Jump to content
Not connected, Your IP: 18.222.92.56

Staff

Staff
  • Content Count

    11042
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1866

Everything posted by Staff

  1. Hello! Network Lock is not persistent (it's a set of firewall rules which will be lost when you reboot the system) so it's possible that the problem is related to DNS settings and not to Network Lock. Keep in mind that VPN DNS are accessible only from inside the VPN, so if they are still set then your system can't resolve names. If Eddie failed to restore DNS settings (for example if it suffered a dirty shut down) you may re-run Eddie and shut it down properly. Since Eddie keeps a safety backup of system settings, it should restore the previous DNS properly. If even the safety backup was lost (for example you uninstalled Eddie) you can easily set DNS from the system settings. We recommend Quad9 (9.9.9.9) for privacy and neutrality commitment. If you run Windows: https://www.windowscentral.com/how-change-your-pcs-dns-settings-windows-10 If you run macOS: https://support.apple.com/guide/mac-help/change-dns-settings-on-mac-mh14127/mac Kind regards
  2. Hello! It might be an unfortunate combination of events: Eddie 2.21.8 is unable to manage properly DNS changes when systemd-resolved runs in on-link mode or anyway any mode which bypasses resolv.conf, therefore your system DNS are not changed properly and you keep querying the usual system DNS most times. Then, one of your system DNS seems poisoned, and your school network administrators may try to act as a man in the middle to monitor your traffic (not so unusual in schools, although it is an abhorrent practice which will expose students to various tremendous attacks, and not only by the school personnel). However, if you have not installed their root certificates, the browsers can't get fooled and you will get those security errors you noticed. You might like to upgrade to Eddie 2.23.2: https://airvpn.org/forums/topic/56428-eddie-desktop-223-beta-released/ This new beta version added full support with proper DNS management for every systemd-resolved working mode. Then, please do not disable route check and DNS check. You must be absolutely sure that you bypass your school DNS and you must also be sure that the tunnel is established. Enable Network Lock as well (before you start a connection) from Eddie's main window. When you start using Eddie 2.23.2 feel free to report again to re-check the whole situation. Some more documentation about possible man in the middle attacks performed by corporate and school networks through the installation and acceptance of root certificates and monitoring proxies: https://security.stackexchange.com/questions/104576/my-college-is-forcing-me-to-install-their-ssl-certificate-how-to-protect-my-pri Note how a VPN will protect you against those attacks and therefore the network administrators might try to block VPN usage. Kind regards
  3. Hello! A new server in Auckland has just been added. https://airvpn.org/forums/topic/56975-new-1-gbits-server-available-nz/ Kind regards
  4. Agree with what was said here. I do, however, get 1Gbps full-duplex through my ISP on a residential line; it's about 1.25Gbps up and down. There have been points where I've used more than 100TB a month, and I still get peak speeds 24/7. I'm sure that in some areas where a PON is oversubscribed, you will see dips in speeds, but I guess I am pretty lucky, considering I've used petabytes of data within a year. I'm sure my ISP has some kind of traffic shaping in place, but I guess there aren't as many bandwidth-hungry users in my area. The funny thing is that I am using one of the biggest ISPs in the US, and they don't explicitly say anything about fair use as far as traffic and bandwidth consumption. Hello! Sounds great. With a dedicated IP address, it would be suitable for a full featured dedicated server, extremely competitive against any datacenter! How much do you pay per month, out of curiosity? Kind regards
  5. Hello! We're very glad to inform you that a new 1 Gbit/s full duplex server located in Auckland (NZ) is available: Tianguan. The AirVPN client will show automatically the new server. If you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts OpenVPN connections on ports 53, 80, 443, 1194, 2018 UDP and TCP, and WireGuard connections on ports 1637, 47107 and 51820. Just like every other Air server, Tianguan supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/Tianguan Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  6. @Koalaman Hello! Maybe connecting to Singapore (as it happened in your example) is not ideal from some Australia ISP. Can you please test specifically Japan, New Zealand and California (we mention California because there's a direct connection via a submarine cable between Australia and California, worth a try anyway). Also please set MTU to 1320 bytes in the [Interface] section of your WireGuard configuration file and check whether performance improves or not. MTU = 1320 You can edit the configuration file with any text editor. Re-run WireGuard to apply the change. Note: Bleutit 2.0.0 alpha 2 already sets WireGuard interface MTU to 1320 bytes by default (next release will let you set a custom value as well). Kind regards
