Jump to content
Not connected, Your IP: 3.135.202.38

Staff

Staff
  • Content Count

    11044
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1867

Everything posted by Staff

  1. Hello! We're glad to inform you that we have released Eddie Android edition 2.0. Update 30-Nov-18: version 2.0.1 has been released. Version 2.0 is a quantum leap when compared to 1.0. It tries to meet most, if not all, of our community requirements and keeps the promises we made: swift and full AirVPN integration as well as Android TV extended compatibility. As usual Eddie is free and open source software released under GPLv3. Source code is available on GitLab: https://gitlab.com/AirVPN You can download Eddie from the Google Play Store: https://play.google.com/store/apps/details?id=org.airvpn.eddie You can also download Eddie from Amazon App Store: https://www.amazon.com/Eddie-AirVPN-official-OpenVPN-GUI/dp/B07KTD6DH9/ref=sr_1_2?ie=UTF8&qid=1545047130&sr=8-2&keywords=AirVPN You can download Eddie Android 2.0.1 apk directly from our repository as well: https://eddie.website/repository/eddie/android/2.0.1/org.airvpn.eddie.apk We are also working to make Eddie 2.0 available on the Amazon Appstore. The application is fully localized and we look for translators, especially for translations into simplified and traditional Chinese. Korean, Japanese, and many other languages are welcome. If you wish to translate (from English) please contact info@airvpn.org for every detail. Eddie Android 2.0 adds tons of new features while keeping all the appreciated old ones: Free and open source OpenVPN GUI based on OpenVPN 3The only Android application officially developed by AirVPNRobust, best effort prevention of traffic leaks outside the VPN tunnelBattery-conscious applicationLow RAM footprintErgonomic and friendly interfaceAbility to start and connect the application at device bootOption to define which apps must have traffic inside or outside the VPN tunnel through white and black listFull integration with AirVPNEnhanced security thanks to locally stored encrypted data through master passwordQuick one-tap connection and smart, fully automated server selectionSmart server selection with custom settingsManual server selectionSmart attempts to bypass OpenVPN blocks featuring protocol and server fail-overFull Android TV compatibility including D-Pad support. Mouse emulation is not required.Enhancements aimed to increase accessibility and comfort to visually impaired personsAirVPN servers sorting optionsCustomizable "Favorite" and "Forbidden" serversOpenVPN mimetype support to import profiles from external applicationsLocalization in English, French, German, Italian, Portuguese, Russian, Spanish, TurkishWhat's new in version 2.0.1: Changelog 2.0.1 (VC 14) - Release date: 30 November 2018 by ProMIND - [ProMIND] Created MainTVActivity class for Android TV leanback launcher - [ProMIND] Renamed class AboutActivity.java to WebViewerActivity.java. This new class is now used for external web sites and local html document to be shown within the app MainActivity.java - [ProMIND] Replaced start intent of external web browser with WebViewerActivity class in order to make the app compliant with Google's Android TV requirements VPNService.java - [ProMIND] complete rewrite of onBind() method in order to properly manage VpnService intents Enjoy AirVPN and give us your feedback! Kind regards and datalove AirVPN Staff
  2. Hello! Nowadays, traffic shaping is a common practice. Several ISPs have evaluated that investing in traffic shaping techniques is better than investing in infrastructure expansion. Overselling becomes easier and the devastating congestion impact gets mitigated by enforcing penalties to all protocols which are rarely used by the majority of customers or that are more onerous for the infrastructure. Protocols and traffic types are discovered in real time via SPI and DPI. A VPN impairs traffic shaping techniques because it makes both SPI and DPI impotent. Therefore, ISPs that share the above vision (wild overselling and traffic shaping) need to shape VPN themselves, unconditionally. OpenVPN has a typical fingerprint, so it's easy to identify it with DPI. However, we provide connection modes which make OpenVPN not discernible. The most effective and at the same time efficient is a connection with "tls-crypt" which encrypts the whole OpenVPN Control Channel. It is available on entry-IP addresses 3 and 4 of our VPN servers. Please test the following one (in Eddie desktop edition): - from Eddie main window select "Preferences" > "Protocols" - untick "Automatic" - select the line with entry-IP address 3, port 443, protocol TCP. The row will be highlighted in blue - click "Save" tls-crypt will circumvent specific OpenVPN shaping, while TCP will get rid of UDP shaping, which is another commonly targeted protocol. UDP might be shaped or not in your line, so it's worth that you try it too. Eddie Android edition 2.0 connects to entry-IP address 3 by default. You might anyway need to change the protocol from UDP to TCP in the "Settings" if UDP is throttled. Kind regards
  3. Hello and thank you! The maximum discount you can get ("up to") is 67.5% with a 2 years plan. You pay 54.60 EUR for 2 years, i.e. 2.28 EUR/month, instead of 7 EUR/month (saving exactly 67.5%). If you compare the new plan with the 1 year plan, then the special deal makes you save anyway 50% (you pay 54.60 EUR for two years, instead of 54 EUR for 1 year). Math doesn't lie, the above comparisons are perfectly legitimate and compliant to the best practices of transparent advertising and the calculations are correct. Kind regards
