Jump to content
Not connected, Your IP:


Popular Content

Showing content with the highest reputation since 07/14/19 in all areas

  1. 4 points
    Hello! AirVPN is very proud to introduce for the first time ever OpenVPN 3 support for ChaCha20-Poly1305 cipher with Eddie Android edition 2.4 beta 1. The new implementation means remarkably higher performance and longer battery life for your Android device. CPUs that do not support AES New Instructions, typically ARM CPUs mounted on most Android devices, are much faster to encrypt and decrypt a stream of data with ChaCha20 than AES. At the same time, ChaCha20 offers the same security when compared to AES. https://en.wikipedia.org/wiki/Salsa20#ChaCha_variant You can test right now the new cipher. We have prepared three test servers running OpenVPN 2.5 and supporting ChaCha20 in Canada and the Netherlands. When you pick ChaCha20 as cipher in Settings, Eddie will filter properly Air VPN servers to let you connect to them. You can participate to testing by joining the beta community in the Google Play Store here: https://play.google.com/apps/testing/org.airvpn.eddie You can also download Eddie Android 2.4 beta 1 apk directly from our repository: https://eddie.website/repository/eddie/android/2.4beta1/org.airvpn.eddie.apk The outstanding feature has been made possible by AirVPN implementation on "OpenVPN AirVPN" of new directives, never supported before by OpenVPN 3, as well as a brand new, rationally re-engineered class for AEAD ciphers, which currently includes both AES-GCM and ChaCha20. Development of OpenVPN 3 will go on during the next months. Here's the current status: Eddie Android edition available languages are: Chinese (simplified), Chinese (traditional), Danish, Dutch, English, French, German, Italian, Portuguese, Spanish, Russian, Turkish. Eddie for Android is free and open source software released under GPLv3. We invite you to check from independent 3rd parties lack of trackers code signatures, for example here: https://reports.exodus-privacy.eu.org/en/reports/search/org.airvpn.eddie Please feel free to report any bug, glitch etc. in the thread. Also, it would be great if you can report a comparison between performance from your Android device with AES and ChaCha20, on equal terms when possible (same experimental server, same load on your Android device...), including your Android version and device specifications if possible. New in version 2.4: Updated native library to OpenVPN 3.3 AirVPN ChaCha20-Poly1305 support on both OpenVPN Control and Data channels Support by OpenVPN 3 AirVPN of ncp-disable directive integrated in the app according to the cipher suite picked by the user For new features complete list, please see the changelog at the bottom of this post Main features: Free and open source OpenVPN GUI based on "OpenVPN 3.3 AirVPN" The only Android application officially developed by AirVPN Robust, best effort prevention of traffic leaks outside the VPN tunnel Battery-conscious application Low RAM footprint Ergonomic and friendly interface Ability to start and connect the application at device boot Option to define which apps must have traffic inside or outside the VPN tunnel through white and black list Localization in simplified and traditional Chinese, Danish, English, French, German, Italian, Portuguese, Russian, Spanish, Turkish Full integration with AirVPN Enhanced security thanks to locally stored encrypted data through master password Quick one-tap connection and smart, fully automated server selection Smart server selection with custom settings Manual server selection Smart attempts to bypass OpenVPN blocks featuring protocol and server fail-over Full Android TV compatibility including D-Pad support. Mouse emulation is not required. Enhancements aimed to increase accessibility and comfort to visually impaired persons AirVPN servers sorting options Customizable "Favorite" and "Forbidden" servers and countries OpenVPN mimetype support to import profiles from external applications Multiple OpenVPN profile support. The app now imports and manages multiple OpenVPN profiles Support for custom bootstrap servers Support for favorite and forbidden countries AirVPN broadcast messages support User's subscription expiration date is shown in login/connection information The app is aware of concurrent VPN use. In case another app is granted VPN access, Eddie acts accordingly and releases VPN resources Optional local networks access. In such case, local network devices are exempted from the VPN and can be accessed within the local devices Localization override. User can choose the default language and localization from one of the available ones Favorite and forbidden lists can be emptied with a single tap VPN Lock can now be disabled or enabled from settings VPN reconnection in case of unexpected OpenVPN disconnection. (It requires VPN Lock to be disabled) User can generate an OpenVPN profile for any AirVPN server or country and save it in OpenVPN profile manager Server scoring algorithm implementing the latest AirVPN balancing factors in order to determine the best server for quick connection Network name and extra information are shown along with network type Device network status management Kind regards & datalove AirVPN Staff Changelog 2.4 beta 1 (VC 24) - Release date: 19 July 2019 by ProMIND [ProMIND] Updated native library to "OpenVPN 3.3 AirVPN" supporting CHACHA20-POLY1305 cipher and ncp-disable profile option (forked from OpenVPN:master 3.2 qa:d87f5bbc04) [ProMIND] Updated default manifest to V256 airvpn_server_listview_item.xml [ProMIND] added a new layout for showing server's warning_open field AirVPNServerProvider.java [ProMIND] Added cipher filter according to user settings AirVPNServerSettingsActivity.java [ProMIND] Added encryption algorithm option for AirVPN servers AirVPNServer.java [ProMIND] Added class members to comply to Manifest V256 AirVPNServerGroup.java [ProMIND] New class for manifest V256 handling AirVPNUser.java [ProMIND] getOpenVPNProfile(): profile generator uses "cipher" and "ncp-disable" according to the user settings [ProMIND] getPasswordDialog(): soft keyboard is shown by default [ProMIND] loginDialog(): soft keyboard is shown by default CipherDatabase.java [ProMIND] New class for manifest V256 handling ConnectAirVPNServerFragment.java [ProMIND] Show a warning in yellow in case server has a warning_open status [ProMIND] Servers are now filtered according to selected encryption [ProMIND] searchDialog(): soft keyboard is shown by default ConnectionInfoFragment.java [ProMIND] Added cipher name and digest to info box OpenVPNTunnel.java [ProMIND] Added method getProtocolOptions() QuickConnectFragment.java [ProMIND] Show user selected encryption in status box SettingsActivity.java [ProMIND] Added encryption algorithm option for AirVPN servers SettingsManager.java [ProMIND] Added methods getAirVPNCipher() and setAirVPNCipher() SupportTools.java [ProMIND] Changed AIRVPN_SERVER_DOCUMENT_VERSION to 256 [ProMIND] editOptionDialog(): soft keyboard is shown by default VPN.java [ProMIND] Added class members cipherName and digest
  2. 2 points

