Jump to content
Not connected, Your IP: 3.219.217.107

go558a83nk

Members2
  • Content Count

    1894
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    24

Reputation Activity

  1. Like
    go558a83nk got a reaction from ableounceony in Entry ip   ...
    1 is the default
    2 is the same server setup as 1 but a different entry IP in case the default IP is blocked by your ISP
    3 is tls-crypt
    4 is the same server setup as 3 but a different entry IP in case the 3 IP is blocked by your ISP
  2. Like
    go558a83nk got a reaction from ableounceony in Entry ip   ...
    1 is the default
    2 is the same server setup as 1 but a different entry IP in case the default IP is blocked by your ISP
    3 is tls-crypt
    4 is the same server setup as 3 but a different entry IP in case the 3 IP is blocked by your ISP
  3. Like
    go558a83nk reacted to Kenwell in Just Great!   ...
    Hi go558a83nk. No special scripts or settings. Some details. In bridge with IPV4 only. Asus Merlin with protocol 3/443/TCP. The OVPN script that comes with AIR. I run 3 separate VPN clients with adaptive Qos. When I downloaded protocol 3 with GCM, the speed increased around 10/12MB’s. At this speed, the RT-AC86U has approx. 77% of load on proc 2 and 50% on proc 1. After some try and error it turns out that client 1, 3, 5 are the fasted and use proc 2 for EAS-NI and proc 1 for background programs. Client 2 and 4 chokes with approx. 110mb’s down at 90% load on proc 1 for EAS-NI and proc 2 for background programs. Maybe that’s the trick on the 86. Today I will enable a 400/40 line a look how that turns out. I don’t think the 86 will come close to 400 on VPN, but we’ll see. I can post my findings if you like.
  4. Like
    go558a83nk reacted to Kenwell in Just Great!   ...
    Thats why i love AIRVPN on a 200/20 line, with a RT-AC86U 
  5. Like
    go558a83nk reacted to Staff in Black Friday 2018 Week   ...
    Hello!

    We're very glad to inform you that the Black Friday week has just begun in AirVPN!
     
    Save up to 67.5%
     
    Check all plans and discounts here: https://airvpn.org/plans

    If you're already our customer and you wish to jump aboard for a longer period, any additional subscription will be added on top of already existing subscriptions and you will not lose any day.

    And that's not all! AirVPN offers five simultaneous connections per account, IPv6 full support and many more, exclusive smart features:
    https://airvpn.org/topic/28153-ipv6-support-and-new-smart-features/


    Kind regards & datalove
    AirVPN Staff
     

  6. Like
    go558a83nk reacted to Staff in Correlation attacks   ...
    Hello!
     
    Yes, the attacks you talk about, usually based on timing attacks in low latency networks, are not meant to be prevented by separate entry and exit-IP addresses.
     
    The correlation attacks which are prevented by separate entry and exit-IP addresses are different. When two nodes of a same VPN connect to each other via a public address which is also the VPN gateway public address they will start exchanging data in clear text outside the tunnel (this is quite obvious, check your routing table to understand exactly why).
     
    When that IP address is shared between the nodes connected to the VPN server, this opens up the way to a wide variety of correlation attacks to discover the real IP addresses of the nodes connected to a VPN server. The adversary does not need to control or wiretap all the relevant network segments, it just needs to enter the VPN as a normal user, forward ports remotely and study the proper way to start the attack on the target or targets (the attacker will need to convince the target or targets to connect to any of the services he/she controls behind the VPN).
     
    This is not an OpenVPN (or other VPN software) vulnerability, it's just how routing works.
     
    Incredibly, even nowadays you can find VPN services around the world which do not take care of all the above and, even more incredibly, famous "VPN reviews" sites do not even talk about this issue.
     
    Kind regards
  7. Like
    go558a83nk reacted to scubadude in AirPy - Python wrapper around AirVPN API   ...
    For anyone who likes programming with Python, I started a project called AirPy on Github, https://github.com/Delphae/AirVPN
     
    AirPy is a Python wrapper around the AirVPN API which everybody can use, which some of you already heard of.
    The API is very useful to determine your connection, your server connected to and your user info
    Take a look at https://airvpn.org/api/ to learn more about the free to use API of AirVPN.
    But the output is in JSON, XML and so on.
    To use the output in a Python program, in a Python console or in Jupyter I have created the AirPy module.
     
