Jump to content
Not connected, Your IP: 3.149.23.124

Staff

Staff
  • Content Count

    11044
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1866

Everything posted by Staff

  1. Hello! The sentences Save up to 74% on AirVPN longer plans (*) (*) When compared to 1 month plan price should be more transparent than a ghastly ghost. Kind regards
  2. Version 2.18.5 (Wed, 30 Oct 2019 15:03:32 +0000) [new] Linux - systemd service [change] Code cleanup for stable release [bugfix] Windows - Service installation issue in Windows 7 [bugfix] Windows - SSL connections [bugfix] Suppression of some unwanted elevated log [bugfix] Windows bug 'Do you want to reset Eddie to default settings?' [bugfix] Fix for occasional error on exit, 'Object reference not set to an instance of an object'. All other reported issues are under investigation.
  3. Hello! We reluctantly have to announce gloomy news to you all: Spooky Halloween Deals are now available in AirVPN... Save up to 74% on AirVPN longer plans (*) (*) When compared to 1 month plan price Check all plans and discounts here: https://airvpn.org/plans If you're already our customer and you wish to jump aboard for a longer period any additional plan will be added on top of already existing subscriptions and you will not lose any day. Every plan gives you all the features that made AirVPN a nightmare for snoopers and a scary service for competitors: active OpenVPN 3 open source development ChaCha20 cipher on OpenVPN Data Channel for higher performance and longer battery life on tablets and smart phones IPv6 support, including IPv6 over IPv4 configurable remote port forwarding refined load balancing to squeeze every last bit per second from VPN servers free and open source software for Android, Linux, Mac and Windows easy "Configuration Generator" web interface for access through third party software guaranteed minimum bandwidth allocation GDPR compliance and very high standards for privacy protection no log and/or inspection of clients' traffic effective traffic leaks prevention by AirVPN software Tor support via AirVPN software on Linux, Mac and Windows various cryptocurrencies accepted without any intermediary crystal clear, easy to read Privacy Notice and Terms https://airvpn.org/privacy No tricks, only treats! Grim regards & datathrills AirVPN Staff
  4. Hi, if you find a way to modify routing table, default gateway and firewall rules in a computer from an account that can't have superuser privileges then you should have found a critical vulnerability in that computer. Kind regards
  5. Hello, the maximum performance we could achieve with AES-NI and load balancing on a single server with daemons working on 4 cores has been 1.8 Gbit/s, meaning that a client with no CPU power limitation connected alone on a VPN server with 1 Gbit/s line full duplex (or a 10 Gbit/s line as in our Netherlands and Dallas servers) with "perfect" peering and routing, and when the weakest hop between client and server is stronger than both those client and server, can achieve a theoretical maximum of 1800 / 4 = 550 Mbit/s (because OpenVPN does not scale, it runs exclusively on a single thread of a single core). In real life with good peering and no CPU bottleneck you can expect the speeds you see reported in real time in the "Top 10 Users speed" in our servers monitor https://airvpn.org/status which means 180-250 Mbit/s, i.e at least 20 times the minimum allocated bandwidth per client we guarantee against overselling in the ToS. Kind regards AirVPN Support Team
  6. @Lordvpn Hello! We can't see how the problem can be solved by Eddie, an application running in the userspace, when not even a system administrator in front of the keyboard can kill a process. If your report is accurate an immortal process that's not a zombie shows that the system is out of control. Not so surprising in Windows but please re-check your claims, just in case, i.e. is openvpn.exe really impossible to kill without rebooting the system? Kind regards
  7. Hello! Cause of the issue is trivial: in 1970 our certificates are not valid. 19700101 01:04:09 N VERIFY ERROR: depth=1 error=certificate is not yet valid: C=IT ST=IT L=Perugia O=airvpn.org CN=airvpn.org CA emailAddress=info@airvpn.org So no bug but correct behavior. According to your own descriptions, it is plausible that the router could not reach the configured NTP server to set the correct date and time. Kind regards
  8. Hello! We need more details. We can only confirm what we wrote here: https://airvpn.org/forums/topic/28876-why-you-can%E2%80%99t-trust-nordvpn/?do=findComment&comment=102091 In general, logging or not logging users' traffic data or metadata or IP addresses is totally irrelevant in such cases. Kind regards
  9. Hello! Vulnerable IPMI, iDRAC etc. which are then kept not updated and whose access is not even communicated to the customer is a negligent and intolerable behavior, however it's not impossible. Good datacenters keep such an access restricted to a VPN, but it's plausible that in some cases access is exposed to some public Internet address. Speaking only about Dell's iDRAC, a study led in 2018 evaluated that tens of millions of servers are critically vulnerable. And that's only Dell, while other management systems add other vulnerabilities. As disabling a remote management system is not a comfortable solution, because it could be needed for any emergency remote OS installation/maintenance/reboot/whatever, since AirVPN birth we verify IPMI, DRAC, iLOM etc. etc., restrict access to them to a tiny pool of IP addresses reserved to Air management if the server is exposed to the Internet (if it's in a VPN, the risk is remarkably reduced, as the attacker should find a way to enter the VPN first and discover the address inside the VPN) and keep it up to date (datacenters sometimes do not even bother to give you an updated system). That said, inside jobs can potentially crumble any and each caution, that's why it's important to rely on reputable datacenters; furthemore, if NordVPN statement is true, as incredible as it may sound, then the datacenter committed an outstanding negligence which perhaps might even be considered malicious in court, for having failed to inform NordVPN about the existence of a remote management system capable to bypass any server defense. However, we would like to read a statement from the datacenter company, before jumping to conclusions. Eliminating hazards completely is impossible, but risk mitigation is a task which must be always pursued with due diligence. Kind regards
