Jump to content
Not connected, Your IP: 3.227.3.146

Leaderboard


Popular Content

Showing content with the highest reputation since 10/18/19 in all areas

  1. 7 points
    Staff

    Spooky Halloween Deals

    Hello! We reluctantly have to announce gloomy news to you all: Spooky Halloween Deals are now available in AirVPN... Save up to 74% on AirVPN longer plans (*) (*) When compared to 1 month plan price Check all plans and discounts here: https://airvpn.org/plans If you're already our customer and you wish to jump aboard for a longer period any additional plan will be added on top of already existing subscriptions and you will not lose any day. Every plan gives you all the features that made AirVPN a nightmare for snoopers and a scary service for competitors: active OpenVPN 3 open source development ChaCha20 cipher on OpenVPN Data Channel for higher performance and longer battery life on tablets and smart phones IPv6 support, including IPv6 over IPv4 configurable remote port forwarding refined load balancing to squeeze every last bit per second from VPN servers free and open source software for Android, Linux, Mac and Windows easy "Configuration Generator" web interface for access through third party software guaranteed minimum bandwidth allocation GDPR compliance and very high standards for privacy protection no log and/or inspection of clients' traffic effective traffic leaks prevention by AirVPN software Tor support via AirVPN software on Linux, Mac and Windows various cryptocurrencies accepted without any intermediary crystal clear, easy to read Privacy Notice and Terms https://airvpn.org/privacy No tricks, only treats! Grim regards & datathrills AirVPN Staff
  2. 3 points
    Hello! We are very glad to introduce a new client software for Linux 64 bit and Linux Raspbian 32 bit (which is frequently installed in Raspberry PI), based on our own AirVPN OpenVPN 3 library. The software is an initial and temporary step toward a more refined product to meet right now various demands by many Linux and *BSD users. It does not have a code name yet, and it is just "AirVPN OpenVPN 3 client" at the moment. It will evolve in to an integrated client and daemon targeting Linux, Mac, OpenBSD and FreeBSD platforms. Main features: lightweight and stand alone binary no heavy framework required, no GUI tiny RAM footprint (less than 3 MB currently) lightning fast based on OpenVPN 3 library fork by AirVPN with tons of critical bug fixes from the main branch, new ciphers support and never seen before features ChaCha20-Poly1305 cipher support on both Control and Data Channel providing great performance boost on Raspberry PI and any Linux-based platform not supporting AES-NI robust leaks prevention through Network Lock based either on iptables or nftables through automatic detection proper handling of DNS push by VPN servers, working with resolv.conf as well as any operational mode of systemd-resolved additional features Versions for Mac, FreeBSD and OpenBSD will follow in the near future. The software is currently in alpha stage and it must be therefore and implicitly considered unstable and under development. Source code will be made public at the release of a stable version. If you wish to test, feel free to download the binaries here and report in this very thread any bug, glitch and anything you wish: Linux 64 bit version: https://eddie.website/repository/eddie/airvpn-static1.0alpha/airvpn-static-linux-1.0-alpha2.tar.gz Raspbian 32 bit version: https://eddie.website/repository/eddie/airvpn-static1.0alpha/airvpn-static-raspberry-1.0-alpha2.tar.gz How to install AirVPN client for Linux x86_64 and Raspberry Requirements ------------ Linux x86-64 CPU/architecture A reasonably recent 64 bit Linux distribution tar sha512sum (optional) Raspberry Linux Raspbian distribution tar sha512sum (optional) Linux Installation ------------------ Download airvpn-static-linux-1.0-alpha2.tar.gz [optional] Download airvpn-static-linux-1.0-alpha2.tar.gz.sha512 This file is required to check the integrity of the above tar archive. It is not mandatory but it is strongly advised to download this file and check the tar archive [optional] Open a terminal window [optional] Check the integrity of the tar archive by issuing this command: "sha512sum --check airvpn-static-linux-1.0-alpha.tar.gz.sha512" (without quotes) [optional] Make sure the command responds with "airvpn-static-linux-1.0-alpha.tar.gz: OK" Change your current directory to a convenient place, such as your home directory. This can be done by issuing the command "cd ~" (without quotes) Extract the tart archive by issuing this command on your terminal window: tar xvf airvpn-static-linux-1.0-alpha.tar.gz The process will create a directory airvpn-static-linux-x86_64 Issue the "cd airvpn-static-linux-x86_64" (without quotes) [optional] Check the integrity of the binary file airvpn. Issue this command from your terminal window: sha512sum --check airvpn.sha512" (without quotes) [optional] Make sure the command responds with "airvpn: OK" [optional] Check dynamic library availability. Issue the command "ldd airvpn" and make sure all the required dynamic libraries are available. No line of the output must contain "not found" the Linux client is now ready to be used and possibly copied to a different directory of your system. Please note the client needs root privileges. Your user must therefore be included in your system's "sudoers" (depending on specific Linux distribution) Raspberry/Raspbian Installation ------------------------------- Download airvpn-static-raspberry-1.0-alpha2.tar.gz [optional] Download airvpn-static-raspberry-1.0-alpha2.tar.gz.sha512 This file is required to check the integrity of the above tar archive. It is not mandatory but it is strongly advised to download this file and check the tar archive [optional] Open a terminal window [optional] Check the integrity of the tar archive by issuing this command: "sha512sum --check airvpn-static-raspberry-1.0-alpha.tar.gz.sha512" (without quotes) [optional] Make sure the command responds with "airvpn-static-raspberry-1.0-alpha.tar.gz: OK" Change you current directory to a convenient place, such as your home directory. This can be done by issuing the command "cd ~" (without quotes) Extract the tart archive by issuing this command on your terminal window: tar xvf airvpn-static-raspberry-1.0-alpha.tar.gz The process will create a directory airvpn-static-raspberry Issue the "cd airvpn-static-raspberry" (without quotes) [optional] Check the integrity of the binary file airvpn. Issue this command from your terminal window: sha512sum --check airvpn.sha512" (without quotes) [optional] Make sure the command responds with "airvpn: OK" [optional] Check dynamic library availability. Issue the command "ldd airvpn" and make sure all the required dynamic libraries are available. No line of the output must contain "not found" the Raspberry/Raspbian client is now ready to be used and possibly copied to a different directory of your system. Please note the client needs root privileges. Your user must therefore be included in your system's "sudoers" Running the Client ------------------ Run the client and display its help and become familiar with its options. From your terminal window issue this command: sudo ./airvpn --help After having entered root password, the client responds with: AirVPN OpenVPN 3 Client 1.0 alpha 1 usage: ./airvpn [options] <config-file> [extra-config-directives...] --help, -h : show this help page --version, -v : show version info --eval, -e : evaluate profile only (standalone) --merge, -m : merge profile into unified format (standalone) --username, -u : username --password, -p : password --response, -r : static response --dc, -D : dynamic challenge/response cookie --cipher, -C : encrypt packets with specific cipher algorithm (alg) --proto, -P : protocol override (udp|tcp) --server, -s : server override --port, -R : port override --ncp-disable, -n : disable negotiable crypto parameters --network-lock, -N : enable/disable network filter and lock (on|off, default on) --gui-version, -E : set custom gui version (text) --ignore-dns-push, -i : ignore DNS push request and use system DNS settings --ipv6, -6 : IPv6 (yes|no|default) --timeout, -t : timeout --compress, -c : compression mode (yes|no|asym) --pk-password, -z : private key password --tvm-override, -M : tls-version-min override (disabled, default, tls_1_x) --tcprof-override, -X : tls-cert-profile override (legacy, preferred, etc.) --proxy-host, -y : HTTP proxy hostname/IP --proxy-port, -q : HTTP proxy port --proxy-username, -U : HTTP proxy username --proxy-password, -W : HTTP proxy password --proxy-basic, -B : allow HTTP basic auth --alt-proxy, -A : enable alternative proxy module --dco, -d : enable data channel offload --cache-password, -H : cache password --no-cert, -x : disable client certificate --def-keydir, -k : default key direction ('bi', '0', or '1') --force-aes-cbc, -f : force AES-CBC ciphersuites --ssl-debug : SSL debug level --google-dns, -g : enable Google DNS fallback --auto-sess, -a : request autologin session --auth-retry, -Y : retry connection on auth failure --persist-tun, -j : keep TUN interface open across reconnects --peer-info, -I : peer info key/value list in the form K1=V1,K2=V2,... --gremlin, -G : gremlin info (send_delay_ms, recv_delay_ms, send_drop_prob, recv_drop_prob) --epki-ca : simulate external PKI cert supporting intermediate/root certs --epki-cert : simulate external PKI cert --epki-key : simulate external PKI private key --recover-network : recover network settings after a crash or unexpected exit The client needs a valid OpenVPN profile in order to connect to a server. You can create an OpenVPN profile by using the config generator available at airvpn website in your account "Client Area" To start a connection: sudo ./airvpn your_openvpn_file.ovpn To stop a connection, just type CTRL+C. The client will initiate the disconnection process and will restore your original network settings according to your options. To start a connection with a specific cipher: sudo ./airvpn --ncp-disable --cipher CHACHA20-POLY1305 your_openvpn_file.ovpn Please note, in order to properly work, the server you are connecting to must support the cipher specified with the "--cipher" option. If you wish to use CHACHA20-POLY1305 cipher, you can find AirVPN servers supporting it in our real time servers monitor https://airvpn.org/status : they are marked in yellow as "Experimental ChaCha20". To disable the network filter and lock: sudo ./airvpn --network-lock off your_openvpn_file.ovpn To ignore the DNS servers pushed by the VPN server: sudo ./airvpn --ignore-dns-push your_openvpn_file.ovpn Please note: the above options can be combined together according to their use and function. Note on network filter and lock ------------------------------- The client's network filter and lock uses natively iptables and nftables. The client will automatically use the infrastructure available on your system. Please note: services firewalld and ufw may interfere with the client's network filter and lock and you are strongly advised to not issue any firewall related command while the VPN connection is active. Note on DNS ----------- The client currently supports both resolv.conf and systemd-resolved service. When the client is running you are strongly advised to not issue any resolved related command (such as resolvectl) or change the resolv.conf file in order to make sure the system properly uses DNS pushed by the VPN server. Please note: DNS system settings are not changed in case the client has been started with "--ignore-dns-push". In this specific case, the connection will use your system's DNS. Recover your network settings ----------------------------- The client is currently in alpha stage and it must be therefore and implicitly considered unstable and under development. In case the client crashes or it is killed by the user (i.e. kill -9 `pidof airvpn`) as well as in case of system reboot while the connection is active, the system will keep and use all the network settings determined by the client; hence, your network connection will not work as expected, every connection is refused and the system will seem to be "network locked". To restore and recover your system network, you can use the client with the "--recover-network" option sudo ./airvpn --recover-network Please note in case of crash or unexpected exit, when you subsequently run the client it will warn you about the unexpected exit and will require you to run it again with the "--recover-network" option. It will also refuse to start any connection until the network has been properly restored and recovered. Kind regards and datalove AirVPN Staff
  3. 3 points
    renehoss

