Jump to content
Not connected, Your IP:


  • Content Count

  • Joined

  • Last visited

  • Days Won


Posts posted by Staff

  1. Hello!

    We're very glad to inform you that Eddie Android edition 2.5 alpha beta is available.

    UPDATE 2021-09-14: Alpha 2 is now available.
    UPDATE 2021-11-10: Alpha 3 is now available.
    UPDATE 2021-12-10: Beta 1 is now available.
    UPDATE 2021-12-17: Release Candidate 1 is now available.

    UPDATE 2021.-12-24: 2.5 has been released. Topic locked, let's move to

    # sha256sum org.airvpn.eddie-2.5-RC1-Unsigned.apk 
    2133a81c584ca7a20c930824b5823d1c882492a0bc23e22cd64c8f44ce839d1c  org.airvpn.eddie-2.5-RC1-Unsigned.apk


    What's new in Eddie 2.5 RC 1

    • updated to the latest OpenVPN3-AirVPN and asio libraries
    • extensive native library rewrite and revision for higher efficiency
    • improved VPN concurrency management
    • global objects enhanced instance handling
    • linked against OpenSSL 1.1.1l (*)
    • full integration with VPN traffic leaks prevention by system in Android 7 or higher version
    • full compatibility with Android 10, 11 and 12, including ability to start and connect from a profile during device bootstrap 
    • ability to start and connect during bootstrap (if Master Password is disabled) according to a priority list which includes automatic choice, your defined country and your defined server
    • ability to select directly an area (country, continent, planet) to connect to
    • on the fly language change allowing to switch language without re-starting application
    • unification of connection parameters between settings and server settings: changes on one side are mirrored to the other so that no discrepancy occurs anymore
    • improved login credentials prompt: if wrong credentials are entered, the prompt is proposed again even when "Remember me" is selected
    • VPN lock option off by default
    • Opt-in Master Password which remains off by default
    • TLS minimum required version set to 1.2 by default
    • option to select an OpenVPN boot profile in Android 7 or higher version
    • VPN lock is forced to off and cannot be activated if "Block connection without VPN" is enabled in Android 8 or higher version system settings
    • connection restore now allows re-connection during the device bootstrap from the last active or default OpenVPN profile. It requires "VPN Always On" system setting active and Android 7 or higher version
    • Force AES-CBC suite option has been removed
    • compatibility with Android 5.1 and higher version has been maintained
    • bug fixes solving various issues, including the crash occurring on specific devices when some contextual menu item to connect was selected
    • new option to skip a single promotional message ("Do not show anymore") has been implemented, without prejudice to future promotional messages
    • manifest permissions modified in order to populate correctly app black and white lists in Android 11 and 12
    • check the changelog at the end of the message

    (*) Eddie 2.4 was linked against mbedTLS library. Such a major change has been adopted to offer TLS 1.3 and slightly higher performance both with AES and CHACHA20 cipher suites. Please do not hesitate to report any variation in battery life and performance in your device compared to Eddie 2.4.

    Important note for Android TV users. In Android 10, 11 and 12, a VPN application can start and connect during the device bootstrap if and only if "Always on VPN" option is active. Unfortunately the option is not available in Android TV 10, 11 and 12. Therefore the ability to start at boot is lost. OpenVPN for Android and openvpn-connect applications are affected by the same constraint.

    For a complete list of Eddie Android edition features please see here:

    Special thanks in advance to all users who will test Eddie Android edition 2.5 alpha and beta versions!