  4. Acknowledged. It will be fixed in the next release. Thanks! Kind regards
  5. Hello! We will consider seriously what you suggest, probably for version 2.1. We are counting to release version 2.0 final (stable) very soon and your suggestion will be carefully evaluated for version 2.1. Thank you! Kind regards
  6. Hello! As you might have read in the welcome e-mail, or in the answers to the FAQ, or in the AirVPN quick starting guide, or in the community forum, "Network Lock" option in Eddie (the Air software client) enforces a set of firewall rules which will prevent any traffic leak outside the VPN tunnel, including, but not limited to, leaks caused by unexpected VPN disconnection. To enable "Network Lock" option please click the big "Activate Network Lock" button in the main Eddie window, before you start a VPN connection. Please make sure that no third-party firewall/packet filtering tool cancels or anyway modifies the rules set by Eddie. Kind regards
  7. Hello! We are very glad to inform you that Eddie Android edition 2.0 beta 3 is now available. Please test it and stress it as much as you can! Changes include new logic for "quick connect" function and a couple of bug fixes. Your feedback will be enormously appreciated as usual. We are looking for translators into traditional and simplified Chinese and several other languages. If you're interested please free to contact us at info@airvpn.org Currently the application features English, French, German, Italian, Portuguese, Russian, Spanish and Turkish localizations. Changelog 2.0 Beta 3 (VC 12) - Release date: 21 November 2018 by ProMIND QuickConnectionFragment.java - [ProMIND] Changed connection requirements for auto connection mode. IPv4 is now the minimum requirement. - [ProMIND] Show a disconnection dialog in case user cancels the connection procedure - [ProMIND] Notify user in case a favorite server is about to be connected - [ProMIND] Connection progress dialog is now properly dismissed at the end of server list connection All new features and changes when compared to version 1.0 can be found on the first message of this thread: https://airvpn.org/topic/30421-eddie-android-edition-20-beta-released Kind regards
  8. Hello! We obviously rule out that the issue has anything to do with the imminent expiration date of your account plan. Please send the log or even better a system report at your convenience to receive proper support. Also consider to open a ticket to get in touch with our technical support staff. Kind regards
  9. Hello and thank you very much for the information. It should be visible (when you use manual or quick connect to AirVPN servers, not when you import a profile) in the "Connection status" view, can you please check? Only version 2.0. Kind regards
  10. Thank you. Can you please also connect in UDP (you don't need to import a new profile, you can use the automatic connection or the server list) and check whether it crashes or not? Kind regards
  11. Hello! Bug confirmed (with Kitalpha and any server not supporting IPv6 yet). It will be fixed in beta 3, scheduled to be released very soon. Kind regards
  12. Hello! We are very glad to inform you that Eddie Android edition 2.0 beta 2 is now available. Please test it and stress it as much as you can! New features now meet latest users requirements. Your feedback will be enormously appreciated as usual. Quick additions/changes summary (please see the changelog for more detailed information): Enhancements aimed to increase accessibility and comfort to visually impaired personsGerman, Portuguese and Russian localizationsOption to change "Quick connect" logic according to users feedback"Quick connect" button can be used to disconnect from VPNSome bugs have been fixedAll new features and changes when compared to version 1.0 can be found on the first message of this thread: https://airvpn.org/topic/30421-eddie-android-edition-20-beta-released Kind regards Changelog 2.0 Beta 2 (VC 11) - Release date: 20 November 2018 by ProMIND - [giganerd] Added German localization - [giganerd] Added Russian localization - [morvotron] Added Portuguese localization - [ProMIND] Added accessibility support to spinners and buttons without text OpenVPNTunnel.java [ProMIND] onEvent() now properly manages TCP errors in Quick Connection mode and avoids connection cycling when VPN is connected SettingsActivity.java [ProMIND] Added setting and functionality for allowing quick connection to connect local (same country) serversAirVPNServerProvider.java [ProMIND] Changed selection algorithm in order to include local (same country) servers when requestedQuickConnectionFragment.java [ProMIND] Quick connection button can now be used to disconnect any VPN connection
  13. And what about a logcat, if you have time? You would just need adb, an USB cable and enabling USB debug on the Android device. https://developer.android.com/studio/command-line/logcat Kind regards
  14. Hello! It works fine with Fire TV stick 1st generation, with Android 5.1. It has been extensively tested. Can you please test it (Eddie 2.0 of course, not 1.0) with your Fire TV 2? Eddie 2.0 includes full support to Android TV. Kind regards
  15. Noted, thank you. Would you have the option to send us the logcat pertaining to the crash? Can you also tell us which Lineage you run? We can't see any crash report on the Play Store pertaining to a device like yours. You might also like to test Eddie Android 2.0 beta 2 (beta 2 is being released during the next hours). Any request is legitimate of course, but this one can not be satisfied unfortunately. The application would need root privileges to manipulate the packet filtering table of the system, and this is not possible on non-rooted devices. The aim of Eddie Android edition is any un-rooted device. Kind regards
