Jump to content
Not connected, Your IP: 52.14.233.132

Staff

Staff
  • Content Count

    11294
  • Joined

    06/04/2010
  • Last visited

    Today at 3:41 PM
  • Days Won

    1933

Everything posted by Staff

  1. @Dia Hello! Eddie Android 3.2.1 Release Candidate 1 is available and the bug you reported has been addressed. Please feel free to test and verify via side load. Direct link: https://eddie.website/repository/Android/3.2.1-RC1/EddieAndroid-3.2.1-RC1.apk SHA-256 checksum: $ sha256sum EddieAndroid-3.2.1-RC1.apk 105abd538a1086722132b487323d8dd62d2892e55f2bd89713f9166dfaeac697 EddieAndroid-3.2.1-RC1.apk Kind regards
  2. @Maggie144 Hello! Eddie Android 3.2.1 Release Candidate 1 is available and the bug you reported has been addressed. Please feel free to test and verify via side load. Direct link: https://eddie.website/repository/Android/3.2.1-RC1/EddieAndroid-3.2.1-RC1.apk SHA-256 checksum: $ sha256sum EddieAndroid-3.2.1-RC1.apk 105abd538a1086722132b487323d8dd62d2892e55f2bd89713f9166dfaeac697 EddieAndroid-3.2.1-RC1.apk Kind regards
  3. Hello! Bluetit does not have a bandwidth performance. It uses the WireGuard library for WireGuard connections (only from Suite 2 and higher versions) and the OpenVPN3-AirVPN library for OpenVPN connections. Were you running the Suite 2 beta or 1.3? If you were running 2.0.0 beta, did you experience awful performance both with OpenVPN and WireGuard connections? Is this supposed to use wireguard as well? When I set the GUI (linux) to use wireguard and connect its very fast, but when I configure startup at boot as you describe the eddie.service unit takes a long time to connect Well, Eddie (just like Bluetit) does not have much control over it, because it's systemd the one deciding when to start any service according to "dependencies". And it does so in a non-deterministic way, in its typical Windows fashion. Did you also test Eddie 2.24.2 beta? If so, did you notice any improvement or not? Anyway, both Eddie 2.21 and 2.24 support WireGuard. However, Eddie 2.24 sets an interface with 1320 bytes MTU, while Eddie 2.21 leaves the choice to WireGuard, which is not a good thing for most networks (1320 bytes is more appropriate for very many networks, while a few ones need even a smaller size of 1280 bytes). In Eddie 2.24 you can set the VPN interface MTU on "Preferences" > "WireGuard" window. Kind regards
  4. Hello! The current Phoenix servers are in a Cogent datacenter in Phoenix, see also our previous message. Any provider may offer services inside totally owned or partially owned datacenters, or from not owned at all datacenters where entire racks are rented or similar agreements are finalized. The new Phoenix servers are in Phoenix, shipped at the beginning of October and arrived on site a few days ago, they are already connected and working, we are testing them and we are confident we will announce them before the end of October. There are dozens of datacenters in Phoenix, around 75 or so, including big ones like Google, Apple, NTT, Cogent and more. Kind regards
  5. Hello! This information will not be disclosed at the moment in details but you may be informed in due time. No to the question and no to the assumption (wrong assumption). All of the current servers are in M247 property racks but not necessarily in M247 datacenters. The new servers will not necessarily be in the same datacenters and M247 will not own any of the new hardware. The current ones are M247, Cogent and Hurricane. Those reports spread false information, if they exist. The current Phoenix servers are in a Cogent datacenter located in Phoenix, this one: https://www.datacentermap.com/usa/arizona/phoenix/cogent-phoenix/ New servers are in a Phoenix datacenter as well. Kind regards
  6. Hello! At the moment they will, but it's not granted, not even in the near future, due to possible pool additions and address rotations. To stay on the safe side, you can rely on DDNS. Furthermore, please use pool 1 only for torrent and general p2p, and pool 2 for anything else. Kind regards
  7. Hello! As you might have noticed by now your domain name resolves into the wrong IP address (128.127.104.80 in place of 128.127.104.86). Be aware of different AirVPN server IP addresses. The matter is explained here and you can also obtain in real time the correct IP address from your AirVPN account port panel (click "Test port" and note down the IP address). Last but not least, you may also consider AirVPN DDNS (service included by default in every AirVPN plan) which is designed also for comfort in similar situations. Kind regards