    I started it, just for fun. And to get familiar with Python and Object Oriented Programming (I learned programming the old school way: procedures and functions :-))
     
    On Github you will find the AirPy code as well as an example, in Python, how to use the AirPy module.
     
     
    Import the AirPy module with your personal API key and set the default country
    from AirPy import Airvpn APIKEY = "7de2aa122b7a42b9882d2f5b1e8ff30168ca6468" air = Airvpn(APIKEY,'nl') # when you are located in the Netherlands air = Airvpn(APIKEY,'gb') # when you are located in the UK, and so on  
    Examples  
     
    print (air.user) print (air.user.connected) print (air.user.login) print (air.connection) print (air.connection.server_name) print (air.sessions[0]) servers = air.servers() for server in servers: print (server) print (air.best()) print (air.rand())  
    So, if you think it is useful, use it. If you want to contribute, please do.
    If you have suggestions and improvements, do not hesitate to write them in this post.
  8. Like
    go558a83nk got a reaction from ruler2016 in europe => sweden => slow   ...
    The swedish servers were least used, and thus the region system sends you there.  You'll be much happier just using a single server that works well for you.
     
    The real tragedy is people banging their head on a wall because they don't understand how things work.
  9. Like
    go558a83nk reacted to Staff in How can I get VPN servers entry-IP addresses?   ...
    How can I get VPN servers entry-IP addresses?
     
    AirVPN servers have at least 4 entry-IP addresses (4 IPv4 and equivalent 4 IPv6 addresses). Different entry-IP addresses provide different tunnel protocols or abilities, please see https://airvpn.org/specs

    We have Fully Qualified Domain Names that resolve into one of the recommended server entry-IP addresses or ALL entry-IP addresses, in both cases according to geographical location. Such FQDNs are used automatically by our Configuration Generator.

    The recommended server is updated every 5 minutes, to balance users between servers.

    Available FQDNs which resolve into the entry-IP address you need are explained below:
      {name [entry-IP address number]}.vpn.airdns.org - to obtain the best entry-IPv4 address for specified name. {name [entry-IP address number]}.ipv6.vpn.airdns.org - to obtain the best entry-IPv6 address for specified name. {name [entry-IP address number]}.all.vpn.airdns.org - to obtain all IPv4 and IPv6 entry addresses for the specified name which can be an ISO two-letters country code (ISO-3166), a continent ('europe', 'america',' asia', 'oceania', 'africa'), or 'earth' {server name}.airservers.org for entry-IPv4 address 1 of a specific server. Note that resolution by server name is limited, so use the Configuration Generator or contact us if you need specific addresses you can't obtain via DNS. You can see server names in the real time servers monitor in our web site page https://airvpn.org/status
    [entry-IP number] is the entry-IP address number (2, 3  4), and it is optional. Don't valorize it in order to obtain the first entry-IP address, otherwise suffix the country code with the proper digit (e.g. 'be' for Belgium recommended/best rated server first entry-IP address, 'be3' for Belgium recommended server third entry-IP address).
    Examples
    nl.vpn.airdns.org resolves into the recommended server first entry-IPv4 for country NL (the Netherlands) nl.ipv6.vpn.airdns.org resolves into the recommended server entry-IPv6 address for country NL (the Netherlands) ca3.vpn.airdns.org  resolves into the recommended server third entry-IPv4 address (tls-crypt connection) for country CA (Canada) europe.all.vpn.airdns.org resolves into all the first entry addresses of all VPN servers in continent Europe. alshat.airservers.org resolves into the first entry address of server whose name is "Alshat".   Command line examples

    Obtain every first entry address (both IPv4 and IPv6) for all servers in Switzerland, asking directly our authoritative DNS server. Windows: nslookup ch.all.vpn.airdns.org dns1.airvpn.org Linux: dig ANY ch.all.vpn.airdns.org @dns1.airvpn.org +short

       
  10. Like
    go558a83nk got a reaction from hbs in How To Set Up pfSense 2.3 for AirVPN   ...
    Looks like you did something wrong around the TLS key.
     