    OpenVPN 3 development by AirVPN

    Hello! We are very glad to inform you that our OpenVPN 3 development is progressing swiftly. Today we implemented directive ncp-disable which was still unsupported in OpenVPN 3. https://github.com/AirVPN/openvpn3 The directive is instrumental to allow clients Data Channel cipher free selection between those available on server, when ncp-ciphers is declared on server side, and keep at the same time total backward compatibility. Since when we implemented ChaCha20-Poly1305 https://airvpn.org/forums/topic/43850-openvpn-3-development/ on OpenVPN 3 Data Channel, "ncp-disable" has become a priority to provide servers and clients with maximum flexibility. We can therefore leave total freedom to clients to pick between AES-GCM, AES-CBC and ChaCha20 while preserving full backward compatibility. Clients with AES-NI supporting processors will prefer AES, while clients running on CPUs without AES-NI, for example most ARM CPUs, will of course tend to prefer ChaCha20. We are working hard to bring you first and foremost a new Eddie Android edition beta version to let you test ChaCha20-Poly1305 on your Android devices as soon as possible. All internal tests both with ChaCha20 and ncp-disable have been fully successful so far. Fingers crossed, maybe you will see a beta release as early as next week. https://github.com/AirVPN/openvpn3 Changelog 3.3 AirVPN - Release date: 13 July 2019 by ProMIND - [ProMIND] [2019/06/02] Forked master openvpn3 repository 3.2 (qa:d87f5bbc04) - [ProMIND] [2019/06/06] Implemented CHACHA20-POLY1305 cipher for both control and data channels - [ProMIND] {2019/07/10] Implemented ncp-disable profile option Kind regards and datalove AirVPN Staff
  3. 1 point
    Also in a DPI country - VPN over SSH and SSL work, though of course with significant speed hits. Also check out the ChaCha20 beta on android which, in this location at least, is working very well.
  4. 1 point
    Thank you @giganerd!! My apologies for the late response. I read everything from @LZ1 as you said, took me a while, but I am finally in! on Linux Mint and Android. Thanks again!
  5. 1 point