    Spooky Halloween Deals

    I for one am not happy about this gigantic popup on my computer screen every time I start a VPN session. This pop up is reason for me to _not_ prolong my subscription at this time and will decide at the moment it ends. Surely disappointed. I am a paying customer and do _not_ whish to be spammed by irrirating popups. Please fix this by making this kind of advertisments an option in the settings.
  4. 3 points
    BlueBanana

    ANSWERED Eddie and torrenting

    Disable µTP in the settings, as it is known to slow down your speeds. Forward a port in the AirVPN client area, enter it in qBittorrent and disable UPnP. Don't forget turn on AirVPNs Network Lock; better safe than sorry! Regards, BB
  5. 2 points
    Hello! We're very glad to inform you that three new 1 Gbit/s servers located in Chicago (Illinois, USA) are available: Fang, Kruger and Sneden. Note that the aforementioned servers replace Alkaid, Microscopium and Pavonis which do not meet anymore our technical requirements in terms of uptime and line reliability and will be withdrawn at the end of November. AirVPN clients will automatically show new servers; if you use OpernVPN or some other OpenVPN frontend, you can generate all the files to access any server through our configuration/certificates/key generator (menu "Client Area" -> "Config generator"). Servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP. Just like all the other AirVPN servers do, Fang, Kruger and Sneden support OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols, smart load balancing between OpenVPN daemons and hardened security against various attacks with separate entry and exit-IP addresses. You can check servers status as usual in our real time servers monitor: https://airvpn.org/servers/Fang https://airvpn.org/servers/Kruger https://airvpn.org/servers/Sneden Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  6. 2 points
    BlueBanana