    Changelog 2.5 RC 1 (VC 26) - Release date: 17 December 2021 by ProMIND

    - [ProMIND] Added "QUERY_ALL_PACKAGES" permission to the manifest

    - [ProMIND] Minimum TLS level now defaults to 1.2
    - [ProMIND] VPN Lock is now off by default
    - [ProMIND] Removed force aes-cbc suite option
    - [ProMIND] Native library updated to the latest dependencies
    - [ProMIND] "AirVPN profile" has been renamed to "AirVPN Key"
    - [ProMIND] All android devices having at least API level 24 (Android 7) are now fully managed by Android system VPN facilities (including "VPN Always On" and "Block Connections without VPN")
    - [ProMIND] In case a connected OpenVPN profile is about an AirVPN server, the name is shown across the whole app instead if the IP
    - [ProMIND] Compression is now off by default
    - [ProMIND] Language override is now immediate and does not need app restart anymore

    Native Library

    - [ProMIND] Updated to OpenVPN3 3.7.1 AirVPN
    - [ProMIND] Moved to version 1.4 (Complete revision of code, structure and naming scheme)
    - [ProMIND] Moved all header files in eddie directory into include directory
    - [ProMIND] Renamed several 1.0 classes and members to more solid names
    - [ProMIND] Removed all references to boost library functions and switched to standard C++ equivalents


    - [ProMIND] Added sslLibraryVersion() function


    - [ProMIND] Added sslLibraryVersion() function

    client.cpp  (Native library)

    - [ProMIND] Implemented private method releaseJniCallbackObject()
    - [ProMIND] Switched to instance model management for JNI callback object
    - [ProMIND] removed tun_builder_set_block_ipv6() function
    - [ProMIND] added tun_builder_set_allow_family() function

    client.hpp  (Native library)

    - [ProMIND] Added private method releaseJniCallbackObject()
    - [ProMIND] removed tun_builder_set_block_ipv6() function
    - [ProMIND] added tun_builder_set_allow_family() function

    common.h  (Native library)

    - [ProMIND] New file. It defines all common macros and includes

    constants.cpp  (Native library)

    - [ProMIND] removed file

    constants.h  (Native library)

    - [ProMIND] removed file

    macros.h  (Native library)

    - [ProMIND] removed file

    stdafx.h  (Native library)

    - [ProMIND] removed file

    types.h  (Native library)

    - [ProMIND] removed file

    utils.cpp (Native library)

    - [ProMIND] Removed all C function and reimplemented as relative class methods
    - [ProMIND] Most of methods and functions have been rewritten from scratch
    - [ProMIND] Removed all references to boost library functions and switched to standard C++ equivalents


    - [ProMIND] Added method getServerByIP()
    - [ProMIND] Added method getFullServerDescription(String name)
    - [ProMIND] Added method getFullServerDescriptionByIP(String ip)
    - [ProMIND] Added method isEncrypted()
    - [ProMIND] Added Continent stats
    - [ProMIND] Added "Do not show again" methods for manifest messages


    - [ProMIND] Added method isEncrypted()
    - [ProMIND] private class getUserLocation is now aware of current local country setting
    - [ProMIND] Added method reloadUserLocation()


    - [ProMIND] added "DEFAULT" case to getUserConnectionPriority() method


    - [ProMIND] TLS, Protocol, Port and IP Version are now linked to their relative default options


    - [ProMIND] Revamped VPN connection boot logics. It now supports AirVPN best server, AirVPN default server and AirVPN default country and improved management of default OpenVPN profile and last active connection


    - [ProMIND] Added default AirVPN items management
    - [ProMIND] Added direct connection to country's best server via context menu
    - [ProMIND] Added direct connection to continent and world best servers
    - [ProMIND] exportOpenVPNProfile() now exports profiles both to internal databse and external file
    - [ProMIND] Added export continent, country and server profile to file


    - [ProMIND] Added "set" and "unset" boot in context menu for OpenVPN profiles


    - [ProMIND] Added methods getTreeMapCountry and countryCount()
    - [ProMIND] Added methods getTreeMaoContinent() and continentCount()


    - [ProMIND] Initialization log messages are now sent once at the first run of the app instance
    - [ProMIND] Classes SettingsManager, EddieLogger, SupportTools, VPNManager, MainActivity, CountryContinent, AirVPNManifest, AirVPNUser and NetworkStatusReceiver are now instantiated here and the unique instance is used all over the app
    - [ProMIND] Checks whether manifest and user's data files are encrypted and sets "Enable Master Password" setting accordingly
    - [ProMIND] Added method isVisible() returning whether the app is in foreground or visible


