Jump to content
Not connected, Your IP: 3.140.198.43

B3nB3n

Members2
  • Content Count

    30
  • Joined

    ...
  • Last visited

    ...

Reputation Activity

  1. Like
    B3nB3n got a reaction from vladox in Spooky Halloween Deals   ...
    I have to say I am very very happy about the pop up!
    as long as it is only from time to time and really just about changelogs or promos, you can continue. I dont check my emails always and I would have missed this.

    Another 3 years... thanks
  2. Like
    B3nB3n reacted to LZ1 in Bootstrap failed - since a week   ...
    Hello!
     
    May we see your logs?
     
    Are you using the latest stable release? There was an added setting to ignore those messages.
  3. Like
    B3nB3n reacted to LZ1 in Bootstrap failed - since a week   ...
    It's always best to list the log from start to finish .
     
    You can use a spoiler tag for the logs too.
     
    If it's just a case of hiding that bootstrap message, then please try going to Eddie>Preferences>UI>Hide Bootstrap failure window.
  4. Like
    B3nB3n reacted to Staff in Bootstrap failed - since a week   ...
    Hello!
     
    The "public" bootstrap servers have been recently blocked in China (only in some limited areas at the moment). We have ways to circumvent the block. Currently you can connect because Eddie can retrieve the servers info from your HDD.
     
    In the future, you might need to re-bootstrap Eddie. In such a case:
    1) if you have followed LZ1 advice, restore the option to the previous settings, so that you get again the prompt for the bootstrap server
    2) open a ticket to receive a random, secret bootstrap server URL to enter in the prompt
     
    Kind regards
  5. Like
    B3nB3n reacted to Staff in Eddie 2.16.3 released   ...
    Hello!

    We're very glad to inform you that a new Eddie Air client version has been released: 2.16.3. As usual, Eddie is released as free and open source software under GPLv3.

    Eddie 2.16.3 includes important bug fixes. Please see the changelog:
    https://airvpn.org/services/changelog.php?software=client&format=html

    Eddie includes a full, seamless and integrated IPv6 support, as well as new features which will let you use our latest service additions including IPv6 and tls-crypt: https://airvpn.org/topic/28153-ipv6-support-and-new-smart-features/

    Users who have only IPv4 connectivity will be able to access IPv6 services, At the same time users who have only IPv6 (and not IPv4) connectivity, will be able to use our service as well.

    tls-crypt implementation provides a new, interesting way to efficiently bypass blocks and throttling against OpenVPN.

    This version has been released for GNU/Linux, OS X (Mavericks or higher is required), macOS and Windows (Vista or higher is required).

    2.16.3 version is compatible with several Linux distributions. For important notes about environments, please read here:
    https://airvpn.org/topic/27259-status-of-eddie-on-linux-distributions/

    Just like previous versions, Eddie implements direct Tor support for OpenVPN over Tor connections. Eddie makes OpenVPN over Tor easily available to Linux, OS X and macOS users: no needs for Virtual Machines, middle boxes or other special configurations. Windows users will find a more friendly approach as well. This mode is specifically designed for Tor and therefore solves multiple issues, especially in Linux and OS X/macOS, including the "infinite routing loop" problem (see for example http://tor.stackexchange.com/questions/1232/me-tor-vpn-how/1235#1235 )

    As far as we know, Eddie is the first and currently the only OpenVPN wrapper that natively allows OpenVPN over Tor connections for multiple Operating Systems. https://airvpn.org/tor Since version 2.14, Eddie sends a NEWNYM signal to Tor to ensure the use of a new circuit in every connection.

    We recommend that you upgrade Eddie as soon as possible.

    Eddie 2.16.3 for GNU/Linux can be downloaded here: https://airvpn.org/linux
    Eddie 2.16.3 for Windows can be downloaded here: https://airvpn.org/windows
    Eddie 2.16.3 for OS X Mavericks, Yosemite, El Capitan and macOS Sierra and High Sierra can be downloaded here: https://airvpn.org/macosx

    PLEASE NOTE: Eddie 2.16.3 package includes an OpenVPN version re-compiled by us from OpenVPN 2.4.6 source code against OpenSSL 1.1.0h for security reasons and to fix this bug: https://community.openvpn.net/openvpn/ticket/328

    Eddie overview is available here: https://airvpn.org/software
    Eddie includes a Network Lock feature: https://airvpn.org/faq/software_lock
    Eddie is free and open source software released under GPLv3. GitHub repository: https://github.com/AirVPN/airvpn-client

    Kind regards & datalove
    AirVPN Staff
  6. Like
    B3nB3n got a reaction from Staff in AirVPN 8th birthday celebrations   ...
    WooooW great!
    To another 8 years (at least)!!!
     
