Jump to content
Not connected, Your IP: 3.15.17.60

Staff

Staff
  • Content Count

    11045
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1867

Everything posted by Staff

  1. Hello! We're very glad to inform you that Eddie Android Edition 1.0 RC2 (VC 5) has just been released. The main changes from RC1 are various bug fixes (including an important problem occurring under Android 8.x) and a more robust detection and handling of network and OpenVPN statuses with the purpose to reach the best effort against traffic leaks outside the VPN, of course within the bounds enforced by limited privileges in the system. Eddie 1.0 RC2 is also packaged with x86 support, we had a request for x86 support some time ago and we're glad to satisfy it. You can find additional information in the changelog which is attached to this message. As usual Eddie is free and open source software released under GPLv3. Check the first post in this thread for source code URL and some more details. You can participate to the tests by joining the testing community in the Google Play Store here https://play.google.com/apps/testing/org.airvpn.eddie Alternatively, if you don't want to access (or you have no access to) the Google Play Store, the apk can be downloaded from our Eddie web site here: https://eddie.website/repository/eddie/android/1.0rc2/org.airvpn.eddie.apk Please keep testing and stress Eddie as much as you can! Any single report is important. With RC2 we feel we are remarkably nearer to a 1.0 stable release, but only extensive tests outside our internal team will prove us right or wrong. Thanks so much to all the past and future testers! Kind regards ChangeLog.txt
  2. Hello! We're sorry, only when we have a signed contract... telling anything during the negotiations, even if not in early stages, would be unfair for all parties, including you. Kind regards
  3. FINAL UPDATE 19 SEP 2018 Migration has been completed and tests have been successful. All the mentioned servers are now available and connectivity is very good from major USA residential ISPs. IPv4 addresses remain the same, while IPv6 addresses have been changed. The servers operate in a new Dallas datacenter. EDIT 18 Sep 2018: migration has been completed to a new Dallas datacenter and servers have passed the tests. All the 10 servers will be again available soon. Hello! We regret to inform you that we will soon start a migration and potential relocation of the following servers currently located in Dallas: Chamaeleon Equuleus Helvetios Leo Mensa Pegasus Ran Scutum Volans Vulpecula The reason is that Cogent (our transit provider in Dallas) will not renew the contract on the current 10 Gbit/s line. Unfortunately they let us know very late, just a few days before the natural expiration and normal renewal of the contract itself. It's not a price problem, they do not want to renew with us and/or with our counselor in the USA. The mentioned servers are our property but disconnecting, packaging, moving (or shipping), reconnecting and reconfiguring may take a long time (probably a month or more). Therefore, we have decided to set up a small battery of new servers, five in Phoenix and five in Dallas itself, that will run during all the time which will be necessary to complete the migration. Such servers are being connected and set up in different datacenters as we write and after a brief 24/48 hours testing period we will make them available. All the new, mentioned servers have 1 Gbit/s ports. We deeply apologize for the inconvenience and at the same time we are confident that you can understand that this sudden and unexpected issue was and is totally out of our control. Kind regards and datalove AirVPN Staff
  4. Hello! Currently you can use tls-crypt on entry-IP addresses 3 and 4 of about 90 servers. Support on the whole infrastructure will be completed in the near future. Please see also https://airvpn.org/topic/28153-ipv6-support-and-new-smart-features/page-3?do=findComment&comment=75733 Kind regards
  5. Yes, DSL is too old, it was a bad example. Anyway you already found an alternative that's good. The fingerprint is mainly (or even exclusively) determined by the browser, in your examples. So using TBB is an excellent solution, as well as a fine tuning of the browser. About fingerprints of the kind you mention, a thread developed in our forum and was carried on by the community: Various solutions, but the Tor Browser still remains probably the most secure (and easiest). https://airvpn.org/topic/20156-avoid-browser-fingerprint/ If a human right is potentially at stake, no general "overkill" / limitation rule can be claimed, the matter remains up to each person considerations. Kind regards
  6. Hello! The bottom half of the diagram you mention summarizes the route of the traffic of an application NOT configured to connect to Tor, in a machine where OpenVN is connected to our servers over Tor. Tor Browser connects to Tor by default, so its traffic route (again in a machine with OpenVPN connected over Tor to some Air VPN server) is summarized in the higher half of the diagram. If you configure Tor Browser to NOT connect to Tor, then its traffic will be summarized in the lower half of the diagram. Yes, with any application NOT configured to connect to Tor. Kind regards
