Jump to content
Not connected, Your IP: 3.147.42.168

Staff

Staff
  • Content Count

    10598
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1761

Posts posted by Staff


  1. 39 minutes ago, Air4141841 said:

    When will the Eddie client receive the newer openssl 3* ?


    https://www.openssl.org/source/

    states 1.1.1 should not be used 


    Hello!

    Eddie is not linked against any OpenSSL library. It's OpenVPN the program linked against some TSL library, which is in most cases OpenSSL, and that depends on your system. Eddie Windows and Mac edition include a ready to use OpenVPN binary linked against OpenSSL and this binary is updated on each new version, but you can update it by yourself. You can also tell Eddie to start a specific OpenVPN binary in your system.

    WireGuard does not use any external TLS library, so if you have Eddie connection mode set to WireGuard you can ignore OpenSSL.

    Kind regards
     

  2. 1 hour ago, Crewman6639 said:

    having trouble getting Eddie on Windows 11 to use IPv6 instead of IPv4. In the networking tab if I set any of the preferences to either prefer IPV6 and/or block IPv4, regardless of protocol, I cannot connect to a server. I am assuming I am probably doing something wrong and was hoping others might have a solution. 


    Hello!

    An essential requisite is that your ISP supports pure IPv6 (not IPv6 over IPv4), can you please verify? If your ISP does not support IPv6 you must connect over IPv4. Then, provided that IPv6 is supported by your system, you can use IPv6 over IPv4 through our servers.

    Kind regards
     

  3. @darksent21

    Hello!

    Your idea is totally correct but unfortunately Android forbids (for unfathomably alleged security reasons or waffling technical oversight) the phone to work as a hot spot in tethering mode when in a VPN. So you can't share the VPN traffic with an un-rooted Android device working as a hot spot. Technically, it's because Android VPN tethering system app fails to set the proper packet pre-routing and forward rules for a virtual network interface. However, if you have a rooted device you can fix the problem by adding the missing mangling rules with iptables. Please see here:
    https://android.stackexchange.com/questions/60819/can-i-share-my-androids-vpn-connection-over-a-hotspot

    Kind regards

     

  4. 1 hour ago, b0sszkr1 said:

    Closed Eddie, deleted default.profile, re-started Eddie, no dice.

    Really sorry, I know it's gotta be something I'm doing wrong. Is there something else it might be? 

    Here's an updated log if it helps: https://eddie.website/report/1413566f/ 


    Hello!

    Nothing wrong on your side, you performed the procedure correctly. The error changed, now it is very different:
    . 2024.04.18 01:49:20 - OpenVPN > TCP: connect to [AF_INET]192.30.89.29:443 failed: Unknown error
    Knowing that the error is "unknown" does not help so much, but at least the previous problem is solved. Do you run any antimalware tool which could be blocking OpenVPN and cause this unknown error?

    What happens if you switch to WireGuard? To do so:
    • from Eddie's main window please select "Preferences" > "Protocols"
    • uncheck "Automatic"
    • select the line with WireGuard port 51820. The line will be highlighted
    • click "Save" and test again connections to various servers
    Kind regards
     

  5. 13 hours ago, cucuruz said:

    Hi folks,
    newcomer here, Linux Ubuntu 23, running Eddie on WireGuard. from my area I have plenty of servers available, and getting like 500 Mbps every day. Refreshing and a lot quicker than my previous vpn! but on the top user speed I see lots of people getting higher speed, is there any way I can fine tune my Eddie to squeeze more bw? Kudos for port forwarding and ad block, terrific system... any chance we can get more than 5 ports? Or I missed some option to have more ports (for a price)?


    Hello!

    You can test different MTU values. Please install Eddie 2.24.x (if you haven't already done so) and change MTU on "Preferences" > "WireGuard" window. Please try all the possible values to determine which one can provide you with the best performance. Each time you change value you need to re-start the VPN connection, in order to apply the change on WireGuard. Please make sure to perform a variety of "speed" tests on a level playing field.

    Also, please make sure to test servers in a variety of locations around your node.

    The limit of 5 ports can't be increased at the moment, we are very sorry. We are working to power up remote inbound port forwarding system in order to avert port depletion and also be able to offer a larger quantity if needed. Stay tuned and welcome aboard!

