Jump to content
Not connected, Your IP: 18.219.253.199

Staff

Staff
  • Content Count

    11042
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1865

Everything posted by Staff

  1. Hello! Probably this old version runs OpenVPN 2.4 which does not support some directives implemented in OpenVPN 2.5 and later versions (for example "data-ciphers"). DSM 6.2 reached the End of Life about a year ago. You may either upgrade to DSM 7 or tell the Configuration Generator to generate a configuration file for OpenVPN 2.4: on the CG page turn on the "Advanced" switch set the "OpenVPN profile" combo box to "2.4" generate, download and import as usual Kind regards
  2. Hello! Yes, our suspicion was correct, as you can see the IP address in the file generated by the CG is different from the one you used previously. Server domain names resolve only into entry-IP address 1, we do not have domain names for other entry-IP addresses. You can query the API or use the CG to see all the entry-IP addresses of the servers. Now the TLS key mismatch problem is solved. The new problem: May 30 15:42:34 ovpn-client1[17021]: /usr/sbin/ip addr add dev tun11 10.11.214.40/24 May 30 15:42:34 ovpn-client1[17021]: Linux ip addr add failed: external program exited with error status: 2 Something goes wrong when the tun11 virtual network interface is configured. According to the current man, the syntax does not seem correct: ip addr { add | del } IFADDR dev STRING but we see it's an old usage which should be just fine. If the problem persists, try to upgrade the firmware if a new version is available. If you have WireGuard available in your firmware you can also test it and check what happens. Kind regards
  3. Hello! Eddie-UI.exe is not found. Please check the path and the file name (case sensitive) but also try to run eddie-ui (do not bypass it with "mono ...") which is the sh script which is meant to be run to start the software (with GUI). What is your Raspberry Pi version and which exact OS you run on it? Kind regards
  4. Hello! You're trying to connect to an entry-IP address 1 (217.138.195.26), which supports TLS Auth. If you're trying the connection through a key for TLS Crypt you would get that error. TLS Auth and TLS Crypt are different and mutually incompatible OpenVPN ways to negotiate the Control Channel. Hence we use different keys and different IP addresses for each "mode". The Configuration Generator, by default, generates TLS Crypt keys and entry-IP address 3, which supports TLS Crypt. Can you please check? Note that if you turn on the "Advanced" switch, you will be able to see all the available connection modes on the Configuration Generator. Kind regards
  5. Hello! The most common causes are a "dirty" line and an MTU related problem. Please try to get a stronger WiFi signal, change WiFi channel, test a different Ethernet cable, make sure that network interface driver and router firmware are both up to date. Also set WireGuard's virtual network interface MTU down to 1280 bytes. You will need Eddie 2.24.x to do it, as older versions do not offer an option to modify MTU (so WireGuard default value is enforced). In Eddie 2.24.x please select Preferences > WireGuard, set MTU to 1280 bytes, click Save and test connections to various servers. Kind regards
  6. Hello! The most common causes are a "dirty" line and an MTU related problem. Less frequently it's a replay attack. Please try to get a stronger WiFi signal, change WiFi channel, test a different Ethernet cable, make sure that network interface driver and router firmware are both up to date. For the second cause try to adjust network interface MTU down to 1280 bytes if you use WireGuard, or add mssfix directive if you run OpenVPN (try for example mssfix 1280). Kind regards
  7. Resolved with specific connection modes (connection coming from a country restricting VPN access).
  8. Hello! You are right, we apologize for any inconvenience. At this stage we can assure you that we are working to improve the uptime in Singapore and we are confident that you will see enhancements in the near future. Kind regards
  9. Hello! The problem is different: It looks like either UDP or OpenVPN is blocked. Please check any packet filtering tool both on your system and router and make sure they don't block UDP. If you find nothing blocking, please try a WireGuard connection. It works in UDP only, so the test will help discern whether the block is against UDP in general or against specific ports or underlying protocols (OpenVPN). To switch to WireGuard: from Eddie's main window select Preferences > Protocols uncheck Automatic select the line with WireGuard, port 51820. The line will be highlighted click "Save" Test again connections to various servers. Kind regards
  10. Hello! Please try to switch to WireGuard and set various MTU starting from 1280 bytes Test whether or not you get a better and more consistent throughput with some specific MTU size. Note that Eddie 2.21.8 doesn't allow through an internal option to modify WireGuard's interface MTU, you will need Eddie 2.24.x, please see here: https://airvpn.org/forums/topic/57401-eddie-desktop-224-beta-released/ In Eddie 2.24.x WireGuard is used by default in place of OpenVPN, anyway you can change mode in the Preferences > Protocols window (uncheck Automatic and then select a specific connection mode), while you can modify WireGuard's interface MTU in Preferences > WireGuard window. Kind regards