  8. Hello! Developer's options in Android system. This article explains everything step by step for any Samsung Galaxy: https://www.samsung.com/uk/support/mobile-devices/how-do-i-turn-on-the-developer-options-menu-on-my-samsung-galaxy-device/ Kind regards
  9. Hello! We're sorry we do not implement the specific obfuscation mentioned which requires pre-shared keys, a specific server side configuration and various over-complications to maintain compatibility with current profiles. The solution adopted by @tanaka is much better, as it is a drop in replacement and does not require any modification on the server side, so you can use it anytime with AirVPN. Kind regards
  10. Hello! We're very glad to inform you that in the coming days, according to our infrastructure expansion and improvement plan, all the servers in Los Angeles, New York City and Phoenix will be replaced. The new servers will have much more powerful hardware and all of them will be connected to a 10 Gbit/s (full duplex) port with guaranteed bandwidth. Therefore, the infrastructure in the mentioned locations will be entirely upgraded to new 10 Gbit/s servers, with 3 servers in LA, 3 servers in Phoenix and 4 servers in New York City. The current servers will be decommissioned on November the 1st. Please note that all the new servers will have new IP addresses. Connectivity will be very similar, with the notable addition of GTT and Zayo as fiber and tier1 transit providers. Kind regards and datalove AirVPN Staff
  11. @Maggie144 Hello! The bug has been fixed and you will see soon an Eddie 3.2.1 Release Candidate. Thank you again! Kind regards
  12. Thank you again! The issue has been addressed, as VPN apps must not offer anymore the option to disable persistent notification. You will see very soon an Eddie 3.2.1 Release Candidate. Kind regards
  13. Hello! The key icon is a persistent notification by Android (and not by Eddie) showing a locked to a specific network traffic status. For example you may have the key icon even when a VPN tunnel is inactive but "Always on VPN" and "Block traffic if VPN is inactive" are enabled for Eddie, due to the integration of Eddie with Android's notification system. The Eddie app's persistent notification icon (a cloud in a circle) appears when the VPN tunnel is up and offers the additional comfort to stabilize the VPN, see at a glance stats, disconnect, and (for OpenVPN) pause and resume the tunnel. Note that Android 7 and older versions don't have the quick tile buttons. An additional clarification about "OpenVPN for Android" app you mention and Eddie. Android enables OpenVPN for Android notifications automatically according to a legacy behavior for all apps built with SDK < Android 13. The behavior on apps built with SDK >= Android 13 (like Eddie 3.2.0) is different, notification authorization must be explicitly enabled by the user. Since August the 31st, it is mandatory to build an application with Android 14 SDK to have it accepted (even as an update) on the Google Play Store. Thank you! Kind regards
  14. Hello! We're glad to know that the problem is resolved! Yes, the idea of Google Android designers was to bring you to the proper setting option(s) directly without forcing you to search for it on the whole sea of settings. Frankly we think this is a good idea. It's not an Eddie screen, you only see Android settings. If you see discrepancies in the settings, they are not due to Eddie. You could have a different setting manager or who knows, but Eddie simply doesn't have Android setting screens. This is a grave danger and a mistake because without a persistent notification the VPN connection established by any app through the VPN API can be interrupted under many circumstances, so you will have traffic leaks, potentially (for sure, sooner or later). Note how "Always on VPN" and "Block traffic if VPN is inactive", two Android settings, are in synergy with the notification and leaks prevention. You don't have two different icons with the same meaning, each icon has its different and unique role. Without persistent notification you shouldn't use a VPN app at all because you may lose the connection anytime. However, and of course, Eddie should not crash, and this matter will be investigated as soon as we can see your logcat. For this purpose please send us a report when the problem occurs. To do so, open the "Log" view, tap the paper plane icon and send us the link that Eddie will give you back. For privacy reasons please send it through a ticket by clicking "Contact us" from our web site or by writing to support@airvpn.org Kind regards