    OpenVPN 3 development by AirVPN

    Hello! On server side, we use OpenVPN 2.5 to support ChaCha20 on the Data Channel, so any server with OpenVPN 2.5 will be marked as "Experimental", to make clear that the OpenVPN running in it is a beta version. As soon as OpenVPN 2.5 stable is released, all the servers will be upgraded to support ChaCha20 on the Data Channel without the "Experimental" warning. Our next, imminent step is releasing Eddie Android edition with OpenVPN 3 supporting ChaCha20-Poly1305 to allow immediate testing from those devices based on Android that need ChaCha20 most, for performance and load reasons (such as any Android tablet, smart phone, Amazon Fire TV and any other Android based mediacenter using a CPU that does not support AES-NI). Kind regards
  6. 1 point

    Suggestion: run Tor exit nodes

    Hello! In addition to what HannaForest wrote, use end-to-end encryption in any case. Kind regards
  7. 1 point

    Five simultaneous connections per account

    Hello! We're glad to inform you that, from now on, every account can establish up to five simultaneous connections to AirVPN servers. As usual, no restrictions will be applied on IP addresses. No price increase has been planned for this new feature. We're confident that allowing 5 connections per account at the very same price will meet and even exceed the expectations of our customers. Please do not hesitate to contact us for any further information. Kind regards & datalove AirVPN Staff
  8. 1 point
    What follows is me, unable to type non-quoted text: Happy 9th, I am very satisfied with your service. Great news, looking forward to this release.
  9. 1 point
    Hello! Today we're starting AirVPN ninth birthday celebrations! From a two servers service located in a single country providing a handful of Mbit/s, the baby has grown up to a wide infrastructure in 22 countries in three continents, providing now 230,000+ Mbit/s to tens of thousands of people around the world. Software related development has also been powered up. Eddie Android edition is now a fully mature application which features an exclusive best effort method to prevent traffic leaks and a complete integration with AirVPN. In 2019 AirVPN has also started operating in South America, on top of Asia, Europe and North America, and the infrastructure has grown significantly, counting now on more than 260 bare metal servers, whose traffic is mainly powered by tier1 and tier2 transit providers. AirVPN has also become recently an EFF "Super Major Donor" member. Furthermore, and we're very glad to announce it here publicly for the first time, development for OpenBSD and FreeBSD has started. We are also integrating OpenVPN 3 on new software which will couple Eddie on UNIX-like systems, including Linux, during the second half of 2019. GDPR compliance was already a de facto standard for AirVPN way before the Regulation entered into force, mainly because we don't collect personal data, period. By the way the compliance is now fully formalized (check details in our Privacy Notice and Terms https://airvpn.org/privacy ). AirVPN provides probably the strongest protection to your data, not only personal data but all data, you can find on any service. If you are an AirVPN customer or user, you are probably aware that our service is radically different than any other VPN service you might have met anywhere. No whistles and bells, no marketing fluff, no fake locations, no advertising on mainstream media, a transparent privacy policy, no trackers on the web site or in mobile applications, no bullshit of any kind in our infrastructure to sell your personal data to any personal data merchant, and above all a clear mission which is the very reason which AirVPN operates for. https://airvpn.org/mission Many of you know that when you buy AirVPN service, you not only support yourself and improve your ability to exercise your fundamental rights, but you also support AirVPN mission. However, while AirVPN in itself has flourished, AirVPN mission aims and values related to fundamental rights have