  11. Hello! Today we're starting AirVPN 14th Birthday celebrations with big discounts on longer term plans. From a two servers service located in a single country providing a handful of Mbit/s, the baby has grown up to a wide infrastructure in 23 countries on four continents! AirVPN is now one of the only three major consumers' VPNs which are still independent, i.e. not owned by big corporations with multiple fields interests, interfering in editorial publications or intersecting with products or services in conflict with privacy protection. Ever since we celebrated the past 13th birthday, AirVPN focused on a comprehensive infrastructure enhancement consisting of: line and server expansion to accommodate the significant customer growth. The infrastructure is now capable of delivering up to 694,000 Mbit/s CPU and network interface upgrades on all four continents where we operate in order to further stabilise and consolidate actual bandwidth availability thorough rewrite of remote inbound port forwarding logic to avert impending port exhaustion. The new implementation will be unveiled soon far reaching improvements to the "behind the scenes" infrastructure (backend servers) through hardware upgrades and targeted software optimisation On the software side, all AirVPN applications and libraries are still free and open source software released under GPLv3. The development of traffic splitting features on an application basis, already available in AirVPN Eddie Android and Android TV edition, has been implemented on the AirVPN Suite for Linux. The OpenVPN3-AirVPN library has undergone a remarkable round of bug fixes and improvements, while the WireGuard library is now fully supported by the Suite. If you're already our customer and you wish to stay aboard for a longer period, any additional subscription will be added on top of already existing subscriptions and you will not lose any day. Check the promotional prices here: https://airvpn.org/buy Promotion will end on June the 12th, 2024 (UTC). Kind regards and datalove AirVPN Staff 
  12. @183aTr78f9o Hello! Please keep us posted and let us know, when you manage to reproduce the problem, what happens with the delay. It's not a solution we recommend because it can expose to leaks but the outcome may provide some insight. We're working on a different approach but we still can't reproduce the problem unfortunately, so it's too early to say whether or not the different approach will be effective. Different options for different tasks, even if partially overlapping, nothing too unusual. Kind regards
  13. Hello! Please try the following procedure to resolve the problem: run Eddie on Eddie's main window uncheck "Remember me" log your account out log your account in (you'll need to re-enter your AirVPN credentials) try again a connection Kind regards
  14. Hello! We're almost there: the 14th birthday celebrations will begin between the 27th and the 28th of May! Stay tuned! Kind regards
  15. Hello and thank you for your tests! Excellent. Kudos to the new WireGuard library too. In the unit file targets you can see that systemd must start Bluetit only when the network is up (Wants=network-online.target). Bluetit also waits some more time for a valid gateway, see here: The above log entry seems to confirm that systemd is right and the network is really up but of course the fact that the network is up does not guarantee that the system's upstream router has a valid Internet connection. If the router does not have Internet connectivity, the incident wouldn't be a systemd or bluetit fault. We will investigate. In which distribution do you experience this? OK. By starting the connection with Goldcrest you may rely on the conn-stat-interval n option, where n is in seconds (please consult the user's manual for more details). You may also consider async for more tasks: the new asynchronous mode adds some interactivity, please check the new manual. However conn-stat-interval is not available in bluetit.rc. Thus, if you don't start a connection via Goldcrest, your approach is the way to go at a first glance. We'll consider your suggestion. Thanks again, keep testing! Kind regards
  16. Hello! All of those "test_suite_*" tests are related to mbedTLS library suite. Let's wait for the maintainer's reply, or you can rely on the official repository. Note that we are going to move your and our messages on to the AirVPN Suite 1.3 thread in the next hours, because this is the thread dedicated to 2.0.0 public testing. Direct link: https://airvpn.org/forums/topic/56375-linux-airvpn-suite-130-available/ Kind regards
  17. Hello! mbedTLS does not support x509. It's not needed by the Suite but maybe the linker enters the error state anyway, or maybe the mbedTLS libraries and include files are misaligned in your system. Can you please try with OpenSSL (which is the default setting)? Please set SSL_LIB_TYPE variable to OPENSSL: SSL_LIB_TYPE=OPENSSL in the following scripts: https://gitlab.com/AirVPN/AirVPN-Suite/-/blob/master/build-bluetit.sh?ref_type=heads https://gitlab.com/AirVPN/AirVPN-Suite/-/blob/master/build-bluetit-static.sh?ref_type=heads Kind regards