    Will buy another year, right now
  7. Like
    B3nB3n reacted to LZ1 in qTorrent + AirVpn = Am I "safe"?   ...
    It sounds like it's all fine really. Especially if you're not leaking as per ipleak.net .
  8. Like
    B3nB3n reacted to LZ1 in qTorrent + AirVpn = Am I "safe"?   ...
    In the first picture, with "Enabled protocols TCP & uTP" you may be able to change it to use only TCP. Also in the image where you use Ethernet 2. The box should contain a drop-down menu for tun0 or similar. It's to help ensure torrenting happens on the interface Air is used on. Under Advanced>Optional Address to bind to, you should see an IP address in the drop-down, underneath the "Network protocols" box. Do also make sure you're using the latest qBIttorent. Go to the Help tab and see which one is on your system. Depending on which OS you use, you can then compare the version to qBittorents download page.
     
    Then restart the client when all those settings are in place and download the test torrent from ipleak.net. Let it show a couple of addresses, instead of just 1, as per your uploaded picture.
     
    Then go to the Air Client Area and test the portforwarding.
     
    After that, you can experiment with using different protocol and location combinations in Eddie, when torrenting, to see what works for you. You can use a Linux torrent if you want to test performance.
     
    Then Linux will be on your system and you can perhaps practice using a virtual machine too
     
    I'm glad the guides were of some help .
  9. Like
    B3nB3n reacted to willowbrook in qTorrent + AirVpn = Am I "safe"?   ...
    Bind the vpn IP too below Ethernet 2 (vpn ip is in Eddie-stats). You can enable logs in qbittorrent (view-->logs-->show) to see if the connection is properly established. When correctly established with vpn, you will only see the ip address of air server in the logs after you start qbittorrent. You can take it one step further by going to ipleak to check torrent ip. ipleak isn't really needed if you have already confirmed via qbittorrent logs.
  10. Like
    B3nB3n reacted to LZ1 in qTorrent + AirVpn = Am I "safe"?   ...
    Hello!
     
    You can check some of the torrenting guides in my signature if you would like.
    Anonymous mode may cause problems for you in terms of speed and can be disabled without consequence. UTP protocol may also cause some speed issues, so you can try not using it. Couldn't you bind it to a tun0 interface of some sort, instead of Ethernet2? Was there no option in the torrent client settings to use Air DNS? Otherwise it looks good to me . Well done.
  11. Like
    B3nB3n reacted to Staff in Multi key support and management available   ...
    Hello!
     
    We're very glad to announce that a new option has been added in your account "Client Area". You will find a menu item labeled "Devices / Keys".
     
    The "Devices / Keys" tab provides you with access to a new panel to administer your client certificate/key pairs. The panel lets you use a new multi-key support from AirVPN, a comfortable and convenient feature. From now on, you will be able to have multiple keys, renew them and issue completely new keys. From each device of yours you will be free to use any key you like.
     
    Therefore you can keep all of your keys under control, administer them and also connect multiple devices to the same server and port by using a different key on each device. Eddie 2.13.6 (current stable release) already implements in the Overview window a menu which will let you choose a key before you start a connection. It will appear automagically when you create a new key from your account control panel.
     
    The Configuration Generator has been modified as well, to let you generate configuration files with the certificate/key pair you wish.
     
    Let's see in details how to use the "Devices/Keys" options.
    Device Name and Description: this is a free name or description that you can associate to any key for your comfort. Columns Type, Creation date, Last renew date and Last VPN connection are informative. Renew: this is an action button. When you click it, the corresponding certificate/key pair will be revoked, and new ones will be issued. Delete: this action button will revoke the corresponding certificate, without issuing a new one. Add a new key: this action button will create a totally new certificate/key pair which will be added without revoking or renewing any pre-existing key. View history will toggle with View Active to provide you with any relevant information on the history of your actions about keys and the current active list.   
    Some caution when using these new features:
    if you revoke or renew a certificate/key which is being used by some connected device, that device will soon be disconnected in Eddie, you will need to log your account out and then in again to force Eddie to pick a different key (new or old)  
    Kind regards and datalove
    AirVPN Staff
  12. Like
    B3nB3n reacted to steve74it in China blocked VPNs   ...
    Thanks, but I'm not the author of the guide, however I am definitely a genius   (just kidding).
     