experienced, in 2018 and 2019, a grim time. Australia "encryption-busting" monstrous law is fully in force; the European Union has definitively approved the bad Copyright Directive, mandating automated filters, which will unavoidably limit freedom of expression on big boards, and making the first step to undermine the liability exemptions of mere conduits and web publishers alike; new threats to citizens' privacy are becoming real through plans of wide face recognition deployment, indiscriminate DNA databases proposals, more pervasive and efficient profiling (possibly even through AI), and strict cooperation between Internet tech giants and intelligence agencies; the persecution of journalists, publishers and whistleblowers all around the world has reached unprecedented levels, revealing a widespread plan to suppress freedom of the press and freedom of expression even in so called "Western democracies". One of the greatest journalists and publishers of all times, Julian Assange, nominated seven times for the Nobel Peace prize and winner of many journalistic prizes and awards, has been and is prosecuted and persecuted for having merely published the truth about war crimes, corruption, torture and more, with a 100% accuracy, and for having protected his sources as any good investigative journalist does. He has been detained arbitrarily and illegally, as widely ascertained and recognized by the UN. He has been victim of an abominable smear campaign based on ignominious lies and defamation, a campaign aimed to turn the public opinion against him and distract from WikiLeaks publications content exposing war criminals in governments key positions, warmongers, torture maniacs, systematic illegal surveillance, endemic privacy violations and plots to limit and reduce fundamental rights. He is currently detained in solitary confinement 23 hours a day, with no access to books, maximum two visits per month, forbidden in practice to coordinate a defense with his lawyers, in a tiny cell of a maximum security UK prison which has been designed for dangerous murderers and terrorists, while UK will decide whether to extradite him to the USA to face a potential 175 years imprisonment. Whistleblowers like Chelsea Manning, who should be regarded as a hero, as Noam Chomsky, John Pilger, Daniel Ellsberg and other titans of our times pointed out, have been tortured and are still persecuted by the very same criminals whose crimes were exposed. Privacy activists and software developers, like Ola Bini in Ecuador, are imprisoned without charges, simply for having showed friendship to Assange or WikiLeaks, or for having developed software aimed to protect privacy through encryption. And the list can go on and on and on. But make no mistake: the dark times we are living in, the environment of fear and intimidation that various governments are building against the exercise of those fundamental rights which our mission forces us to protect to the best of our abilities, the mounting attacks against "encryption for everyone" and the awareness that enemies of human rights nestle inside government agencies, have not undermined our determination. Quite the opposite: they have convinced us that our service is even more necessary now and we are resolute to do even more. Our mission has been and will be empowered by the ongoing support to projects and NGOs which aim to the protection of privacy, personal data and freedom of expression, now more than ever. We have confirmed our support to Tor and we will progressively add support to champions of freedom of expression and privacy in any way our capacities and abilities will allow us. If you're curious to know something about a series of fortunate events which gave birth to AirVPN, have a look here: https://airvpn.org/aboutus To worthily celebrate AirVPN ninth birthday, we're glad to inform you that starting from now we will offer a 20% discount on all long term plans. Hurry up, this special offer will end on June the 11th, 23:59:59 UTC! Check the new prices here. Kind regards and datalove AirVPN Staff
  10. 1 point