    Also, is your local network really 192.168.0.0?  What is your DHCP server subnet?
  11. Like
    go558a83nk reacted to whitewolf75 in Serious tips for securing my computing domain and activities   ...
    I second pfSense via nguvu.org guides. He has helped a massive amount in getting my pfsense up and running and making me feel much more secure. I run home automation & security cams in my home and did not want anything phoning home to Asia nor make it easy to hack my systems.
     
    The beauty of pfSense to me was that it did not not require special or expensive hardware. I run it on an i3 (AES-NI) w/4GB and some intel NICs. Probably cost $100 USD on ebay. I spent more on the managed switch and APs.
  12. Like
    go558a83nk reacted to routeninja in IRC or Discord channel suggestion   ...
    Hello,
     
    Is there currently a Discord or IRC channel? I think it would be cool to have a place to just chat about VPN/Security/Networking/AirVPN,
  13. Like
    go558a83nk reacted to Staff in New 1 Gbit/s server available (US)   ...
    Hello!
    We're very glad to inform you that a new 1 Gbit/s server located in New York City (NY, USA) is available: Lich.

    The AirVPN client will show automatically this new server, while if you use the OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP.

    Just like every other "second generation" Air server, Lich supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the server status as usual in our real time servers monitor:
    https://airvpn.org/servers/lich

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Team
  14. Like
    go558a83nk reacted to Staff in Two new 1 Gbit/s servers available (CH)   ...
    Hello!

    We're very glad to inform you that two new 1 Gbit/s servers located in Zurich (Switzerland) are available: Dorado and Sextans.

    The AirVPN client will show automatically the new servers, while if you use the OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP.

    Just like every other "second generation" Air server, Dorado and Sextans support OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.
     
    Dorado and Sextans replace Kitalpha which will be dismissed within Nov 17th, 2018.  EDIT: by popular acclaim good old Kitalpha will NOT be canceled.

    You can check the servers status as usual in our real time servers monitor:
    https://airvpn.org/servers/dorado
    https://airvpn.org/servers/sextans
     
    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Team
  15. Like
    go558a83nk reacted to Staff in New 1 Gbit/s server available (CA)   ...
    Hello!

    We're very glad to inform you that a new 1 Gbit/s servers located in Vancouver (Canada) is available: Pisces.

    The AirVPN client will show automatically this new server, while if you use the OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP.

    Just like every other "second generation" Air server, Pisces supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the server status a usual in our real time servers monitor:
    https://airvpn.org/servers/Pisces

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Team
  16. Like
    go558a83nk reacted to Staff in Eddie Android edition 1.0 released   ...
    Hello!
     
    We are very glad to inform you that Eddie 1.0 for Android systems has been released.
     
    Eddie Android edition is a free and open source OpenVPN 3 GUI released under GPLv3. Source code is available here: https://gitlab.com/AirVPN/EddieAndroid
     
    Main features:
    Free and open source application based on OpenVPN 3 Only official application by AirVPN Robust, best effort prevention of traffic leaks outside the VPN tunnel Battery-conscious application Low RAM footprint Option to start and connect the application at device boot Option to define which apps must have traffic inside or outside the VPN tunnel through white and black list OpenVPN linked against mbedTLS library Android 5.1 or higher required fully localized (current available languages: English, French, Italian, Spanish, Turkish) The traffic leak prevention has proved to be stronger than the one implemented in OVPN for Android. A thorough OpenVPN error detection allows Eddie to "lock" the network in case of unrecoverable disconnection (for example when communications to the VPN server get broken).
     
    Direct link to the Google Play Store: https://play.google.com/store/apps/details?id=org.airvpn.eddie
     
    Direct link to download Eddie Android edition from our Eddie web site: https://eddie.website/repository/eddie/android/1.0/org.airvpn.eddie.apk
     
    A quick tutorial is available here: https://airvpn.org/topic/29660-using-airvpn-with-eddie-client-for-android/
     
    The APK will soon be available in F-Droid repository too.
     