  16. Hello, can you please check whether your *.airdns.org name resolves properly into the exit-IP address of the last VPN server you connected to? Also keep in mind that TTL is 1 hour. Kind regards
  17. Hello! We're very glad to inform you that the Black Friday week has just begun in AirVPN! Save up to 67.5% Check all plans and discounts here: https://airvpn.org/plans If you're already our customer and you wish to jump aboard for a longer period, any additional subscription will be added on top of already existing subscriptions and you will not lose any day. And that's not all! AirVPN offers five simultaneous connections per account, IPv6 full support and many more, exclusive smart features: https://airvpn.org/topic/28153-ipv6-support-and-new-smart-features/ Kind regards & datalove AirVPN Staff
  18. Hello! Air VPN DNS servers IP addresses match the VPN default gateway IP address. 10.4.0.1 is anyway reachable from any other VPN subnet for backward compatibility. Having DNS address matching with default gateway address will make "DNS poisoning through route injection" attacks totally ineffective. Kind regards
  19. Social engineering is not required. The attacker just needs to find the forwarded ports. A very quick and easy one-minute job. M247 offers a service which meets and has always met all of our technical requirements at a fair price. It's really something because as you know we are quite demanding. However, we do not want to stay bound with a single provider (simply for failover and redundancy considerations, it has notbhing to do with M247 quality of service), that's why we will not exceed around 25% of our infrastructure with M247. Kind regards
  20. Hello! Please try the following settings: - from Eddie main window select "Preferences" > "Networking" - set the "IPv6 layers" combo box to "Blocked" - click "Save" Alternative solution: upgrade to OpenVPN 2.4 or higher version. Explanation: OpenVPN versions older than 2.4 do not handle IPv6 properly. So our servers do not perform the IPv6 push when they detect older versions, in order to not break retro-compatibility. However Eddie (for a bug in 2.15.x and 2.16.x, fixed in 2.17.2beta) tries anyway to check the IPv6 route in the tunnel and it obviously fails. Kind regards
  21. Hello! Any packet received (through a remotely forwarded port) from the IP address that is also the public entry IP address of the VPN server will be replied to that same IP address from your "real" public IP address. When public entry and exit-IP addresses match (i.e it's only one address) an attacker can simply enter the same VPN and send packets to all the forwarded ports (finding the forwarded ports is of course a "two-seconds" task) and receive replies from the real IP addresses of every and each VPN node. When entry and exit-IP addresses are different, the above can't happen, since listening services can't receive unsolicited packets from anywhere with entry-IP address as origin. Therefore, the PIA configuration you mention is wrong and dangerous when remote port forwarding is available and at least two nodes can connect to the same VPN. If only one node can connect, then it's unsafe for different reasons (weak anonymity layer). Therefore, avoid VPNs which do not provide this basic security configuration (lacking this setup is also a worrying symptom suggesting that they lack proper networking knowledge). If that's not possible, at least avoid remote port forwarding completely when entry and exit-IP addresses are the same, and make sure that you're not the only one connecting to that virtual network. Kind regards
  22. Hello! It is a very essential security feature which protects all of your AirVPN data (username, password, certificates, keys...). Eddie makes every effort to save battery and what you suggest is somehow problematic because it may decrease battery life. Currently Eddie is the only OpenVPN based application which ensures a longer than "OpenVPN for Android" and "openvpn-connect" battery life, therefore we are hesitant to add any non-strictly essential feature which would potentially drain more energy per time unit. Thank you very much! Your suggestions will be kept in due consideration. Kind regards
  23. Hello! In the other devices do you run Eddie as well? In OpenVPN for Android do you run OpenVPN 2.5 or OpenVPN 3 library as engine? Can you name such servers to let us test (in private, if you don't want to report here)? Is the "persistent notification" option enabled? If it's disabled Android can suddenly stop the VPN connection in various circumstances. Kind regards
  24. Hello, it is a real disconnection. Eddie should enter the lock state and the device should have no traffic. Operator's manual intervention is required, thus option to stop in good time any program whose traffic must not be leaked is available. Do you experience something different? KEEPALIVE_TIMEOUT is triggered (with AirVPN and most of other OpenVPN based services) when no reply to any in-tunnel ping is received for 60 seconds. An in-tunnel ping is sent every 10 seconds. If you experience frequent timeouts of the above kind, try to get a stronger mobile signal and test different servers in various locations. Kind regards
  25. Hello! If you blindly trust the feature you mention, in the "Settings" you can tell Eddie to not pause VPN while screen is off (battery will have a shorter life), disable the persistent notification and disable the persistent tun interface. Kind regards
×
×
  • Create New...