-
Content Count
11526 -
Joined
... -
Last visited
... -
Days Won
2036
Everything posted by Staff
-
Version 2.18.9 (Thu, 02 Apr 2020 12:14:10 +0000) [add] - Windows - Added DotNet 4.5 check & install in Installer edition [bugfix] - Linux - Resolved an elevation issue in some Linux distribution (Raspbian mainly) [bugfix] - Fixed a bug that intermittently ignores --connect @rgrdgr
-
Hello! From your country the following connection mode is mandatory. OpenVPN is blocked everywhere, while UDP Is not infrequently blocked on some networks. Protocol TCP Port 443 Entry-IP address THREE You can change connection mode from Eddie's "Preferences" > "Protocols" window. Detick "Automatic", select the line with the above setting (it will be highlighted in blue) and click "Save". Enable Network Lock from Eddie's main window. Kind regards
-
I know. I also tried with Hummingbird and the same thing happened over and over again. It's not an Eddie problem then. Feel free to open a ticket and provide all the necessary documentation that may help us resolve your problem. Please don't hijack the thread anymore. Kind regards
-
Hummingbird 1.0: AirVPN client based on OpenVPN 3 AirVPN
Staff replied to Staff's topic in News and Announcement
Hello! Yes, as @go558a83nk explained, but in any case your CPU load is anomalous (too high) in both cases, could you please tell us your exact system architecture, OS name and version? Can you also make sure that during those tests which cause 100% CPU load no other computing intensive applications are running? Also, how do you determine exactly that the whole CPU is 100% loaded? Please describe with details to prevent any bias from wrong interpretations, just in case. Kind regards -
@go558a83nk Hello! A momentary misconfiguration which has been fixed, thank you. Kind regards
-
@inc Hello! Of course, Hummingbird 1.0.2 was announced on Twitter too, on Feb the 5th,. 2020: https://twitter.com/airvpn/status/1225024418327474176 Kind regards
-
@puff-m-d Hello! Our initial plan was that all the servers would run OpenVPN 2.5 and therefore support CHACHA20 with OpenVPN 2.5 stable release. The plan was made in autumn 2019. OpenVPN 2.5 stable release had been previously announced for December 2019. We are now almost in April 2020 and OpenVPN 2.5 stable has not been released yet. Therefore, we could add a few additional servers. We have already several requests and we need to decide additional locations. Please tell us your favorite country (not here, as the thread would be quickly hijacked, but in a ticket). Kind regards
-
Changing OpenVPN from port 1194 to 443
Staff replied to barnabas's topic in Troubleshooting and Problems
@barnabas Hello! After you have deticked "Automatic" select a connection mode by clicking a line. The line will be highlighted in blue. Click "Save". A connection mode can not be edited, as modes are decided by us server side. You are free to pick one between the dozens available. If your ISP disrupts OpenVPN and/or UDP we recommend that you try the following parameters: - protocol TCP - port 443 - entry-IP address THREE Since 1194 is the "official" OpenVPN port, if an ISP wants to disrupt OpenVPN, blocking outbound port 1194 would be trivially the first and simplest thing to do. Kind regards -
Changing OpenVPN from port 1194 to 443
Staff replied to barnabas's topic in Troubleshooting and Problems
@barnabas Hello! By default Eddie will connect to port 443. You can change connection mode, as you correctly noticed, on "Preferences" > "Protocols" window. Port 1194 is a port that's recommended specifically for OpenVPN by IANA, in this sense it's the "official" OpenVPN port. Our servers accept connections on ports 53, 80, 443, 1194, 2018 and more. Kind regards -
Version 2.18.8 (Thu, 26 Mar 2020 12:59:48 +0000) [bugfix] Windows - Support of OpenVPN2.5 tech-preview (also with new wintun driver) [bugfix] MacOS - -mmacosx-version-min=10.9 on all binary [bugfix] Service reinstalls automatically when version-incompatibility detected [change] Code cleanup for stable release [change] Enforcement of operation allowed by Elevation [change] Enforcement of service checking [change] Windows - Elevated converted from C# to C++ [change] Little score adjustment in UI [change] Better feedback in CLI edition (mainly latency check steps) [new] Linux - enabled CLI-only packages in all editions [change] Minor changes
-
@Ponch22 Hello! Servers are not overloaded, AirVPN infrastructure (globally) is still used less than 25% of its capacity. Residential ISPs lines are actually overloaded in peak times in various countries,. but we have reports of major problems only from UK, and only for limited times. Very minor problems, almost irrelevant, from Italy. See also: https://airvpn.org/status/ In any case, a route check failure is in general not related to any congestion, as it is performed only after the connection to a server has been established successfully according to OpenVPN. What are your Operating System and Eddie exact versions? If you run Eddie 2.16.3 or older version, please test Eddie 2.18 beta 7, please see here to download it: https://airvpn.org/forums/topic/45326-eddie-desktop-218beta-released/ Eddie 2.18, during its eight beta iterations, has been extensively tested not only by us but also by a large part of our community since almost a year ago. You can use the current latest beta version reliably as no critical problem has been found in it. A stable version will come in the very near future. If Eddie 2.18 beta does not resolve the issue, please post a system report ("Logs" > LIFE BELT icon > COPY icon > paste into your message). Also feel free to open a ticket if necessary. Kind regards
