-
Content Count
11551 -
Joined
... -
Last visited
... -
Days Won
2044
Staff last won the day on November 13
Staff had the most liked content!
About Staff
- Currently Viewing Forums Index
-
Rank
AirVPN Team
- Birthday 05/28/2010
Profile Information
-
Gender
Not Telling
Recent Profile Visitors
The recent visitors block is disabled and is not being shown to other users.
-
-
Hello! We're very glad to inform you that the Black Friday weeks have started in AirVPN! Save up to 74% when compared to one month plan price Check all plans and discounts here: https://airvpn.org/buy If you're already our customer and you wish to jump aboard for a longer period, any additional subscription will be added on top of already existing subscriptions and you will not lose any day. AirVPN is one of the oldest and most experienced consumer VPN on the market, operating since 2010. It never changed ownership and it was never sold out to data harvesting or malware specialized companies as it regrettably happened to several competitors. Ever since 2010 AirVPN has been faithful to its mission. AirVPN does not inspect and/or log client traffic and offers: five simultaneous connections per account (additional connection slots available if needed) state of the art and flexible inbound remote port forwarding active daemons load balancing for unmatched high performance - current 'all time high' on client side is 730 Mbit/s with OpenVPN and 2000 Mbit/s with WireGuard flexible and customizable opt-in block lists protecting you from adware, trackers, spam and other malicious sources. You can customize answers or exceptions globally, at account level or even at single device level. powerful API IPv6 full support comfortable management of your client certificates and keys AES-GCM and ChaCha20 OpenVPN ciphers on all servers Perfect Forward Secrecy with unique per-server 4096 bit Diffie-Hellman keys internal DNS. Each server runs its own DNS server. DNS over HTTPS and DNS over TLS are also supported. free and open source software client side software support to traffic splitting on an application basis on Android and Linux and on a destination basis on Windows and macOS GPS spoofing on Android application AirVPN is the only VPN provider which is actively developing OpenVPN 3 library with a fork that's currently 330 commits ahead of OpenVPN master and adds key features and bug fixes for a much more comfortable and reliable experience: https://github.com/AirVPN/openvpn3-airvpn AirVPN, in accordance with its mission, develops only free and open source software for many platforms, including Android, Linux (both x86 and ARM based systems), macOS and Windows. Promotion due to end on 2025-12-03 (UTC). Kind regards & datalove AirVPN Staff
-
Hello! This message may help: https://airvpn.org/forums/topic/57512-make-plex-server-available-externally-forever/?do=findComment&comment=253176 Moreover, keep in mind that Plex always listens to port 32400 of the VPN interface, no matter how you configure it: make sure that you can "re-map" the incoming packets. This option is available also in your AirVPN account port panel by filling the "Local" field of the remotely forwarded port. "Connection refused" means that the attempted TCP connection to your node was actively rejected, i.e. reset through a TCP RST. This usually means that your system is configured to actively reject packets (instead of silently dropping them) to non-existing port, or your firewall is configured to reject packets (instead of silently dropping them). In the first case, it's likely that the VPN interface destination port simply doesn't exist, probably because Plex end-point is 32400 and not what you would expect. Try to "re-map", in the first place, your forwarded remote port to "local" 32400. If the VM is attached to the host via NAT and it's the host the one connecting to the VPN, you also have to make sure that the incoming packets (which reach the host only in this scenario, of course) are then properly forwarded (by the host) to the final destination (IP address and port of the VM). Kind regards
-
temp124 reacted to a post in a topic:
[PRC Propaganda] Taiwan, a provincial administrative region of China, is misrepresented with outdated flags. Please correct it. ...
