Jump to content
Not connected, Your IP: 52.15.174.110

Staff

Staff
  • Content Count

    11283
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1932

Everything posted by Staff

  1. Hello! OK. What is the OpenVPN version you have no problems with? OpenVPN 2 branch runs external system tools to configure interfaces and routing table, while OpenVPN3-AirVPN and Bluetit try to minimize the external tools to launch. In particular the tun interface configuration is accomplished quite differently by OpenVPN 2 and 3. If you run Bluetit in "WireGuard mode", do you experience the very same issue? Also, do you experience the same issue if you run native wg tools? Kind regards
  2. Hi! Historically, that's for the Black Friday only. 😉 Kind regards
  3. Hello! We reluctantly have to announce gloomy news to you all: Spooky Halloween Deals are now available in AirVPN... Save up to 74% on AirVPN longer plans (*) (*) When compared to 1 month plan price Deal will expire on 2024-11-04 UTC Check all plans and discounts here: https://airvpn.org/plans If you're already our customer and you wish to jump aboard for a longer period any additional plan will be added on top of already existing subscriptions and you will not lose any day. Every plan gives you all the features that made AirVPN a nightmare for snoopers and a scary service for competitors. Just check this frighteningly long list of terrific features if you dare: a clear mission without compromises https://airvpn.org/mission exclusive and comfortable remote inbound port forwarding system flexible, opt-in block lists against malware and other hostile entities. Pick predefined lists, add exceptions or additional blocks, define your own lists, or just use our totally neutral DNS by default improved API functions to let you control and configure VPN features and account settings active OpenVPN 3 AirVPN library open source development WireGuard integration IPv6 support, including IPv6 over IPv4 refined load balancing to squeeze every last bit per second from VPN servers free and open source software for Android, Linux, Mac and Windows easy "Configuration Generator" web interface for access through third party software guaranteed minimum bandwidth allocation GDPR compliance and very high privacy protection standards no log and/or inspection of clients' traffic effective traffic leaks prevention by AirVPN software Tor support via AirVPN software on Linux, Mac and Windows various cryptocurrencies accepted without any intermediary no obligation to use our free and open source software to enter AirVPN infrastructure. Interoperability is an AirVPN priority. perfectly clear and easy to read Privacy Notice and Terms https://airvpn.org/privacy No tricks, only treats! We witch you a spooktacular Halloween! AirVPN Staff
  4. @jssi Hello! UDP seems blocked. Also, the Mullvad tunnel we see in the report is up, therefore conflicts will arise on the main routing table and also for the overlapping of Mullvad/AirVPN VPN range (subnet). Please check any packet filtering tool both on your Fritz!Box and your system and make sure that they do not block UDP. Moreover, please do not keep the Mullvad tunnel up while you run Eddie (and vice-versa). You may also test a connection with WireGuard. You can switch to WireGuard on Eddie's "Preferences" > "Protocols" window. Kind regards
  5. Hello! Thank you very much for your tests. Can you please post the whole Bluetit log and also tell us your exact distribution/OS name and version? Also, if some specific action is needed to cause the crash, can you describe it step by step to help us reproduce the failure? Kind regards
  6. @matto82 Hello! OpenVPN can't configure the tun interface (operation not permitted). Usually this happens in unprivileged containers, is it the case? Please upgrade to AirVPN Suite 2.0.0 beta and test again with both OpenVPN and WireGuard. If the issue persists, please check this thread for further insight and potential solutions: https://forum.proxmox.com/threads/openvpn-in-unprivileged-container.38670/ Kind regards