    - [ProMIND] Removed generic onAirVPNIgnoredDocumentRequest
    - [ProMIND] Added onAirVPNIgnoredManifestDocumentRequest and onAirVPNIgnoredUserDocumentRequest
    - [ProMIND] Added onAirVPNRequestError event


    - [ProMIND] Removed generic onAirVPNIgnoredDocumentRequest
    - [ProMIND] Added onAirVPNIgnoredManifestDocumentRequest and onAirVPNIgnoredUserDocumentRequest
    - [ProMIND] Added onAirVPNRequestError event


    - [ProMIND] Added instance and context support in order to keep the log across multiple runs belonging to the same app instance


    - [ProMIND] Added "Clear log" button


    - [ProMIND] At startup check whether system's "Block connections without VPN" setting is enable, if so VPN Lock is disabled and show a dialog
    - [ProMIND] Added new VPN Statuses management
    - [ProMIND] AirVPN Manifest messages are now shown only in case they have the "do not show again" flag turned off
    - [ProMIND] Max reconnection retries now supports infinite


    - [ProMIND] Added "boot" element and relative methods
    - [ProMIND] Added "airVPNServerName" element and relative methods
    - [ProMIND] Added "airVPNServerLocation" element and relative methods
    - [ProMIND] Added "airVPNServerCountry" element and relative methods


    - [ProMIND] In case system's "Block connections without VPN" setting is enable, VPN Lock is disabled and hidden
    - [ProMIND] Added controls for new settings
    - [ProMIND] Revised language change setting and adapted to new Android levels. The change is now immediate and does not require restart anymore
    - [ProMIND] Added infinite to max reconnection retries setting


    - [ProMIND] Added SYSTEM_IS_ALWAYS_ON_VPN and SYSTEM_VPN_LOCKOWN internal settings and relative get/set methods
    - [ProMIND] Added AIRVPN_CURRENT_LOCAL_COUNTRY and AIRVPN_CURRENT_LOCAL_COUNTRY_DEFAULT internal settings and relative get/set methods
    - [ProMIND] Added AIRVPN_DO_NOT_SHOW_AGAIN_MESSAGES and AIRVPN_DO_NOT_SHOW_AGAIN_MESSAGES_DEFAULT internal settings and relative get/set methods


    - [ProMIND] Added CONNECTION_CANCELED to Status enum


    - [ProMIND] Improved VPN concurrency management


    - [ProMIND] Check "VPN Always On" and "Block connections without VPN" system options and set Eddie's internal options accordingly


    - [ProMIND] http: and https: links are now opened by invoking the external browser
    - [ProMIND] Added bottom "Do not show again" layout bar
    - [ProMIND] Restore language/locale to the app setting and reverts Chrome/WebView default locale override

    Kind regards and datalove
    AirVPN Staff

  2. @Maggie144


    That's out of AirVPN mission scope as it would crumble the anonymity layer. Moreover it would put some additional legal duties on AirVPN as a hosting provider, so it's even outside AirVPN core business.

    We are perfectly aware that we could be offering valid VPS with one dedicated IPv4 address for less than 5 EUR per month (in an hyper-inflated business segment), but again that would be best accomplished by some partner company ad hoc created, in order not to mix different businesses with mutually incompatible purposes which, on the long run, would undoubtedly damage AirVPN good reputation as a privacy protector and a service capable to provide an anonymity layer of a significant degree.

    While competition increases, simply for the incredible amount of VPN services for consumers which are born every other day, in a world facing an economic crisis due to the pandemic and slowly progressing shortage of energy resources, it's somehow normal that each company tries to survive by innovating, or by adding different services, or sometimes, unfortunately, by betting on marketing fluff. Remember that when PIA controlling company was acquired by Kape, it had accumulated more than 32'000'000 USD debt which had to be covered by Kape itself, so it's normal that new services are added to increase much needed revenues in an attempt to make PIA profitable again, or anyway more profitable. https://www.techradar.com/uk/news/cyberghost-owner-buys-pia-for-dollar955m-to-create-vpn-giant

    In this specific case we underline once again that the service you mention is really incompatible with AirVPN Terms of Service and general mission, so you could find it only by some other company controlled by us and not in AirVPN infrastructure.