-
@65tiklak If you enforce Network Lock you should disable UFW. It is an iptables frontend which adds custom chains that may interfere. About the outcome of your tests, you therefore imply that the iptables rules mainly impair upload speed, and not download speed. It's a reasonable assumption, yes, because Eddie overwhelms the OUTPUT chain of the filter table. Use Hummingbird and make a new comparison please, for a potential confirmation of your assumption (with Network Lock on) as Hummingbird enforces only 19 rules on OUTPUT, instead of the 1000 rules enforced by Eddie. If you wish to reproduce Network Lock through UFW, just look at the rules enforced by Hummingbird, make sure to delete any UFW custom chain, and set your own. However using directly iptables (or nftables if you have a system supporting it) is probably a better solution, but it's up to your taste at the end of the day. Please keep us posted at your convenience after you have tested Hummingbird, even with CHACHA20-POLY1305. Kind regards
-
@65tiklak Hello and welcome aboard! Eddie's Network Lock enforces something like 1000 iptables rules and 1000 ip6tables rules, so in theory it might actually slow down a Raspberry. However the screenshots you report show no performance difference between Network Lock on and off, so your conclusions are incorrect according to your very own experimental data set. In the first example of yours, you even have slightly higher performance with Network Lock on. By the way it's not a big deal because the "problem" (if it was a problem) has been completely resolved by Hummingbird, which enforces only few rules, only the strictly necessary ones. It's like 30 rules, and there's no way that 30 iptables rules can measurably slow down Linux throughput in Raspberry. Your comparison with NordVPN is also not very relevant if you don't specify the cipher and the VPN protocol you have used. We allow, like NordVPN, weaker ciphers, but by default our servers propose the strongest available cipher, so you need to explicitly force the weaker cipher. Additionally we do not support insecure protocols like PPTP, which NordVPN still supports as far as we know. On top of that Hummingbird lets you connect with CHACHA20-POLY1305 cipher which will give a non AES-NI supporting system (like a Raspberry) a performance boost. Hummingbird is available both for Raspbian 32 and Ubuntu 19 for ARM 64 bit (and should be also compatible with any other ARM 64 bit Linux distribution). Hummingbird also calls OpenVPN3-AirVPN library, which is remarkably faster than OpenVPN 2 binary. Test it and let us know. Any Network Lock not enforced via firewall rules is garbage. Do not trust such kill switches because they will not prevent leaks when a process binds to the physical network interface and when the "switch killer" process halts unexpectedly. Please see here to download and install Hummingbird: https://airvpn.org/hummingbird/readme/ Kind regards
-
ANSWERED Canada Servers are not overloaded
Staff replied to ForeShadow's topic in General & Suggestions
@arteryshelby Thank you, we will keep your suggestion in serious consideration. Kind regards -
ANSWERED Canada Servers are not overloaded
Staff replied to ForeShadow's topic in General & Suggestions
@BlueBanana Hello! Check the stats about used bandwidth on the total infrastructure day by day: As you can see, the used peak bandwidth has increased remarkably in the last days, up to 80200 Mbit/s. On the whole infrastructure, it is still slightly more than just 1/3 of the total available bandwidth (236900 Mbit/s). We will closely monitor, on top of that, used bandwidth country by country, of course. About the countries you mention, even the last peak usage does not exceed 60% of total available bandwidth in each of those countries. We are still well within the range of the quality of service ensured by the terms of service and actually most available bandwidth has not ever been used. That said, we will not hesitate to add servers when it is really necessary, of course. We are monitoring closely, as usual, peak demands country by country. Kind regards -