    This is a starting point: development of a new version which includes stricter AirVPN integration is already ongoing and we are confident to provide you with updates in a very near future.
     
    Kind regards and datalove
    AirVPN Staff
  17. Like
    go558a83nk reacted to Staff in New 1 Gbit/s server available (CA)   ...
    Hello!

    We're very glad to inform you that a new 1 Gbit/s servers located in Montreal (Canada) is available: Lacerta.

    The AirVPN client will show automatically this new server, while if you use the OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP.

    Just like every other "second generation" Air server,  Lacerta supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt.
     
    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.
     
    You can check the server status as usual in our real time servers monitor:
    https://airvpn.org/servers/Lacerta
     
    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Team
  18. Like
    go558a83nk reacted to Staff in Two new 1 Gbit/s servers available (BG)   ...
    Hello!

    We're very glad to inform you that two new 1 Gbit/s servers located in Sofia  (Bulgaria) are available: Apus and Grus.

    The AirVPN client will show automatically these new servers, while if you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP.

    Just like every other "second generation" Air server, they support OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt.
     
    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.
     
    Please note that these servers replace Fornax. Fornax has been withdrawn because its datacenter did not meet anymore our technical requirements.

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Team
  19. Like
    go558a83nk got a reaction from TDJ211 in How To Set Up pfSense 2.3 for AirVPN   ...
    I think this is the 2nd or 3rd time somebody has asked this.
     
    I'm no expert by any means and I figured it out myself by just looking around and posting on the pfsense forums.  I'll write up something here for using an SSL tunnel.  SSH doesn't require stunnel but may require installing something like bash.  The other steps and actions are very similar.
     
    You must install stunnel from the freebsd repo with a small workaround
    It's recommended to install nano and screen from the pfsense repo
     
    Start by browsing to https://pkg.freebsd.org/FreeBSD:10:amd64/latest/All/  This is for 64bit systems, which I assume all are these days.  Find stunnel, and copy the link to it.
     
    Open an SSH session to your pfsense machine, select 8 for the shell command line.  I use putty for this.  https://the.earth.li/~sgtatham/putty/latest/x86/putty.exe  run it and put in the ip address of your pfsense machine e.g. 192.168.1.1 with connection type SSH.
     
    Via your SSH session find or create a directory on the pfsense machine to which to download stunnel
     
    use fetch to download stunnel from the SSH prompt, like this -  fetch https://pkg.freebsd.org/FreeBSD:10:amd64/latest/All/stunnel-5.40,1.txz
     
    use pkg to install stunnel - pkg install stunnel-5.40,1.txz
     
    use pkg to install nano - pkg install nano
     
    use pkg to install screen - pkg install screen
     
    exit out of the shell session by typing exit at the command prompt
     
    re-enter the shell session by selection option 8
     
    download the config files you need from the AirVPN config generator page with your web browser.  Then we will upload them to the pfsense machine via the web GUI interface.
     
    In the pfsense web GUI go to diagnostics>command prompt
     
    In the upload file section upload the *.ssl files you need, for each server you may want to use.  And upload a stunnel.crt file.  If you've downloaded configs for several servers you may have many stunnel.crt files but you only need to upload one.  They're all the same.
     
    Via the SSH session command line move those files you've uploaded to the pfsense machine to a permanent location.  Right now they're in the temp folder as the web GUI told you.
     
    This step is not necessary but should help with performance.  I edit the .ssl files to use the least CPU intensive TLS 1.2 cipher.  By default it'll use a stronger cipher but this isn't the real security later, openvpn is.  This is just meant to defeat DPI.  Since your machine will be crunching SSL for stunnel and openvpn, choosing a weaker cipher here will save you some clock cycles.  In the permanent directory to which you've moved the .ssl and stunnel.crt files use nano to edit...
     
    e.g. nano AirVPN_the_server_you_chose.ssl   under the line "options = NO_SSLv2" paste another line (no quotes) "ciphers = DHE-RSA-AES128-SHA256"  type ctrl+o to save the changes.  type ctrl+x to exit out of nano
     
    run stunnel using screen so that it runs in the background.  like this - screen -dmS tunnel stunnel AirVPN_the_server_you_chose.ssl    the options -dmS are important, and so is the letter case.  "tunnel" is the name of the screen session, you can call that whatever you want.
     