    Kind regards

  3. Version 2.21.1 (Thu, 19 Aug 2021 12:19:20 +0000)

    • [change] [windows] OpenVPN 2.5.3 also in Windows 7/8
    • [change] [linux] Removed "libappindicator1" dependency in .deb package
    • [bugfix] [linux] Fixed an issue with portable/AppImage packages ('cannot open shared object file')
    • [bugfix] [windows] Fixed Windows 7 issues
    • [bugfix] [all] Fixed an issue when IPv6 is disabled at system level
    • [bugfix] [windows] Updated libcurl
    • [change] [all] New ping engine

    Windows users: now if Wintun is used (default from this version), a network adapter is created when session starts and destroyed when session ends.
    Wintun driver is installed (or upgraded) when the adapter is created and removed when the adapter is removed.
    We added an option to keep the adapter in Preferences->Advanced window.

    Windows/Linux/macOS: we rewrote the latency/ping system to make it work better and faster, resolve some UI issues in Linux and provide more accurate results in macOS.

    @airvpnforumuser and other: issues after system suspension, and the error "Windows WFP, unexpected: Rule 'ipv6_block_all' already exists" is still under investigation, it is our next priority.

    About Windows OS compatibility: Windows 8 works exactly like Windows 10.  In Windows 7 the latest Wintun driver doesn't work for some currently unknown reason, so it is not used (OpenVPN works with the tapdriver6), and for the same reason Wireguard (which can use ONLY Wintun) will not be supported on Win7.

    Kind regards and datalove

  4. @PugConsultant


    In the host machine, your setup will force all traffic over OpenVPN over a Tor fixed circuit. You can't compare it with Tor-ification because the Tor circuit is fixed.

    However, what happens to the traffic from and to the VM depends on how the VM connects to the physical network interface:
    1. if the VM connects directly to some physical network interface, i.e. it works in "bridge mode", the tunnel(s) in the host machine are "bypassed" completely
    2. if the VM is attached to the host via NAT, all the VM traffic will also be tunneled over VPN over Tor

    The latter setup 2 is particularly important when your threat model includes powerful adversaries. OpenVPN over Tor tunnels OpenVPN over a fixed Tor circuit. Now, if you use Tor on the VM attached to the host via NAT, you add another Tor circuit, this time dynamic (i.e. re-built for every and each new TCP stream), where the traffic will end up before getting on to the Internet (your node -> Tor circuit 1 -> Air VPN server -> Tor different circuit -> the Internet). A significant improvement of the anonymity layer (on the VM) at the price of slower performance.

    Kind regards

  5. @hardknox


    Network Lock already includes a rule which allows any TCP and UDP packet from to If you need to reach different subnet inside between different network interfaces, remember to enable IP forwarding. Also remember that Network Lock does not allow data exchange between different private blocks, for example from to Should that be your need you must add additional firewall rules on top, after each Network Lock activation.

    Kind regards

  6. @hardknox


    Whereas you have set connectatboot server in bluetit.rc, when started Bluetit will propound the aircipher specified AES-128-GCM cipher, which is supported by all of our servers, for the OpenVPN Data Channel.

    If you want to try CHACHA20-POLY1305 just change aircipher into CHACHA20-POLY1305 and re-start Bluetit, or use Goldcrest with the proper options to disconnect and start a new connection.

    However, if your system does support AES New Instructions, you may lose performance with CHACHA20. Not all systems take advantage of AES-NI, even when they are implemented in the CPU, thus a test with CHACHA20 is worth its time.

    Furthermore, please make sure to test different servers in various locations, in order to maximize likelihood of good peering between our and your transit providers. If performance remains low, test TCP, according to @OpenSourcerer suggestion, just in case your ISP enforces some cap on UDP. Just change airproto into tcp and restart Bluetit.

    Kind regards

  7. Hello!

    We're very glad to inform you that we have just published the Developer's Reference Manual for Bluetit by promind.

