Jump to content
Not connected, Your IP: 3.137.161.250

Staff

Staff
  • Content Count

    11294
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1935

Everything posted by Staff

  1. @Balaena Hello! In the macOS package, Eddie 2.21.8 includes OpenVPN 2.5.5 linked against OpenSSL 1.1.1, which is perfectly fine (OpenVPN 2.5.5 is the only version in the 2.5 branch which is immune to some annoying vulnerability). You can install the latest OpenVPN version (we recommend OpenVPN 2.6.x and not openvpn-connect, as the 2.x branch seems more robust and it is full featured) and then tell Eddie to use it in "Preferences" "Advanced" window. Please set the path to the OpenVPN binary in the "OpenVPN custom path" field. However, you will need to build it in your macOS as it is not available as a pre-built binary. Anyway, this is not really necessary. For an updated package for macOS you could consider Eddie 2.24 beta version: https://airvpn.org/forums/topic/57401-eddie-desktop-224-beta-released/ Furthermore, in macOS OpenVPN 2 is not very efficient. You can get a nice performance boost (usually +100%) by switching to Hummingbird (it's AirVPN software based on an heavily optimized, modified and bug-fixed OpenVPN3 library forked by AirVPN; the latest version is linked against OpenSSL 3). To switch to Hummingbird just check "Use Hummingbird if available" in the "Preferences" > "Advanced" window. You may also test WireGuard, which is in many cases more efficient than OpenVPN, which may translate into higher throughput, higher than Hummingbird's throughput in a neutral network. You can switch to WireGuard in "Preferences" > "Protocols" window (uncheck "Automatic", select the line with WireGuard port 51820 and click "Save"). Kind regards
  2. @Jbarker138 Hello! From the log a block against either UDP, OpenVPN or specific destination ports is apparent. ! 2024.08.04 16:21:45 - Connected. . 2024.08.04 16:21:45 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.08.04 16:21:45 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.08.04 16:21:45 - OpenVPN > write UDP: Unknown error (code=10065) As a first attempt please test a connection over WireGuard. You can switch to WireGuard by setting the proper connection mode in "Preferences" > "Protocols" window (uncheck "Automatic", select the line with WireGuard port 51820, click "Save"). If the connection goes through successfully then the block is not against UDP, as WireGuard works in UDP only: you may like to verify any antimalware and packet filtering tools and remove blocks against Eddie, OpenVPN or destination ports. If the problem persists, please publish a system report as well, see here: https://airvpn.org/forums/topic/50663-youve-been-asked-for-a-support-filesystem-report-–-heres-what-to-do/ Kind regards
  3. Hello! The previous message is valid only if you connect your router to the VPN, as it was understood or misunderstood. If you connect your Windows machine please ignore the message, you don't need to forward anything from router's interface to your Windows machine in this case (and actually everything works fine, as you wrote). However, PS5 can not connect directly to the VPN as far as we know, so having your Asus router connect to the VPN and share the VPN traffic with the PS5 can be a good solution to have the PS5 inside the VPN. iptables is a userspace utility available in various Linux based systems (including Asus WRT Merlin) that lets you set the packet filtering and mangling rules of the system. It will be necessary if you need to "forward ports" for your PS5, otherwise you don't need it. Kind regards
  4. Hello! This guide could be exactly what you're looking for: https://airvpn.org/forums/topic/9270-how-to-forward-ports-in-dd-wrt-tomato-with-iptables/ Please consider that direct access to iptables is available on Asus WRT Merlin but not Asus WRT. Upgrade (if your router supports it and you haven't already applied it) is easy and fast through the Asus control panel. Kind regards
  5. Hello! AirVPN software with default settings will prevent DNS leaks. Consider to engage Network Lock permanently too, in order to prevent traffic leaks of a different nature. If you don't run AirVPN software, please specify your Operating System and which program you run to connect to the VPN servers to receive more proper suggestions. Kind regards
  6. Hello! Please do not "re-map" the ports, it's a critical error. Then, please follow this guide: https://airvpn.org/faq/p2p/ Please note that the system may not update re-mapping in real time, it may take some minutes. To quickly apply the change, once you have deleted the "local" fields in your port panel and you have fixed your p2p program configuration, please disconnect and re-connect. EDIT: Important, please make sure that you start your p2p program only after the VPN connection has been successfully established. If you disconnect the system from the VPN, then shut down the p2p program, re-connect the system to the VPN, and then re-start the p2p program. Furthermore, if you run Windows, you must check the firewall rules while the system is in the VPN, as the Windows Firewall can change rule set (especially for incoming packets) according to the network type the system is connected to. Kind regards