    OpenVPN 2.4.8 released

    Hello, to whom it may concern, OpenVPN 2.4.8 has been released today: https://openvpn.net/community-downloads/ Happy Helloween! BB
  7. 2 points
    Hello! @giganerd Bug detected and fixed, a new testing version is almost ready to be deployed. Thanks! @QueenSasha Thank you, actually speed, efficiency and low RAM footprint have been a priority in OpenVPN 3.3 AirVPN design. Glad to hear that you get remarkable performance boost in Raspberry. Our OpenVPN 3 development goes on and is aimed as usual to bug fixing and new features implementation. Developer will answer soon to your technical questions, in the meantime feel free to keep us posted if you find any glitch or bug. @usr32 Great comparison thank you! We are surprised that you could beat AES with ChaCha20 in an AES-NI supporting machine. Can you please specify the whole architecture? We would like to make some verifications with OpenVPN 3+mbedTLS for AES-NI support in specific archs. @GJElde So you made an OpenVPN text configuration file +x and you tried to run it? @maxandjim Thank you, we will investigate asap. Kind regards
  8. 2 points
    spiderdisco

    Spooky Halloween Deals

    A notice about saving money is fine in an email. Having a popup on my computer telling me to "save money now!" is not the appropriate way to convey this information. Maybe it would have been in 1998, but its 2019 and popup ads are frowned upon by most people. There is a reason every modern web browser blocks pop up ads by default. Its an annoying and disrespectful way to get someones attention. We are paying customers and you already have our email addresses, just send us an email. That's how every other business communicates with their customers. I'm very happy with my AirVPN service, but I feel this type of notification should be handled differently.
  9. 2 points
    ssling

    Spooky Halloween Deals

    I don't think so. Giving better prices only month after this promo wouldn't be fair for customers.
  10. 2 points
    Staff

    Eddie Desktop 2.18beta released

    Version 2.18.5 (Wed, 30 Oct 2019 15:03:32 +0000) [new] Linux - systemd service [change] Code cleanup for stable release [bugfix] Windows - Service installation issue in Windows 7 [bugfix] Windows - SSL connections [bugfix] Suppression of some unwanted elevated log [bugfix] Windows bug 'Do you want to reset Eddie to default settings?' [bugfix] Fix for occasional error on exit, 'Object reference not set to an instance of an object'. All other reported issues are under investigation.
  11. 2 points
    Staff

    OpenVPN AirVPN 3.3.2 released

    Hello! We're very glad to inform you that on October the 10th 2019, we released a new version of OpenVPN AirVPN library fixing critical bugs affecting main OpenVPN 3 branch for Linux since years ago. Please see the changelog here: https://github.com/AirVPN/openvpn3-airvpn/blob/master/CHANGELOG.txt Critical bug fixes are essential to offer an OpenVPN AirVPN library based client on Linux. As those bugs remained unresolved for years in the main branch and made OpenVPN 3 de facto unusable in a safe way in Linux, we could not wait anymore. Therefore, we will be able to release a first beta version for Linux and macOS of a command line based, light-weight client software based on OpenVPN AirVPN 3.3.2 around October the 20th. FreeBSD and OpenBSD versions remain planned for the very near future. Kind regards and datalove AirVPN Staff
  12. 1 point
    The scoring rule is set at the bottom of the window, either "speed" or "latency". Roughly translated the rating means: ⭐⭐⭐⭐⭐ - "This is among the best servers for throughput for you." / "This server's latency is among the best for you." ⭐- "This server is unlikely to give you good speeds." / "Don't expect a quick and reactive experience when connected to this server."
  13. 1 point
    Hello! We're glad to inform you all that Chamaeleon https://airvpn.org/servers/Chamaeleon in Dallas now runs OpenVPN 2.5 daemons and is configured to accept connections with cipher CHACHA20-POLY1305 both on Control and Data Channel. You can connect in ChaCha20 with Eddie Android edition, OpenVPN 3.3 AirVPN alpha for Linux, or by using Eddie desktop edition with OpenVPN 2.5. To use cipher ChaCha20: with Eddie Android edition, select "Settings" > "AirVPN" > "Encryption Algorithm" > "CHACHA20-POLY1305" with OpenVPN 3.3 AirVPN please see here: with Eddie desktop edition, install OpenVPN 2.5, tell Eddie to use OpenVPN 2.5 in "Preferences" > "Advanced" , finally add the following custom directives in "Preferences" > "OVPN Directives" and make sure to connect or white list ONLY experimental ChaCha20 servers ncp-disable cipher CHACHA20-POLY1305 Servers supporting ChaCha20 are marked as "Experimental ChaCha20" in https://airvpn.org/status in a yellow warning. Kind regards
  14. 1 point
    Anybody know if AirVPN will be doing another Black Friday deal for renewing Annual Subscriptions to the service? Cheers muchly
  15. 1 point
    DeSegura