    Kind regards
     

  6. @b0sszkr1

    Hello!

    Do you still get this error?
    . 2024.04.17 13:43:12 - OpenVPN > AUTH: Received control message: AUTH_FAILED

    If so, try to delete the following file while Eddie is NOT running:
    C:\Users\ag\AppData\Local\Eddie\default.profile

    Then re-start Eddie (you will need to re-enter your AirVPN credentials and the custom options you wish) and test again.

    Kind regards
     

  7. @AirGuy24

    Hello!

    The route check failure claimed by Eddie seems correct, because it is confirmed by WireGuard:
     
    52 minutes ago, AirGuy24 said:

    . 2024.04.17 10:42:50 - WireGuard > Retrying handshake with peer 1 (199.189.27.125:1637) because we stopped hearing back after 15 seconds
    . 2024.04.17 10:42:50 - WireGuard > Handshake for peer 1 (199.189.27.125:1637) did not complete after 5 seconds, retrying (try 2)


    Therefore, this problem could be peculiar to the WireGuard code implemented in Eddie 2.21 (or Eddie is blocked by some other blocking tool, can you please check?) and the new WireGuard resolves the problem. Can you please test whether or not the same problem occurs with Eddie 2.24.x? Please see here to download it: https://airvpn.org/forums/topic/57401-eddie-desktop-224-beta-released/

    Kind regards
     

  8. 14 minutes ago, jowlo said:

    Hi!

    Thanks for the quick answer. I know, but this is a device managed by another account. I do not have access to that account to regenerate the configuration for this device. 

    My question was whether there is another way of extending the lifetime of the certificate and getting the new CA without the use of the Configuration Generator. But it appears not, thank you anyways...


    Hello!

    Well, very strange case. BTW, ca.crt is just a public certificate and is always the same, so no, the Configuration Generator is not strictly needed, once any account has the ca.crt, it can be sent to any other account. The client certificate and key, on the contrary, are secret and non-sharable files.

    Kind regards
     

  9. Hello!

    Just in case it may help, Eddie Linux edition handles automatically OpenVPN over SSL, you can just set it in the "Preferences" > "Protocols" window. Once connected run the Tor Browser. Eddie is available even in a deb package for super-easy installation in Debian, Ubuntu and derivatives.

    If you don't want to run Eddie you can follow the instructions available here, but the setup is more complex:
    https://airvpn.org/ssl/

    Frequently, OpenVPN over SSL is not necessary. OpenVPN in tls-crypt mode (the default connection mode in our service) is able to bypass any block against OpenVPN just like OpenVPN over SSL does.
     

    1 hour ago, boonekathryn@pm.de said:

    I am ready to thank financially.


    in your subscription unlimited technical support is included, so you don't have to pay anything, just contact the support team by opening a ticket or writing to support@airvpn.org, if you haven't already done so.

    Kind regards
     

  10. @jowlo

    Hello!

    You must enter the Configuration Generator while you are logged in to the web site with an account having a valid plan. If you try to enter with an account that does not have access to AirVPN, the CG can't generate anything because the account does not have an OpenVPN certificate or a WireGuard key etc. To clarify, when you try to enter the CG from an account which does not have any valid certificate and/or key, you get a descriptive error message.

    "jowlo" has never had a valid plan to enter AirVPN, probably you have a different account, please check.

    Kind regards
     

  11. On 4/3/2024 at 2:55 AM, blank90 said:

    I use AirVPN for privacy, but I'm wondering if when I am transferring sensitive, private data across the world if doing so through an AirVPN connection improves my security any. Can anyone intelligently explain?


    Hello!

    It does. End-to-end encryption ensures data integrity and confidentiality between you and the recipient. End-to-end encryption must be used, properly and correctly, no matter what (with or without VPN, with or without Tor...).

    By adding AirVPN you enhance your privacy as nobody in the middle (including your ISP) comes to know that you and your recipient are communicating with each other (if necessary, you may hide your identity to your recipient too). As the Electronic Frontier Foundation pointed out, knowing who communicates with whom is a sensitive information which can be used against citizens' privacy even when the communication's content is encrypted. In this peculiar sense, privacy enhancement is also a security enhancement.
     