    Update on Netflix USA access

    Hello Staff and All, Is Netflix still working for you, please? Unfortunately it doesn’t work for me. I am using Eddie on Win machine for my connections, VPN DNS and have no leaks which I checked on ipleak.net. I have a Netflix account created in one of EU countries but according to previous comments that should not affect connection. I first used Netflix about a month ago and it was working relatively fine. I got occasional Streaming error due to proxy... but refreshing the page solved it and streaming continued. It is a different story now. I have tried to connect from quite few US, UK, NL, SE… servers but I always get the same known Streaming error: You seem to be using an unblocker or proxy… and no matter what I try I cannot pass that. Interesting is that from some servers it started to stream the content but that worked for only few minutes then it stopped (sorry, I haven’t mark down specific servers). It looks like it is buffering but it never does and once I refresh the page I get the above mentioned error. When I login to Netflix account I can see the following IP addresses as the ones used by my streaming activity: Maryland (US) - Virginia (US) - Maryland (US) - Maryland (US) - Maryland (US) - Does anyone have any suggestions what could be causing this and how to fix it, please? Thank you.
  11. 1 point
    A little update: - server location selector added (usually it’s a city) - `remote` lines are terminated with a semicolon - each `remote` has a comment with server country, location and name https://ellie-app.com/65hw6mcDCS5a1
  12. 1 point
    This started happening few months ago on my Mint 19.1 running kernel 4.15.* I thought it was triggered by one of the kernel updates, but could not resolve it. Running Eddie 2.16.3, I updated to 2.17.2, but it was the same behavior and could not get it to apply network lock via new feature (build iptables-save format and apply directly), it just worked the same as 2.16.3. So I downgraded back to 2.16.3 and when playing around with it, I disconnected computer from network (WiFi) which I normally never do. I noticed that in this state, the network lock would be applied in under 10 seconds, compared to 180 seconds when computer is connected to WiFi.
  13. 1 point

    Suggestion: run Tor exit nodes

    Hello, since 2017 we've been contributing to run about 5-7% of all the worldwide Tor traffic through exit-nodes maintained by Quintex Alliance, please check our mission page. Kind regards
  14. 1 point
    Hello, I used this configuration about 20-25 days ago without problem, but today it give me a strange problem: I tried to start my server in local listening on my port 8676 (i need it) and tried with a port checker if all work fine, all was good! After it I tried to start AirVPN (where port 8676 was already forwarder and worked some days ago) and check again and the tester can't see me on this port. So I tried to delete the port in my page and recreate it again and when I tried to check the port on my personal page I received a red alert like this "DANGER! Reachable on real IP over the external port 8676, tcp protocol." and the port is still not reachable. I need help, what is wrong? why the port is reachable only without VPN? and why the red alert message? Thx
  15. 1 point
    Reporting in with another replication of this error on latest Manjaro (XFCE). Also, due the network lock not working correctly, some of the rules persist after the end of the session, which causes connection issues in the local network.
  16. 1 point

    ANSWERED Master Password on Android

    I have had simalar issues were the master password seems to get corupted. uninstalling does not work because the phone keeps cache which includes the password. As stated above I have found this works. go into APPS on a Android phone find eddie and long press. you should get the app info screen you should now have the option to CLEAR DATA. press this and all stored info should be deleted. Now when you open eddie you should be asked to set a new password. enter one then confirm it. you should be ready to go with your user name and password.
  17. 1 point
    I can also confirm this problem with a clean (and updated) Manjaro KDE installation. With the Network lock enabled at start-up, Eddie executes a large number (at least 1000) of iptable commands, each taking over 300ms. Whilst it is applying these commands, I cannot connect to a server, I cannot de-activate the network lock, and I cannot close eddie. Basically, eddie becomes unresponsive and unusable, and I have to reboot the system I am using 2.17.2 (but have also tried the latest stable). Thanks for any help/advice. (By the way, all is well on Debian Stable and Mint 19.1).
  18. 1 point

    Update on Netflix USA access

    Hello! Can you please test now with Hulu and report back? Kind regards
  19. 1 point

    ANSWERED Netflix

    https://netflix.com Watch Movies & TV Shows Online or Streaming right to your TV via Xbox, Wii, PS3 & many other devices. Only $7.99/mo. Status: OK Native: UK servers. Routing to EN (USA): All other servers Last update: July the 28th, 2018
  20. 1 point