    [Request] Danish Routing Server

    Having used AirVPN for a couple of years, I'm generally satisfied with the overall service, but I find it kinda annoying that I cannot access certain content on sites like DR (https://www.dr.dk/tv), DPlay, Viafree, etc. while connected to one of AirVPN's servers, or just out of the country. Which is why I would like to request a Danish routing server. Have a nice weekend! Some old, but similar requests:
  16. 1 point
    Hmm, I'm sorry, but it's still mixing up v4 and v6... $ sudo ./airvpn -N off -i -6 yes IPv6.ovpn AirVPN OpenVPN 3 Client 1.0 alpha 2 - 7 November 2019 CONNECTING... Starting thread Thu Nov 7 18:28:12.805 2019 OpenVPN core 3.3.2 AirVPN linux x86_64 64-bit Thu Nov 7 18:28:12.809 2019 Frame=512/2048/512 mssfix-ctrl=1250 Thu Nov 7 18:28:12.812 2019 UNUSED OPTIONS 3 [resolv-retry] [infinite] 4 [nobind] 5 [persist-key] 6 [persist-tun] 7 [auth-nocache] 8 [route-delay] [5] 9 [verb] [3] 10 [explicit-exit-notify] [5] 18 [pull-filter] [ignore] [dhcp-option DNS] Thu Nov 7 18:28:12.812 2019 EVENT: RESOLVE Thu Nov 7 18:28:12.813 2019 WARNING: Network filter and lock is disabled Thu Nov 7 18:28:12.813 2019 Contacting [2001:ac8:20:2b:fbca:14fa:873e:4051]:443 via UDP Thu Nov 7 18:28:12.813 2019 EVENT: WAIT Thu Nov 7 18:28:12.813 2019 net_route_best_gw query IPv6: 2001:ac8:20:2b:fbca:14fa:873e:4051/128 Thu Nov 7 18:28:12.813 2019 sitnl_route_best_gw result: via fe80::9a9b:cbff:fe6d:a378 dev enp35s0 Thu Nov 7 18:28:12.813 2019 Thu Nov 7 18:28:12.813 2019 EVENT: DISCONNECTED connect error: ipv4_exception: error parsing IPv4 address '2001:ac8:20:2b:fbca:14fa:873e:4051' : Invalid argument Thread finished STATS: Profile is the same.
  17. 1 point
    When eddie-ui opened up, I selected the 'Settings' icon - this brought up the 'Settings Menu'. On the Settings Menu, there is a 'Layer IPv6' option. On the drop-down tab next to it, I selected 'Blocked'. After that, I was able to access the Airvpn service. Thank you very much for your kind help. I was a little worried things wouldn't work out - but I'm very happy to report I now have a properly running Airvpn service. This would not be possible without your contribution. Thank you so much! I am eternally grateful
  18. 1 point
    Bug report to check: the software freezes when it runs with a profile containing a remote line with a name resolving to multiple addresses . After a forced kill, software doesn't restore fw rules correctly with --recover-network when launched again Test for example with: remote europe.all.vpn.airdns.org 443 -- qs
  19. 1 point
    Did a clean install and fully updated. Buster on a headless Pi4 and set up my wifi AP with this https://www.raspberrypi.org/documentation/configuration/wireless/access-point.md#internet-sharing Installed the Alpha1 and tried various config files and all seem to work and connect seamlessly, good speeds. Nothing works on the AP though through the VPN, I can connect and ping wlan0 and tun0 from windows but no internet. This is probably blatantly obvious to most but I'm sadly out of my depth here so I'll leave this thread to the pros. --recover-network gives the same fault as I mentioned earlier, no backup of resolv.conf, though when killing the connection with ctrl/c the last thing it says is "successfully restored DNS" Ctrl/C kills everything, kills the ssh shell and I can't ssh back in to either eth0 or wlan0 #poweroff Good luck with the project, I will keep my eye on it :-)
  20. 1 point
    sorry, i am deeply ashamed, what a stupid mistake.
  21. 1 point
    usr32

