Jump to content
Not connected, Your IP: 34.237.138.69

go558a83nk

Members2
  • Content Count

    1894
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    24

Reputation Activity

  1. Like
    go558a83nk reacted to corrado in AirVPN API - Update to include information for Gen2 servers   ...
    I recently stumbled upon the AirVPN API. I'd like to use it but the data provided by the api seems to be lacking information about the second generation servers, i.e. additional entry IPs and ipv6 IPs (and whether those features are available). Am I missing something or - if my assumption is correct - are there any plans to update the API to include the missing data?
  2. Like
    go558a83nk got a reaction from User of AirVPN in PIA's new South Korean server (Censored)   ...
    Air tried a server in South Korea and quickly dropped it because of the censorship.
  3. Like
    go558a83nk reacted to Staff in Five new 1 Gbit/s servers available (US)   ...
    Hello!

    We're very glad to inform you that five new 1 Gbit/s servers located in Dallas  (TX, USA) are available: Ara, Corvus, Fafnir, Monoceros, Pictor.

    The AirVPN client will show automatically the new servers, while if you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP.

    Just like every other "second generation" Air server, they support OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt.
     
    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Team
  4. Like
    go558a83nk reacted to Staff in Why You Can’t Trust NordVPN   ...
    Hello!
     
    The situation is not what you describe, since, according to the article we linked:
     
    1) the CEO of Tesonet, the CEO of ProtonVPN and the CEO of CloudVPN are all the same one person.
     
    2) CloudVPN is not a payment processor. It uses PayPal to collect subscriptions from NordVPN. It's not that you pay to NordVPN via a payment processor called "CloudVPN", you pay to CloudVPN via some payment processor (PayPal for example). In such transactions CloudVPN is not the payment processor, it is the final beneficiary of your payments. To allow such payments via a web site interaction with PayPal, PayPal wants that the beneficiary is the web site owner.
     
    Additionally, the developer of NordVPN application in the Google Play Store is CloudVPN. The developer of ProtonVPN application in the Google Play Store is Tesonet.
     
    So you know that:
    - CloudVPN is not a payment processor in the transaction phase, but the beneficiary of the payment
    - CloudVPN signs the application(s) of NordVPN (therefore it has full access to Google Play Store keys of NordVPN)
    - Tesonet signs the application(s) of ProtonVPN (therefore it has full access to Google Play Store keys of ProtonVPN)
    - the CEO of Tesonet, CloudVPN and ProtonVPN is the same person
    - CloudVPN introduced itself to PayPal as the web server owner of NordVPN
     
     
     
     
    This is a matter of trust, and when trust is involved, a lack of transparency should trigger a red alert.
     
     
    This is plainly incorrect even under a purely technical aspect. With Wireshark etc. you can only see that your packets go to or come from the VPN server. You have absolutely no idea of what happens once they are there, outside of your control. As an additional side note, please keep in mind that data mining does not necessarily involves inspection of the traffic content, which is rather trivial and obvious (another trivial consideration: otherwise end-to-end encryption would have meant death of intermediary data mining worldwide ).
     
    Kind regards
  5. Like
    go558a83nk got a reaction from corrado in Using the .ovpn conf file on linux lead to DNS LEAK!   ...
    Sigh.  Did you even read what they wrote to you?  Quote from their reply "You would need a script to modify your resolv.conf if network-manager-openvpn can't do that by accepting the DNS push". 
     
    There is your answer.
     
    Not everything will be done for you in life.  Sometimes you must put in a little effort.
  6. Like
    go558a83nk reacted to guppy in Port forwarding troubles [Tomato]   ...
    apparently you can optionally add a port like so;
     
    iptables -t nat -I PREROUTING -i tun1 -p tcp --dport port -j DNAT --to-destination destIP:destPort would be good if the guide could be edited to include that.
  7. Like
    go558a83nk reacted to Monotremata in Netflix while on AirVPN   ...
    Holy shit it works hahaha! Im on Merope and watching Real Genius as I type!! YAAAAAAAS! No more having to switch to my TV app to watch it haha.
  8. Like
    go558a83nk reacted to Staff in Announcement for Eddie Windows edition users   ...
    Hello!
     
    We would like to inform you that according to hundreds of reports we have been receiving in the last weeks, Eddie 2.10.3 and older versions stopped working properly in Windows 7, 8 and 10. While they seem to run correctly, they are not able to establish any connection with any connection mode.
     
    While we ignore the reason of this malfunction, we will probably not investigate, because Eddie 2.10.3 and older versions are no more supported since a long ago.
     
    We remind you that Eddie 2.10.3 is a three years old version and that it is deprecated. The only non-deprecated Eddie versions are 2.13.6 and 2.15.2 (as well as 2.16.1 which is currently under testing). We strongly recommend that you don't use any Eddie version older than 2.13.6.
     