    On 4/3/2024 at 11:11 PM, blank90 said:

    The question actually relates to my wish to backup a credential database. It would be encrypted on my end before uploading it. I just wonder if any additional security is provided by AirVPN's encrypted tunnel.


    In this specific case the AirVPN additional protection may or may not be necessary, according to your threat model. Let's imagine an hard case: your threat model includes an adversary which systemically wiretaps your lines. When this happens, hiding to that adversary the location of where you're uploading important amount of data is a layer of protection in itself: it may be a very good thing, and indeed a security feature, to prevent your adversary to know which datacenter you rely to store your data and so on, even when everything is encrypted. This is a real security enhancement (you cancel the knowledge of a crucial access point from the attack surface): even if the adversary can't decrypt your data, it can either destroy them, make the machine where they are stored inaccessible, or further encrypt them to ask for a ransom, if it comes to know their location and cracks the access system.
     
    On 4/3/2024 at 11:11 PM, blank90 said:

    Do you think even if encrypted it is a bad idea to upload anywhere a password database?


    Avoid it whenenver possible, but there are some cases where it comes in handy. Imagine that you have to cross the borders of a country with questionable practices towards foreign citizens and you want to avoid a compulsory, time-consuming and stressful analysis of your mobile devices or laptop (with the obligation to provide the decryption password, otherwise you will be charged as a criminal). To avoid this hugely stressful and time-consuming action, the usual solution is to upload the complete device image (heavily encrypted of course) to a service that you know you can access from abroad, and download and restore the image well after you have crossed the border. So you can cross the border with a dummy phone/tablet/laptop completely empty of any of your sensitive data, with just a few apps to make the inspection and intrusion quick and painless, or with no device at all, and then buy a new one and restore the image you have stored on some globally accessible server (of course, some passwords must necessarily remain stored in your mind).

    Kind regards
     

  12. 17 hours ago, zsam288 said:

    I recently noticed on android "private DNS" being marked as “On" while airvpn is running.

    Maybe I didn't notice before or misremembering that this didn't used to be on?


    Hello!

    If the screenshot was taken while the system was connected to the VPN, it is fine: the DNS pushed by the VPN server is a private DNS for Android and in general (private address). You can check what your system says when it is disconnected from the VPN by entering the "Private DNS" view. You have three options: "on" sets the default DNS defined by the device manufacturer, "off" selects Google DNS, "manual" sets the DNS picked by the user. If you have a rooted device, you can permanently change the forced manufacturer and Google DNS.

    Kind regards
     

  13. 48 minutes ago, castortroy86 said:

    In Windows 11 Network settings, I set Quad9 DNS for IPv6 over HTTPS. 

    If I now use eddie and then disconnect from the VPN, my windows DNS settings becomes my IPv6 router/gateway.

    I want it to stay on quad9. 


    Hello!

    It's unexpected, can you please attach the link to a system report, generated after the problem has happened? Please see here to do so:
    https://airvpn.org/forums/topic/50663-youve-been-asked-for-a-support-filesystem-report-–-heres-what-to-do/

    Can you also test Eddie 2.24.x and check whether the problem persists or is solved? Please see here to download Eddie 2.24 beta version:
    https://airvpn.org/forums/topic/57401-eddie-desktop-224-beta-released/

    Kind regards
     

  14. Hello everyone!

    We hereby publish the Community Forum policy in response to requests for clarification as apparently the generic invitations to comply to Netiquette are not sufficient. We will spread this information throughout the platform if necessary. This document pertains only to Community forums and not to AirVPN forums for official AirVPN communications and guides, where only AirVPN staff can open new threads.

    The Community Forums are managed and maintained by AirVPN, inside its own infrastructure, and are intended to be an environment to:

    • improve AirVPN services through community driven suggestions
    • provide an old style, relaxed platform for customers to get technical help in addition to the core assistance provided by the professional AirVPN customer care and support team.
       
    Community forum is open to everybody, including non-AirVPN customers, and moderated by AirVPN staff. Community moderators may be appointed by AirVPN staff on a voluntary basis to improve moderation.

    Messages posted on the forums and authors must comply with the following rules:
    1. Message content and author's behavior must respect Netiquette rules as described here: https://www.britannica.com/topic/netiquette
    2. Content must be rigorously on topic. The topic is specified in the description of each forum or made explicit in the name itself.
    3. Any form of explicit or surreptitious advertising for third party companies or private activities is prohibited.