    Help with port forwarding

    Old thread, but still relevant. I'd like to add something in case anyone in future finds it helpful. If you are on Windows 10, have tried all of the above, have bound your connection in qbittorrent to the AirVPN connection, but are still unconnectable to your tracker/canyouseeme, and the TCP Test in AirVPN Client Area is not green, you have 1 more step to take Open the Windows Defender Security Area Select "Firewall & Network Protection"Select "Allow an app through the firewall"Select "qbittorrent"Select "Change Settings"and make sure both Private and PUBLIC are selected (by default, the AirVPN network is created as a Public Network) Run your tests again, all should work
  21. 1 point
    Hi Mikeyy, hope they will fix it. I found a workaround which fixes the problem for me. I deleted those three lines in client_oxxxxxxx file: up /usr/syno/etc.defaults/synovpnclient/scripts/ovpn-up route-up /usr/syno/etc.defaults/synovpnclient/scripts/route-up plugin /lib/openvpn/openvpn-down-root.so /usr/syno/etc.defaults/synovpnclient/scripts/ip-down Now the client starts and connects at startup without any problems. It now looks like this: # -------------------------------------------------------- # Air VPN | https://airvpn.org | Tuesday 12th of July 2016 03:54:03 PM # OpenVPN Client Configuration. # AirVPN_xxxxxxxxxxxx_xxxxxxx_UDP-443 # -------------------------------------------------------- client dev tun proto udp remote xxx.xxx.xxx.xxx 443 script-security 2 redirect-gateway resolv-retry infinite nobind persist-key persist-tun remote-cert-tls server cipher AES-256-CBC comp-lzo no verb 3 explicit-exit-notify 5 rcvbuf 262144 sndbuf 262144 ca ca_oxxxxxxxxxx.crt key client_key_oxxxxxxxxxx.key cert client_crt_oxxxxxxxxxx.crt tls-auth ta_oxxxxxxxxxx.key Greets
  22. 1 point
    Yes, this happens to me also, but I didn't notice it until now since I almost never reboot my NAS, and I have reconnect script which detects that VPN isn't working and restart it. I think this is Synology VPN implementation bug, it should be reported to them. Hopefully they can fix it in new updates.
  23. 1 point
    First of all: Thanks a lot for your great work, Mikeyy! I followed your instructions to set up a vpn client by using the ovpn file. There's one strange thing: When the DSM is rebooted the client starts automatically, but it does not fully establish the routing table. I have to stop it and start it again to get it work. --> pics left to right. Any ideas what the reason could be? Greets
  24. 1 point

    Swisscom TV - CH

    Website: Swisscom TV Switzerland streaming television from Swisscom, Live and On Demand. Status: OK Native: CH servers. Routing: All other servers.
  25. 1 point

    Using AirVPN with Asus router

    About AsusWRT AsusWRT is a unified firmware developed by Asus for use in their recent routers. The firmware was originally based on Tomato-RT/Tomato-USB, but has since seen many changes. Asus started using this new firmware with their recent routers (RT-AC68U, RT-AC87U), but they also started moving other routers to this new firmware. Prerequisite Asus Router with AsusWRT (native OpenVPN support). Model tested:RT-AC68Ubut it should work for all Asus routers that have AsusWRT. see Official website for AsusWRT model support list. [Firmware Notes]: Please upgrade the router Firmware to the latest version. "New Asus Firmware supports 4096 bits key and will work with AirVPN." Steps1. Create configuration files from our Config Generator. Select [Router or others] and choose a server you like. Tick on [Direct, protocol UDP, port 443] and click on [Generate]. Save the openvpn config file .ovpn (Ex: AirVPN__UDP-443.ovpn) anywhere on your computer.2. Open the Asus router webinterface and click on [VPN]. Click on [Add profile], choose [OpenVPN] tab. Enter a "description", leave username and password EMPTY. Click on [browse] and select the downloaded openvpn config file (.ovpn). Click on [upload]. Click on [OK]. That's it now you can click on [Activate] to connect to AirVPN server. 3. Make sure to setup the AirVPN DNS this way: Click on [WAN] tab. Turn [DNS server] "off" (No) and enter AirVPN's DNS as first DNS IP address (it's DNS for Protocol UDP, Port 443 - see Specs for more details). About the secondary DNS entry, we recommend picking ones from the OpenNIC Project. The AirVPN DNS will enable you to access AirVPN geo-routing services to bypass discriminations based on IP address geo-location. 4. Visit https://ipleak.net and check if it works.Every client (PC, Smartphone, Console, Smart TV ..) which is connected to the router now is secured by VPN and also have full access to the anti-geo-blocking service. Useful Info A custom firmware for Asus routers based on official AsusWRT called Asuswrt-Merlin is available. AsusWRT-Merlin retains all the features of the original stock AsusWRT firmware with added/enhanced features. More info on AsusWRT-Merlin website http://asuswrt.lostrealm.ca/features
  26. 1 point