    Bluetit, a core component of the AirVPN-SUITE, is a lightweight D-Bus controlled system daemon providing VPN connectivity through OpenVPN 3 AirVPN. Bluetit exposes a D-Bus interface which can be used by client applications in order to control the daemon and provide full interaction and connectivity with the whole AirVPN infrastructure.

    The manual covers Bluetit infrastructure and architecture and provides a complete reference for all the AirVPN’s classes on which the suite is based. The goal is to give any developer who wishes to write a Bluetit client, or a tool providing AirVPN inter-connectivity, a complete reference about the internals of both Bluetit daemon and the AirVPN–SUITE C++ classes.

    The tool to swiftly interact with the AirVPN infrastructure, repeatedly required by multiple AirVPN client developers in the past, is available and fully documented now.

    The document is a significant step forward in the VPN market and a further AirVPN's commitment to transparency and openness..The availability of a Developer's Reference Manual allows, in fact, any user or developer to successfully and proficiently build an AirVPN client to best suit her or his own needs.

    Should you decide to have a paper copy of the document, please consider that it is typeset for double side printing.

    Bluetit Developer's Reference Manual has been written and typeset in the unrivaled (ça va sans dire) LaTeX 2ε and it is released under CC BY-NC-SA 4.0 International

    You can download the manual here:

    directly from this message:

    or in the AirVPN Suite for Linux download section.

    Kind regards & datalove
    AirVPN Staff

  8. @MarxBrother

    Please make sure that no firewall blocks incoming packets while the system is in the VPN and that the listening software does not bind, even as an aftermath of UPnP or other  automated port mapping, to the physical network interface and/or localhost. Therefore, please check any bind option and also check any UPnP and similar option.

    If the above has been already verified and the problem endures, please open a ticket. The support team, in private, may support you more effectively.

    Kind regards

  9. 1 hour ago, Stack of computer parts said:
    Its this.

    My regular user cant use sudo or escalate to root and you cant log in as a root user. I have to become root in terminal via su, which I believe is the proper way of doing it.


    Of course every security model can have different approaches and settings, but in general this approach of yours is very good. "sudo" is sometimes (frequently?) used improperly in Linux and can potentially do more harm than good.

    Now imagine that you, the superuser, wants to give some other user (even your regular user, for example) the privilege to drive Bluetit (which performs even root actions, such as changing network) but not any other root privilege. With the current permission model, you can do it swiftly and comfortably. Without the airvpn group, you would be blocked and you should implement the current permission model by hand by yourself, which would be a very inelegant flaw of ours, the daemon developers and distributors.

    Even in your system, therefore, the default configuration is more comfortable for you, should any more refined need arise.

    For future logging if this happens again, is there a way of getting more verbosity from bluetit or the other airvpn suite stuff?

    No, it's already set to maximum verbosity, and such setting can't be modified in the current release, it's a gabby daemon. 😋

    Kind regards

  10. @Stack of computer parts


    Very strange issue indeed, and it's also stranger that it solved "by itself". If it re-occurs, please take all log and configuration files and open a ticket.

    kind of wonder why it wants the airvpn user to even be created if its just running as root in the first place. Ill try chaning it to airvpn:airvpn and see what happens.

    This is a question that's ignominious for any UNIX administrator, let's pretend it was born during a momentary lapse of reason or some nefarious Windows-ish influence 😀

    Joking apart: Bluetit is a daemon and runs with high privileges to modify your inner system settings (routing table, kernel packet filtering table...).

    By default policy, Bluetit accepts commands from clients that are run by any user in the airvpn group. Creation of airvpn user in the airvpn group is an additional comfort provided by the installer. It allows superusers to have fine grained selection according to the most classical and robust UNIX permission model (remember CUPS, X server and other tons of daemons permission scheme? same thing).

    For example, nowadays many Linux users routinely log into their machines with a user that can also gain all the root privileges, and they might like to NOT allow this user to send commands to Bluetit for trivial security reasons. They can do so simply by not adding their regular login user to the airvpn group. Another good, very similar example is having users that can not gain root privileges but can send commands to Bluetit.

    Of course the above is the default permission scheme set up by the installer and the provided files, nothing prevents a superuser to change it and adopt a different one.