  15. Hello! The Network Lock rules are not the problem as they allow traffic to all local networks. Only a future Network Lock will have the option to stricter rules which can be enforced optionally when necessary. The problem is the other one we mentioned and it will be tackled in a near future Suite version for WireGuard connections. In the meantime you can consider the solution suggested in the previous message. Kind regards
  16. Hello and thank you! Bug confirmed and reproduced. We will fix it expeditiously and make a new 3.2.1 version to be tested in the near future. In the meantime, to avoid the problem, you have two options: if you try a connection from a server list when WiFi is off and LTE is off too, do not kill ungracefully the app. Just wait 60 seconds and the app will tell you that there's no network and will remain operational if you kill without grace the app anyway, you can delete the app's cache from Android app settings (instead of de-installing and re-installing the app) in order to re-enable the app to start properly Kind regards
  17. @rkdover Hello! The feature to make local networks available during WireGuard connections will be available in the Suite 2.0.0 next beta version, similarly to the Android implementation. In the meantime, you can consider to run WireGuard with a configuration file explicitly compiled to have traffic to local network excluded from the VPN routing: https://airvpn.org/forums/topic/55801-wireguard-access-local-network/?do=findComment&comment=217458 Network Lock rules implemented by the Suite already allow traffic to/from all the local subnets. A stricter Network Lock to block traffic even for the local network is under evaluation. Kind regards
  18. @nva Hello! Each VPN server runs its own DNS server. The authoritative server for the mentioned domain names either blocks a lot of DNS IP addresses (not only AirVPN ones, as you noticed) or is malfunctioning. In both cases you would get a SERVFAIL error message. Kind regards
  19. Hello! That's expected due to the quoted configuration. The 30 minutes delay is unexpected. Please take care to re-start your qBittorrent client each time you re-start a VPN connection. If the problem re-appears, please report again and also open a ticket to let the support team verify the correct configuration on the server side. Kind regards
  20. Hello! Thanks for the info and to let us know that an AsusWRT Merlin based router can handle perfectly an OpenVPN server behind an OpenVPN client almost out of the box and without manual configuration required. Kind regards
  21. @Dia Hello! Are you able to turn on the Allow notifications switch in the screenshot you sent us? By turning it on the problem should be resolved. Can you tell us the brand, model and exact system version of your device? Kind regards
  22. Hello! Wait, you must enter the key label. The label is just the name you assigned to the key in your AirVPN account device panel. Kind regards
  23. Hello! For this purpose running an OpenVPN server and client at the same time on the same router is perhaps a useless complication. A simpler solution is just connecting the router to some AirVPN server, forwarding and pre-routing the ports needed for the listening services of the machines behind the router to the proper destination (both on your AirVPN account port panel and from the router's tun interface), configuring the proper DDNS for each port, and reach from the Internet the services running on the devices behind the router. This simple solution, however, is not suitable in case you need more than 5 ports (if you need more, contact the support team). Kind regards
  24. @cccthats3cs Hello! We have removed this limitation. If anybody else experiences this problem please contact us via support@airvpn.org or anyway write to support@airvpn.org to bypass the limitation (the support team will then sort your mail messages in the proper ticket). Kind regards
  25. Hello! Yes, connection's key ("device" in the Client Area) can be selected via Goldcrest's --air-key option: https://airvpn.org/suite/readme/#goldcrest-configuration or via Bluetit's run control file option airkey: https://airvpn.org/suite/readme/#bluetit-configuration Please note that the key string is case sensitive. Kind regards
×
×
  • Create New...
We do NOT use cookies to profile or track users.I understandMore information