    Wilmaa - CH

    http://www.wilmaa.com For the best streaming television that Switzerland has to offer, there’s but one name, and that name is wilmaa. Status: OK Native: CH servers. Routing: All other servers.
  27. 1 point

    DMAX - IT

    Website: http://www.dmax.it Italian streaming TV Status: OK Routing: All servers to IT route.
  28. 1 point
    Introduction This is a guide on how to host a Minecraft server through AirVPN. Please note that this guide assumes that you already have at least a basic understanding on how to set up and run a Minecraft server. AirVPN is a good tool for people who want to run Minecraft servers and either don’t know how to port forward or can’t for any reason. It is also useful for some ISPs that block most inbound ports, making it impossible to run a Minecraft server without a VPN tool. I found AirVPN useful to help me run a server at my university because my university is its own ISP and they don’t allow any inbound ports aside from standard ones like HTTP. Step #1 Set up the server normally. If you are running it on the same computer that you are playing on you should be able to join the server locally (IP If you don’t know how to get this far the Minecraft wiki has a very good, albeit technical, guide on setting up a server here. Step #2 Forward a port with AirVPN. You can do this by logging into your account on airvpn.org and clicking the “Client Area” tab then going to the “Forwarding ports” tab on the left side of the screen. Once there you can fill in the form as shown above to reserve a port. Things to note: The box at the top is the inbound port you want to use and you have to find a free one. The actual number of the port doesn’t matter, any will work fine. Just make sure to note which one you picked!Unless you have changed the Minecraft server port you should set your local port to 25565, the default port.DDNS is useful if you want players to players to be able to join a URL, which is easier to remember, than an IP address. In the example above you would connect to myserver.airdns.org (note that it might take up to an hour for the name servers to update and in the meantime you would need to use the IP)Step #3 Connect to an AirVPN server and note your exit-IP (the exit-ip is different for each server). If you are not using the DNS service or are waiting for the name servers to update you will need this for players to connect. You can find the exit-IP of the server you are currently connected to by checking your client area on the AirVPN site or the application on your computer. You may be finished now, you can check and see if players can connect to your server at <Server exit-IP>:<Your Port>. For example, if my server exit IP were and my port was 22222 you would have people connect to If players can’t connect keep following the last two steps. Step #4 Find the IP of your AirVPN adapter. On Windows this can be done by opening command prompt (Press + R then type “cmd” and press Ok) and typing in “ipconfig.” You should see something that looks like the picture above. Look for an entry that starts with 10.*.*.* if you have two, like I do, check https://airvpn.org/specs/ to see which one matches with one of the entries on the table. You can see that because 10.247.*.* doesn’t appear on the table Local Area Connection 2 is my AirVPN connection because 10.4.*.* does. Note the whole Address, in my case, we will need this for the next step. Step #5 Open your Minecraft server config file (named “server.PROPERITES” in your Minecraft server directory) with notepad. Set “server-ip=” to the IP you got from step 4. Congratulations, people should now be able to connect to your server from around the world. If you had to do Step 4 and 5 for it to work then unfortunately you have to repeat those two steps every time you reconnect to an AirVPN server as that IP changes each time you connect. Enjoy!
  29. 0 points
    Wow, good idea! Will add it. Not sure why you added other part? If VPN is off, current script will start it (when cronjob runs). If VPN is ON, but it's in error state (not letting traffic trough) it will kill VPN and start it again. EDIT: Added your contribution to tutorial. Changed some parts of tutorial. You no longer need to copy script to /usr/ folder. It's better if it stays in shared folder of your choice since there it will survive system upgrades.
  30. 0 points

    Marco Polo - IT

    Website: http://www.marcopolo.tv/ Italian TV Streaming Status: OK Routing: All servers to IT route.
  • Create New...