Hello! We would like to inform you that we have made every effort to ensure AirVPN full and efficient operation during the pandemic caused by SARS-CoV-2. In order to reduce hazard and safeguard health, AirVPN staff and personnel work exclusively from home and worked from home well before the current situation appeared clearly as a pandemic Each member has a landline and one or more mobile lines, when possible in different infrastructures, to maximize likelihood to stay connected to the Internet 24/7 AirVPN system is more efficiently automated and basic functioning requires no manual interventions, even for several months (if kernel upgrades hadn't been necessary, we would have had servers uptime of 4 years or more) AirVPN inner staff members have now overlapping competences. Therefore if a key member, including a founder, is forced to stop working, the other ones can carry out his/her functions Emergency funds already secured in the past in different facilities as well as banks remain unaltered and ensure AirVPN financial health for a very long time even in very harsh scenarios. However, we would like to assure you that they are not needed at all currently, quite the contrary. In the last 10 days we have experienced a substantial increase in the growth of our customer base We have been informed by our most important partners and providers of housing and hosting in Europe, America and Asia they they are, and expect to, remain fully operational Kind regards AirVPN Staff
-
ANSWERED Canada Servers are not overloaded
Staff replied to ForeShadow's topic in General & Suggestions
Hello! No doubts we are having higher than average bandwidth request in the last days, but Canada infrastructure is still used mainly at no more than its 40% capacity. Even in your very screenshot you can see that most servers are not even at 60% Thanks to our planned in the past redundancy we can still support much more bandwidth. in Canada. Kind regards -
Thoughts about about Tor+VPN (and who to trust)
Staff replied to curhen57's topic in General & Suggestions
@curhen57 Hello! Roughly, in IPv4 MAC addresses (more in general link layer addresses) are obtained via ARP (Address Resolution Protocol) requests, which are necessary when a node must physically find the final destination node otherwise identified only by an IP address. So your router knows the MAC address of your computers network interface, your nearest ISP upstream point knows your router network interface MAC address (and not your computers network interface one) and so on and so forth. Our VPN servers don't know anything about MAC addresses of your computer, router... For a more rigorous definition and information please see for example: https://en.wikipedia.org/wiki/Address_Resolution_Protocol Kind regards -
@dedo299 Hello! We're glad to know that you found out the "culprit" causing the wake up issue. Network Lock is a set of firewall rules preventing traffic leaks outside the VPN tunnel, including, but not limited to, leaks caused by unexpected VPN disconnection and those caused by processes binding to the physical network interface. In Hummingbird, Network Lock is on by default. Kind regards
-
@dedo299 Hello! Thank you very much. AirVPN staff and personnel are healthy and fully operational. We all work from home to reduce hazard as much as possible. We all have at least one landline and one or more mobile line, in different infrastructures when possible. Good luck to you too, and to San Francisco and the rest of the world. We're glad to know that the previous problem seems resolved. Hummingbird writes to stdout and stderr so you can re-direct the log and errors in any way you prefer, for example (if you want both of them in a single file): sudo ./hummingbird [...] myprofile.ovpn > /var/log/hb.log 2>&1 To append log, instead of overwriting it: sudo ./hummingbird [...] myprofile.ovpn >> /var/log/hb.log 2>&1 Maybe it can help us understand the other issue you mention. Kind regards
-
Thoughts about about Tor+VPN (and who to trust)
Staff replied to curhen57's topic in General & Suggestions
@iwih2gk Hello! A few remarks to your last message. 1) MAC address is never included in IPv4 packets. Not even our VPN servers can see your network interface MAC address in IPv4. Similar safeguards are nowadays applied in modern OS for IPv6 too (IPv6 packets do have a specific allocation space for a MAC address). 2) Data passed voluntarily by a browser to a web site can be blocked or altered, either in browser configuration or through dedicated add-ons. Examples include spoofing browser user agent (which includes Operating System etc.) (**), blocking fingerprinting through canvas by generating "noise" and randomizing different fingerprints for each stream (*), and working without any previous tracking cookie by cleaning cookies at each session and working in browser "private" mode. Such safeguards should be applied even when working inside a VM, if your threat model needs them. (*) Example: Canvas Defender for Firefox. "Instead of blocking JS-API, Canvas Defender creates a unique and persistent noise that hides your real canvas fingerprint" (**) Example: User Agent Switcher and Manager for Firefox. Kind regards -
@dedo299 Thanks, please keep us posted, we would like to know whether it resolves the issue in your case too or not. Kind regards
-
Hello! Please check here: It means that no VPN server meets the combination of settings you have required. In your specific case: airvpn_server_whitelist: Acamar A possible explanation is that you have some setting that's not compatible with Acamar (an example would be cipher CHACHA20), or that Acamar was down at the time of the connection attempt. Try to enlarge the white list of servers. Kind regards
-
@arteryshelby It doesn't make difference, actually. But if M247 tells us it's in Berlin, we publish Berlin. If you prefer you can consider it in Frankfurt until our next investigation. Topic locked. Kind regards
