Jump to content
Not connected, Your IP: 3.230.173.249

Leaderboard


Popular Content

Showing content with the highest reputation since 04/13/21 in all areas

  1. 1 point
    Of course not. All traffic is routed through the VPN. In comes the connection from 1.2.3.4 (your ISP), out goes the answer on 5.6.7.8 (VPN server). Your router/firewall doesn't expect a connection from 5.6.7.8 and silently drops whatever comes from there. You can avoid this by excluding your ISP IP from being routed on the remote machine. That way, the answer will be sent to 1.2.3.4 if it comes from 1.2.3.4.
  2. 1 point
    pjnsmb

    Linux: AirVPN Suite 1.1.0 beta avaialble

    @Staff Thanks Working again for me too regards
  3. 1 point
    leori

    Linux: AirVPN Suite 1.1.0 beta avaialble

    Ok now! Thx a bunch. regards
  4. 1 point
    colorman

    Linux: AirVPN Suite 1.1.0 beta avaialble

    It's oke now...thanks
  5. 1 point
    Staff

    Linux: AirVPN Suite 1.1.0 beta avaialble

    Hello! We're glad to inform you that AirVPN Suite 1.1.0 RC 3 is now available. Download URLs have been updated in this thread first message. AirVPN Suite 1.1.0 RC 3 aims at addressing RC 2 Bluetit problem or regression suffered in D-Bus message handling and found out (unfortunately not reproduced on our systems) by our community testers @pjnsmb @leori and @colorman Please keep testing RC 3! Version 1.1.0 RC 3 - 16 April 2021 - changelog [ProMIND] Updated to OpenVPN 3.7 AirVPN [ProMIND] vpnclient.hpp: avoid netFilter setup in case NetFilter object is not private [ProMIND] dbusconnector.cpp: fine tuned D-Bus wait cycle in R/W dispatch. Implemented a thread safe wait in order to avoid D-Bus timeout policy Kind regards
  6. 1 point
    Activate where, on your machine or remote?
  7. 1 point
    colorman

    Linux: AirVPN Suite 1.1.0 beta avaialble

    Same at opensuse leap15.2 2021-04-16 14:02:36 Maximum rate: In 28,16 Mbit/s, Out 1,21 Mbit/s ^C2021-04-16 14:03:26 Caught SIGTERM signal. Terminating.
  8. 1 point
    leori

    Linux: AirVPN Suite 1.1.0 beta avaialble

    Confirmed : no elegant shut-down RC2 ubuntu 20.04 : Caught SIGTERM signal. Had to kill zombie. kill -9 $(ps -A -ostat,ppid | grep -e '[zZ]'| awk '{ print $2 }') restore network via goldcrest
  9. 1 point
    pjnsmb

