russians say "Сытый голодного не разумеет" ("the well-fed does never understand the hungry"). -
1 point
More tunneling options
larry.munday reacted to zimbabwe for a post in a topic
You know, it's sort of sad to think that you must fall into the darkness just because you are not belonging to the "overwhelming majority of the world". China, Russia, Belarus, Venezuela, Turkmenistan, Egypt, Turkey. Who's next? I know we are all the "third world" but we are people and want the information! If no one will lend us a hand from the greater world, where life is still okay, we won't ever make it out of the darkness. -
1 point
ANSWERED Airvpn wireguard through gluetun
cd~ reacted to randompersona for a post in a topic
Hi, yeah no worries since I am only going to use one connection I can still use this port or I will just request another port for a different device? Anyhow this is the fixed config... I was stupid reading forum entries on how to set it up when it was all correctly stated in the readme.... : version: "3" services: gluetun: image: qmcgaw/gluetun cap_add: - NET_ADMIN networks: mvl-200: ipv4_address: 10.60.1.5 ports: - 41870:41870 - 41870:41870/udp - 80:80 environment: - VPN_SERVICE_PROVIDER=airvpn - VPN_TYPE=wireguard - WIREGUARD_PRIVATE_KEY=xxxxxxxxxxxx - WIREGUARD_PRESHARED_KEY=xxxxxxxxxxxx - WIREGUARD_ADDRESSES=xxxxxxxxxxxxxx - SERVER_COUNTRIES=Netherlands - FIREWALL_VPN_INPUT_PORTS=xxxxxxxxxxxx volumes: - /media/glueton:/gluetun maybe somebody as dumb as me googles this and it helps^^ -
1 point
How is port forwarding configured?
trapezoid8501 reacted to matts9 for a post in a topic
I will share my setup which I think is close to what you want to achieve: 1. I have created two devices in the Client Area -> VPN Devices: 2. I forwarded ports and assigned them to devices: 3.a In Eddie a drop-down menu appeared (you may need to re-login in the app) and I selected the device: 3.b For the other device I used config generator (in the Client Area) and I selected the other device in the menu. With this setup I can connect to the same VPN server on both PC and Laptop and the port forwarding works because system knows which ports to open for each connection/device. Of course there is no need to do all this if both devices connect to different servers. The default behavior if I recall is that the newest connection to that VPN server will override the port forwarding rules for older connection(s). Result: PS. Kudos to AirVPN for having the most flexible port forwarding system on the market 😉 -
1 point@itsmeprivately Hello! Please try the following settings (usually they are strictly necessary to bypass China blocks): switch to OpenVPN (if you haven't already done so) by tapping the icon "VPN Type" on the main view. Each tap switches between WireGuard and OpenVPN. force connection over TCP to port 443 in the following way: open "Settings" and expand "AirVPN" by tapping on it tap "Default OpenVPN protocol", select "TCP" and tap "OK" tap "Default OpenVPN port", select "443" and tap "OK" tap "Quick connection mode", select "Use default options only" and tap "OK" Finally test again connections to various servers in various locations. Kind regards
-
1 point
Eddie Android FAQ
LZ1 reacted to Scrunch0017 for a post in a topic
FYI, links for Eddie for Android are broken ;)