    We kindly ask you to check your version in "AirVPN" > "About" and upgrade to Eddie latest release if necessary. Eddie for Windows can be downloaded here:
    https://airvpn.org/windows
     
    Kind regards
    AirVPN Staff
  9. Like
    go558a83nk reacted to corrado in Alternative AirVPN client with provider-independent double-hop support (GNU/Linux)   ...
    After the botched update yesterday, I hope v0.6.2 fares better! Main reason for that quick update is a problem with the ProtonVPN autodownload feature - I used an outdated API that would download a very old server list. Full changelog:
     
    - [change] api-url for ProtonVPN updated - the one introduced in last update was out of date
    - [change] added support for Windscribe's stealth feature (OpenVPN over SSL)
    - [change] postrm functions added to deb/rpm/aur packages
    - [change] automatic reconnections for double hop if first hop fails/disconnects
    - [change] adjusted OpenVPN configs of Mullvad and Windscribe to match official ones
    - [bugfix] tray icon not always updated after establishing double hop connection
    - [bugfix] qomui crashes while performing latency checks when server(s) are deleted
  10. Like
    go558a83nk reacted to Staff in Update on Netflix USA access   ...
    UPDATE 04-DEC-2019: Netflix USA is currently NOT accessible, we are investigating.

    Hello!
     
    After a remarkable amount of inquiries we have been receiving in the last couple of months, we are glad to inform you that currently we managed to restore access to Netflix USA.
     
    Remember that you need to use VPN DNS in order to be able to access that service from our servers.
     
    Access to Netflix USA is now possible from all of our servers. Please see here for more details: https://airvpn.org/topic/9223-netflix
     
    Please feel free to test. Your feedback is appreciated.
     
    Kind regards
    AirVPN Staff
  11. Like
    go558a83nk reacted to Staff in Netflix while on AirVPN   ...
    Hello!
     
    That's a really ingenious solution!
     
    On top of that, you can now access Netflix USA from all Air VPN servers except UK servers, provided that you use VPN DNS. Can you please test?
     
    Kind regards
  12. Like
    go558a83nk reacted to corrado in Alternative AirVPN client with provider-independent double-hop support (GNU/Linux)   ...
    I just released another update - version 0.6.1
     
    Changelog:
    - [new] support for Windscribe
    - [new] support for ProtonVPN
    - [change] missing flags for Windscribe added
    - [change] autocompletion for "c" and "v" options in cli
    - [change] most cli commands are not case-sensitive anymore
    - [bugfix] alternative dns servers not parsed correctly
    - [bugfix] crashes when loading default configuration
    - [bugfix] configs are not imported if url cannot be resolved
    - [bugfix] old connection not killed after network change detected (in rare cases)
     
    Deb-Package:
    qomui.0.6.1-amd64.deb
     
    Rpm-Package:
    qomui-0.6.1-1.x86_64.rpm
     
  13. Like
    go558a83nk reacted to Staff in Wireguard   ...
    Hello!
     
    Given the reputation of Daniel J. Bernstein, concerns about the specific employed ECC are not relevant. However, remember that Wireguard is not ready for production and you must not use it when security of your data is a priority. Wireguard developers are very honest about it, so use it at your own risk. From the official web site:
     
     
    We can't propose to our customers something based on experimental code that has not undergone a proper security auditing and those who do are clearly not protecting their customers' interests. Sooner or later Wireguard will reach a mature, stable release and will be audited and peer reviewed. That will be the right time to consider to put it into production.
     
    Kind regards
  14. Like
    go558a83nk reacted to Staff in Five new 1 Gbit/s servers available (US)   ...
    Hello!

    We're very glad to inform you that five new 1 Gbit/s servers located in Atlanta (Georgia, USA) are available: Hercules, Libra, Musca, Sculptor and Ursa.
     
    The AirVPN client will show automatically the new servers, while if you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP.

    Just like every other "second generation" Air server, they support OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt.
     
    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.
     
    Please note that these new servers will replace five servers in Atlanta, and precisely Antlia, Octans, Pavo, Sagittarius and Scorpius which will be withdrawn soon because the company operating in the datacenter they are located is ceasing operations, unfortunately.
     
    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Team
  15. Like
    go558a83nk reacted to PajamaLlama in I am blown away   ...
    This is the third VPN service I have tried. The first one I had was decent, the second one had a great software client, but both had issues. They would, at times, intermittently lose connection to their servers, or their client would freeze up and crash silently, leaving my network exposed.
     
