Jump to content
Not connected, Your IP:


  • Content Count

  • Joined

  • Last visited

  • Days Won


Everything posted by Staff

  1. New All Time High throughput! Record! Congratulations! Feel free to add it here: https://airvpn.org/forums/topic/48234-speedtest-comparison/ Kind regards
  2. @Spyker Hello! It's outlined on step 2: after you have picked Android as system and you have defined your favorite settings, click "Generate" and the QR code will appear. On step 3 you can read how to scan it from the WireGuard app. Kind regards
  3. @zsam288 Hello! Just an additional check: make sure that the "device" (client certificate/key pair) you use in your Android device has the correct DNS block settings. Since you can define different lists (or no lists) for each "device", it's worth a verification. Kind regards
  4. Hello! We reluctantly have to announce gloomy news to you all: Spooky Halloween Deals are now available in AirVPN... Save up to 74% on AirVPN longer plans (*) (*) When compared to 1 month plan price Check all plans and discounts here: https://airvpn.org/plans If you're already our customer and you wish to jump aboard for a longer period any additional plan will be added on top of already existing subscriptions and you will not lose any day. Every plan gives you all the features that made AirVPN a nightmare for snoopers and a scary service for competitors: a clear mission without compromises https://airvpn.org/mission active OpenVPN 3 open source development WireGuard support exclusive and very flexible, opt-in block lists against malware and other hostile entities. Pick pre-defined lists, add exceptions or additional blocks, or just use our totally neutral DNS by default ChaCha20 cipher on OpenVPN Data Channel for higher performance and longer battery life on tablets and smart phones IPv6 support, including IPv6 over IPv4 configurable remote port forwarding refined load balancing to squeeze every last bit per second from VPN servers free and open source software for Android, Linux, Mac and Windows easy "Configuration Generator" web interface for access through third party software guaranteed minimum bandwidth allocation GDPR compliance and very high standards for privacy protection no log and/or inspection of clients' traffic effective traffic leaks prevention by AirVPN software Tor support via AirVPN software on Linux, Mac and Windows various cryptocurrencies accepted without any intermediary no obligation to use our free and open source software to enter AirVPN infrastructure. Interoperability is an AirVPN priority. perfectly clear and easy to read Privacy Notice and Terms https://airvpn.org/privacy No tricks, only treats! Grim regards & datathrills AirVPN Staff
  5. @zsam288 The current version of WireGuard does not support DHCP, so not even DNS push. The server has no way to tell your client which DNS it should set. We do include a directive in the WireGuard configuration file to use the proper DNS, though. Have you generated the configuration file with our Configuration Generator? If so, can you please check the directive starting with "DNS=" ? Kind regards
  6. @zsam288 When the network is not neutral you can have all sorts of differences according to how traffic shaping is enforced. For example, if UDP were to be heavily shaped and de-prioritized, or blocked, you couldn't use WireGuard but only OpenVPN with TCP as transport layer. In our infrastructure the best download performance we could achieve from a single client when line, peering, CPU and server load and bandwidth availability were not for sure bottlenecks and in total absence of any type of traffic shaping have been 715 Mbit/s (1430 Mbit/s on the server) with OpenVPN 2.5 / OpenVPN AirVPN 3, and 654 Mbit/s (1308 Mbit/s on the server) with WireGuard. Kind regards
  7. @zsam288 Hi, since the feature is strictly AirVPN DNS related, check your system DNS settings when you use WireGuard and make sure that VPN DNS is queried. What are your Operating System name and version, and which application do you run to connect via WireGuard? Kind regards
  8. Hello! We're very glad to inform you that a new 1 Gbit/s full duplex server located in Tokyo, Japan, is available: Fleed. The AirVPN client will show automatically the new server; if you use any other OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and port 1637 UDP for WireGuard. Fleed supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/fleed Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  9. Hello! We're glad to announce the beginning of WireGuard beta testing in AirPVN infrastructure. In order to test WireGuard, go to Client Area ⇨ Preferences and check Beta Features. This will allow you to see specific guides and options pertaining to WireGuard. About privacy concerns, we wrote a FAQ answer here . Please make sure to read it. WireGuard with Eddie If you want to use Eddie, go to download page of your OS, and click Other