  10. Hello We're sorry, OpenVPN 3 library, which is used by Eddie Android edition, currently does not handle "remote-random". All remote lines will be evaluated sequentially, with no random start. "remote-random" directive has always been missing in OpenVPN 3 main branch but now that we actively develop OpenVPN 3 AirVPN fork, we might implement it. We can't promise anything right now but stay tuned. Kind regards
  11. Hello! Of course. Eddie handles network changes perfectly in Android 5.1, 6, 7, 8 and 9. Should problems involve Android 10 (under which current Eddie stable release was not tested) they will be properly addressed. Let's see log and logcat. Kind regards
  12. @dinosm Hello! 1. Yes, it's possible and the only explanation we can think of (you can check the log anyway, if in doubt feel free to send it to us). 2. Please enable both "Always On VPN" and "Block connections without VPN". After that you can disable "VPN Lock" in Eddie's "Settings" > "VPN". Kind regards
  13. Hello, can you also send us a system report ("Logs" > LIFE BELT icon > "Copy" icon > paste into your message)? From the log we see that VPN server's IPv4 push is strangely missing and that in pure IPv6 a problem arises: . 2019.10.15 01:10:00 - OpenVPN > NOTE: unable to redirect default gateway -- Cannot read current default gateway from system The IPv4 successful route check is enigmatic as well. Do you have IPv4 connectivity with your ISP, or do you have IPv6 only (and IPv4 is wrapped in IPv6)? We are looking forward to hearing from you. Kind regards
  14. @laowai Please feel free to send the logcat in a ticket, and not here (as you prefer). Eddie has been tested extensively on dozens of Android 6, 7, 8 and 9 devices, and not on 10, so the logcat is very welcome. Is your version a beta version? Kind regards
  15. @laowai Hello! Yes, if you need to re-enter the Master Password, then Eddie re-started. If you have the chance to take a logcat, that would help us immensely: we start to suspect that Eddie crashes in your customized Android version, and the idea is supported even by some other unexpected behaviors you report and by the fact that after your last system upgrade situation improved remarkably. About starting Eddie at (re)boot, that's entirely up to the system. Eddie registers to the list of applications that the system should launch at boot. Then it's up to the system when and if running them. In some device (for example some Asus phones and tables), a boot launcher manager pre-installed by the manufacturer and running with root privileges is active by default and manages the list of apps to run at boot, so it will bypass Eddie (and any other app) registration. Kind regards
  16. Hello! No, they can't of course. And surely nobody would pay for such a "feature"! There is no remaining trace of your real IP address in your packets once they are not between the VPN server and you, (not like in proxies which add X-Forward etc. field, obviously) and a web site owner can not access our VPN servers (again, that's obvious) as administrator or physically to perform a correlation analysis in real time. Kind regards
  17. Hello! If the disconnection from the previous network did not cause an unrecoverable OpenVPN error Eddie would re-connect, of course, because the VPN would have remained paused and the tunnel up (no leaks possible). Otherwise what you suggest would be terribly wrong, as it would expose you to traffic leaks during the re-connection. Anyway, since you run Android 9, you can enable proper options in your system to prevent traffic leaks outside the VPN tunnel and then disable VPN lock from "Settings" view. Doing so will let Eddie re-connect in any case, and you will not suffer traffic leaks outside the tunnel, not even during re-connections caused by unrecoverable OpenVPN error. Kind regards
  18. Hello! Probably the servers bind to physical network interface, with explicit configuration or through UPnP, and Eddie's Network Lock is not enabled. Thus they accept incoming connections from the Internet and their traffic is outside the tunnel. Can you please confirm that Network Lock is not enabled? Kind regards
  19. Hello! We're very glad to inform you that on October the 10th 2019, we released a new version of OpenVPN AirVPN library fixing critical bugs affecting main OpenVPN 3 branch for Linux since years ago. Please see the changelog here: https://github.com/AirVPN/openvpn3-airvpn/blob/master/CHANGELOG.txt Critical bug fixes are essential to offer an OpenVPN AirVPN library based client on Linux. As those bugs remained unresolved for years in the main branch and made OpenVPN 3 de facto unusable in a safe way in Linux, we could not wait anymore. Therefore, we will be able to release a first beta version for Linux and macOS of a command line based, light-weight client software based on OpenVPN AirVPN 3.3.2 around October the 20th. FreeBSD and OpenBSD versions remain planned for the very near future. Kind regards and datalove AirVPN Staff
  20. @laowai Thank you! Description of point 1 makes us think that the problem is unrelated to Eddie. Anyway we'll try to reproduce it (so far we couldn't but we have tested on different hardware). About point 2, the description seems coherent with the expected behavior of a VPN lock following an unrecoverable error. In such a case human intervention is required. The operator has the option to shut down critical applications before unlocking the communications: it's what you need for the safest leaks prevention within the limits enforced by Android. If you have Android 8 or 9 you can disable VPN Lock (from the "Settings" view) and let Android handle leaks prevention with the proper system options. Anyway, feel free to elaborate and clarify if our interpretation of your description is incorrect. Kind regards
  21. Hello! We are aware of the issue and we are investigating. Unfortunately, as it pertains to Netflix, we can't promise anything, we're sorry. Kind regards
  22. AirVPN Canada servers (Amanah Tech servers in general mostly) Hello! Not reproducible so far. Can you please list server names for a more accurate cross-check? Kind regards
  23. Hello! Can you both, independently, provide a list of servers you experience the various issues on? Kind regards
  24. Hello! We're very sorry, currently we have no plans for an email service. Kind regards
  25. Hello! Yes, if the connected device (where OpenVPN runs) is behind the router. Outgoing traffic flow is already encrypted while incoming traffic flow is still encrypted. Kind regards
×
×
  • Create New...