Jump to content
Not connected, Your IP: 18.223.158.132

Staff

Staff
  • Content Count

    11042
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1865

Everything posted by Staff

  1. Hello! Can you please test the just released 2.24.4 beta and check whether or not the problem disappears? This specific problem has been addressed: https://airvpn.org/forums/topic/57401-eddie-desktop-224-beta-released/?do=findComment&comment=241781 Kind regards
  2. Version 2.24.4 (Thu, 14 Nov 2024 11:40:14 +0000) [bugfix] [windows] Fixed an issue with portable edition 2.24.3 [change] [all] Minor improvements [change] [linux] Fixed an issue with network lock with iptables-legacy (also Arch distro) [change] [all] Migration from DotNet7 to DotNet8
  3. Hello! We tend to assume that it is indeed a coincidence, but of course we can't be 100% sure. It must also be said that the attacks started after a few days the new servers were already operational and the old ones decommissioned. Kind regards
  4. Hello! We're very glad to inform you that a new 1 Gbit/s full duplex server located in Madrid (Spain) is available: Jishui. The AirVPN client will show automatically the new server. If you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts OpenVPN connections on ports 53, 80, 443, 1194, 2018 UDP and TCP, and WireGuard connections on ports 1637, 47107 and 51820. Just like every other Air server, Jishui supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/Jishui Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  5. Hello! We are honored to see that you expect from us superhuman powers but unfortunately after a reality check we must tell you that not only we don't know the attackers personally, but we are not even able to read minds. Also remember that future mitigation procedures, if any, should not be disclosed, in order not to make the attacker task easier. No, there were no attacks. Currently the main objectives are NYC, LA and Raleigh. Kind regards
  6. Hello! We do not prevent any access to Zoho or any mail service. The only block we enforce as a unique exception to our Net Neutrality commitment is a block against outbound port 25. Please make sure you do not rely on port 25 for SMTP (plain SMTP must not be used anyway) and connect to the standard Zoho mail server ports (465 or 587 for SMPT over SSL/TLS). If you are already connecting to port 465 or 587 please contact Zoho customer service and verify if (and if so why) they block AirVPN servers. Feel free to keep us informed. Kind regards
  7. @MrGreen101 Hello! For some reason Eddie picks a pre-existing WireGuard interface for OpenVPN and OpenVPN doesn't like it. Maybe it's some interface driven by some customized driver of a third party. Try this to resolve: https://airvpn.org/forums/topic/56643-stuck-in-a-broken-route-never-connects/?do=findComment&comment=225323 Kind regards
  8. New version, mainly bug fixes, to promote it to Stable as soon as possible. A completely revamped version of the UI, no longer based on Mono (for Linux) and Xamarin (for MacOS), is in development, but we cannot currently estimate a release date. Version 2.24.3 (Wed, 06 Nov 2024 12:08:47 +0000) [bugfix] [all] CPU usage optimization [change] [all] OpenVPN 2.6.12 [bugfix] [all] Various minor fixes [change] [all] Fine-tuning of Network Lock IPv6 rules (Private & Translation) [bugfix] [linux] Hide window when minimized to tray [bugfix] [all] Fixed issue with user/password when used with third-party .ovpn files
  9. Hello! We're very glad to inform you that Eddie Android edition 3.2.1 is available. This is a hot fix release addressing specific issues and improving overall usage: fixed a bug which caused an anomalous situation and a long delay when the user tried to connect to a specific server or area when no network is available removed the option to disable Eddie's Persistent Notification, as disabling the persistent notification is now strongly deprecated for any VPN app because of the dangerous instability to the VPN tunnel it causes fixed traffic volume counter variable overflow Eddie Android edition is free and open source software offering a comfortable GUI for both WireGuard and OpenVPN3-AirVPN library. Eddie Android edition is the only official software by AirVPN developed for Android: we have been warned of some bogus versions in the Google App Store using the name "AirVPN" or "Air VPN". A few of them have been removed by Google, but a new one has re-appeared. The correct link to the free, open source and safe app developed by AirVPN is the following one: https://play.google.com/store/apps/details?id=org.airvpn.eddie Main features Compatible with all Android versions ranging from 5.1 to 15 Full WireGuard support and integration with AirVPN Battery-conscious application Low RAM footprint Ergonomic and friendly interface Ability to start and connect the application at device bootstrap GPS spoofing Traffic splitting and reverse traffic splitting on an application basis. You can define which apps must have traffic inside or outside the VPN tunnel through white and black list Localization in simplified and traditional Chinese, Danish, English, French, German, Italian, Portuguese, Russian, Spanish, Turkish Full integration with AirVPN Quick tile button Enhanced security thanks to locally stored encrypted data through optional master password Quick one-tap connection and smart, fully automated server selection Smart server selection with custom settings Manual server selection Ability to start and connect during device startup according to a priority list which includes automatic choice, your defined country and your defined AirVPN server Smart attempts to bypass OpenVPN blocks featuring protocol and server fail-over Full Android TV compatibility including D-Pad support. Mouse emulation is not required.  Enhancements aimed at increasing accessibility and comfort to visually impaired persons  Direct link to download the APK https://eddie.website/repository/Android/3.2.1-VC35/EddieAndroid-3.2.1-VC35.apk SHA-256 checksum: 4f65baa671129990aec835885c675ace90e314531aa137378441c5ebb2b46fff *EddieAndroid-3.2.1-VC35.apk Please report any issue or feedback on this thread. Kind regards & datalove AirVPN Staff
  10. Hello! Yes, that's probably why it is no more available. It was a FAQ and then removed as outdated. @Abstain9194 please ignore the out of date recommendation. Kind regards