    Look via your web GUI of the pfense machine at Status>system logs to see that stunnel is running properly.
     
    If it is, then proceed to editing your openvpn client by going to vpn>openvpn>clients and editing your AirVPN client so that it goes through stunnel.
     
    The edits you must make to the openvpn client are: protocol must be TCP, interface must be localhost, server must be 127.0.0.1, server port must be 1413, and you must add to custom options from the corresponding .ovpn file (same server as the .ssl file you started with stunnel) the line "route server_IP_address 255.255.255.255 net_gateway" (without quotes).  Just open the .ovpn file for the server you chose with wordpad to copy and paste the line.
     
    If "explicit-exit-notify x" is in your custom options remove it as that option won't work with a TCP tunnel.
     
    click save to save the changes to the openvpn client and it should connect.  Again you can look in system logs to see more stunnel actions, and look at your openvpn status and logs, all via the web GUI.
  20. Like
    go558a83nk reacted to NvXo in [COMPLETED] Migration announcement for 10 Dallas servers   ...
    The new Dallas servers are phenomenal thus far, thank you!
  21. Like
    go558a83nk reacted to giganerd in 5 years of AirVPN   ...
    It's been a while since my last "review" - 2.5 years to be somewhat exact. My first one even dates back to 2014. Both are interesting reads if you want to know more about my story and how I used AirVPN over the years - along with my experiences with AirVPN, of course.


    I quite can't believe it myself that I'm still here after five years. It's not like I expected Air to fail miserably, but I sure expected that after 3-4 years maybe the time will come to try something new because AirVPN wouldn't be able to satisfy me for some reason..
    But no, I'm still here. And it's not because other VPN providers looked less promising (there was a brief moment when I really wanted to try out IVPN for a change), it's because AirVPN beautifully adapts to problems and trends in the market while staying true to their mission and not breaking anything in the process! The company's strategy is well thought out, both in handling technical challenges and managing users, and I actually enjoy being here. I can wholeheartedly say that I trust AirVPN's decision-making and it's a no-brainer for me to entrust them with "handling" my traffic, because I cannot fully trust my ISP.
     
    [h2]What happened since the last review?
     
    A year or so ago I was more or less forced to subscribe to Vodafone Cable because I moved to another city and the DSL lines are not as fast here as I expected them to be. It was sad to terminate my subscription to Deutsche Telekom (referred to as DTAG from here) because of this - OpenVPN works extremely well over their network and I was able to reach both my maximum upload and download throughput. And their network is rock-solid, you pay for some numbers and you actually get it in full, no strings attached. I am more than ready to pay slightly higher prices for bullshit-free network access like this. Only downside is that the Snowden leaks revealed NSA's direct access to DTAG customers' traffic... which is just another good reason to always be protected connected.
     
    Now, Vodafone is a more cheeky fella. I compare them to Verizon a bit (or was it Virgin?), that one provider who injects (or did inject) advertisements into customers' traffic. I really believe they will start doing this as well one rainy day, so surfing via AirVPN is a must for me, so as to not give them any data to train some AI. Unfortunately, this comes with a price: bad packet ID warnings are a common sight, but they seem to appear irregularly and roughly correspond to the times when I think I don't get the throughput I subscribed to. I think there's some packet reordering happening in the background - rerouting traffic over other nodes or lines, who knows.
     
    [h2]Throughput / Server quality and features
     
    With AirVPN via Vodafone I was rarely able to reach some 40 MiB/s in download, but 20-30 MiB/s is more common and stable (till the next bad packet ). I see the same symptoms with upload throughput: 50 Mbit/s ordered, I rarely get it uploading on torrents, and I didn't determine numbers by other means.
    Recently I noticed that specific server/port combinations can reach stable 5 MiB/s. But there are moments when a few simple bad packet ID warnings manage to disrupt even this.  Upload throughput fluctuates  apart from that between as low as 500 KiB/s and 3 MiB/s. There is a new development here, see below.
    I use vanilla OpenVPN on Linux with the most recent three servers in Germany, namely Intercrus, Serpens and Tucana, all ports except 53, rotating by route-random. In my ovpn file I made a few comments on some servers:
    On Intercrus, qBittorrent has a steady 5 MiB/s upload and downloads from my favorite Debian repo with 30 MiB/s more often than any other server. Tucana works extremely well on UDP/41185. Adhara and Cervantes are prone to low throughput. Errai and Ogma are "good", whatever I wanted to tell myself with this. In short: Most german servers can handle 40 MiB/s in download and definitely can hit 5 MiB/s in upload.
     