  7. Hello! Eddie Android edition is a fully integrated with AirVPN, free and open source WireGuard and OpenVPN GUI client. Source code is available on GitLab. Eddie is based on official WireGuard library and OpenVPN3-AirVPN library (free and open source software library by AirVPN), allowing comfortable connections to both OpenVPN and WireGuard servers. All Android versions from 5.1 to 14 are supported. We're very pleased to announce that Eddie Android Edition 3.2.0 is now available: a release focused on bug fixes featuring also a much more robust management of critical situations and network conditions. You can download Eddie Android 3.2.0 APK directly from our repository or from the Google Play Store, please see here: https://airvpn.org/android/eddie/ Source code is available in GitLab: https://gitlab.com/AirVPN/EddieAndroid/ Direct link to the changelog: https://gitlab.com/AirVPN/EddieAndroid/-/blob/master/ChangeLog.txt What's new updated to OpenVPN3 3.11 AirVPN (20240912) updated to OpenSSL 3.3.2 fixed pause/resume button status according to network status change (OpenVPN) fixed a bug which caused the app to rely on VPN servers domain names for AirVPN country connections at device bootstrap fixed a bug which caused the app to crash on some systems if no network was available at device bootstrap fixed a bug which caused a paused OpenVPN connection to resume after a network change fixed AirVPN manifest management, particularly during concurrent network access and VPN startup fixed a pre-packaged manifest issue which caused the app to crash when a profile was imported and the proper manifest could not be downloaded fixed a bug which caused the app's quick tile button to become unresponsive in some systems after the app was swiped out fixed a bug which caused the app's quick connection button to become unresponsive after or during an OpenVPN session fixed a bug which caused the quick tile button status to get misaligned with the actual app status fixed a bug which caused the app to show a status different from the actual device and/or VPN status fixed a bug which caused the app to ignore the white list at the first connection through the quick tile button and in other circumstances fixed a bug which caused the app not to update the white list after a user already defined it and later changed it added profile deletion multiple selection added an optional real time log view update and refresh improved Quick Setting Tile interaction improved VPN connection at startup (device bootstrap) by checking and properly managing critical system and network conditions Main features Compatible with all Android versions ranging from 5.1 to 14 Full WireGuard support and integration with AirVPN ChaCha20-Poly1305, AES-CBC and AES-GCM support on both OpenVPN Control and Data channel Battery-conscious application Low RAM footprint Ergonomic and friendly interface Ability to start and connect the application at device bootstrap GPS spoofing Traffic splitting and reverse traffic splitting on an application basis. You can define which apps must have traffic inside or outside the VPN tunnel through white and black list Localization in simplified and traditional Chinese, Danish, English, French, German, Italian, Portuguese, Russian, Spanish, Turkish Full integration with AirVPN Quick tile button Enhanced security thanks to locally stored encrypted data through optional master password Quick one-tap connection and smart, fully automated server selection Smart server selection with custom settings Manual server selection Ability to start and connect during device startup according to a priority list which includes automatic choice, your defined country and your defined AirVPN server Smart attempts to bypass OpenVPN blocks featuring protocol and server fail-over Full Android TV compatibility including D-Pad support. Mouse emulation is not required. Enhancements aimed at increasing accessibility and comfort to visually impaired persons  AirVPN servers sorting options Customizable "Default", "Favorite" and "Forbidden" servers and countries OpenVPN and WireGuard mimetype support to import profiles from external applications Multiple OpenVPN profile support. The app now imports and manages multiple OpenVPN and WireGuard profiles Support for custom bootstrap servers Support for favorite and forbidden countries AirVPN broadcast messages support The app is aware of concurrent VPN use. In case another app is granted VPN access, Eddie acts accordingly and releases VPN resources Optional local networks access. In such a case, local network devices are exempted from the VPN and can be accessed within the local devices Localization override. User can choose the default language and localization from one of the available ones Ability to directly select an AirVPN area (country, continent, planet) to connect to VPN concurrency management Full integration with VPN traffic leaks prevention by system in Android 7 or higher version User can generate or save an OpenVPN or WireGuard profile for any AirVPN server or country and save it in the internal OpenVPN and WireGuard profile manager or export it On the fly language change allowing to switch language without re-starting application Exclusive optional VPN lock in case the device cannot take advantage of Android's VPN direct management (Android 5 and 6) Server scoring algorithm implementing the latest AirVPN balance factors in order to determine the best server