  7. @Air4141841 Hello! By muting the entries you would hide the problem but wouldn't solve it. Try with mssfix 1280 directive. It will tell OpenVPN to split TCP packets inside the UDP tunnel larger than 1280 bytes; if the problem is related to MTU this directive alone can greatly mitigate or solve it altogether. Kind regards
  8. Hello! We're glad to know that you managed to solve the problem. Yes, for some reason their customer care could explain, Radmin interface blocks UDP connections. Eddie should not pick this interface for OpenVPN. For the readers: you can also tell Eddie to ignore any other interface by entering a valid name in Preferences > Networking > VPN interface name field (for example eddie) but, when Radmin runs, this solution could be insufficient. Kind regards
  9. Hello! We consider redundancy in definite areas. Toronto is just 500 Km away from Montreal and offers ~37 Gbit/s as well as 10 Gbit/s availability. New York City is about 500 Km away and offers 10 Gbit/s lines as well. If you need redundancy in one single specific town you will not find it in all the towns (note that we mentioned "redundancy in most countries"), such as in Montreal, we're sorry, but please note that connectivity in Montreal remained available even if you had some less throughput. Unfortunately, in many cases this is impossible because it depends on factors that are out of our control. Common examples: a routing problem that needs to be detected, diagnosed and resolved by a datacenter's transit provider; an unknown hardware problem which needs to be determined first in order to decide which pieces to replace. EDIT: Ross is back online. Kind regards
  10. Hello! We apologize for any inconvenience. We can't provide you with a definite time but we are confident that Ross will be back online in the very near future. Please do not rely on a single server, you will have a single point of failure. We offer a decent redundancy in most countries exactly to avoid your situation. Kind regards
  11. Hello! No, they can't: OpenVPN and WireGuard are invulnerable to replay attacks in real life. Nevertheless a massive replay attack can dramatically slow down the VPN tunnel throughput because of the massive amount of packets that need to be dropped and re-sent. Kind regards
  12. @hedgehog Hello! Some of the features you mention are essentially managed by Mono, can you please make sure you have an up to date package? If any problem persists, please test Eddie 2.24 beta version and report any persisting problem in this thread: https://airvpn.org/forums/topic/57401-eddie-desktop-224-beta-released/ Start from a default configuration please: before you install the beta version please delete the 2.21.8 configuration file whose location is ~/.config/eddie directory (you can delete anything inside that directory while Eddie is NOT running in order to wipe out any previous setting). If the scroll problem persists, please try to change font. When you report persisting problems please do not forget to mention your Desktop Environment name and version. Kind regards
  13. @Ackei Hello! Insufficient information, we're sorry. What is the program you run to connect to the VPN? Can you post the log of such program taken after a connection attempt has failed? Kind regards
  14. @drsergei Hello! WireGuard extracts the configuration file name to name the virtual network interface. The Configuration Generator generates names which are way too long for interface names. You will need to rename configuration files with very short names, with ASCII characters, before using them with WireGuard. Kind regards
  15. Hello! Yes, definitely. More in general, the remote inbound port forwarding feature depends on forwarding and pre-routing set on the VPN server for all subnets and specific for each client, and therefore nothing changes if you switch connection protocol/port/type and/or connection program. Your setup is correct, we verified that your service is reachable through the VPN server while your system is connected to some VPN server. Keep Network Lock enabled to ensure no exposure of your inbound port on your physical network interface (i.e. your "real" IP address). Anyway, now you're connected through WireGuard and your port on the real IP address is not reachable, so it's fine. Kind regards
  16. Hello! In many cases it depends on how many queries Google receives from the same IP address. It is plausible that some VPN user queries Google heavily with bots and such. When you want faster search via Google you can rely on https://startpage.com which will act as a proxy (it will give you back exactly Google answers) and save you from the captchas. As a nice side note you will have additional protection against Google profiling. You can also consider different search engines, a good one is https://search.brave.com Kind regards
  17. Hello! The client-side problems could be caused by Plex service. In order to reach a Plex server, you may optionally use Plex services for registration, authentication etc., instead of pointing directly to the Plex server. In this case, if Plex service blocks any AirVPN server, you will not be able to access your own Plex server. Try to bypass completely any Plex service and you should be able to reach your Plex server from the Internet or from the VPN. Just in case you decide to connect to an AirVPN server even the machine running the Plex server, please check the documentation on inbound remote port forwarding and keep in mind that no matter how you configure it, Plex will always listen to port 32400 of your physical and virtual interfaces. Kind regards