  11. Hello! WireGuard will never consider a connection over and will not try a re-connection when the tunnel is dead. If you want more network management with re-connection attempts after a timeout you can consider AirVPN software for Android, Linux, Mac and Windows. Kind regards
  12. @Abstain9194 Hello! We see the issue on that topic which is no more accessible by normal users, we must check with the web site maintainers, maybe there's a logic reason for this choice or maybe it's an error. In the meantime, if you run specific browsers on Mac and Windows here's the message posted by @OpenSourcerer as a solution at the time (August 2019, and limited to the mentioned browsers): Kind regards
  13. Hello! A relevant part of the infrastructure in the USA has been under attack since 24-48 hours ago. The redundancy is currently guaranteeing the usual high quality of service: 200'000 Mbit/s are available and distributed throughout the whole USA territory. Please take note that in the last 8 months the Tzulo infrastructure, provisioning connectivity now even to NYC servers, has been consistently providing the top speed in the world to AirVPN clients often beating the old "all time high" of 1 Gbit/s on the client side (2 Gbit/s on the server) with WireGuard. Kind regards
  14. Hello! A relevant part of the infrastructure in the USA has been under attack in the last 48 hours. The redundancy is currently guaranteeing the usual high quality of service: 200'000 Mbit/s are available and distributed throughout the whole USA territory. The uptime of the new 10 Gbit/s servers in Arizona and California is 100% so check your facts. Everything can be improved and we will work to improve, 14 years of experience are not chicken feed. In the meantime please take note that in the last 8 months the Tzulo infrastructure, provisioning connectivity to Polis and NYC servers you mention with disgraceful disdain and superficiality, as well as other servers in strategic areas of the USA, has been consistently providing the top speed in the world to AirVPN clients often beating the old "all time high" of 1 Gbit/s on the client side (2 Gbit/s on the server) with WireGuard. (EDIT: the current ATH is 1.5 Gbit/s client side). Kind regards
  15. Hello! That's correct. To make any future oversight (i.e. you run qB without running Eddie or other VPN software) harmless please follow the suggestion by OpenSourcerer in the previous message. Kind regards
  16. Hello! If Network Lock was active, and firewall rules were not modified, leaks can not happen during a re-connection. The only conceivable way we can imagine (but it is extremely speculative) is that qBittorrent was launched before the VPN connection was up, or before Network Lock was activated, and therefore it announced to trackers and DHT your real IP address for some time, and then the copyright troll did not perform the validation of the claim by attempting a direct connection to your real IP address (yes, there are still trolls that just generate the notice upon harvesting the IP addresses they find on trackers, without validating the claim with a connection to the peer's presumed IP address). Another highly speculative idea is that you run some "antimalware / Internet protection" tool which might have had overwritten the Network Lock rules without your knowledge. Were the notices totally correct even about the shared content? What are your Operating System name and version? Do you run Eddie, and if so which version? Kind regards
  17. Hello! Bug reproduced, it is an undersized variable's overflow. You will see the fix very soon, in the next 3.2.1. Thank you for your tests! Kind regards
  18. Hello! "Always on VPN" and "Block traffic if VPN is inactive" (or "Block connections") are Android settings, while "VPN Lock" is an Eddie setting. In your case, disable "VPN Lock" and enable the Android options, they are more comfortable. Screenshots that can help are here: https://airvpn.org/android/eddie/#step6 « Always on VPN » et “Block traffic if VPN is inactive” / "Block connection" sont des paramètres Android, tandis que “VPN Lock” est un paramètre Eddie. Dans votre cas, désactivez « VPN Lock » et activez les options Android, elles sont plus confortables. Les captures d'écran qui peuvent vous aider sont ici : https://airvpn.org/android/eddie/#step6 Kind regards
  19. Hello! No, nothing special. The configuration is identical. Does the system report tell anything useful? Kind regards
  20. Hello! This looks incorrect because in "AllowedIPs" you have to enter the ranges that you want inside the VPN. So, you are routing in the VPN even parts of the 10.0.0.0/8 subnet that you should not, if we understood correctly. Please try again with a subnet calculator and also compare with the following post: https://airvpn.org/forums/topic/55801-wireguard-access-local-network/?do=findComment&comment=217458 Kind regards
  21. Hello! Yes, of course, thanks! Kind regards
  22. Hello! We're very glad to inform you that three new 10 Gbit/s full duplex servers located in Los Angeles, California, are available: Maia, Sarin, Xamidimura. They have replaced Groombridge, Saclateni and Teegarden with more powerful hardware and higher overall bandwidth. The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637 UDP for WireGuard. Haedus and Iklil support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the status as usual in our real time servers monitor by clicking the names of the servers. Do not hesitate to contact us for any information or issue. Kind regards & datalove AirVPN Team
  23. Hello! We're very glad to inform you that three new 10 Gbit/s full duplex servers located in Phoenix, Arizona, are available: Gunibuu, Kambalia, Sheratan. They have replaced Chalawan, Indus, Phoenix and Virgo with more powerful hardware and higher overall bandwidth. The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637 UDP for WireGuard. Haedus and Iklil support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the status as usual in our real time servers monitor by clicking the names of the servers. Do not hesitate to contact us for any information or issue. Kind regards & datalove AirVPN Team
  24. Thank you so much for your touching words and stellar feedback. And for your commitment in so many years. However, were you really under the illusion that you could escape so easily? Kind regards
  25. Hello! No, it was an omission, we have now fixed the original message. Kind regards
×
×
  • Create New...