    Linux: AirVPN Suite 1.1.0 beta avaialble

    @Staff Real trouble using RC2 1# on goldcrest command : peter@desktop:~/Desktop/VPN$ goldcrest --air-connect --air-server Alathfar normal start of server but on using CTRL +C to terminate the last line shows : ^C2021-04-15 15:40:30 Caught SIGTERM signal. Terminating. but that is where it stops............ and the server remains connected. Full log : peter@desktop:~/Desktop/VPN$ goldcrest --air-connect --air-server Alathfar 2021-04-15 15:24:54 Reading run control directives from file /home/peter/.config/goldcrest.rc Goldcrest 1.1.0 RC2 - 14 April 2021 2021-04-15 15:24:54 Bluetit - AirVPN OpenVPN 3 Service 1.1.0 RC2 - 14 April 2021 2021-04-15 15:24:54 OpenVPN core 3.6.7 AirVPN linux x86_64 64-bit 2021-04-15 15:24:54 Bluetit is ready 2021-04-15 15:24:54 Bluetit options successfully reset 2021-04-15 15:24:54 Bluetit successfully set to command line options 2021-04-15 15:24:54 Requesting AirVPN connection to Bluetit 2021-04-15 15:24:54 Network filter and lock are using nftables 2021-04-15 15:24:54 Successfully loaded kernel module nf_tables 2021-04-15 15:24:54 Network filter successfully initialized 2021-04-15 15:24:54 Session network filter and lock successfully enabled 2021-04-15 15:24:54 AirVPN bootstrap servers are now allowed to pass through the network filter 2021-04-15 15:24:54 Logging in AirVPN user pjnsmb 2021-04-15 15:24:55 AirVPN user pjnsmb successfully logged in 2021-04-15 15:24:55 Selected user key: DESKTOP 2021-04-15 15:24:55 Starting connection to AirVPN server Alathfar, Maidenhead (United Kingdom) 2021-04-15 15:24:55 Starting VPN Connection 2021-04-15 15:24:55 TUN persistence is enabled. 2021-04-15 15:24:55 CIPHER OVERRIDE: CHACHA20-POLY1305 2021-04-15 15:24:55 Network lock set to 'nftables' by Bluetit policy 2021-04-15 15:24:55 Ignore DNS push is enabled by Bluetit policy 2021-04-15 15:24:55 OpenVPN core 3.6.7 AirVPN linux x86_64 64-bit 2021-04-15 15:24:55 Frame=512/2048/512 mssfix-ctrl=1250 2021-04-15 15:24:55 UNUSED OPTIONS 6 [resolv-retry] [infinite] 7 [nobind] 8 [persist-key] 9 [persist-tun] 10 [auth-nocache] 11 [verb] [3] 12 [explicit-exit-notify] [5] 2021-04-15 15:24:55 EVENT: RESOLVE 2021-04-15 15:24:55 Local IPv4 address 192.168.0.6 2021-04-15 15:24:55 Local IPv6 address 2a02:c7f:cc09:d900:e8e0:78ab:dbaa:b120 2021-04-15 15:24:55 Local IPv6 address fdda:2d87:d69a:0:66c2:963b:c4e3:9f3c 2021-04-15 15:24:55 Local IPv6 address fe80::154d:4265:bdaf:3d0 2021-04-15 15:24:55 Local interface enp3s0 2021-04-15 15:24:55 Setting up network filter and lock 2021-04-15 15:24:55 Allowing system DNS 127.0.0.1 to pass through the network filter 2021-04-15 15:24:55 Adding IPv6 server 2a01:a500:320:52a4:a5b8:604b:f9ee:869 to network filter 2021-04-15 15:24:55 Network filter and lock successfully activated 2021-04-15 15:24:55 Contacting [2a01:a500:320:52a4:a5b8:604b:f9ee:869]:443 via UDP 2021-04-15 15:24:55 EVENT: WAIT 2021-04-15 15:24:55 net_route_best_gw query IPv6: 2a01:a500:320:52a4:a5b8:604b:f9ee:869/128 2021-04-15 15:24:55 sitnl_route_best_gw