versions ⇨ Experimental in Eddie download pages. Linux note: Eddie doesn't recognize WireGuard until it is present at kernel level. Use cat /sys/module/wireguard/version to check your WireGuard kernel module. Wireguard will be available in Preferences > Protocols window (logout and login from Eddie's main window might be necessary). WireGuard without Eddie Otherwise, for official WireGuard app/binaries, see the guides below: Windows - with official WireGuard app (GUI) ⇨ https://airvpn.org/windows/wireguard/gui/ macOS - with official WireGuard app from App Store (GUI) ⇨ https://airvpn.org/macos/wireguard/appstore/ macOS - with Homebrew, terminal ⇨ https://airvpn.org/macos/wireguard/homebrew/ Linux - with official WireGuard from your distro, terminal ⇨ https://airvpn.org/linux/wireguard/terminal/ iOS - with official WireGuard app from App Store (GUI) ⇨ https://airvpn.org/ios/wireguard/appstore/ Android - with official WireGuard app from Play Store (GUI) ⇨ https://airvpn.org/android/wireguard/playstore/ The guides above will be also shown in Download section when Beta Features option is checked. Notes: We will add other connection ports, suggestions are welcome. We automatically generate WireGuard keypair (and preshared-key), and assigned IPv4/IPv6 addresses, for any device, no action required. Kind regards & datalove AirVPN Staff
  10. @zsam288 Hello! Please try again now. Kind regards
  11. Hello! In the Devices page click the "Details" button pertaining to the "device" you wish to modify, then click the "DNS" button. You will be directed to the DNS page. Configure your favorite blocks in the block list page. The settings you define will be reserved to that "device" (i.e. to that certificate/key pair). Kind regards
  12. Hello! We're glad to introduce a new feature in AirVPN infrastructure: DNS block lists. By default, AirVPN DNS remains neutral in accordance with our mission. However, from now on you have the option to enforce block lists which poison our DNS, in order, for example, to block known sources of ads, spam, malware and so on. You can manage your preferences in your account Client Area ⇨ DNS panel https://airvpn.org/dns/. We offer only lists released with licenses which grant re-distribution for business purposes too. The system is very flexible and offers some exclusive features never seen before in other VPN services: You can activate or de-activate, anytime, any combination of lists. You can add customized exceptions and/or additional blocks. Any specified domain which must be blocked includes all of its subdomains too. Lists which can return custom A,AAAA,CNAME,TXT records are supported. You can define any combination of block lists and/or exceptions and/or additions for your whole account or only for specific certificate/key pairs of your account (Client Area ⇨ Devices ⇨ Details ⇨ DNS) Different matching methods are available for your additions and exceptions: Exact (exact FQDN), Domain (domain and its subdomains), Wildcard (with * and ? as wildcards), Contain, Start with, End with. An API to fetch every and each list in different formats (see Client Area ⇨ API ⇨ dns_lists service) is active Any change in your selected list(s), any added exception and any added block is enforced very quickly, within few tens of seconds. You don't need to disconnect and re-connect your account. You can define your own lists and discuss lists and anything related in the community forum here Essential requisite to enjoy the service is, of course, querying AirVPN DNS while your system is connected to some VPN server, which is by the way a default setup if you run any of our software. Kind regards & datalove AirVPN Staff
  13. We deployed a new release which fixes issues with WireGuard (for a public beta testing) and some minor bugs. Other issues reported in this thread are under investigation. Version 2.21.2 (Wed, 27 Oct 2021 12:29:20 +0000) [bugfix] [all] WireGuard beta support [change] [all] Whitelist->Allowlist, Blacklist->Denylist [bugfix] [all] Preferences -> Routes error
  14. Hello! As a preliminary clarification, if your account uses all the connection slots and a new connection is required, the previous connection slots remain unaffected. Therefore, the disconnections occurred at an earlier time. If each OpenVPN client connected to a different server, the most plausible cause of the simultaneous disconnection is some line break, or a problem in the router. Not necessarily. If the connections were over UDP (if they are over TCP, the following does not stand), and the disconnection is caused by a line drop, your clients can not notify the server that they were disconnecting. UDP is connectionless and in our system the ping timeout is set to 60 seconds. Add to that a few more seconds for communications between VPN servers, proxy and backend servers, and you see that you need to wait more than a minute to have your connection slots freed in case of unexpected disconnection without notification in UDP. Kind regards