  7. Hello, we have taken care to definitely improve precisely this aspect (on top of other ones) with the upcoming RC2. A preRC2 has been extensively tested internally and if there are no last minute problems it will be made available on 26th of July. Check the main thread about Eddie Android edition (and the Google Play Store will let you know when a new version is available, if you downloaded Eddie from the Play Store): https://airvpn.org/topic/26549-eddie-android-edition Anyway, please note that "automatic reconnection" you mention is meant to reconnect Eddie at the Android device (re)boot if it was turned off or restarted when Eddie was still running and connected. Thank you very much for your tests and please keep testing the new version and feel free to keep reporting back, the more testers the better: we consider the feedback as a paramount resource on the road to deliver a good stable version. When you report anything, please add if you don't mind your exact device model and Android version. Kind regards
  8. Hello! Given the reputation of Daniel J. Bernstein, concerns about the specific employed ECC are not relevant. However, remember that Wireguard is not ready for production and you must not use it when security of your data is a priority. Wireguard developers are very honest about it, so use it at your own risk. From the official web site: We can't propose to our customers something based on experimental code that has not undergone a proper security auditing and those who do are clearly not protecting their customers' interests. Sooner or later Wireguard will reach a mature, stable release and will be audited and peer reviewed. That will be the right time to consider to put it into production. Kind regards
  9. Hello and thank you! Cash payments are impossible to handle manually (we should correlate any received cash with some precise account and activate it manually... humanly impossible), and very risky for the buyer. We accept cryptocurrencies which are designed to provide a strong layer of anonymity at transaction level itself. We think of ZCash and Monero. About getting coins, you really don't need to mine them. The obvious method to get them is exactly the same you employ for fiat money: you offer a good or a service. It should be quite easy to earn coins for many months of AirVPN subscription in this way. Alternatively consider services like LocalBitcoins which can be perfect for your purposes (for small amounts: we don't feel to recommend them for relevant transactions) Kind regards
  10. Hello! Please see also here: https://airvpn.org/faq/udp_vs_tcp/ Kind regards
  11. Hello! Can you please publish the original Kaspersky reply (or send it to us privately in a ticket) where they declare what you reported here? It might help us. Kind regards
  12. Hello! Can you post (or send it to us privately in a ticket) the original reply from Kaspersky stating that the bug will be fixed within 2019? It might help us. Kind regards
  13. Hello! Using the Tor Browser sounds like an excellent solution for your purposes, because you just need to separate identity with certain web sites. On VM performance, you might test a very light Operating System with some guest integration by the virtualization software, before considering the purchase of new hardware. About light systems, check out DragonFly BSD (a FreeBSD fork) or something like "Damn Small Linux". https://www.dragonflybsd.org http://www.damnsmalllinux.org Avoid Windows at all costs. Kind regards
  14. Hello! On your Android or iOS device you need to re-generate a configuration file and import it as a profile in your application (openvpn-connect, OpenVPN for Android...). Try the following settings: - click "Advanced Mode" in the Configuration Generator - select protocol TCP, port 443, entry-IP address 3 - proceed as usual to download / import the profile On entry-IP addresses 3 and 4 of our VPN servers you have OpenVPN working with "tls-crypt". It means that the whole Control Channel of OpenVPN is encrypted. This connection mode has showed great abilities to bypass a wide variety of blocks. In this case we also suggest TCP because, according to the reports we have been receiving from China in the last years, it is not uncommon that UDP gets entirely blocked on mobile lines. UPDATE: with our software Eddie Android edition, you will not need the Configuration Generator anymore in Android. Eddie will try by itself anti-blocking connection modes. If you don't wish to wait (Eddie may need up to 1 minute to find the proper way to circumvent China blocks). go to the "Settings" view and please set: Custom protocol option to TCPCustom port to 443Custom TLS mode to tls-cryptQuick connection mode to Use custom settingsEddie will connect to port 443, with protocol TCP, using tls-crypt. Kind regards
  15. Hello! Please make sure that the router firmware is up to date. The condition you report might be caused by a router bug which is triggered by sustained UDP throughput. In spite of the fact that only some torrent software causes the issue (which does not fit in the explanation), it's worth anyway a try. Kind regards