result: via fe80::3e89:94ff:fef6:ead1 dev enp3s0 2021-04-15 15:24:55 net_route_add: 2a01:a500:320:52a4:a5b8:604b:f9ee:869/128 via fe80::3e89:94ff:fef6:ead1 dev enp3s0 table 0 metric 0 2021-04-15 15:24:55 Connecting to [2a01:a500:320:52a4:a5b8:604b:f9ee:869]:443 (2a01:a500:320:52a4:a5b8:604b:f9ee:869) via UDPv6 2021-04-15 15:24:55 EVENT: CONNECTING 2021-04-15 15:24:55 Tunnel Options:V4,dev-type tun,link-mtu 1522,tun-mtu 1500,proto UDPv4,comp-lzo,cipher CHACHA20-POLY1305,auth [null-digest],keysize 256,key-method 2,tls-client 2021-04-15 15:24:55 Peer Info: IV_VER=3.6.7 AirVPN IV_PLAT=linux IV_TCPNL=1 IV_PROTO=30 IV_CIPHERS=CHACHA20-POLY1305 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 IV_IPv6=1 UV_IPV6=yes IV_GUI_VER=Bluetit - AirVPN OpenVPN 3 Service 1.1.0 RC2 IV_SSL=OpenSSL 1.1.0l 10 Sep 2019 2021-04-15 15:24:55 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 2021-04-15 15:24:55 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Alathfar/emailAddress=info@airvpn.org, signature: RSA-SHA512 2021-04-15 15:24:55 SSL Handshake: peer certificate: CN=Alathfar, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD 2021-04-15 15:24:55 Session is ACTIVE 2021-04-15 15:24:55 EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future 2021-04-15 15:24:55 EVENT: GET_CONFIG 2021-04-15 15:24:55 Sending PUSH_REQUEST to server... 2021-04-15 15:24:55 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [ipv6] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.5.46.1] 3 [dhcp-option] [DNS6] [fde6:7a:7d20:12e::1] 4 [tun-ipv6] 5 [route-gateway] [10.5.46.1] 6 [topology] [subnet] 7 [ping] [10] 8 [ping-restart] [60] 9 [ifconfig-ipv6] [fde6:7a:7d20:12e::101d/64] [fde6:7a:7d20:12e::1] 10 [ifconfig] [10.5.46.31] [255.255.255.0] 11 [peer-id] [2] 12 [cipher] [CHACHA20-POLY1305] 2021-04-15 15:24:55 PROTOCOL OPTIONS: cipher: CHACHA20-POLY1305 digest: NONE ncp enabled: no key-derivation: OpenVPN PRF compress: LZO_STUB peer ID: 2 control channel: tls-crypt enabled 2021-04-15 15:24:55 EVENT: ASSIGN_IP 2021-04-15 15:24:55 WARNING: ignoring server DNS push request for address 10.5.46.1 2021-04-15 15:24:55 WARNING: ignoring server DNS push request for address fde6:7a:7d20:12e::1 2021-04-15 15:24:55 net_iface_mtu_set: mtu 1500 for tun0 2021-04-15 15:24:55 net_iface_up: set tun0 up 2021-04-15 15:24:55 net_addr_add: 10.5.46.31/24 brd 10.5.46.255 dev tun0 2021-04-15 15:24:55 net_addr_add: fde6:7a:7d20:12e::101d/64 dev tun0 2021-04-15 15:24:55 net_route_add: 0.0.0.0/1 via 10.5.46.1 dev tun0 table 0 metric 0 2021-04-15 15:24:55 net_route_add: 128.0.0.0/1 via 10.5.46.1 dev tun0 table 0 metric 0 2021-04-15 15:24:55 net_route_add: ::/1 via fde6:7a:7d20:12e::1 dev tun0 table 0 metric 0 2021-04-15 15:24:55 net_route_add: 8000::/1 via fde6:7a:7d20:12e::1 dev tun0 table 0 metric 0 2021-04-15 15:24:55 TunPersist: saving tun context: Session Name: 2a01:a500:320:52a4:a5b8:604b:f9ee:869 Layer: OSI_LAYER_3 Remote Address: 2a01:a500:320:52a4:a5b8:604b:f9ee:869 [IPv6] Tunnel Addresses: 10.5.46.31/24 -> 10.5.46.1 fde6:7a:7d20:12e::101d/64 -> fde6:7a:7d20:12e::1 [IPv6] Reroute Gateway: IPv4=1 IPv6=1 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 IPv6 ] Block IPv6: no Add Routes: Exclude Routes: DNS Servers: 10.5.46.1 fde6:7a:7d20:12e::1 [IPv6] Search Domains: 2021-04-15 15:24:55 Connected via tun 2021-04-15 15:24:55 LZO-ASYM init swap=0 asym=1 2021-04-15 15:24:55 Comp-stub init swap=0 2021-04-15 15:24:55 EVENT: CONNECTED [2a01:a500:320:52a4:a5b8:604b:f9ee:869]:443 (2a01:a500:320:52a4:a5b8:604b:f9ee:869) via /UDPv6 on tun/10.5.46.31/fde6:7a:7d20:12e::101d gw=[10.5.46.1/fde6:7a:7d20:12e::1] 2021-04-15 15:24:55 Connected to AirVPN server Alathfar, Maidenhead (United Kingdom) 2021-04-15 15:25:54 ---------------------- 2021-04-15 15:25:54 Connected to AirVPN server Alathfar (Maidenhead, United Kingdom) 2021-04-15 15:25:54 Users 55 - Load 27% - Bandwidth 276.03 Mbit/s - Max 1 Gbit/s 2021-04-15 15:25:54 Connection time: 00:01:01 2021-04-15 15:25:54 Transferred data: In 1.76 MB, Out 676.97 KB 2021-04-15 15:25:54 Current rate: In 177.52 Kbit/s, Out 71.04 Kbit/s 2021-04-15 15:25:54 Maximum rate: In 496.43 Kbit/s, Out 88.97 Kbit/s 2021-04-15 15:26:54 ---------------------- 2021-04-15 15:26:54 Connected to AirVPN server Alathfar (Maidenhead, United Kingdom) 2021-04-15 15:26:54 Users 55 - Load 27% - Bandwidth 276.03 Mbit/s - Max 1 Gbit/s 2021-04-15 15:26:54 Connection time: 00:02:01 2021-04-15 15:26:54 Transferred data: In 5.61 MB, Out 2.85 MB 2021-04-15 15:26:54 Current rate: In 5.91 Kbit/s, Out 8.25 Kbit/s 2021-04-15 15:26:54 Maximum rate: In 697.65 Kbit/s, Out 99.17 Kbit/s 2021-04-15 15:27:54 ---------------------- 2021-04-15 15:27:54 Connected to AirVPN server Alathfar (Maidenhead, United Kingdom) 2021-04-15 15:27:54 Users 55 - Load 27% - Bandwidth 276.03 Mbit/s - Max 1 Gbit/s 2021-04-15 15:27:54 Connection time: 00:03:01 2021-04-15 15:27:54 Transferred data: In 7.23 MB, Out 4.84 MB 2021-04-15 15:27:54 Current rate: In 8.57 Kbit/s, Out 21.22 Kbit/s 2021-04-15 15:27:54 Maximum rate: In 697.65 Kbit/s, Out 99.17 Kbit/s ^C2021-04-15 15:40:30 Caught SIGTERM signal. Terminating. 2# If I stop bluetit : root@desktop:~# systemctl stop bluetit root@desktop:~# systemctl status bluetit ● bluetit.service - AirVPN Bluetit Daemon Loaded: loaded (/etc/systemd/system/bluetit.service; enabled; vendor preset: enabled) Active: failed (Result: timeout) since Thu 2021-04-15 15:58:38 BST; 5s ago Process: 15853 ExecStart=/sbin/bluetit (code=exited, status=0/SUCCESS) Process: 117468 ExecStop=/bin/kill -- $MAINPID (code=exited, status=0/SUCCESS) Main PID: 15855 (code=killed, signal=KILL) CPU: 33.284s Apr 15 15:58:17 desktop bluetit[15855]: Received SIGTERM signal. Terminating Bluetit. Apr 15 15:58:17 desktop bluetit[15855]: Stopping OpenVPN3 connection thread Apr 15 15:58:17 desktop bluetit[15855]: Connection statistics updater thread finished Apr 15 15:58:38 desktop systemd[1]: bluetit.service: State 'stop-sigterm' timed out. Killing. Apr 15 15:58:38 desktop systemd[1]: bluetit.service: Killing process 15855 (bluetit) with signal SIGKILL. Apr 15 15:58:38 