    I won't go into the server's security too much because whatever AirVPN offers should be "industry standard" by now. AirVPN offers little choice on the encryption parameters used - it's always AES-256 with RSA-4096 keys. It's solely there to ensure the max of achievable security across all users and their devices. Use the maximum - it's in the interest of AirVPN and you.
     
    [h2] A few remarks on the different client softwares
    Eddie is so feature-rich, it's almost the go-to OpenVPN client on PC. It runs on all major platforms and can handle itself and some nasty OS situations. Needs more support for external ovpn configs and it needs to drop Mono. Like, now. Please? There's an Android app now, and it uses OpenVPN 3. Mr. Schwabe's client does, too, via setting, and I can tell v3 connects blazing fast and gives more thorough log output. The decision to go with v3 was not a bad one. Unfortunately, this thing is written with Xamarin, using C#, therefore it depends on MonoDroid. Please? We were promised Eddie 3 on GTK+ and Eddie-Android without Mono. The community is awesome (more on that later ). So awesome, it gave birth to Qomui by fellow forum member corrado - an alternative Qt-based AirVPN client for Linux. I don't use any of these - vanilla on Linux and Mr. Schwabe's client on Android do the job for me. I help test Eddie on Android when I have some free time, though.
     
    [h2] The community
     
    is awesome. Seriously. These forums are a gold mine if you look for knowledge, wisdom, might and magic about pretty much any topic related to (Air)VPN and general computer tech. As I said a few times in the past, the decision to create these forums for AirVPN users might just be one of the more important factors why AirVPN is held in high regard, even if regularly being called out as being "more technical that others". Honestly, you can ask some dumb question and you will not be called dumb - people who love talking to newbies like you will be there. Or, you can ask a very thorough question with lots of tech words in it and concepts one must work with to understand and you will be treated more professionally - people who love minds like yours will be there to advise you. Of course there's a nag here and there, but they are such a rarity that I almost believe writing this is not necessary. But still.
     
    Staff is a book chapter for itself. Regularly active on the forums, managing the flood of support tickets, raising an undead army of community forum moderators. You can generally count on their posts to be helpful in their own special way.
    And yes, you read right: Some of the moderators here were regular users like me and you! And through their engagement with the community and good, helpful practice they got "promoted" to forum moderators. I've known most of them for some time now and they all deserved it very much. If something like that can happen, you know that Staff is not afraid of their users - they encourage contact among them.
     
    [h2] Anything more to say?
     
    I must realize I'm not the most thorough writer of "reviews". Generally, I let my mind speak for me. So there are definitely some things I, willingly or unwillingly, didn't mention. If you want to find out everything about AirVPN as a VPN provider, you might just register and, I don't know, see for yourself?! You will not regret this.
     
    I thank you for your time.
     
    Update:
     
    I replaced my DOCSIS modem and the throttling is gone! Now I reach stable 4 to 5 MB/s upload throughput! It doesn't seem to have much to do with my ISP in the end. Some uncontrollable feature of the modem, I guess, and no, I am not willing to look deeper.
  22. Like
    go558a83nk reacted to giganerd in client certifcate/key pairs   ...
    Not quite. You create keys with your own names so that you can, for instance, connect to AirVPN on a device you are not going to use for long. So you generate a new key pair and use this to generate a config. When you no longer use it you delete the pair and this key can no longer be used to connect to AirVPN with your account.
     
    A Certificate Revocation List by definition is a list of keys with a still ongoing validity which are marked invalid out of any reason by the issuer or owner before its time of validity expired. Your AirVPN keys are valid indefinitely, so a revocation makes little sense. Instead, you just delete the key from the database so that connecting with a deleted key leads nowhere.
     