  16. Hello! "Probably" is not "surely" (but we wrote "apparently"). Anyway, it doesn't matter: you have no leaks, and this is the important point. Note how you can have IPv6 connectivity over our service even if your ISP does not support IPv6. Kind regards
  17. Hello! No, you don't. The IP addresses of any new server are added automatically in the rating system, so the qualified name of each country may resolve (if the server reaches the best rating) into those IP addresses. The configuration file, when the needed settings are the same, remains the same. Kind regards
  18. Hello! Thank you. Yes, it's planned for all the servers. Kind regards
  19. Hello! We're very glad to inform you that five new 1 Gbit/s servers located in Atlanta (Georgia, USA) are available: Hercules, Libra, Musca, Sculptor and Ursa. The AirVPN client will show automatically the new servers, while if you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP. Just like every other "second generation" Air server, they support OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. Please note that these new servers will replace five servers in Atlanta, and precisely Antlia, Octans, Pavo, Sagittarius and Scorpius which will be withdrawn soon because the company operating in the datacenter they are located is ceasing operations, unfortunately. Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  20. Hello! 2. In this case you could rely on VMs. For example, you have a host connecting over OpenVPN over Tor, and a VM (attached to the host via NAT) which connects to another VPN server. The traffic to/from the VM would be tunneled according to your description, if we understand it correctly. 3. Exactly, this is an important factor to consider. A different setup, again with the aid of a VM, would be more secure under this respect. For example, connecting the host to a VPN server with Network Lock enabled, and then using OpenVPN over Tor in a VM attached to the host via NAT. In this way, if the connection established by the VM fails, you can still rely on the host connection "locked". Yes, once you know the Tor guard entry-IP address you can enter the rule allowing traffic only to that IP address, but complications arise when the circuit changes.A safer solution appears as the one described in point 3 (with a VM). This is also a matter for developers to see whether something similar can be implemented in a safe way in Eddie, we will make them aware of this thread. Kind regards
  21. Hello! About the changes from 2.15.2, please check the changelog here: https://eddie.website/changelog/?software=client&format=html And yes, you're right, now it works properly for a new feature. There are some cases for which IPv6 seems available but in reality it does not work properly. Now Eddie tries to understand these issues, which have a definite pattern. If it detects them, it switches IPv6 tunneling to "Block". 1. Yes. 2. No: you have a local Tor proxy, you can connect to it different OpenVPN instances (provided that you take care to define multiple routing tables, a feature that's unsupported on Windows systems), but then you have to decide which route a packet must follow. A simpler solution would be adding another VPN service not between Tor and AirVPN, but before them or after them. 3. Unfortunately not. It is not possible to ensure a proper Network Lock because Eddie can not know in advance the Tor guard IP address. So you might lock the traffic only after the circuit is established, a thing that Eddie currently does not do, and anyway might be deceptive. Kind regards
  22. Hello! Thank you, send them to us too, and enable logging on file (then send us the generated log, taken after the crash). Kind regards
  23. @hugomueller Please see here: https://airvpn.org/topic/28153-ipv6-support-and-new-smart-features/page-3?do=findComment&comment=75733 The same thread can be taken as a reference. Simply, tls-crypt is supported and mandatory on entry-IP addresses 3 and 4. OpenVPN 2.4 or higher is required. https://airvpn.org/topic/28153-ipv6-support-and-new-smart-features tls-crypt encrypts the whole Control Channel and has been reported as effective in bypassing blocks in China and Iran at the moment (to port 443 preferably, otherwise you could experience a generic, not OpenVPN related, outbound port blocking). Kind regards
  24. You were lucky you did not need anti-blocking techniques earlier. They have been enforced since many years ago in wide areas of China. Do not hesitate to open a ticket if you have still troubles after you have applied the recommendations in this thread. Kind regards
  25. Hello! Can you please upgrade to Eddie 2.16.1 and test again? To download this version, in the usual download page for your system please click "Other versions", then select "Experimental". You will be brought back to the download page, where you can proceed to download and install as usual. Please feel free to let us know whether this new version fixes the problems you experience. Kind regards
×
×
  • Create New...