    I have been running AirVPN for a few days now with no crashes or connection issues, and I am absolutely shocked at the awesome stability of Eddie and the servers. I don't have anything to complain about (and hopefully I won't find anything later on!) since I am such a new member of the AirVPN train, but I am happy to have stumbled upon it while shopping for my next VPN. You guys have gained a loyal, long-term customer with me. Keep being awesome.
  16. Like
    go558a83nk reacted to Anonymouss_ in How to make UDP usable if you get a time out   ...
    Heya, first post on the forum.
     
    So, I always had issues while connecting with the UDP protocol. It always ended up with a:
     
    curl: (28) Operation timed out after 20000 milliseconds with 0 out of 0 bytes received  
    Unfortunately I didn't find many posts about how to solve the problem or what may be the cause. Except for one post that said it had to with the MTU (Maximum transmission unit).
    I don't know the exact cause since I don't know a lot about networking. Maybe there is a better solution, if there is I'm more than happy to edit the post.

    Keep in mind that it helped me and may not help you, but it's always worth a shot.
     
    ------------------------------------------------------------
    Windows
    ------------------------------------------------------------
     
    1. We want to find out what our current MTU is, most likely 1500 but it's always good to know what the default value is.
    2. For this, we need to go into: Control Panel > Network and Internet > Network and Sharing Centre > Change adapter settings
       You're looking for the Tap-Windows Adapter (example included in hyperlink). You need the name for later which is my example, just "VPN"
    3. Open cmd as an admin
    4. Type netsh interface ipv4 set subinterface "YourInterfaceName" mtu=1200 store=persistent
    5. And you're done! Try connecting to AirVPN with UDP again and tell me if it worked! You can try going higher, since I'm pretty sure it's better the higher it is.
     
    ------------------------------------------------------------
    Linux
    ------------------------------------------------------------
    This is only going to cover "NetworkManager" and "OpenVPN"
    If you're using something else, find your equivalent
    As a sidenote: I'm currently on Windows and can't confirm if it actually works, may update the post when I change back to Linux
     
    1. Right-click the NetworkManager applet and choose Edit Connections
    2. Double-click your VPN connection, in my case AirVPN_NL-Alblasserdam_Hydrus_TCP-433. Example
    3. On the bottom above Save click Advanced...
    4. Click on the checkbox that says Use custom tunnel Maximum Transmission Unit (MTU)
    5. Enter 1200. Example
    6. And you're done! Try connecting to AirVPN with UDP again and tell me if it worked! You can try going higher, since I'm pretty sure it's better the higher it is.
     
    ------------------------------------------------------------
     
    This is the first guide I ever wrote on the internet. If you have any suggestions, grammar mistakes that you found, feel free to let me know.
    Fun Fact: My ping actually decreased from 60 to 48. I'm guessing because my ISP has a shitty routing system, not sure though.
     
    - Scy
  17. Like
    go558a83nk reacted to Staff in Monitor IP   ...
    It should not be a problem to extract a string with the IP address of the default gateway of the tun (or whatever) interface, with something like:
     
    pingip=$(ip route list dev tun0 | grep link | awk -F '/' {'print $1'} | sed 's/\.0/\.1/g') ping $pingip  
    Fix and refine it according to your needs and pfSense nomenclature, interface names... Note that the last "sed" invocation is gross because it just replaces any ".0" with a ".1"  so it will not work if you have a gateway with a 0 octet that's not the last one.
     
    Kind regards
  18. Like
    go558a83nk reacted to Staff in Four new 1 Gbit/s servers available (DE)   ...
    Hello!
     
    One will remain, Mesarthim.
     
     
     
    Precisely. It was a bad story with Leaseweb USA, though. Our retaliation was canceling a wide battery of dozens of servers in the Netherlands, Germany and USA. Only Singapore was graced.
     
    After a couple of months we received the official apologies from their mother company lawyers. In spite of the apologies an AirVPN founder decided to keep them on ice for two three years except for Leaseweb SG and some tiny servers in Leaseweb NL. Now we are trying to re-build a bridge of good relationships with them because we have seen that many things have changed.
     
    Kind regards
  19. Like
    go558a83nk got a reaction from asdiotgyad9fn69er7 in Alternative AirVPN client with provider-independent double-hop support (GNU/Linux)   ...
    It's good to see stuff like this in the forums.  Compared to two years ago I think Air forums have lost a lot of knowledgeable users so this is refreshing.
     
    I don't think I'll have an opportunity to use this as I use pfense but I hope somebody finds it useful.
  20. Like
    go558a83nk reacted to indon in IPv6 support and new smart features   ...
    Hi! I'm looking into trying IPv6 on AirVPN, but I'm concerned regarding the following option in generated client config:
     
    push-peer-info
     
     
    While I do understand that it is required for passing environment variable with IPv6 enable flag, I'm worried regarding what OpenVPN documentation says about it:
     
     
     
    Reading source code reveals, that it actually sends MAC address of current default route, but both documentation and source code are a little bit unclear at best on when it is being called and what type of MAC address is being sent. I'm pretty sure it has something to do with TAP interface only which is not used in AirVPN and this option does not affect privacy in any way, but still, it would be nice to get professional explanation.
     