for quick connection Network name and extra information are shown along with network type Device network status management Fully compatible with Android TV 5.1 and higher versions  Please remember that, starting from Android TV 10, Always On VPN feature has been stripped off in order to prevent users from connecting to a VPN during an Android TV based system bootstrap. Therefore Eddie start & connection at bootstrap, as well as system built in leaks prevention, are not possible on Android TV 10 and higher versions. For leaks prevention you can rely on Eddie's "VPN Lock" feature. Android TV 9 and older versions can still start Eddie during the bootstrap and have it connected when you activate Always on VPN and configure Eddie accordingly. Download link https://eddie.website/repository/Android/3.2.0-VC34/EddieAndroid-3.2.0-VC34.apk Quick link for faster TV devices typing: https://airvpn.org/tv SHA-256 checksum 82b5ceee79f86f6b3a81974cc907d29a38d5854ab1e2c8dff0e9f7fdb3901431 EddieAndroid-3.2.0-VC34.apk How to sideload Eddie Android edition on Android TV and FireOS devices https://airvpn.org/android/eddie/apk/tv Kind regards & datalove AirVPN Staff
  8. Hello! Yes, you need to handle packets in order to forward them to the proper destination. The VPN server sends incoming packets to Flint2, which in turn decrypts the VPN flow. Then, the router can not know the real, final destination of each unsolicited packet and you must define the proper rules. An example with iptables here: https://airvpn.org/forums/topic/9270-how-to-forward-ports-in-dd-wrt-tomato-with-iptables/ According to online documentation it appears that Flint2 OEM firmware's graphical interface supports inbound port forwarding from the VPN interface, please check the router's manual. Kind regards
  9. Hello! This final crash of the eddie-tray is probably a direct consequence of: Since Fedora adopted Wayland as the only display server, Eddie (just like many other applications, based or not based on Mono) may crash. Wayland by itself does not provide a graphical environment and compatibility with applications relying on Xorg is competence of the compositors. You may either try to use Eddie in CLI mode only (i.e. avoid the GUI and therefore eddie-tray) or test the AirVPN Suite 2.0.0 beta (it does not offer any GUI). While Wayland and many compositors progress and approach maturity it's possible that various issues and incompatibilities will be resolved. Xwayland is an X server that runs under Wayland, providing compatibility for native X11 applications that lack Wayland support. Can you verify whether it is installed in your system? Just installing the package xorg-xwayland should be sufficient to enable Xwayland, but reports claim that you do not have a 100% compatibility. Worth a test anyway. With all of the above said, Eddie's developers are anyway investigating. EDIT: in Fedora you can still get rid of Wayland because all the Xorg packages are available. This is the preferred solution by several Wayland victims to regain a full compatibility not only with Eddie, but with the relevant amount of applications that currently can't run in Wayland regardless of compositor. Kind regards
  10. Hello! There is no 2.0.0 release currently. Kind regards
  11. Hello! Customer experienced the problem with Chrome 129.0.6668.90 on Windows 11 Home 23H2 build 22631.4169 and resolved it by switching to Edge. Is anyone experiencing download problems from our web site when running Chrome? Kind regards
  12. @jssi Hello! Please post a system report generated by Eddie on the "problematic" machine. Generate the report after the problem has occurred: https://airvpn.org/forums/topic/50663-youve-been-asked-for-a-support-filesystem-report-–-heres-what-to-do/ Kind regards
  13. Hello! Can you give us the exact link to the package you are trying to download and tell us your Operating System and browser names and versions? Kind regards
  14. Hello! In this case it is self-evident that you must add a rule to allow incoming packets to the desired application's port to make that application reachable from the outside. Note that Eddie's and AirVPN Suite's Network Lock will set policy and new rules either with nft or iptables on the default table chains and by default this feature will allow incoming packets from the VPN server entry IP addresses. Kind regards
  15. Hello! Currently we have no plans to do it. We might consider in the future to offer additional inbound ports (perhaps only on pools > 1) for a fair price. Nothing is written in stone at the moment, except of course contractual agreements. Accounts with plans purchased when the previous contractual agreements were in force and 20 ports were advertised have kept and will keep enjoying 20 ports. Kind regards