  15. Hello! It seems the proxy does not accept connections from OpenVPN but anyway this approach (OpenVPN over proxy) is not what you want, because if you connected OpenVPN over that proxy, your packets would have the VPN server as last hop, so the final service would again see the VPN server exit-IP address. To achieve your purpose, connect OpenVPN normally, then configure your software to connect to the proxy (make sure you start the software after the VPN connection has been established). In this way, this, and only this, software will have its traffic tunneled over the proxy over OpenVPN, and the final "exit node" is the proxy itself. It remains to be seen, however, whether the proxy will accept connections from our VPN servers IP addresses. Remember: data transiting through the proxy server will not be protected anymore by OpenVPN encryption. Make sure you enforce end-to-end encryption. Kind regards
  16. Hello! It might be indeed an IPB malfunction or problem, we will investigate. Kind regards
  17. Understood. Maybe an error by Invision? Go to your account "Client Area" > "Preferences" page, and force the date time, language and format you wish, instead of "browser". Click "Save" and verify whether the change complies to your choice. Feel free to keep us posted. Kind regards
  18. @Valerian Hello! The dates are displayed according to the browser settings, so the US format should be displayed only to en-US set browsers. Do you notice any discrepancy? Kind regards
  19. Hello! We're very glad to announce that, in compliance with its mission, AirVPN proudly supports WikiLeaks https://wikileaks.org in 2021 too, with a 0.32577602 BTC donation, around 20,000 USD at the moment of the transaction. WikiLeaks is an international non-profit organization that publishes news leaks and classified media provided by anonymous sources. Since 2006, the group has released a huge amount of documents of paramount importance and public interest, with an outstanding 100% accuracy so far, which deeply changed our vision and knowledge of the world. https://www.blockchain.com/btc/tx/527abecb9e8959556fd01cba66b45890a71f643eddff3cb1d6f9d4ffd39dc15b AirVPN's mission: https://airvpn.org/mission Kind regards & datalove AirVPN Staff
  20. More very important information: https://english.almayadeen.net/articles/analysis/exclusive:-expressvpn-insider-tells-all-on-companys-israelua Kind regards
  21. @maasenstodt Hello! Currently Eddie does not re-download automatically any new certificate/key pair: in Eddie main window, log your account out and then log it in again, in order to force Eddie to re-download client certificate(s) and key(s). A detailed guide is available here: https://airvpn.org/forums/topic/26209-how-to-manage-client-certificatekey-pairs/ Kind regards
  22. Hello! Frequently, the wintun driver can solve different problems caused by the TAP driver. If you have problems with the TAP driver (including installation issues), try and switch to the wintun one: in "Preferences" > "Advanced" window tick "Use wintun driver" then click "Save", finally re-start Eddie. Eddie 2.19 or higher version is required. Kind regards
  23. Hello! Ignore that sentence, actually we fixed the issue on server side to maintain compatibility with bugged TLS libraries and at the same time old Android versions will not be affected. That was never the case. The problem is caused by bugged TLS libraries in your system. Yes, you can do it now! You understood exactly the opposite of what it really happened. Security degradation is on client side affecting those systems still running with obsolete TLS libraries affected by critical bugs. Although we now keep compatibility even with bugged TLS libraris, please consider to upgrade your system anyway. Bugged TLS libraries are (at least) OpenSSL 1.1.0 or older versions, LibreSSL older than 3.2.0 version, GnuTLS older than 3.6.7 version. As you can see they are all obsolete versions which should not be used anymore. Kind regards
  24. @Iyam Nadie Hello! Yatse "receiver" and client listen to ports 8083 and 9077. Can those ports be configured, both in server and client? If so, you can remotely forward ports in our system (from your account "Client Area" > "Ports" panel) and then configure Yatse server and client to listen / reach to the same port numbers you remotely forwarded, as long as you need to contact Yatse receiver from the Internet. If those ports are hard coded (but hopefully in 2021 nobody hard codes anything anymore) you can't follow our suggestion. However, you could consider to reach the Yatse listening service from and to the local network, no need to send the packets to the Internet from your home network, and then receive them back, after they traveled around the world, to your home again. Can Yatse service be configured to bind to a specific interface? Kind regards
  • Create New...