    AirVPN client based on OpenVPN 3.3 AirVPN

    That is great news, thank you, keep up the good work. I performed a small benchmark for fun, comparing the throughput in a VM. What is weird is the Tx/Rx "reversal" with OpenVPN 2.4.4 versus 3.3.2 but probably just the peak values are relevant. ~30% more performance is something. Expected a little more but the CPU is heavily throttled (and supports AES-NI), so I guess this is a very good result. Here is the test. ### All tests performed on lowest cheapo cloud instance with Luhman ## No VPN # Baseline iperf3 Network Speed Tests (IPv4): --------------------------------- Provider | Location (Link) | Send Speed | Recv Speed | | | Bouygues Telecom | Paris, FR (10G) | 967 Mbits/sec | 7.44 Gbits/sec Online.net | Paris, FR (10G) | 962 Mbits/sec | 7.88 Gbits/sec Severius | The Netherlands (10G) | 966 Mbits/sec | 2.72 Gbits/sec Worldstream | The Netherlands (10G) | 966 Mbits/sec | 7.51 Gbits/sec wilhelm.tel | Hamburg, DE (10G) | 948 Mbits/sec | 7.20 Gbits/sec Hostkey | Moscow, RU (1G) | 624 Mbits/sec | 909 Mbits/sec Velocity Online | Tallahassee, FL, US (10G) | 878 Mbits/sec | 958 Mbits/sec Airstream Communications | Eau Claire, WI, US (10G) | 834 Mbits/sec | 294 Mbits/sec ## With OpenVPN 2.4.4 and AES-256-GCM # Test 1 iperf3 Network Speed Tests (IPv4): --------------------------------- Provider | Location (Link) | Send Speed | Recv Speed | | | Bouygues Telecom | Paris, FR (10G) | 200 Mbits/sec | 162 Mbits/sec Online.net | Paris, FR (10G) | 210 Mbits/sec | 120 Mbits/sec Severius | The Netherlands (10G) | 183 Mbits/sec | 67.5 Mbits/sec Worldstream | The Netherlands (10G) | 206 Mbits/sec | 68.5 Mbits/sec wilhelm.tel | Hamburg, DE (10G) | 216 Mbits/sec | 59.7 Mbits/sec Hostkey | Moscow, RU (1G) | 135 Mbits/sec | 78.7 Mbits/sec Velocity Online | Tallahassee, FL, US (10G) | 69.6 Mbits/sec | 61.6 Mbits/sec Airstream Communications | Eau Claire, WI, US (10G) | 62.6 Mbits/sec | 45.4 Mbits/sec # Test 2 iperf3 Network Speed Tests (IPv4): --------------------------------- Provider | Location (Link) | Send Speed | Recv Speed | | | Bouygues Telecom | Paris, FR (10G) | 216 Mbits/sec | 104 Mbits/sec Online.net | Paris, FR (10G) | 252 Mbits/sec | 101 Mbits/sec Severius | The Netherlands (10G) | 198 Mbits/sec | 84.6 Mbits/sec Worldstream | The Netherlands (10G) | 226 Mbits/sec | 73.3 Mbits/sec wilhelm.tel | Hamburg, DE (10G) | 238 Mbits/sec | 62.4 Mbits/sec Hostkey | Moscow, RU (1G) | 129 Mbits/sec | 160 Mbits/sec Velocity Online | Tallahassee, FL, US (10G) | 62.1 Mbits/sec | 75.7 Mbits/sec Airstream Communications | Eau Claire, WI, US (10G) | 77.9 Mbits/sec | 67.6 Mbits/sec ## With AirVPN OpenVPN 3 Client 1.0 alpha 1 and CHACHA20-POLY1305 # Test 1 iperf3 Network Speed Tests (IPv4): --------------------------------- Provider | Location (Link) | Send Speed | Recv Speed | | | Bouygues Telecom | Paris, FR (10G) | 40.3 Mbits/sec | 303 Mbits/sec Online.net | Paris, FR (10G) | 56.7 Mbits/sec | 264 Mbits/sec Severius | The Netherlands (10G) | 83.2 Mbits/sec | 213 Mbits/sec Worldstream | The Netherlands (10G) | 47.8 Mbits/sec | 283 Mbits/sec wilhelm.tel | Hamburg, DE (10G) | 83.5 Mbits/sec | 285 Mbits/sec Hostkey | Moscow, RU (1G) | 65.4 Mbits/sec | 106 Mbits/sec Velocity Online | Tallahassee, FL, US (10G) | 48.9 Mbits/sec | 106 Mbits/sec Airstream Communications | Eau Claire, WI, US (10G) | 12.0 Mbits/sec | 55.6 Mbits/sec # Test 2 iperf3 Network Speed Tests (IPv4): --------------------------------- Provider | Location (Link) | Send Speed | Recv Speed | | | Bouygues Telecom | Paris, FR (10G) | 134 Mbits/sec | 333 Mbits/sec Online.net | Paris, FR (10G) | 166 Mbits/sec | 274 Mbits/sec Severius | The Netherlands (10G) | busy | 254 Mbits/sec Worldstream | The Netherlands (10G) | 121 Mbits/sec | 334 Mbits/sec wilhelm.tel | Hamburg, DE (10G) | 157 Mbits/sec | 304 Mbits/sec Hostkey | Moscow, RU (1G) | 50.2 Mbits/sec | 208 Mbits/sec Velocity Online | Tallahassee, FL, US (10G) | 45.9 Mbits/sec | 92.5 Mbits/sec Airstream Communications | Eau Claire, WI, US (10G) | 98.3 Mbits/sec | 74.1 Mbits/sec
  22. 1 point
    A problem....... error
  23. 1 point
    Ow lord I figured it out. In the synology reconnection script mentioned here: There is a part where it will get your public IP address to see if you're still online. While that script works normally, if you're connection is maxed out by torrent connections, it will not be able to reach the website and return nothing, thus triggering the reconnect in the script. 😬 Took me way too long to figure this out ...
  24. 1 point
    It mixes up v4 and v6 somewhere. $ sudo ./airvpn IPv6.ovpn -i --ipv6 yes IPv6.ovpn AirVPN OpenVPN 3 Client 1.0 alpha 1 CONNECTING... Starting thread Fri Nov 1 18:00:43.484 2019 OpenVPN core 3.3.2 AirVPN linux x86_64 64-bit Fri Nov 1 18:00:43.485 2019 Frame=512/2048/512 mssfix-ctrl=1250 Fri Nov 1 18:00:43.487 2019 UNUSED OPTIONS 3 [resolv-retry] [infinite] 4 [nobind] 5 [persist-key] 6 [persist-tun] 7 [auth-nocache] 8 [route-delay] [5] 9 [verb] [3] 10 [explicit-exit-notify] [5] 18 [pull-filter] [ignore] [dhcp-option DNS] 39 [IPv6.ovpn] Fri Nov 1 18:00:43.487 2019 EVENT: RESOLVE Fri Nov 1 18:00:43.487 2019 Network filter and lock is using iptables Fri Nov 1 18:00:43.491 2019 Successfully loaded kernel module iptable_filter Fri Nov 1 18:00:43.500 2019 Successfully loaded kernel module iptable_nat Fri Nov 1 18:00:43.503 2019 Successfully loaded kernel module iptable_mangle Fri Nov 1 18:00:43.506 2019 Successfully loaded kernel module iptable_security Fri Nov 1 18:00:43.509 2019 Successfully loaded kernel module iptable_raw Fri Nov 1 18:00:43.512 2019 Successfully loaded kernel module ip6table_filter Fri Nov 1 18:00:43.519 2019 Successfully loaded kernel module ip6table_nat Fri Nov 1 18:00:43.522 2019 Successfully loaded kernel module ip6table_mangle Fri Nov 1 18:00:43.525 2019 Successfully loaded kernel module ip6table_security Fri Nov 1 18:00:43.527 2019 Successfully loaded kernel module ip6table_raw # Warning: iptables-legacy tables present, use iptables-legacy-save to see them # Warning: ip6tables-legacy tables present, use ip6tables-legacy-save to see them Fri Nov 1 18:00:43.536 2019 Network filter successfully initialized Fri Nov 1 18:00:43.536 2019 Local IPv4 address 192.168.110.11 Fri Nov 1 18:00:43.536 2019 Local IPv4 address 192.168.122.1 Fri Nov 1 18:00:43.536 2019 Local IPv6 address 2003:f5:f713:6500:da0f:dfee:ec7:71ae Fri Nov 1 18:00:43.536 2019 Local IPv6 address fe80::588d:c0ef:5820:9720 Fri Nov 1 18:00:43.536 2019 Local interface enp35s0 Fri Nov 1 18:00:43.536 2019 Local interface virbr0 Fri Nov 1 18:00:43.536 2019 Local interface virbr0-nic Fri Nov 1 18:00:43.536 2019 Setting up network filter and lock Fri Nov 1 18:00:43.536 2019 OpenVPN profile has multiple remote directives. Temporarily adding remote servers to network filter. Fri Nov 1 18:00:43.536 2019 WARNING: Cannot resolve 2001:ac8:20:2b:fbca:14fa:873e:4051 Fri Nov 1 18:00:43.536 2019 WARNING: Cannot resolve 2001:ac8:20:2c:463c:42f4:f700:3d77 Fri Nov 1 18:00:43.536 2019 WARNING: Cannot resolve 2a00:c98:2050:a007:b750:ad0d:3df1:5950 Fri Nov 1 18:00:43.536 2019 WARNING: Cannot resolve 2001:ac8:20:99:744e:9a79:9f43:89c7 Fri Nov 1 18:00:43.536 2019 WARNING: Cannot resolve 2a00:c98:2050:a02f:d4fa:1823:c0b2:2a77 Fri Nov 1 18:00:43.536 2019 WARNING: Cannot resolve 2a02:c205:0:1031:79f8:734d:afb7:43c Fri Nov 1 18:00:43.536 2019 WARNING: Cannot resolve 2a00:c98:2050:a02f:b240:4a82:7fb6:af29 Fri Nov 1 18:00:43.536 2019 WARNING: Cannot resolve 2001:ac8:20:97:ec6c:776:1763:3ee7 Fri Nov 1 18:00:43.536 2019 WARNING: Cannot resolve 2001:ac8:20:98:5307:a6cf:d139:d129 Fri Nov 1 18:00:43.536 2019 WARNING: Cannot resolve 2001:ac8:20:2a:fa58:8bc5:ea41:6ecc Fri Nov 1 18:00:43.536 2019 WARNING: Cannot resolve 2001:ac8:20:9a:9a5a:d9af:457a:bae8 Fri Nov 1 18:00:43.536 2019 WARNING: Cannot resolve 2001:ac8:20:5:6000:4b07:7b1c:4c0 Fri Nov 1 18:00:43.536 2019 WARNING: Cannot resolve 2a00:c98:2050:a02f:9a5:8bac:eb1d:d313 Fri Nov 1 18:00:43.536 2019 WARNING: Cannot resolve 2001:ac8:20:96:b054:682e:3392:c1ff Fri Nov 1 18:00:43.536 2019 Allowing system DNS 192.168.110.22 to pass through the network filter Fri Nov 1 18:00:43.561 2019 Network filter and lock successfully activated Fri Nov 1 18:00:43.561 2019 Contacting [2001:ac8:20:2a:fa58:8bc5:ea41:6ecc]:443 via UDP Fri Nov 1 18:00:43.561 2019 EVENT: WAIT Fri Nov 1 18:00:43.561 2019 net_route_best_gw query IPv6: 2001:ac8:20:2a:fa58:8bc5:ea41:6ecc/128 Fri Nov 1 18:00:43.562 2019 sitnl_route_best_gw result: via fe80::9a9b:cbff:fe6d:a378 dev enp35s0 Fri Nov 1 18:00:43.562 2019 Fri Nov 1 18:00:43.562 2019 EVENT: DISCONNECTED Fri Nov 1 18:00:43.581 2019 Network filter successfully restored connect error: ipv4_exception: error parsing IPv4 address '2001:ac8:20:2a:fa58:8bc5:ea41:6ecc' : Invalid argument Thread finished
  25. 1 point
    robertoohoho