desktop systemd[1]: bluetit.service: Killing process 18314 (bluetit) with signal SIGKILL. Apr 15 15:58:38 desktop systemd[1]: bluetit.service: Main process exited, code=killed, status=9/KILL Apr 15 15:58:38 desktop systemd[1]: bluetit.service: Failed with result 'timeout'. Apr 15 15:58:38 desktop systemd[1]: Stopped AirVPN Bluetit Daemon. Apr 15 15:58:38 desktop systemd[1]: bluetit.service: Consumed 33.284s CPU time. 3# If I restart bluetit : root@desktop:~# systemctl restart bluetit root@desktop:~# systemctl status bluetit ● bluetit.service - AirVPN Bluetit Daemon Loaded: loaded (/etc/systemd/system/bluetit.service; enabled; vendor preset: enabled) Active: active (running) since Thu 2021-04-15 16:01:51 BST; 3s ago Process: 126229 ExecStart=/sbin/bluetit (code=exited, status=0/SUCCESS) Main PID: 126231 (bluetit) Tasks: 2 (limit: 9362) Memory: 1.4M CPU: 22ms CGroup: /system.slice/bluetit.service └─126231 /sbin/bluetit Apr 15 16:01:51 desktop bluetit[126231]: Reading run control directives from file /etc/airvpn/bluetit.rc Apr 15 16:01:51 desktop bluetit[126231]: IPv6 is available in this system Apr 15 16:01:51 desktop bluetit[126231]: System country set to GB by Bluetit policy. Apr 15 16:01:51 desktop bluetit[126231]: Bluetit successfully initialized and ready Apr 15 16:01:51 desktop systemd[1]: Started AirVPN Bluetit Daemon. Apr 15 16:01:51 desktop bluetit[126231]: Bluetit did not exit gracefully on its last run or has been killed. Apr 15 16:01:51 desktop bluetit[126231]: Run recover network procedure or restore system settings saved in /etc/airvpn Apr 15 16:01:51 desktop bluetit[126231]: AirVPN Manifest updater thread started Apr 15 16:01:51 desktop bluetit[126231]: AirVPN Manifest update interval is 15 minutes Apr 15 16:01:51 desktop bluetit[126231]: Updating AirVPN Manifest Apr 15 16:02:51 desktop bluetit[126231]: AirVPN Manifest successfully retrieved from local instance Apr 15 16:03:40 desktop systemd[1]: Stopping AirVPN Bluetit Daemon... Apr 15 16:03:40 desktop bluetit[126231]: Received SIGTERM signal. Terminating Bluetit. Apr 15 16:03:40 desktop bluetit[126231]: AirVPN Manifest updater thread finished Apr 15 16:03:40 desktop systemd[1]: bluetit.service: Succeeded. Apr 15 16:03:40 desktop systemd[1]: Stopped AirVPN Bluetit Daemon. It takes nearly two minutes to stop the server and the goldcrest log still shows 'terminating' UPDATE closing terminal and reopening a new terminal shows : eter@desktop:~/Desktop/VPN$ goldcrest --air-connect --air-server Alathfar 2021-04-15 16:19:41 Reading run control directives from file /home/peter/.config/goldcrest.rc Goldcrest 1.1.0 RC2 - 14 April 2021 2021-04-15 16:19:41 DBusConnectorException: DBusConnector: not primary owner (2) UPDATE TWO I cannot stop goldcrest using htop either. Restarting the computer results in a 30 second delay on shutdown with : 'A stop job is running for session 1 of user peter' showing in close down terminal
  10. 1 point
    I found the always-on vpn setting and disabled it, which fixed the problem. Thanks!
  11. 1 point
    Stalinium

