-
Content Count
11541 -
Joined
... -
Last visited
... -
Days Won
2041
Staff last won the day on November 8
Staff had the most liked content!
About Staff
-
Rank
AirVPN Team
- Birthday 05/28/2010
Profile Information
-
Gender
Not Telling
Recent Profile Visitors
The recent visitors block is disabled and is not being shown to other users.
-
Port Forwarding > No route to host (113)
Staff replied to anwnymos's topic in Troubleshooting and Problems
Hello! Actually what you say is plausible, although puzzling. Please try to generate a new key in your AirVPN account "Devices" panel, adjust the "device" linked to the forwarded port accordingly and connect with the new key. Check whether the problem gets resolved or not. The new key will give you a different VPN IP address and this test could provide some clue. Kind regards -
-
@tranquivox69 Hello! This timing is mainly up to the system, anyway we ask for a log (Log -> Paper plane icon), just in case. Thanks in advance. Kind regards
-
-
-
Hello! Thank you very much. Yes, we ask again for a new log (Log -> Paper plane icon), thanks! Kind regards
-
Hello! We're very glad to inform you that a new 1 Gbit/s full duplex server located in Singapore is available: Azelfafage. The AirVPN client will show automatically the new server. If you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts OpenVPN connections on ports 53, 80, 443, 1194, 2018 UDP and TCP, and WireGuard connections on ports 1637, 47107 and 51820. Just like every other Air server, Azelfafage supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/Azelfafage Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
-
Hello! We're very glad to inform you that a new 1 Gbit/s full duplex server located in Auckland (NZ) is available: Mothallah. The AirVPN client will show automatically the new server. If you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts OpenVPN connections on ports 53, 80, 443, 1194, 2018 UDP and TCP, and WireGuard connections on ports 1637, 47107 and 51820. Just like every other Air server, Mothallah supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/Mothallah Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
-
AirVPN suite ignores bluetit.rc settings for server.
Staff replied to meatloafmondays's topic in Troubleshooting and Problems
@meatloafmondays Hello! Yes, please, the Bluetit log may help understand the cause of the problem indeed. You can extract it from the systemd journal if your system is based on systemd: sudo journalctl | grep bluetit > bluetit.log or from syslog (typically in /var/log) in other systems not based on systemd. Kind regards -
Networklock doesn't work and no minimization
Staff replied to StylishSpecter's topic in General & Suggestions
It's the Cochran's formula. When you want a 95% confidence with an error margin of 5%, you need 383 samples out of 322 millions or infinite population. With 1009 samples you get a confidence of 95% with an error of +/-3.1%, which is accurate and acceptable for our business and for this conversation to show that your claim must be incorrect. However the Cochran's formula assumes that there's no bias in picking the sample and the above is based on an optimistic estimate of p=0.5 variability. Therefore, let's compare other surveys. An important source is GWI as it covers 2.7 billion Internet users through various tools. You must pay for their reports and insights but we found that Meltwater / We Are Social / Kepios published for free some GWI data here: https://learn.meltwater.com/rs/814-WJU-189/images/2025_Kepios_Digital_Global_Overview_Report.pdf Another source (using different tools) such as Anlyzify / Shopify publishes a few data here: https://analyzify.com/statsup/vpn You may notice that all of the above show consistent data within the confidence and error margins and they all agree to compute the amount of Internet users connecting to VPNs to 1.7 billion persons globally. There are even more surveys confirming this. They are reserved to paying companies but you can trust us, they show the same within a 5% error margin. Your estimate of 10-15% therefore lacks credibility as it is outside the error margin of many other reputable surveys which are consistent with each other. You may have a problem in how you picked your sample, it could have been unintentionally biased. On the other hand, if your sample amount is n0=40 with a high variability then you have a confidence level of 90% on an error margin of 13%, which would explain the discrepancy with no need to assume a bias. Thus VPN usage is indeed mainstream, if we agree to consider "mainstream" the usage of something with an agreed frequency by 1.7 billion people out of 6.4 billion people (26.5%). It's a design choice based on community feedback and a few considerations. The main consideration is preventing lock out from remotely administered machines, whereas community considered a permanent system modification too invasive for a program that has the responsibility to run with admin privileges. Anyway, it's true that the the previous considerations have been partially ignored by the new "persistent network lock" implemented in the AirVPN Suite for Linux daemon (Bluetit). The daemon, when this option is enabled (anyway it's off by default), sets network lock as soon as the machine has a default gateway, emulating therefore your request (as long as the daemon is allowed to start during the system bootstrap), but avoiding at the same time to set permanent changes to the system. It must also be said that implementing permanent "block all outgoing Internet traffic" rules by default on a system is a trivial task. Then, when the Network Lock comes in, the traffic towards VPN servers is re-allowed, permitting VPN connections... thus the matter does not seem relevant at all: the idea behind the whole matter is that if you know how to use a firewall, you need 30 seconds or so to set proper permanent rules; if you don't know, it's preferable that a software does not modify permanently your system in a way that you might not be able to roll back on your own. The type of double hop you suggest is a client side feature that you can easily achieve by yourself (feel free to open a ticket if in doubt). It may be integrated on our software, no rocket science here, but remember that double hopping on servers administered by the same entity is not an optimal solution and could potentially provide a false sense of security. As suggested, running Tor over a VPN connection is a much, much more robust solution for privacy purposes. The VPN hides Tor usage to your ISP and snoopers, while at the same time helps build a circuit outside a potential cage you might have been put inside by your country regime. At the same time Tor hides from the VPN servers any information related to your Internet usage. With that said, double hop for marketing reasons and for specific needs tied to jurisdictional monitoring could make sense, so we will re-consider its integration in the future. Kind regards -