    Spooky Halloween Deals

    Hi, The popup showed twice on my system (OS X). This method doesn't match what I expect from AirVPN, no matter the good intentions behind. Anyways, I renewed. Regards.
  26. 1 point
    Staff

    AirVPN becomes an EFF Super Major Donor

    Hello! We proudly announce that today AirVPN has become an Electronic Frontier Foundation "Super Major Donor". The Electronic Frontier Foundation is the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development. We work to ensure that rights and freedoms are enhanced and protected as our use of technology grows. https://www.eff.org Check our mission page: https://airvpn.org/mission Kind regards and datalove AirVPN Staff
  27. 1 point
    Flic

    AirVPN becomes an EFF Super Major Donor

    Now this is great news. Well done Air. I have done lots of checking up on EFF, and I am a fan of their work. Now it feels to me that your 'super contributions' to EFF includes just a little bit from me via my Air subscription.... ... I like it
  28. 1 point
    B3nB3n

    Spooky Halloween Deals

    I have to say I am very very happy about the pop up! as long as it is only from time to time and really just about changelogs or promos, you can continue. I dont check my emails always and I would have missed this. Another 3 years... thanks
  29. 1 point
    giganerd

    Spooky Halloween Deals

    It's not an ad, though, is it? For the record, a working email address is not required for registration here, so such a notification can end up nowhere. Also, did you just try to tell that you don't get spammed via email enough? We can partially agree upon that at least. Maybe a way of setting it in the client area, but a bit difficult to implement, I must add.
  30. 1 point
    ssling

    Spooky Halloween Deals

    When this promo ends anyway? I don't see any info, is this one day only?
  31. 1 point
    @Staff any plans to revisit this? It has been a few years now, and things have changed for the better in India, wrt Internet. Please do consider opening an India server.
  32. 1 point
    spiderdisco

    Spooky Halloween Deals

    I appreciate the deal but the popup notification in eddie is really obnoxious. It shows up on every device whenever I launch eddie and made me think I had adware installed for a second. Its really not a good look. Maybe just send an email when there are sales and give us an option to opt out of them in our account settings, like so many other services do.
  33. 1 point
    scgt1

    Spooky Halloween Deals

    I really like the Eddie Client notice about this deal. I missed the Birthday promo due to not even knowing about it. The client notice is a very nice change. Can't help but wonder if the Black Friday promo may be a larger discount. Looking back on the Facebook page there wasn't even a Halloween promo offered and BF 2018 was a 67.5% discount. So debating pulling the trigger now or holding out for BF. hmmm choices choices. Please thought keep with the Eddie Client notices about promos that was a very nice change.
  34. 1 point
    LZ1