  16. Hello! We inform you that within a few hours all the IP addresses of Alruba (Tallinn, Estonia) VPN server will change, due to a datacenter's decision. If you run AirVPN software, no action on your side is required. If you connect to Alruba through configuration files with IP address (and not domain name) please re-generate the file(s) in due time. The change is planned on 2024-Oct-09 at around 12.30 PM CEST. Kind regards AirVPN Staff
  17. Hello! It is intentional. We want to upload 3.2.0 on the Google Play Store directly, without passing through 3.1. Kind regards
  18. Hello! AirVPN servers have different entry and exit IP addresses to prevent various correlation attacks. An OpenVPN ping (not to be confused with the ping tool relying on ICMP) every 10 seconds is part of the keep alive session method implemented in OpenVPN and compliant with the configuration "ping" directive. See also OpenVPN manual: https://openvpn.net/community-resources/reference-manual-for-openvpn-2-6 (jump to --ping n) Yes, it is correct. Any virtual network must at some point rely on something physical.  OpenVPN's ping is inside the OpenVPN Control Channel and not inside the Data Channel. Keep in mind that OpenVPN performs multiplexing, i.e it combines multiple logical channels in a single physical channel. In AirVPN configuration, OpenVPN's ping and the whole Control Channel are cryptographically secure. Kind regards
  19. Hello! Correct. 111 is the error code for "connection refused". Packets have reached your system and have been actively rejected by your system (and not silently dropped). Technically this occurs via a TCP RST, so the other end (in this case the port tester machine) can see the active reset. The "active rejection" can occur via a firewall configured to reject packets (instead of silently dropping them) or by the system when configured to reset an attempted connection to a non-existing port. Therefore, you need to check your system firewall rules, and the qBittorrent configuration (according to our previous message). Kind regards
  20. Hello! Verizon does not see traffic "through" VPN. The only way that a network snooper or in particular a swarm observer can detect your real IP address is through your system leaking traffic outside the VPN tunnel. It may happen only if you disabled the Network Lock feature of AirVPN software, or you did not take the necessary steps if you connect via third party software. Once the observer monitored swarm activities outside the VPN tunnel and harvested IP addresses provided by trackers and DHT, it transmits the IP address and timestamp with a notice of presumed infringement to your ISP which can correlate it with the subscriber's identity. Main reasons of a traffic leak are unexpected VPN disconnection and wrong configuration (wrong network binding) of a program, but only when Network Lock is disabled. If Network Lock is enabled, any traffic leak for any reason is prevented. Network Lock is a set of firewall rules, therefore leaks prevention is ensured. If you don't run our software you can bind your program(s) to the tun interface to prevent them from exchanging data outside the VPN tunnel and you can implement your customized firewall rules, various guides are available in the "How To" forum. With that said, please check the Terms of Service you accepted. Kind regards
  21. Hello! We could not detect any problem to port 1637 of Menkent's entry-IP address three, we're sorry. Does the problem still persist? Kind regards
  22. Thanks. We would like to check the VPN server. When you plan to stay connected for hours, please open a ticket and warn our support team that you're connected. If you can't stay connected for a long time please name the servers you're experiencing the problem with. Kind regards
  23. @Pestermess Hello! We can see now that your qBittorrent is reachable on all the VPN servers your systems are connected to. Can you confirm that the problem is resolved? Kind regards
  24. Hello! If you already upgraded and then you downgraded probably there's no point in further tests, but please repeat the procedure and try again to send us a system report. Please do not forget to delete the configuration file when you uninstall. Does 2.24.2 beta gets stuck too, when generating or sending the system report to our servers? We would like to see the 2.24.2 beta system report too. Kind regards
  25. Hello! Apparently not. From the last screenshots you sent us, please note that you are still running Eddie 2.21.8. Please uninstall Eddie, delete again the configuration file (important, the uninstaller does not remove it), upgrade to Eddie 2.24 beta and test again to see whether or not the problem persists. Kind regards
×
×
  • Create New...