Jump to content
Not connected, Your IP: 3.143.247.214

Staff

Staff
  • Content Count

    11288
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1933

Everything posted by Staff

  1. Hello! WireGuard will never consider a connection over and will not try a re-connection when the tunnel is dead. If you want more network management with re-connection attempts after a timeout you can consider AirVPN software for Android, Linux, Mac and Windows. Kind regards
  2. @Abstain9194 Hello! We see the issue on that topic which is no more accessible by normal users, we must check with the web site maintainers, maybe there's a logic reason for this choice or maybe it's an error. In the meantime, if you run specific browsers on Mac and Windows here's the message posted by @OpenSourcerer as a solution at the time (August 2019, and limited to the mentioned browsers): Kind regards
  3. Hello! A relevant part of the infrastructure in the USA has been under attack since 24-48 hours ago. The redundancy is currently guaranteeing the usual high quality of service: 200'000 Mbit/s are available and distributed throughout the whole USA territory. Please take note that in the last 8 months the Tzulo infrastructure, provisioning connectivity now even to NYC servers, has been consistently providing the top speed in the world to AirVPN clients often beating the old "all time high" of 1 Gbit/s on the client side (2 Gbit/s on the server) with WireGuard. Kind regards
  4. Hello! A relevant part of the infrastructure in the USA has been under attack in the last 48 hours. The redundancy is currently guaranteeing the usual high quality of service: 200'000 Mbit/s are available and distributed throughout the whole USA territory. The uptime of the new 10 Gbit/s servers in Arizona and California is 100% so check your facts. Everything can be improved and we will work to improve, 14 years of experience are not chicken feed. In the meantime please take note that in the last 8 months the Tzulo infrastructure, provisioning connectivity to Polis and NYC servers you mention with disgraceful disdain and superficiality, as well as other servers in strategic areas of the USA, has been consistently providing the top speed in the world to AirVPN clients often beating the old "all time high" of 1 Gbit/s on the client side (2 Gbit/s on the server) with WireGuard. (EDIT: the current ATH is 1.5 Gbit/s client side). Kind regards
  5. Hello! That's correct. To make any future oversight (i.e. you run qB without running Eddie or other VPN software) harmless please follow the suggestion by OpenSourcerer in the previous message. Kind regards
  6. Hello! If Network Lock was active, and firewall rules were not modified, leaks can not happen during a re-connection. The only conceivable way we can imagine (but it is extremely speculative) is that qBittorrent was launched before the VPN connection was up, or before Network Lock was activated, and therefore it announced to trackers and DHT your real IP address for some time, and then the copyright troll did not perform the validation of the claim by attempting a direct connection to your real IP address (yes, there are still trolls that just generate the notice upon harvesting the IP addresses they find on trackers, without validating the claim with a connection to the peer's presumed IP address). Another highly speculative idea is that you run some "antimalware / Internet protection" tool which might have had overwritten the Network Lock rules without your knowledge. Were the notices totally correct even about the shared content? What are your Operating System name and version? Do you run Eddie, and if so which version? Kind regards
  7. Hello! Bug reproduced, it is an undersized variable's overflow. You will see the fix very soon, in the next 3.2.1. Thank you for your tests! Kind regards
  8. Hello! "Always on VPN" and "Block traffic if VPN is inactive" (or "Block connections") are Android settings, while "VPN Lock" is an Eddie setting. In your case, disable "VPN Lock" and enable the Android options, they are more comfortable. Screenshots that can help are here: https://airvpn.org/android/eddie/#step6 « Always on VPN » et “Block traffic if VPN is inactive” / "Block connection" sont des paramètres Android, tandis que “VPN Lock” est un paramètre Eddie. Dans votre cas, désactivez « VPN Lock » et activez les options Android, elles sont plus confortables. Les captures d'écran qui peuvent vous aider sont ici : https://airvpn.org/android/eddie/#step6 Kind regards
  9. Hello! No, nothing special. The configuration is identical. Does the system report tell anything useful? Kind regards
  10. Hello! This looks incorrect because in "AllowedIPs" you have to enter the ranges that you want inside the VPN. So, you are routing in the VPN even parts of the 10.0.0.0/8 subnet that you should not, if we understood correctly. Please try again with a subnet calculator and also compare with the following post: https://airvpn.org/forums/topic/55801-wireguard-access-local-network/?do=findComment&comment=217458 Kind regards
  11. Hello! Yes, of course, thanks! Kind regards
  12. Hello! We're very glad to inform you that three new 10 Gbit/s full duplex servers located in Los Angeles, California, are available: Maia, Sarin, Xamidimura. They have replaced Groombridge, Saclateni and Teegarden with more powerful hardware and higher overall bandwidth. The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. The new servers support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the status as usual in our real time servers monitor by clicking the names of the servers. Do not hesitate to contact us for any information or issue. Kind regards & datalove AirVPN Team
  13. Hello! We're very glad to inform you that three new 10 Gbit/s full duplex servers located in Phoenix, Arizona, are available: Gunibuu, Kambalia, Sheratan. They have replaced Chalawan, Indus, Phoenix and Virgo with more powerful hardware and higher overall bandwidth. The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. The servers support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the status as usual in our real time servers monitor by clicking the names of the servers. Do not hesitate to contact us for any information or issue. Kind regards & datalove AirVPN Team