    Spooky Halloween Deals

    Hello! Haha, this sudden orange onslaught did provide a slight scare, I must admit. But this is new: you're now doing Halloween celebrations. Staff, I suggest you also do Chinese New Year celebrations around January/February. That, coupled with the Black Friday, Christmas/New Year and Birthday celebrations, will ensure you've got the VPN market cornered from November to May. Leaving only a few months of summer for the competition, where in many places of the world, it'll be too hot to be sitting inside using a VPN anyway . At any rate, I think you've used up the last 9 years of marketing budget getting that font to work .
  35. 1 point
    mdoverl

    ANSWERED Port Forwarding with Calibre

    It's a good idea, although I'd prefer something like nslookup.info because it's minimalistic but covers all features of a DDNS service. Also, it's open source. I'll look into that, thank you. I'm experimenting with a few this being that this is my first server I'm building. It's pretty fun and exciting.
  36. 1 point
    giganerd

    ANSWERED Port Forwarding with Calibre

    In a command prompt/PowerShell window: nslookup servername_exit.airvpn.org If you hover over it, you can see the error code and a short explanation. It's not about the ports. All your ports are forwarded to all connected devices, so when you open somename.airdns.org:12345 it can try connecting to the first device although you wanted to reach the second. It's not ideal, and the workaround is to stay connected to AirVPN on the server you're running Calibre on, finding out its exit IP and always use that. This also means to not use any of the *.airdns.org addresses to connect to AirVPN servers to not make your life difficult. Pick one and stick to it, it's a server, anyway. Please stop testing port 8080 from the outside, you'll never reach it. It's the local port forwarded to the internal 10.x.x.x address of your OpenVPN tunnel and therefore "invisible" to all connecting to the Calibre server. If it doesn't go through, check on which interface/address Calibre is listening. Maybe even disable all firewalls. If you use antivirus, disable all functionality of it temporarily as well.
  37. 1 point
    RaineyPass

    ProtonVPN (from Protonmail)

    Update on Proton VPN, 20Oct2019 I upgraded from free Proton Mail to their Plus VPN plan, which promises the highest speeds and includes the same email, no new features. About six months ago or so, Proton began uploading user crash data with no opt out and began performing more slowly than previously, so I decided to not renew my subscription, which had a few months to go yet. This is where the fun began. A few weeks before subscription expiration, I tried in futility to find a way, anywhere, on their site to cancel but could not, only a mention in a forum post to send a ticket and Proton would decide if your reason for canceling was sufficient (flashback to Steam, argh!) In other forums, I read numerous complaints about how much a PIA Proton was when attempting a cancel, so I decided to just let the service run out since the card I used expired long ago. A week or so after the VPN subscription ran out, I found I was locked out of my email and could only gain access if I renewed the VPN. Apparently, my free email was bundled with the VPN when I moved to Plus and their "recurring" subscription had no leeway. There was no indication of this anywhere. After all the underhanded nonsense from Proton, I just deleted my email account (made no sense that I could even do that if all the emails were ransomed by Proton Plus; and btw reduced to zero value after account deletion, ha ha!) and all was well again, minus some emails and tons of spam. Proton VPN seemed to be good when I signed up but the devil's in the details; if important terms are obscure and they're using the world's worst ransomware on members, is their service really secure? Ptoton's very expensive, far too expensive for anything but the best customer service and fastest servers. Not recommended.
  38. 1 point
    The discussion about Eddie has become a real hot topic in the past weeks. And understandably so, given the fact that "Eddie" is a core element of the whole service and a highly sophicticated one too. But i think that one has to consider the fact that AIR has to develop software for 4 OS'es (WIndows, Linux, Mac and Android) if i am not mistaken. That's a hell lot of work to do and it takes lots of time to develop a fully functioning client from scratch. There are other VPN services out there that give a shit about their client, hell, they don't even have one for Linux, let alone for Mac OS X. The community itself is a little "spoiled" in this regard, if i may say so. I am a bit impatient too and i am awaiting the release of the new client quite eagerly. But it doesn't help much if the community puts pressure on the devs. If they release the new client too early with a lot of bugs, then the community complains about a buggy client, and all hell breaks loose. So just let the devs make their job and i am confident that a new version is coming soon. Regards, BB
  39. 1 point
    What follows is me, unable to type non-quoted text: Happy 9th, I am very satisfied with your service. Great news, looking forward to this release.
  40. 1 point
    air521745

    AirVPN becomes an EFF Super Major Donor

    Just wanted to add my thanks as well. Private companies are under no such obligations, so every gesture in helping out like this is really appreciated. Couldn't find Air's banner on the EFF's Thanks page though, so make sure they actually add it at some point. Next stop; FSFE.org.
  41. 1 point
    Essentially, passive TCP/IP fingerprinting by analyzing some timings. The developer of WITCH? once wrote an article on Medium about it.
  42. 1 point
    Hello! We're glad to inform you that we support the journalistic work of Caitlin Johnstone, "rogue journalist". Her journalistic work is entirely supported by her readers. Her articles are not copyrighted and she gives unconditional permissions to republish them or part of them free of charge. https://caitlinjohnstone.com Check our mission page: https://airvpn.org/mission Kind regards and datalove AirVPN Staff
  43. 1 point
    Problem solved: Enable UDP for tracker support was disabled. /Close thread.
  44. 1 point
    Greeting everyone. I tried few different solutions like disabling IPv6 which cause Eddie to freak out and restart the connect since it will try to reattempt to connect IPv6. After looking around and found a right solution for this issue. It is something to do with the gateway that OpenVPN don't have the support for. Office 365 and Microsoft product relies on gateway for detecting network activity. The way Eddie/OpenVPN are designed to keep the gateway blank is the cause of the issue. The I found the solution from this forum, Here is the link to the actual solution of the problem. I can confirm it finally working with Eddie running. https://www.macwheeler.com/windows-10-office-365-cannot-connect-over-openvpn-fixed/ It like what JimDandy posted. The guide recommend putting 192.168.0.1 in TAP's gateway in IPv4 Advanced option. The link have the guide step by step how to do it. I can confirm it works for me. And I haven't got any complaints from OneDrive and Office 365 with this guide.
  45. 1 point
    What are your thoughts? Is this more spyware? Or is this a better option that things like Silverlight for playing video via HTML5? Should it be disabled if you are not immediately using it? Or should it be disabled altogether? I do not trust Google. But it does work well for things like Amazon Prime Video.
  46. 1 point
    firewalker