    Moderators have the task to enforce compliance with the above rules. Messages that violate the rules can be deleted. When possible, moderators will inform the author about the infringement. Authors of two or more messages whose content violates the rules can have their accounts temporarily prevented from posting in the forum.

    If the author of a message reputes that a moderator made a mistake in the moderation actvity, communication with the moderator is encouraged. If the author is still unsatisfied by communication with the moderator, AirVPN staff can be contacted at info@airvpn.org. The staff undertakes to examine author's' complaints within a reasonable time not exceeding 30 days.

    Kind regards and datalove
    AirVPN Staff
     

  15. 1 hour ago, overmorrow said:
    1 hour ago, go558a83nk said:

    Did you complete the guide's instructions on setting MSS on the LAN interface?
    Yes. I also set the MTU to 1320, because that's what the AirVPN conf file said.

    Hello!

    Please lower it even more to 1280 bytes and test again. Cases requiring the minimum possible MTU accepted by WireGuard are rare but not impossible.
    EDIT: ONLY through WireGuard directive, the small MTU is needed on the VPN interface. Do NOT touch the MTU of the physical interface.

    Kind regards
     

  16. @TToD

    Hello!

    Please feel free to open a ticket and the support team will examine the problem and suggest a possible solution. Make sure to include the OpenVPN log showing the connection attempt failure. On the client side TLS Crypt improves ability to circumvent blocks because in the first phase of the TLS negotiation the "client hello" and the "server hello" are already encrypted by the pre-shared TLS key, therefore the OpenVPN initialization remains hidden from the ISP. All the other steps are the same. You have no urgent reason to switch to TLS Crypt since your ISP does not block OpenVPN.

    Kind regards
     

  17. @TToD

    Hello!

    To clarify, be aware that europe.vpn.airdns.org will resolve into entry-IP address 1 of some VPN server in Europe. Entry-IP address 1 accepts only TLS Auth. You must have europe3.vpn.airdns.org for TLS Crypt with tls-crypt.key, and europe.vpn.airdns.org for TLS Auth and ta.key.
    TLS Crypt encrypts completely the whole OpenVPN Control Channel and therefore it is superior in its ability to bypass specific blocks against OpenVPN when TLS Auth may fail.

    Kind regards
     

  18. Hello!

    You might be running an nft version that supported a different syntax, or this was a peculiar error in Eddie 2.19.7. Please try to rename the "nft" utility as a momentary workaround. Eddie should fall back to iptables-legacy (if we're not mistaken that's supported in your system) and the problem should be resolved. From your description we also infer that you can't run Eddie 2.24 beta testing version in your system; if that's correct, feel free (if you haven't already done so) to warn the developers in this thread:
    https://airvpn.org/forums/topic/57401-eddie-desktop-224-beta-released/

    Kind regards
     


  19. 20 hours ago, al the yank said:

    Hello,
    I see how we are all dealing with fixing our broken access.  I did get Eddie to work again with the renewal but I dont like using the SW clients.  I tried creating new keys from the Config Generator but no success.  Anyone else get this working ok?  What a pain...


    Hello!

    Yes, as you can see on the forum all the users who had the obsolete ca.crt resolved the issue and the same happened to those who opened a ticket. Which Operating System and which OpenVPN version do you still experience the problem with? Can we see the OpenVPN log taken after a connection attempt has failed?

    Kind regards
     

  20. Hello!

    Again:

    Apr 13 02:18:01	openvpn	39844	SIGTERM[soft,auth-failure] received, process exiting
    Apr 13 02:18:01	openvpn	39844	TCP/UDP: Closing socket
    Apr 13 02:18:01	openvpn	39844	AUTH: Received control message: AUTH_FAILED
    You renewed your client certificate a few hours ago, and locally you have the previous certificate (which is no more valid due to the renewal you did). This is confirmed as the current user.crt certificate of yours expires in 2034, but locally you have:
     
    8 hours ago, hbs said:
    Valid From: Fri, 26 Oct 2018 04:54:23 +0300
    Valid Until: Mon, 23 Oct 2028 04:54:23 +0300

    showing that you have the old certificate you revoked.
    EDIT: remember to update again the user.key too.

    Kind regards
×
×
  • Create New...