    Kind regards


  11. Hello!


    We're very glad to inform you that a new Eddie Air client version has been released: 2.21 beta. It is ready for public beta testing.


    How to test our experimental release:

    • Go to download page of your OS
    • Click on Other versions


    • Click on Experimental


    • Look at the changelog if you wish
    • Download and install

    Please see the changelog:


    This version contains an almost completely rewritten code for routes management, DNS and more, so please report any difference from the latest stable release 2.20.

    This version implements WireGuard support. AirVPN servers will offer it, during an opt-in beta-testing phase, within September.


    WireGuard support is expected to work out-of-the-box (no need to install anything else but Eddie) in Windows and macOS. In Linux it works if kernel supports it (WG support by kernel is required).


    Don't use it for real connections it's only for those who want to collaborate to the project as beta-testers.


  12. @Stalinium


    We might have underrated the non-linear growth of load over clients amount, which is very difficult to compute in advance because it depends not only on bandwidth required by a client, but (also) on an unknown variable, that is the amount of half.-connections established by single clients, which varies enormously over time and by single clients (different usages).

    We are fine tuning and resolve the issue if necessary, thank you for the head up.

    Kind regards

  13. @WilDieteren


    The AirVPN Suite is a software suite for LInux which includes Hummingbird, Bluetit and Goldcrest. Hummingbird is already available for macOS High Sierra or higher version, while the other software of the suite (Bluetit and Goldcrest, which is a client of the Bluetit daemon) are planned to be ported to macOS.

    TUI is a Terminal (or Text-Based) User Interface, ncurses is a library which offers an API to build terminal independent TUIs. We have plans to implement an ncurses based TUI in Goldcrest.

    Eddie various problems in Rosetta 2 will be solved by having Mono native for M1, but as we wrote it's not available at the moment.

    Kind regards

  14. @amazeballs


    Unfortunately the matter is not entirely in our hands because Eddie frontend (the GUI and CLI) runs in Mono framework, and a native Mono "M1" version still doesn't exist.  For Mac we also have plans to port the AirVPN Suite, which includes Goldcrest client and Bluetit daemon. Goldcrest will have an ncurses based TUI.

    Of course, if in the meantime Mono is released for M1, we will quickly re-build Eddie fronted native for M1.

    Currently you can anyway run Eddie in M1 (frontend will run in Rosetta 2) and have it run Hummingbird for M1, to have anyway the performance boost. Only Eddie GUI will run in Rosetta, Hummingbird will run natively, and you don't need the CLI anymore.

    Kind regards

  15. @m1ster


    You can't build Hummingbird or the AirPVN Suite in FreeBSD because OpenVPN3 AirVPN library needs various modification for FreeBSD, you will not be able to even compile it at the moment.

    We have plans to port the AirVPN Suite to FreeBSD later this year, but first we need to adapt the library, which might be or not a trivial task, and we must release a new Eddie Android edition version before the summer is over.

    At the moment you only have the Linux binary compatibility mode option (try with Hummingbird, as Eddie will have too many complications due to Mono), and of course OpenVPN 2.5.2.

    Hummingbird and the Suite support and have always supported pf, the default FreeBSD firewall, but different directory tree and some other issue may cause trouble. https://docs.freebsd.org/en/books/handbook/linuxemu/

    Anyway we assure you that FreeBSD support improvement with native applications remains our goal for 2021. Our FreeBSD users are many (25% of our Windows customers, and 20% of our Linux customers, who are currently the absolute majority), not to mention the system outstanding superiority, so stay tuned.

    Kind regards

  16. Hello!

    It's possible that the first "bootstrap server" that Eddie tries to contact is not working well or is unreachable from your nodes. After the timeout, Eddie goes on to the next available "bootstrap" server, that's why it works but you notice a delay each time Eddie wants to download the "manifest file" from any bootstrap server (we offer wide redundancy of bootstrap servers, but Eddie will try them always in the same order). We will start an investigation soon. Can you confirm that the problem is still ongoing?

    Kind regards

  • Create New...