     
    It creates key pairs for you to use on different devices, for different purposes or some other reason.
     
     
    Do not give in to any kind of paranoid thinking, like this. You do not generate the key pairs on your web browser, you request a generation on the server. Even then you are not simply presented with your key afterwards. You need to generate a config, only then the key will be bundled with it.
     
    It's also important to note that these keys do not enable someone to decrypt your traffic. They are merely there for user identification against the AirVPN servers. The most harm someone can do to you is being constantly connected with five clients. You delete the key, the "bad user" gets thrown out.
  23. Like
    go558a83nk reacted to Staff in Servers withdrawal announcement   ...
    Hello!
     
    We inform you that the following servers are being withdrawn:
     
    Fornax (Sofia, Bulgaria).
    Reason: not meeting our technical requirements anymore.
    Replacement: yes, 2 1 Gbit/s servers in Sofia in a different datacenter within 2 days (already operative, now testing)
     
    Ara, Corvus, Fafnir, Monoceros, Pictor (Dallas, TX, USA)
    Reason: they were temporary servers to support the migration of our main 10 Dallas servers. Migration completed, temp servers dismissed.
    Replacement: yes, migration complete, the previous 10 servers in Dallas are now up and running https://airvpn.org/topic/28871-completed-migration-announcement-for-10-dallas-servers/
     
    Antlia, Octans, Pavo, Sagittarius and Scorpius (Atlanta, GE, USA)
    Reason: company shutting down operations.
    Replacement: yes, 5 1 Gbit/s servers, already available since 31 Jul 2018 https://airvpn.org/topic/28854-five-new-1-gbits-servers-available-us
     
    Kind regards and datalove
    AirVPN Staff
  24. Like
    go558a83nk reacted to Staff in [COMPLETED] Migration announcement for 10 Dallas servers   ...
    FINAL UPDATE 19 SEP 2018
     
    Migration has been completed and tests have been successful. All the mentioned servers are now available and connectivity is very good from major USA residential ISPs. IPv4 addresses remain the same, while IPv6 addresses have been changed. The servers operate in a new Dallas datacenter.
     
     
     
    EDIT 18 Sep 2018: migration has been completed to a new Dallas datacenter and servers have passed the tests. All the 10 servers will be again available soon.
     
     
     
    Hello!
     
    We regret to inform you that we will soon start a migration and potential relocation of the following servers currently located in Dallas:
     
    Chamaeleon
    Equuleus
    Helvetios
    Leo
    Mensa
    Pegasus
    Ran
    Scutum
    Volans
    Vulpecula
     
    The reason is that Cogent (our transit provider in Dallas) will not renew the contract on the current 10 Gbit/s line. Unfortunately they let us know very late, just a few days before the natural expiration and normal renewal of the contract itself. It's not a price problem, they do not want to renew with us and/or with our counselor in the USA.
     
    The mentioned servers are our property but disconnecting, packaging, moving (or shipping), reconnecting and reconfiguring may take a long time (probably a month or more).
     
    Therefore, we have decided to set up a small battery of new servers, five in Phoenix and five in Dallas itself, that will run during all the time which will be necessary to complete the migration. Such servers are being connected and set up in different datacenters as we write and after a brief 24/48 hours testing period we will make them available. All the new, mentioned servers have 1 Gbit/s ports.
     
    We deeply apologize for the inconvenience and at the same time we are confident that you can understand that this sudden and unexpected issue was and is totally out of our control.
     
    Kind regards and datalove
    AirVPN Staff
  25. Like
    go558a83nk reacted to Staff in Planned maintenance on Sep 18, 2018   ...
    Hello!
     
    We inform you that on September the 18th, 2018, starting at 10.00 AM CEST, we will be performing special maintenance on our infrastructure. The maintenance aims to prepare a future migration to an updated forum board.
     
    Expected maintenance time: from 10.00 AM to 11.00 AM CEST
     
    Impact: all AirVPN web sites will be inaccessible. Only a courtesy page will be served. VPN servers and services will remain unaffected.
     
    Kind regards
     
×
×
  • Create New...