-
Hello! The keys are key here. AirVPN infrastructure knows who you are from your key and knows your VPN IP address according to that key (as WireGuard doesn't support DHCP). Your account remotely forwarded ports are linked to "All devices" or to "Default" device, which is the only key you have, so the problem must lie elsewhere. If your NixOS VM is attached to the host via NAT, please make sure that the incoming packets are properly forwarded by the host to the final VM running qBittorrent. Kind regards
-
@Pilly Hello! Please start from here: https://airvpn.org/faq/port_forwarding/ Follow this checklist if you experience any problem: https://airvpn.org/forums/topic/66388-port-forwarding/?do=findComment&comment=243305 Kind regards
-
Networklock doesn't work and no minimization
Staff replied to StylishSpecter's topic in General & Suggestions
@StylishSpecter Hello! Not hidden, and anyway you can use them without Eddie. They are available respectively it is in the "Preferences" > "DNS" window and in "Preferences" > "Protocols" window. Eddie sets the DNS you wish, then it's up to you to ensure compatibility with specific protocols you want. Or you can just use the DNS over TLS or HTTPS of the VPN DNS - totally useless of course as the DNS is inside the VPN but anyway available. Eddie does not apply trivial decoys (except the padding offered by wg) you mention (which unfortunately are very or totally ineffective against blocks) but offers the much more effective feature (against blocks and pattern analysis) to encrypt the tunnel inside another tunnel, using OpenVPN abilities. In particular you can tunnel the VPN traffic inside a SOCKS proxy, an HTTPS proxy, an SSH tunnel and a pure TLS tunnel. Such features are more effective but come at a price: performance hit. Trivial, less noble decoys that are not so effective but are surely more performance friendly are anyway under consideration, stay tuned! Kind regards -
Networklock doesn't work and no minimization
Staff replied to StylishSpecter's topic in General & Suggestions
@StylishSpecter Hello! Both decoy traffic and usage of DNS over TLS (external or internal) have been available in Eddie since several years ago. On the server side you may connect an OpenVPN client over a stunnel or SSH tunnel previously established, you are not forced to run proprietary software. It is proven that currently AIs are able to discern from the pattern which web site you visit when you are connected to AirVPN only in 2% of the cases of real world usage, which is consistent with the paper you linked (see Tor avg. accuracy of 2.96%, negligible). Please note that the accuracy reported in the paper you linked is inferred from a not very realistic usage, where the target visited only 775 URLs in total (they discarded anything else for the analysis from the global proxy traffic). We add, on our side, that a double blind test in real world usage (where you do NOT filter out a selected amount of URLs before starting the guessing analysis) caused failure rates dramatically higher. Kind regards -
Networklock doesn't work and no minimization
Staff replied to StylishSpecter's topic in General & Suggestions
You don't worry about that, that's our business and we can assure you that we're good at math and that the business model is sustainable, as 15 years of activity show. No, it's not necessary for this use case: you need Tor over VPN and not VPN over Tor to hide your ISP from detecting Tor usage and hide our servers from knowing your actual Internet usage. This solution meets the needs you mentioned and can also be used with WireGuard. Just start the VPN connection and then, when you need it, use the Tor browser for your browsing needs, for example. We understand that it may be good for marketing fluff, but it's a solution that does not deserve much consideration, because it is against the most basic rules of safety. To understand why, just think about how the circuit is built. Furthermore, it does not hide Tor usage from your ISP. Tor over VPN and Tor alone are not a VPN side feature (except in the sense that the VPN infrastructure must not block Tor usage, of course). The fact that it is being advertised as a "premium feature" sadly says a lot about what kind of people is targeted by such ads. Yes, as usual, we were the first to offer specific anti-blocking techniques starting from 2012 and we kept adding new connection modes which are effective (AirVPN bypasses > 80% of the blocks according to a recent paper). We are working to further increase that percentage through new connection modes in the near future, and because it's always a cat and mouse game, stay tuned! However, please do not expect marketing fluff and ads for gullible people, it's not our style. Kind regards -
Hello! Can you please check whether Eddie starts minimized? Please look for Eddie's tray icon (a small cloud in a circle) in the system tray. Make sure you can see hidden icons. If you find Eddie's tray icon, double click on it and the main windows should pop up. Then, you can decide whether Eddie must start minimized or not in the "Preferences" > "UI" window. Kind regards
-
-
-
-
ANSWERED Solved! Port Forwarding > No route to host (113)
Staff replied to anwnymos's topic in Troubleshooting and Problems
Thank you very much, we have scheduled an investigation on this strange issue. We're glad to know that the new key resolved the problem. If the problem re-appears, this time please do not touch the "problematic" key (just generate and use a new one), maybe it could help the investigation. Kind regards -
-
-
-
ANSWERED Solved! Port Forwarding > No route to host (113)
Staff replied to anwnymos's topic in Troubleshooting and Problems
Hello! Actually what you say is plausible, although puzzling. Please try to generate a new key in your AirVPN account "Devices" panel, adjust the "device" linked to the forwarded port accordingly and connect with the new key. Check whether the problem gets resolved or not. The new key will give you a different VPN IP address and this test could provide some clue. Kind regards -
-
@tranquivox69 Hello! This timing is mainly up to the system that decides at its own discretion when to broadcast "BOOT_COMPLETED" and any other system signal and up to the actual time required to have the network up. Eddie waits for the network before trying connections, while other apps (wg included) don't and just tell you that the connection to the VPN is established even when the device is not connected to any network. Anyway we ask for a log (Log -> Paper plane icon), just in case. Thanks in advance. Kind regards
-
-
-
Hello! Thank you very much. Yes, we ask again for a log (Log -> Paper plane icon), thanks! Kind regards
-
Hello! We're very glad to inform you that a new 1 Gbit/s full duplex server located in Singapore is available: Azelfafage. The AirVPN client will show automatically the new server. If you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts OpenVPN connections on ports 53, 80, 443, 1194, 2018 UDP and TCP, and WireGuard connections on ports 1637, 47107 and 51820. Just like every other Air server, Azelfafage supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/Azelfafage Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
-
Hello! We're very glad to inform you that a new 1 Gbit/s full duplex server located in Auckland (NZ) is available: Mothallah. The AirVPN client will show automatically the new server. If you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts OpenVPN connections on ports 53, 80, 443, 1194, 2018 UDP and TCP, and WireGuard connections on ports 1637, 47107 and 51820. Just like every other Air server, Mothallah supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/Mothallah Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
