-
Content Count
11343 -
Joined
... -
Last visited
... -
Days Won
1951
Staff last won the day on May 16
Staff had the most liked content!
About Staff
-
Rank
AirVPN Team
- Birthday 05/28/2010
Profile Information
-
Gender
Not Telling
Recent Profile Visitors
The recent visitors block is disabled and is not being shown to other users.
-
-
-
Hello! We're very glad to inform you that two new 10 Gbit/s full duplex servers located in New York City, USA, are available: Sadalmelik and Unurgunite. The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. Sadalmelik and Unurgunite support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the status as usual in our real time servers monitor : https://airvpn.org/servers/Sadalmelik https://airvpn.org/servers/Unurgunite Do not hesitate to contact us for any information or issue. Kind regards & datalove AirVPN Staff
-
-
-
OpenSourcerer reacted to a post in a topic: Bypass specific app or website on Ubuntu without VPN? ...
-
Hello! We're very glad to inform you that two new 10 Gbit/s full duplex servers located in Chicago (IL), USA, are available: Meridiana and Sadalsuud. The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. Meridiana and Sadalsuud support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the status as usual in our real time servers monitor : https://airvpn.org/servers/Meridiana https://airvpn.org/servers/Sadalsuud Do not hesitate to contact us for any information or issue. Kind regards & datalove AirVPN Staff
-
jopket reacted to a post in a topic: Eddie doesn't work anymore, keeps restarting for weeks now, was working before ...
-
-
Bypass specific app or website on Ubuntu without VPN?
Staff replied to hedgehoq's topic in General & Suggestions
Hello! Should you have the will to try and "beat your limits" the user's manual should be understandable by everyone, it's quite explicative and very verbose. It's the file "README.md" in the package you already have. It is much simpler than it may appear and faster than any GUI. Since you have already installed the Suite and have Bluetit running, you can: 1. configure Bluetit to support traffic splitting by editing with a text editor with root privileges the file /etc/bluetit.rc (just type a line "allowtrafficsplitting on" and save the file) 2. restart Bluetit 3. connect Bluetit to a VPN server via Goldcrest 4. start Chromium in the specific traffic split namespace ("cuckoo --run /path/to/chromium") Each of the above steps requires just a few minutes, probably well spent, to read the documentation (each step is exhaustively documented in the manual) once and for all and perform the action. Otherwise you can wait for a Text User Interface which is the next planned improvement for Goldcrest (one of the Suite components). Kind regards -
Bypass specific app or website on Ubuntu without VPN?
Staff replied to hedgehoq's topic in General & Suggestions
Hello! Yes, you can do it with the AirVPN Suite 2.0.0 component Bluetit. You can run that application via the provided software cuckoo once the system is connected to the VPN (also run airsu before in order to prepare the graphic environment variables for the ungoogled Chromium). Then, only this one app will have its traffic routed outside the VPN tunnel. Please see here: https://airvpn.org/forums/topic/66706-linux-airvpn-suite-200-preview-available/ AirVPN Suite 2.0.0 is currently a Release Candidate, but it has reached a remarkable reliability and stability. Release Candidate 2 is also imminent, so the stable release will come in the very near future. Kind regards -
New User: WireGuard > Error: Failed to start: not running
Staff replied to b0n's topic in Troubleshooting and Problems
@b0n Hello! On top of the previous excellent answer by @EMULE (thank you, we'll examine your analysis to improve the software) please make sure that any RadminVPN related software is NOT running when you run Eddie. Also consider to disable this interface: when you want to use AirVPN. Kind regards -
-
Authoritative DNS server not available over ipv6
Staff replied to fhopper's topic in General & Suggestions
Hello! OK sorry, we misunderstood the question then. No, it will not work. We'll update this thread when possible. Kind regards -
Authoritative DNS server not available over ipv6
Staff replied to fhopper's topic in General & Suggestions
Hello! It's the authoritative DNS for airdns.org. $ doggo NS airdns.org NAME TYPE CLASS TTL ADDRESS NAMESERVER airdns.org. NS IN 43200s ns1.airvpn.org. 9.9.9.9:53 airdns.org. NS IN 43200s ns2.airvpn.org. 9.9.9.9:53 $ doggo AAAA airvpn.org NAME TYPE CLASS TTL ADDRESS NAMESERVER airvpn.org. AAAA IN 1800s 2001:41d0:a:6034:: 9.9.9.9:53 $ doggo NS airvpn.org NAME TYPE CLASS TTL ADDRESS NAMESERVER airvpn.org. NS IN 3474s pdns03.domaincontrol.com. 9.9.9.9:53 airvpn.org. NS IN 3474s pdns04.domaincontrol.com. 9.9.9.9:53 $ doggo AAAA airvpn.org @pdns03.domaincontrol.com NAME TYPE CLASS TTL ADDRESS NAMESERVER airvpn.org. AAAA IN 1800s 2001:41d0:a:6034:: pdns03.domaincontrol.com:53 Kind regards -
Some apps work with OpenVPN but not with Wireguard
Staff replied to alscx's topic in Troubleshooting and Problems
Hello! Please try also 1280 bytes. Usually 1280 bytes is strictly necessary only with PPPoE, but other conditions even in networks with larger frames may require smaller MTU. Worth a try. Kind regards -
@Dunmer1E700 Thank you! Understood. This a conceptual error in cuckoo which exits if it does not find any graphic environment, for example when launched from a pure TTY. cuckoo will be modified accordingly to allow correct usage even in cases like yours. It's not a trivial matter but we should be able to deliver the patch already in RC 2. About airsu, it can work only from a terminal emulator run by X or some Wayland compositor, and this is correct. You won't need airsu to run Caddy via cuckoo if Caddy does not need any graphic environment. Thank you again, your report has been instrumental to make us realize of this conceptual error. Stay tuned for Release Candidate 2. Kind regards
-
Hello! The unlimited traffic has nothing to do with slowing or not slowing down servers. The bandwidth allocation per connection slot as well as the amount of simultaneous connections inside the tunnel originated by each slot are crucial factors in this case and both those variables have been addressed in AirVPN ever since a decade ago. There's no need to limit the traffic in a given time frame for the purpose you mention; in fact, it would be ineffective. Kind regards
-
-
Hello! If, and only if, you connect directly the router to AirVPN servers and share the AirVPN traffic with device(s) behind the router, please see here: https://docs.gl-inet.com/router/en/3/tutorials/firewall/#port-forwards From the documentation it is not totally clear whether the "WireGuard" external zone for port forwarding applies also when the router runs WireGuard in "client mode": it should work fine since a WireGuard interface does not have a fixed role as client or server, it can act as both. Thus, chances are that the port forwarding documented for WireGuard in "server mode" will work identically in "client mode". For any problem please contact their customer support and if possible report back here. Kind regards
-
-
ANSWERED AirVPN wireguard through gluetun and portainer
Staff replied to James8795's topic in Troubleshooting and Problems
@James8795 Hello! Can you please publish the complete container's log taken after the problem has occurred? As a first "blind" attempt to resolve the situation, please test again with a WireGuard interface MTU set to 1280 bytes. Set the WIREGUARD_MTU environment variable to 1280 in the environment: section: environment: - VPN_SERVICE_PROVIDER=airvpn - VPN_TYPE=wireguard - HEALTH_VPN_DURATION_INITIAL=120s - WIREGUARD_MTU=1280 ... Kind regards