    Fowarded ports and Privacy

    Legendary 6 and a half years necromancy. Though its been 3 weeks now without an answer. It would be good to hear an official response. I will bump and add my thoughts: Forwarded, yes. Forwarded ports are globaly unique for AirVPN and it's possible to know whose account it's currently forwarded on. I think the question to ask you what scenario you are trying to avoid was very on point. I very much doubt they'd give out your information to any small fish without a court order (that would be illegal, a violation of GDPR). And if it's a court order it'd need to be in Italy or be enforcable there (ianal). Basically until someone (not you obviously) angers some very big pockets, the privacy should be safe. If you want to be sure, rotate the forwarded port every 24 hours. Better yet, every time you connect (assign port) and disconnect (remove port). AirVPN has an API, use this unique feature to your advantage. As requested though. A Scenario: Let's say I host a website on a non-default port (port-forwarded) with satire and comedy of a certain Winnie Pooh and R. Dogan political leaders. Somehow they visited my funny comedic website but didn't find my short stories and comics about them funny and cried (a lot). They decide to sue AirVPN for identifiable information. The port is still tied to my account. Obviously AirVPN has no obligation to respond to Winnie Pooh's country's court system, but what if Mr. Dogan manages to get a court within the EU to issue an order? What if that order is issued in Italy vs. Non-Italy (EU member state)? In what case will AirVPN cause indirect harm to an aspiring comedian and disclose information? Can the comedian hope to be notified by AirVPN of this fact? (A non-question: can an AirVPN admin miss the button and accidentally click "unbind port" instead of "pwn user" button? Mistakes can happen, right?)
  12. 1 point
    This way of thinking would only hurt AirVPN. The reason 'all other providers' are crap isn't because they can't better, it's their business decision. iirc AirVPN said their 'allocation' is 2 mbits per customer, now I can't say how that is applied but you can see very clearly thanks to transparency how many people are connected and how much bandwidth each server is currently using up. Scaling up is no problem, but it must be a business decision. If needed I'm sure they could fire up 10s of new servers within days etc. But an 'explosion' ain't gonna happen because they don't waste money on advertising, instead if you want to help - just help. Why are other VPN so bad? Because of overselling. There's a difference whether your servers run at 30% capacity or 80% (aka overloaded), it's money for the business and quality of service to the customer. If servers run at more than 70-80% then your latency will suffer, packet drops etc. The reason why AirVPN is solid is because they chose to. The reason why some other providers are shit is because they chose to (or are incompetent in addition to this). @NoiselessOwl says to rely on 'word-of-mouth' but then doesn't personally advertise AirVPN at all (I understand user's own word-of-mouth)? That goes against that idea. Users advertising themselves is the breeze of air that keeps AirVPN alive. Otherwise old customers would slowly drop out and no newcomers join. You can't singlehandedly make AirVPN become like a mainstream provider. I believe them to increase capacity when needed. Hell I doubt even a big youtuber or anything of sorts would make a dent if they were to advertise once (for free or not). I disagree strongly with the previous poster and want to say: Advertise AirVPN as best as you can (casually, it aint a chore nor a job)! If you want to see greatness, you need to help spread greatness. Don't leave less knowledgable users stuck to the shitty mainstream VPN services. PS: Does any other VPN out there pay as much close attention to the legal framework of server countries as AirVPN does? It's one of the main goals of a VPN provider! To ensure the security of your data!
  13. 1 point
    You're welcome.
  14. 1 point
    Pause does not destroy the tunnel, only disconnect does. Are you sure you did not enable Always-On VPN in Android settings? This prevents all traffic on a system level unless the specified VPN app establishes a VPN connection.
  15. 1 point
    Do what you want, really. If the service is good, I'm sure you can think of a few ways to give recommendations or links where they fit. Staff won't do that themselves. If done, how is AirVPN better than NordVPN who sponsors so many Twitch and YouTube channels that you can't outrun that name? It's aggressive marketing but that doesn't make NordVPN an angel. In fact, far from it:Look into the forum the thread above is in for more NordVPN talk. Next, refrain from linking to reviews or "expert" voices in the future if there is no clear AirVPN reference in the content. A comment on a video is not a valid reference – everyone can post any comment they want to any content there is while the content doesn't change. Thanks.
  16. 1 point
    Newest I could find off the cuff https://www.vpnuniversity.com/routers/use-selectivepolicy-routing-kill-switch-asuswrt-merlin
  17. 1 point
    zsam288

    UAE (Dubai) VPN Problems

    I'm in the UAE and using UDP443 with entry IP 4 and no issues with speed throttling or dropped connections can reach 250mbit no other customs settings used
  18. 1 point
    OpenSourcerer

    Eddie Client New feature

    Not by itself. There is a setting for notifications in Preferences, though, allowing you to choose the update channel. There's a RSS feed for all threads created in the Announcements forum. That's where new beta and stable news are posted usually. There's also a newsletter feature in the forums software, but I don't know if it does anything. Probably not. As a third option, a user on Reddit created a Telegram channel "mirroring" the Announcements RSS feed. Eddie is saving its settings in a file called default.profile, the path is in your logs. Access to that file can be protected with whatever you set here. The file is already unreadable per se, so your credentials for example are safe. In earlier versions you'd see your username and password there in plaintext. If you've used Eddie for Android, the concept of the Master Password there is similar.
×
×
  • Create New...