    Glad I helped.
     
    S.
  13. Like
    B3nB3n reacted to InactiveUser in [How-To] AirVPN via SSL/stunnel on Android 6/7/8   ...
    I think I know why: You're calling /bin/bash which likely does not exist on your phone. The shebang line (#!/bin/bash) is not necessary here, just leave it out. I've created a quick tutorial for Termux:Widget, including a small video, please try it out and compare it to your approach:
     
    Termux:Widget usage
     
    The following steps assume that you have successfully followed the main tutorial.
    Instead of manually typing the two commands necessary to launch stunnel, we can do the same with a script. A script is nothing more than a text file that contains the commands we need to run.
     
    Here is a video on Vimeo that demonstrates steps 3 to 6.
     
    1. Create a text file with the following contents. Please adjust the second line to whatever server you happen to be using! For this tutorial, I'll be using the server BE-Brussels_Capricornus:
    cd storage/shared/AirVPN stunnel AirVPN_BE-Brussels_Capricornus_SSL-443.ssl 2. Save the file; choose whatever file name you want, but make sure you use the .sh file extension. For this tutorial, I'll name the file:
    capricornus.sh Put your file into the AirVPN folder on your phone (the same folder you have already been using for the main tutorial).
     
    3. Open Termux and run:
    cd This makes sure we are in stunnel's home directory. Now run:
    mkdir .shortcuts This will create a (hidden) folder that is required for Termux:Widget. That's where we need to copy our script to:
    cp storage/shared/AirVPN/capricornus.sh .shortcuts 4. Leave Termux. Now install Termux:Widget from your preferred app store (FDroid or Google Play)
     
    5. On your phone's home screen, enter your widget/wallpaper settings by long-pressing on a free spot on your home screen. Tap the WIDGETS button and find the Termux:Widget item.
    Drag one of the Termux:Widget items onto your home screen. For this tutorial, I'll use the "All shortcuts 2x2" option.
     
    6. You should now see your script listed within that new widget on your home screen. Tap on your script to run it.
    7. You can add and use as many .sh scripts for different stunnel connections as you like, as long as you also create/generate the corresponding .ovpn and .ssl files.
  14. Like
    B3nB3n reacted to steve74it in China blocked VPNs   ...
    Hi, give a look at this topic for AirVPN via SSL on Android https://airvpn.org/topic/24349-how-to-airvpn-via-sslstunnel-on-android-678/
     
    Regards.
    S.
  15. Like
    B3nB3n reacted to InactiveUser in [How-To] AirVPN via SSL/stunnel on Android 6/7/8   ...
    Goal

    We want to use AirVPN's SSL tunneling mode on Android. SSL tunneling can be very useful, especially to defeat firewalls that block OpenVPN or SSH on a protocol level. We will use the Termux Terminal Emulator to install and run stunnel and OpenVPN for Android to manage the OpenVPN connection.



    Requirements
     
    Android 6.0 or newer (5.0 and derivatives thereof such as FireOS should work too) the Android device does not have to be rooted Google PlayStore or the free & open source F-Droid market (recommended) OpenVPN for Android (FOSS) – or Air's official Eddie Android Edition Please stay tuned for future Eddie releases as they may include native SSL tunnel support (which would make this cumbersome guide unnecessary) Termux Terminal Emulator (FOSS) stunnel (FOSS), via Termux repository a separate computer to download/edit the config files (entirely optional, but recommended)  


     
    Setup instructions

    Part 1: generate AirVPN config files


    1/7: open AirVPN's config generator. When asked for your operating system, pick Linux:
     
     



     
    2/7: Choose servers: Pick a single server. Do not select more than one. Do not select a whole region.
     