Hello! You polluted both commands with syntax errors (note the spurious spaces). Please re-check. If you enter the correct commands and you still get the other errors you reported then your device is probably customized in a way that doesn't allow this operation, unfortunately. Kind regards
-
Networklock doesn't work and no minimization
Staff replied to StylishSpecter's topic in General & Suggestions
It's a weird urban legend that the VPN clientele is a niche one, at least since 2015 (maybe even earlier). According to security.org and other sources 1.75 billion people "commonly" use a consumer VPN in 2025,. Usage in the USA has declined significantly to 32% (we had a 50% peak in 2022-2023), yes, but it's not a niche obviously. The decline is driven mainly by the shift of companies dropping VPN to replace it with zero-trust solutions (corporate VPN now account for just 5% of usage, 8% in the USA, so it's less meaningful). Worldwide, if 2024 survey of a specialized company we bought is correct, roughly 1/3 of the whole Internet population used a VPN at least "once per week". Unfortunately (for them too) of this 1/3, more than 30% used a "free" VPN (this implies that free VPNs are used commonly by more than half a billion persons in the world). Some more data showing usage from USA perspective: https://www.security.org/resources/vpn-consumer-report-annual Kind regards -
Hello! It is because you have "brianz@tuta.io" as e-mail address linked to an account (whose linked e-mail address is different) and as username of another account. Only one of them has a valid plan. You can easily resolve this confusion but we have already done this for you. Please try again now. Kind regards
-
-
oaknip reacted to a post in a topic:
[PRC Propaganda] Taiwan, a provincial administrative region of China, is misrepresented with outdated flags. Please correct it. ...
-
-
Hello! We have asked twice Wurren's datacenter support for investigations and interventions on intermittent Wurren malfunctions. Techies always claimed they found nothing, but we could clearly observe repeatedly a specific bandwidth choke on various (not all) IP addresses. Although the problem seems resolved and did not re-appear in the last week, we are waiting for delivery of 3 new servers in the same Kornephoros' datacenter to power up our presence in Toronto. They are currently at Canada custom, so it's likely that we will have them connected before the end of November. They feature powerful hardware and they will be connected to 10 Gbit/s full duplex lines. We are considering to decommission Wurren after the three new servers are operational. Kind regards
-
Hello! Thanks. It's strange because Eddie has the very same ability. Given this new information, it looks like an Eddie bug rather than a limitation enforced by your device manufacturer. However, we are unable to reproduce this problem on any of our Android TV devices and emulators. Can you explain the failure with adb and send us a complete report generated by Eddie in your machine to give us more clues (after the problem has occurred, in the "Logs" view tap the paper plane icon and send us the link that the app will give you back)? Kind regards
-
Hello! Thank you for the information. It is perfectly possible, and has been observed, that manufacturers restrict or block automatic startup of VPN apps (and other app categories) in their Android TV customized ("non-stock") versions. If that's the case, you could try to enable "Always on VPN", if it wasn't removed as well. On stock Android TV "Always on VPN" is available, and sometimes it is available even in non-stock Android TV versions, because it is removed only from the user interface. Link Always on VPN to Eddie in the following way: https://airvpn.org/forums/topic/65815-android-tv-vpn-connection-at-startup-why-openvpn-for-android-can-do-it-and-eddie-not/?do=findComment&comment=255925 and check whether it resolves the situation. It is possible that the settings are wiped out by the firmware or manufacturer's supervision programs so this solution will not work in any case (even when "Always on VPN" is successfully enabled and not removed completely) but it's worth a test. Please keep us informed. Kind regards
-
-
port forwarding ANSWERED Port Forward limit=20
Staff replied to kinsham's topic in Troubleshooting and Problems
On July 2023 and only for new accounts, it was not retro-active. An official announcement was published well in advance. https://airvpn.org/forums/topic/56405-port-forwarding-availability-change/ FAQ and home page features were modified accordingly. On September 2024 a more powerful system was announced https://airvpn.org/forums/topic/63545-update-remote-port-forwarding-system-expansion/ We don't see the point: even if you can't read the news, the home page or the FAQ, you still have your old account, so you can cut it out with the gratuitous arguments. Kind regards -
-
-
port forwarding ANSWERED Port Forward limit=20
Staff replied to kinsham's topic in Troubleshooting and Problems
Hello! A couple of clarifications or additions. Multiple devices with the same key can connect to multiple servers and have the linked port(s) forwarded on all of those servers. You may also specify "All devices" for each port. Such port(s) is/are forwarded to all the connected devices, no matter through which key, on all servers. The limit is 5 ports per account but additional ports can be purchased (for this purpose you can open a ticket). Kind regards