    Won't Connect at checking Ipv6

    I have run into a similar issue, so I switched back to the last version available in the changelog, the modern client seems to be giving me more trouble then the old.
  47. 1 point
    I can explain very simply with qbittorrent. 1. Launch airvpn, connect to a server (preferably lowest ping, closest to you) 2. Login on airvpn.org, go to client area and then forwarded ports. Forward any port that is available (just choose a random port that is available) 3. Download qbittorrent and install. Launch https://www.qbittorrent.org/download.php 4. In qbittorrent, go to options, connection. Put your forwarded port that was in step 2. Uncheck upnp/nat-pmp 5. In qbittorrent, go to options, advanced. Choose Ethernet 2 (or whatever your tap adapter is, it is usually ethernet 2 if you don't have any other vpn installed) 6. Click OK and restart qbittorrent. 1. You must connect to airvpn before launching qbittorrent and 2. you should see DHT: x nodes go up on the bottom right when you start qbittorrent if everything is normal. 3. The plug picture should turn green once you download things. You can also enable "Execution log" by going to View-->log-->check show on qbittorrent. By doing this, you can check at startup if everything is working by checking the ip address (should show airvpn ip address on log) If you launch qbittorrent without connecting to airvpn first, you will see a bunch of red lines on log which indicates things aren't normal. The rest of the settings on qbittorrent are not vpn related and can be adjusted to your preference. Ex.) connection limits http://infinite-source.de/az/az-calc.html
  48. 1 point
    I have solved the problem. It had to do with the DOS Defense protection of my Draytek router's firewall. I now use TCP instead of UDP and I now get full speed! So take a look at your router's firewall if you are experiencing the same problems. Edit: Some Swedish servers are also slow for me, but that's another issue.
  49. 1 point
    Staff

    A review on another site

    @ThatOnePrivacyGuy Thank you for your extensive reply. Unfortunately, we think that it does not address our corrections at all. First of all, this is not the original sentence of your article, The original sentence is: "Do a search for “AirVPN review” and just try to find one that isn’t written by someone paid to do so." which clearly suggests that an overwhelming majority of reviews are paid by us. This is false and defamatory because we don't pay for any review. Additionally, at the moment of this writing and at the moment of the publication of your article, most of the reviews did/do not even contain a referral link. Tom's Hardware, Torrentfreak, vpnMentor, your own and even other reviews you can find on the first Google Search page are all reviews which not only have not been paid, but do not even include a referral link. Therefore, if the aim of this thread is having a fair exchange of opinions to improve both sides, we would recommend that you do not apply old rhetoric tricks (admitting that a sentence is wrong to replace it with a different but equally false sentence) to twist your sentences in the mind of the readers, according to your own requirements of trust and transparency and your calls for "ethical" behaviors. This is your opinion. We can respect it but we can't share it. The requirement of a disclaimer for a review including a referral link is in our opinion correct and we already ask for it to our few, major referrals (who have of course the right to refuse if the applicable law for their web site does not require that). Of course we can't check all the referrals, it's humanly impossible, but we check all the referrals that refer to us more than 5-6 users per week. The referrals who don't refer any user to us can be checked randomly, but of course have a lower priority since they don't harm anybody. About copyright enforcement we are in total disagreement. In the first place we are not copyright enforcers. It is not our duty, not our competence and not our will. Under this respect, your requirement is in our opinion unreasonable and legally unsustainable . And since you stress a lot on "ethics" throughout your whole message, we think that your requirement is contradictory. Copyright is one sector of the wide set of different laws and international trade agreements pertaining to intellectual monopolies, which in the last century have been severely damaging innovation, harming and limiting freedom of expression, imposing barriers to seek and impart information and access to culture, science and art, and above all have been causing and are causing millions of deaths and dreadful suffering to hundreds of millions of people. We can discuss endlessly about the horrors and the good of intellectual monopolies, but asking us to act as a copyright enforcer against some third-party web site is not only unreasonable under a legal point of view, but also unethical, because we would become a small part of that huge "machinery" that promotes one of the set of laws and one of those "mind attitudes" which are one of the causes (and not a negligible one, for what you can see in the last decades) of humankind pain especially in developing countries. Let's leave this task to the "competent authorities". That's correct. If you have time, please feel free to inform us if some review containing a referral link infringes the legal framework of the European Union on this subject. While we check all the referrals which bring to us customers, it's impossible for us to check all of those that don't send referred persons, so we leave the task to the public authorities who have the competence and duty to do so. Last but not least, feel free to cite the reviews that in your opinion talk about our service with undeserved terms. We ask because we usually see that the reviews, even those that contain referral links, miss the strong points of our service, in our opinion - but of course we underline that it's impossible to read them all. Kind regards
  50. 1 point
    You are not concealing the fact you connect to a VPN. You are right that any ISP or monitoring agent can see destination/origination packets from your IP address, but what you are concealing is what content you are browsing/downloading once connected to the VPN. The traffic between airVPN and your IP address is encrypted (hopefully using strong techniques that aren't being circumvented), so as long as 1 or more others are also connected to the same airVPN server, then it is more difficult to tie traffic back to your IP address. The keywords being "more difficult", becuase it is not impossible. Also AIRVPN does not keep logs, so veiwing exactly what you are doing in real time would require even more resources to monitor. If you want to be completely anonymous that you are connecting and purchasing airVPN, then do not connect directly to AirVPN from your main IP. Connect over TOR, or through another or several VPN proxies. If you connected through proxies or TOR before purchasing AirVPN using bitcoin, then it would be even "more difficult" to tie payment, in addition the packets back to your IP address. Accepting Bitcoin is just another way to add a layer of complexity to payment back-tracing, and it's up to you to determine how complex you'd like that to be. It is also very convenient if you already have Bitcoin.
×
×
  • Create New...