  18. @Radosk We're very glad to know that we meet all of your requirements, and we thank you for the appreciation and your compliments! Kind regards
  19. Hello! Captchas could be mobile-specific in some rare cases. Do you get captchas if you use Chrome on the computer to browse the same web sites from the same VPN server? If the Android device connects to the same VPN server your computer connects to, do you still get captchas when you browse the same web sites? Also, what if you change browser in your Android device? If you can, also mention the web sites. Kind regards
  20. Hello! We have identified the problem caused by a rare bug in the collision/duplicate check, therefore more than one user may potentially operate one name, and your case is one of the very rare ones. We are working on it to solve the issue. Now collisions are no more possible and we will have to take action for the current duplicates. In the meantime, for a quick resolution so that you can re-start operating immediately, please change your *.airdns.org names with some more unique strings. We still experience another problem with our first authoritative nameserver, so feel free to report any further anomaly. Kind regards
  21. Hello! It's not so simple with more and more networks in public places trying to block VPN and Tor activities. Please test connection modes capable to bypass blocks, such as OpenVPN over SSH and OpenVPN over SSL: on Eddie's main window select "Preferences" > "Protocols" uncheck "Automatic" select a proper connection mode line (example some OpenVPN over SSH mode). The line will be highlighted click "Save" and test again connections in case of failure, repeat the procedure with a different port and/or connection mode (example SSL to port 443) Kind regards
  22. @AirVPNUser2023 Hello! The problem for your own *.airdns.org domain name is now resolved. However, we're still experiencing problems on our primary authoritative nameserver. We are investigating. Please feel free to report any anomaly related to DDNS. Kind regards
  23. Hello! We are going to investigate the problem. Kind regards
  24. Hello! Don't worry, it's impossible that AirVPN will follow "this development", and after 14 years such doubts, or worse insinuations, are frankly inexcusable. The comparisons you make with some poor service with little value and lack of knowledge about Linux are a bit insulting. "Linux" in general is the main development platform for AirVPN and the backbone of the infrastructure, especially with robust distributions built on top. What's more, customers connecting via Linux are an irreplaceable part that totals, according to rough estimates, more than 30% of AirVPN customers (not counting Android here, which is anyway Linux based). Some major points showing how much we support "Linux" customers, regardless of the distribution they picked: AirVPN free and open source software is compatible with at least 200 Linux distributions and probably more. AirVPN software not only supports systemd based distributions, but also SysV Style-init and chkconfig based distributions (let's remember that more than 50 distributions are not based on systemd) . For leaks prevention, both iptables and nftables Netfilter components are supported Packages for most package managers as well as classical tarballs are ready for customer comfort, and Eddie is also available as an AppImage There is no feature for other systems which is not ported on Linux too, and not infrequently a feature is implemented on Linux first or simultaneously on all systems Linux is the only system for which multiple software by AirVPN is available: you can choose between Eddie (offering a rich GUI running swiftly on all major Desktop Environments) and the AirVPN Suite, which in turn offers a stand alone binary as well as a client-daemon architecture The AirVPN software is built not only for Linux x86-64 systems, but also for Linux systems based on ARM 64 bit, ARM 32 bit CPUs. Builds are also available for x86-64 legacy systems, ARM 32 bit legacy systems, and ARM 64 bit legacy systems OpenVPN3-AirVPN library development is led on Linux systems, only then the library is ported to macOS too AirVPN Configuration Generator is very friendly for any third-party Linux software, if you don't want to run AirVPN software in your Linux system Talking about bloatware, you will not find any on AirVPN. Additional features like DDNS or DNS opt-in filters never caused a price increase, and if you think about it DDNS is really comfortable for inbound remote port forwarding, it surely isn't bloat feature offered as marketing fluff. DNS filters have received a stellar feedback so we will maintain them (as usual, opt-in and at no price). Note how AirVPN pricing is the same since 2011 in spite of the useful features added since then. Kind regards
  25. Hello! This is an error: in AirVPN the authentication takes place via certificates and keys. Please disable the username/password authentication. Kind regards
×
×
  • Create New...