  18. Can XMPP use forwarded ports on airvpn servers? I'm not aware of any setting that allows XMPP to use specific ports for calls. Hello! XMPP is a protocol. Clients implementing the protocol may let you specify listening ports which become indispensable for specific needs. In Pidgin you can do it in "Preferences" > "Network" > "Ports" > "Manually specify a range of ports to listen to". The other option "Enable automatic router port forwarding" is probably based on UPnP, so it must be disabled when you want to run Pidgin in the VPN. Kind regards
  19. Hello! At a first glance UDP seems blocked but this block could be a consequence of the following interface picked by Eddie for OpenVPN: . 2024.05.22 22.01.11 - Using WinTun network interface "ProtonVPN TUN (ProtonVPN Tunnel)" Please try this and check whether the problem gets resolved: https://airvpn.org/forums/topic/56643-stuck-in-a-broken-route-never-connects/?tab=comments#comment-225323 If the problem persists after the above, please make sure that no Proton software is running concurrently (you must run only one VPN client at a time to avoid conflicts). Kind regards
  20. Hello! The AirVPN's symmetric-like NAT makes STUN unsuitable, we're sorry, but in our infrastructure you can directly rely on the inbound remote port forwarding feature, so you can avoid an external STUN server. However, in your specific XMPP case, probably you will need anyway a TURN server. For example, with Pidgin (a client which implements XMPP) you can enable audio and video behind VPN without STUN but you will need a TURN server, according to the documentation, if we understand correctly. For the readers, please be careful with STUN as it may cause traffic leaks outside the VPN tunnel and disclose your "real" IP address if Network Lock is disabled. Typical uses of STUN are in browsers (with WebRTC) and SIP. Kind regards
  21. Hello! We're still gathering information from various sources, therefore this is only a provisional answer. At the moment: OpenVPN over SSH and OpenVPN over SSL, to various ports except port 53, work WireGuard to port 51820 works on a limited set of servers. Unfortunately reports on this subject contradict each other about working servers so we can't say for sure which ones. UPDATE: multiple confirmations that WireGuard to port 51820 works on various servers, but not all of them access to bootstrap servers is blocked therefore you can't use Eddie Desktop or Android edition, or the AirVPN Suite integration, but you will need configuration files. UPDATE: we have new reports confirming that "secret" bootstrap servers DO work. You will obtain them by opening a ticket only from your valid AirVPN account to generate configuration from the Configuration Generator it's crucial that you can access one of our web sites. Currently they seem all accessible configuration files can be used with Eddie Android edition, Hummingbird, OpenVPN and WireGuard native clients, and Eddie Desktop edition through the external provider support option OpenVPN in tls-crypt mode over TCP to port 443 (connect to entry-IP address 3 to have this mode) works but only towards a small amount of servers (please test as many as you can) NEW circumvention option: please check this message: https://airvpn.org/forums/topic/59479-block-vpn-in-russia/?do=findComment&comment=237288 Kind regards
  22. @zimbabwe Please open a ticket, the support team will tell you something interesting. Kind regards
  23. Hello! It is possible that it's something caused by an ancient bug affecting various browsers and reported (on Android too) about 15 years ago: https://issuetracker.google.com/issues/36906622 or something related to mime types. In some rare cases this issue has been correlated to download managers as well. In iOS, for this specific task please use Safari, Chrome or Opera (without download manager extensions, if necessary), which are not affected by that (or similar) bug and can download files from the CG properly. If you decide to try and run WireGuard, you may also avoid downloading a file. You can consider to use a computer and shoot (on the computer monitor) the QR code rendered by our Configuration Generator to import the WireGuard configuration file into your iOS device. Kind regards
  24. @perryaj Hello! You must not renounce to HTTPS. Explanation and solution has been provided by @OpenSourcerer in the first answer to the OP on this thread, please see here: https://airvpn.org/forums/topic/55424-nextcloud-server-behind-airvpn-problem-with-ssl/?do=findComment&comment=214209 Kind regards
  25. Hello! By enabling Location Services your device sends location information (including wireless access point information, cellular tower information, and precise GPS location if available) to Microsoft. It will also allow apps to use their device’s location and location history to deliver location-aware services and disclose your location to third-party entities. Frequently, this behavior is exactly what must be avoided when connected to a VPN for privacy purposes. It may weaken significantly the anonymity layer. Kind regards
×
×
  • Create New...