      
    3/7: Protocols: First, enable Advanced Mode:
     



     
     
    Now select the SSL mode, port 443:
     



     
    4/7: Accept Terms of Service and generate the config files:
     
     
     



     
    5/7: Download the generated zip archive:
     
     

     


     
    6/7: unzip AirVPN.zip and open the *.ssl file in a text editor.
    find this line:
    pid = /tmp/stunnel4.pid 
    replace it with:
    pid = /data/data/com.termux/files/home/stunnel4.pid


     
    7/7: Now transfer the AirVPN folder to your phone's sdcard / main storage directory. For ease of use, don't put it into any subdirectories. Instead, put it into your "root" storage directory, meaning on the same level as your other default Android folders such as Documents, Download and Movies.
     



    Part 2: Install and prepare Android software

    1/3: Install OpenVPN for Android, via F-Droid or Play Store. Don't configure anything just yet.
    2/3: Install Termux Terminal Emulator, via F-Droid or PlayStore
     
    open Termux and run: termux-setup-storage Allow Termux to access files on your device. (Android 8.0 Oreo users, please read the note at the end of this tutorial). The pkg command is used to install und update software packages. Make sure your base packages are all up to date: pkg upgrade now install stunnel: pkg install stunnel


     3/3: Still in Termux, jump to the AirVPN folder you copied to your phone:
    cd storage/shared/AirVPNThe command
    lsshould list 3 files:
    AirVPN*.ovpn (the OpenVPN config file) AirVPN*.ssl  (the stunnel config file) stunnel.crt (stunnel certificate) Now start stunnel:
    stunnel AirVPN*.ssl 
    press the Home button to get out of Termux. Start OpenVPN and import the AirVPN*.ovpn config file Edit your new OpenVPN connection (tap the "pencil button") in the ALLOWED APPS tab, tick the box next to Termux return to OpenVPN's connection list your VPN connection is now configured. A tap on its name will establish the connection. verify that a connection has been established by looking for the log entry Initialization Sequence Completed browse to ipleak.net (or any similar site) to verify that your traffic is indeed routed through the VPN tunnel Here's a short video, demonstrating the steps above: https://vimeo.com/246306477
     
     



     
    Part 3: Usage instructions
     
    Now that everything is configured, future usage will be much easier:
     
    open Termux navigate to your AirVPN folder: cd storage/shared/AirVPN now run stunnel: stunnel AirVPN*.ssl Press the Home button and open the OpenVPN app Connect to your VPN profile



    Addendum: Tips 
    as an alternative to OpenVPN for Android, you can also use Air's official Eddie Android edition. Don't forget to dive into Eddie's settings to exclude ("blacklist") Termux from the VPN tunnel. don't forget to periodically run pkg upgradeto keep all of Termux' packages, including stunnel, up-to-date. To prevent leaks, it's recommended to let OpenVPN set the default route for both IPv4 and IPv6; as well disabling the LAN bypass:
     
    you may want to take a look at Termux:Widget (via F-Droid or Play Store. It's an extension to Termux. If you put your stunnel commands into shell scripts, stored in ~/.shortcuts/ , you can launch them via Home screen widgets. enable Termux' extended keyboard by sliding out the left-side menu and long-pressing the KEYBOARD button. This will enable a row of additional keys, such as CTRL, ALT and TAB which are very useful in a terminal environment -- especially the TAB key, allowing you to autocomplete command and path names. Here's a short video on Vimeo demonstrating the extended keyboard. you may generate config files for as many servers as you like, put them into your AirVPN folder on your phone and add the *.ovpn profiles to OpenVPN. you may want to consider AFWall+ for additional firewalling (root required) it is recommended to move the *.ssl and stunnel.crt files out of Android's shared storage and into Termux' private data directory, while also deleting the no longer needed *.ovpn file:

    cd ~ mkdir st         cd storage/shared/AirVPN         cp *.ssl stunnel.crt ~/st rm *.ssl stunnel.crt *.ovpn Moving those files obviously changes the paths of your Termux commands. Instead of running:

    cd storage/shared/AirVPN stunnel AirVPN*.ssl You'd now need to run:
     
    cd ~/st stunnel AirVPN*.ssl  
     



     Addendum: Caveats
     
    Following this tutorial will add the Termux app to OpenVPN's exclusion list, allowing it connect to the VPN server. But this also means that anything else you may do via Termux will also bypass the VPN tunnel. If you need a VPN-tunneled terminal app, I recommend using Termux only to run stunnel; using another terminal emulator app for your other tasks.