  14. Thank you so much for your touching words and stellar feedback. And for your commitment in so many years. However, were you really under the illusion that you could escape so easily? Kind regards
  15. Hello! No, it was an omission, we have now fixed the original message. Kind regards
  16. Hello! We're very glad to inform you that four new 10 Gbit/s full duplex servers located in New York City are available: Muliphein, Paikauhale, Terebellum, Unukalhai. They have replaced Haedus, Iklil and Lich with more powerful hardware and higher overall bandwidth. The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. The servers support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the status as usual in our real time servers monitor by clicking the names of the servers. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  17. Hello! We have WireGuard clients connected to Menkent since July 2024, without a single interruption. We can not confirm any problem on Menkent. Menkent is also on the top user's speed table frequently (right now, while we are writing, it's #1 in the world providing ~1 Gbit/s to a single client). Kind regards
  18. Hello! Please check this. Although the starting problem was different, you could get a mitigation with an identical approach: On top of all of the above, make sure you test different WireGuard interface MTU, starting from the minimum size of 1280 bytes. The correct MTU may also stabilize the connection. Kind regards
  19. EDIT 2024-11-07. 3.2.1 release is available. Hello! We're very glad to inform you that Eddie Android edition 3.2.1 Release Candidate 1 is available. This is a hot fix release candidate to address two issues: fixed a bug which caused an anomalous situation and a long delay when the user tried to connect to a specific server or area when no network is available removed the option to disable Eddie's Persistent Notification, as disabling the persistent notification is now strongly deprecated for any VPN app because of the dangerous instability to the VPN tunnel it causes Please feel free to test and verify via side load. Direct link: https://eddie.website/repository/Android/3.2.1-RC1/EddieAndroid-3.2.1-RC1.apk SHA-256 checksum: $ sha256sum EddieAndroid-3.2.1-RC1.apk 105abd538a1086722132b487323d8dd62d2892e55f2bd89713f9166dfaeac697 EddieAndroid-3.2.1-RC1.apk Please report any issue on this thread. Thank you in advance for your invaluable tests! Kind regards
  20. @Dia Hello! Eddie Android 3.2.1 Release Candidate 1 is available and the bug you reported has been addressed. Please feel free to test and verify via side load. Direct link: https://eddie.website/repository/Android/3.2.1-RC1/EddieAndroid-3.2.1-RC1.apk SHA-256 checksum: $ sha256sum EddieAndroid-3.2.1-RC1.apk 105abd538a1086722132b487323d8dd62d2892e55f2bd89713f9166dfaeac697 EddieAndroid-3.2.1-RC1.apk Kind regards
  21. @Maggie144 Hello! Eddie Android 3.2.1 Release Candidate 1 is available and the bug you reported has been addressed. Please feel free to test and verify via side load. Direct link: https://eddie.website/repository/Android/3.2.1-RC1/EddieAndroid-3.2.1-RC1.apk SHA-256 checksum: $ sha256sum EddieAndroid-3.2.1-RC1.apk 105abd538a1086722132b487323d8dd62d2892e55f2bd89713f9166dfaeac697 EddieAndroid-3.2.1-RC1.apk Kind regards
  22. Hello! Bluetit does not have a bandwidth performance. It uses the WireGuard library for WireGuard connections (only from Suite 2 and higher versions) and the OpenVPN3-AirVPN library for OpenVPN connections. Were you running the Suite 2 beta or 1.3? If you were running 2.0.0 beta, did you experience awful performance both with OpenVPN and WireGuard connections? Is this supposed to use wireguard as well? When I set the GUI (linux) to use wireguard and connect its very fast, but when I configure startup at boot as you describe the eddie.service unit takes a long time to connect Well, Eddie (just like Bluetit) does not have much control over it, because it's systemd the one deciding when to start any service according to "dependencies". And it does so in a non-deterministic way, in its typical Windows fashion. Did you also test Eddie 2.24.2 beta? If so, did you notice any improvement or not? Anyway, both Eddie 2.21 and 2.24 support WireGuard. However, Eddie 2.24 sets an interface with 1320 bytes MTU, while Eddie 2.21 leaves the choice to WireGuard, which is not a good thing for most networks (1320 bytes is more appropriate for very many networks, while a few ones need even a smaller size of 1280 bytes). In Eddie 2.24 you can set the VPN interface MTU on "Preferences" > "WireGuard" window. Kind regards
  23. Hello! The current Phoenix servers are in a Cogent datacenter in Phoenix, see also our previous message. Any provider may offer services inside totally owned or partially owned datacenters, or from not owned at all datacenters where entire racks are rented or similar agreements are finalized. The new Phoenix servers are in Phoenix, shipped at the beginning of October and arrived on site a few days ago, they are already connected and working, we are testing them and we are confident we will announce them before the end of October. There are dozens of datacenters in Phoenix, around 75 or so, including big ones like Google, Apple, NTT, Cogent and more. Kind regards
  24. Hello! This information will not be disclosed at the moment in details but you may be informed in due time. No to the question and no to the assumption (wrong assumption). All of the current servers are in M247 property racks but not necessarily in M247 datacenters. The new servers will not necessarily be in the same datacenters and M247 will not own any of the new hardware. The current ones are M247, Cogent and Hurricane. Those reports spread false information, if they exist. The current Phoenix servers are in a Cogent datacenter located in Phoenix, this one: https://www.datacentermap.com/usa/arizona/phoenix/cogent-phoenix/ New servers are in a Phoenix datacenter as well. Kind regards
  25. Hello! At the moment they will, but it's not granted, not even in the near future, due to possible pool additions and address rotations. To stay on the safe side, you can rely on DDNS. Furthermore, please use pool 1 only for torrent and general p2p, and pool 2 for anything else. Kind regards
×
×
  • Create New...