    Thanks in advance!
  21. Like
    go558a83nk got a reaction from 333_half_evil in Thats a first. Someone really busy today?   ...
    I was connected to another AirVPN server the other day and rarbg was telling me my IP was banned.  It wouldn't let me post comments to torrents, or vote on comments, or look past page 2 of the list of torrents.
     
    But, I had no problems downloading torrent files.
     
    I went to another AirVPN server and had no problems.  Obviously there are users of AirVPN who are morons and cause problems for the rest of us.
  22. Like
    go558a83nk reacted to Staff in Four new 1 Gbit/s servers available (DE)   ...
    Hello!

    We're very glad to inform you that four new 1 Gbit/s servers located in Germany are available: Intercrus, Serpens, Tucana and Veritate.

    The AirVPN client will show automatically the new servers, while if you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP.

    Just like every other "second generation" Air server, they support OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt.
     
    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.
     
    Please note that these new servers will replace three older servers in Germany, and precisely Lepus, Libertas and Perseus which will be withdrawn on July the 11th, 2018.
     
    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Team
  23. Like
    go558a83nk reacted to Staff in Wireguard   ...
    Hello!
     
    Why should we do that? In other words, what advantages in terms of security and/or performance do a user get from Wireguard (over OpenVPN) when deployed before an audit has been performed?
     
    In terms of performance, we are concerned about this:
    https://www.wireguard.com/performance/
     
    The Wireguard performance is low, while the OpenVPN reported throughput is fake. Remember that we could beat in a single core of an archaic Q6600 CPU 300 Mbit/s in 2014. In 2018 (just a couple of weeks ago) we have obtained 1.7 Gbit/s on our AES-NI optimized machine with a load of 300+ clients practically in just ONE CORE of an E3-1270 @ 3.80 Ghz with a Linux kernel 4.9 and AES-256-GCM (so we could even go higher with ChaCha20 Poly305).
     
    The fact that in the Wireguard web site not believable data for OpenVPN is published is a reason of concern. Then, the performance of Wireguard is not interesting, especially on a core of an i7 with ChaCha20.
     
    On top of that, it is unfair to deploy to our customers a service based on a software that's not yet been tested enough in our opinion. USA Senator Wyden recently recommended Wireguard to replace everything (IPsec, OpenVPN...) in USA infrastructures and recommended to recommend Wireguard to NIST:
    https://www.phoronix.com/scan.php?page=news_item&px=WireGuard-Senator-Recommends
     
    Why this requirement before any serious audit when we know for sure (from the Snowden documents) that plans to insert backdoors in random number generators and other cryptography-related software, and then have that very software approved by NIST, started several years ago? This is another reason of concern that maybe makes Wireguard wide deployment premature: it is safer to check deeply the software and the ECC employed first, and then deploy to the public.
     
    Remember what happened  with the infamous Dual_EC_DRBG, we are not short on memory like some of our competitors are, and we are not trading your security for a fistful of dollars by riding the Wireguard hype. When and if Wireguard will prove to be as secure as OpenVPN, and capable to provide the same (or higher) performance, and provide obfuscation and more protocols choice, then we'll be very happy to experiment with it.
    https://en.wikipedia.org/wiki/Dual_EC_DRBG#Software_and_hardware_which_contained_the_possible_backdoor
     
    Kind regards
  24. Like
    go558a83nk reacted to Staff in Tunnel private subnet changed   ...
    Yes, the subnets are unique for each OpenVPN daemon. You can't overlap when you connect to different servers for multi-homing from the same machine, for example. However, you have several small subnets /24 on each server, one per daemon, and you can't say in advance which subnet your system will enter because of the load balancing system which "welcomes" the clients and "assigns" them to the OpenVPN daemon running in the less loaded core (at the moment of connection).
     
    The huge convenience of this implementation is that now we can break the previous throughput limits caused by the lack of "parallelization" of OpenVPN.
     
    The Moore's law is being infringed and we can't expect significantly more powerful CPus (at one core level) for a long time; in computing power advancements we will probably never experience again (at least in our life) the peaks of 1996-1998;  it's time to fight the software bloat, but a fully scalable multi-core OpenVPN release is probably not coming out soon; therefore the load balancing we have implemented is an immediate break through.
     
    Kind regards
  25. Like
    go558a83nk reacted to nick75 in Tunnel private subnet changed   ...
    Is it normal for a traceroute to a local IP address to reach the internet!?
×
×
  • Create New...