     
     
    Addendum: Testing and bugs
    This tutorial has been tested on:
    Stock Android 6.0 Stock Android 7.0 Stock Android 8.0 LineageOS 14.1 (~ Android 7.1.x) Fire OS 5.6.0.0 (~ Android 5.x), testing done by user steve74it

    Important Notice for Android 8.0+ (Oreo) users:

    The command termux-setup-storage does not work (yet). Instead, follow this workaround to access storage:
    https://github.com/termux/termux-app/issues/157#issuecomment-246659496

    The workaround will no longer be necessary once this bug is resolved:
    https://github.com/termux/termux-packages/issues/1578
     


     
    EDIT LOG
    Thu Dec  7 20:24 UTC 2017: initial release Thu Dec  7 20:40 UTC 2017: formatting corrections Thu Dec  7 20:58 UTC 2017: spelling Fri Dec 8 18:47 UTC 2017: add recommended route settings. credit and thanks to Darkspace-Harbinger Fri Jan  5 17:30 UTC 2018: add note that this guide is functional on FireOS 5.6 (Android 5.x). testing done by user steve74it, thank you! Mon Jan 22 18:34 UTC 2018: add mikevvl's security tip to move files out of shared storage. thank you! Sun Jul 15 12:16 UTC 2018: recommend against alternative VPN apps (thanks steve74it) Tue Jul 17 12:20 UTC 2018: mention Eddie compatibility (thanks steve74it)  
    Any corrections, further testing, as well as general suggestions for improvement would be much appreciated.
  16. Like
    B3nB3n reacted to Staff in Five simultaneous connections per account   ...
    Hello!

    We're glad to inform you that, from now on, every account can establish up to five simultaneous connections to AirVPN servers. As usual, no restrictions will be applied on IP addresses.

    No price increase has been planned for this new feature.

    We're confident that allowing 5 connections per account at the very same price will meet and even exceed the expectations of our customers.

    Please do not hesitate to contact us for any further information.

    Kind regards & datalove
    AirVPN Staff
  17. Like
    B3nB3n got a reaction from go558a83nk in China — May to July 2017   ...
    Short experience report: VPN works with the given help perfectly. Thank you very much!
  18. Like
    B3nB3n reacted to Mad_Max in AirVPN on Android (finding best server)   ...
    OpenVPN doesn't run tests to check which config u added is better. However, it uses the last config you added.
     
    I had a similar problem, where Eddie on windows used to work flawlessly and the openVpn on my mobile( iphone 6plus) was slow with high ping.
    i fixed it with:
    choosing a specific server configuration and choosing the closest one to where i live (Bulgaria), and another one in Netherlands. I tested both of them and the one in Bulgaria had a very low ping and high speed, but unfortunately, i guess there is a problem in the server where the server disconnects every 2--10mins
    but the one in the Netherlands was excellent, higher ping but good speed and never disconnects.
     
    Nevertheless, u have to keep in mind that speeds while using windows differ while using a smartphone cuz of the slower cpu the phone has.
  19. Like
    B3nB3n got a reaction from go558a83nk in China — May to July 2017   ...
    Short experience report: VPN works with the given help perfectly. Thank you very much!
  20. Like
    B3nB3n reacted to serenacat in China — May to July 2017   ...
    Not trying to take any business from AirVPN, but as a "backup", forums in Australia have quite a few long term workers/visitors to China setting up a "private VPN", similar to a business running its own VPN server for remote access by staff to internal systems for security reasons.
    See https://openvpn.net/
    A moderate amount of motivation and technical expertise is required, and a suitable arrangement with family/friends/computershop/techo/? to host and run when/if needed. The Great Firewall seems to be rather "manual" and unpredictable and variable across time and location and how you are categorized - tourist, working for foreign corp, working for Chinese corp, foreign citizen visiting relatives, etc.
    For some,  using a private vpn server and ip address back in one's "home country" allows access to georestricted streaming subscriptions etc in their own language. For the rest of us "commercial vpn users" it makes it more difficult for politicians and bureaucrats and police to argue for banning/blocking/registering vpn use to increase their power/budgets/kickbacks/... because this bypasses Netflix style filtering of ip address ranges and datacentre detection techniques.
×
×
  • Create New...