  7. Hello! Impossible, unless you have a dedicated line with a very high price. Nowadays residential ISPs sell 10 or 1 Gbit/s asymmetric lines where the peak bandwidth is "best effort", as the the broadband capacity is shared. That's why you don't pay 7-800+ USD/month for a Gigabit (1-10) unmetered line and that's why traffic "management" is widespread. In various European countries, and as far as we know this happens even on many USA ISPs infrastructure, the traffic gets shaped if you consume more than a dozen TB per month, according to a practice graciously renamed as "fair use", "acceptable use", "quality of service", and you never get the nominal peak bandwidth on peak hours. Your line is capable of, say, 1 or 2 or 10 Gbit/s, but your upstream can not provide the nominal peak to all the connected lines (and therefore customers). Overselling is perfectly normal and it's not a shady practice because the ISP never tells you that you have guaranteed allocated bandwidth with your contract (quite the opposite, in fact, with the "fair use" contract clauses). On the contrary, on datacenters you can connect a dedicated server to dedicated lines with hundreds of TB per month and failover, or even unmetered. Those lines are connected to upstream devices which can guarantee 24/7 the nominal peak bandwidth for the dedicated server. A 1 Gbit/s full duplex line constantly at capacity will cause ~ 648000 GB (~632 TB) per month and for such usage the prices are not even remotely close to the prices offered by residential ISPs. @cccthats3cs Exactly. Our infrastructure must respect the minimum allocated bandwidth according to the binding advertisement on the home page. 4+4 Mbit/s might look not much to the untrained eye, but it's huge, much higher than what most residential ISPs offer through broadband global sharing, and higher than most VPN competitors. However, all of this has a price and your considerations are indeed correct. Express, one of the biggest VPN in the world (maybe the biggest ever since it was acquired by Kape) publicly declare (compare Yahoo Finance or Forbes) more than 4 million customers, of which 1/4 connect at the same time, and each customer has 8 connection slots. That VPN offers about 3000 dedicated servers with shared or dedicated lines, for a total of ~40000 Gbit/s, therefore it guarantess "only" ~2.5+2.5 Mbit/s per connection (not binding, as they are not mentioned or advertised anywhere), which is less than AirVPN's 4+4. Even 2.5+2.5 is anyway good (especially if you compare it with that Windscribe's 0.596 Mbit/s), but it must be mentioned that AirVPN's prices are lower than Express' prices, with or without promotions. As a curiosity calculation, our infrastructure offers 612000 Mbit/s and at any given time 22000 connection slots are used at most, so assuming that the connections were ideally, evenly divided into all world areas and that all the users asked for maximum bandwidth at the same time (worst case scenario!) and that they had no peering, routing or any other type of problem (yes, a very ideal world), they would get 27 Mbit/s (up + down), which is very remarkable and higher than what advertised. To offer more, we think that a price increase would be mandatory. Kind regards
  8. Hello! Please try again to delete the following file. Make sure that Eddie is NOT running when you do it. Check with the Task Manager. C:\Users\tmth\AppData\Local\Eddie\default.profile Then re-start Eddie. The symptoms all hint to a corrupt configuration file but if the problem persists even after you have deleted that file (Eddie rebuilds a new one with default settings if the file is not found) please consider to send a complete system report: https://airvpn.org/forums/topic/50663-youve-been-asked-for-a-support-filesystem-report-–-heres-what-to-do/ Kind regards
  9. @readchaoschild Hello! Since Fortinet anti-AirVPN filters essentially rely on blocks of our bootstrap servers, it is usually possible to bypass the block by running OpenVPN directly. You will have to renounce to Eddie and test a connection to port 443 over protocol TCP, with tls-crypt mode. The Configuration Generator will generate the file you need. Specific instructions for all desktop systems in order to use OpenVPN directly or an OpenVPN wrapper are avaialble in the respective OS pages: https://airvpn.org/download Worth a test, let us know... Kind regards
  10. @Koalaman Hello! Please try a connection over WireGuard and check whether performance improves. Note: AirVPN Suite 1.3 and older versions don't support WireGuard. The support has been added on the latest 2.0.0 alpha 2. You might test the latest Suite preview (if you feel adventurous) or you can try WireGuard userspace utilities directly, or you can run Eddie Linux edition. Please see here for the latest Suite 2.0.0 preview version: https://airvpn.org/forums/topic/56704-linux-airvpn-suite-200-preview-available/ @zman3000 Since the problem in your case appeared suddenly, please open a ticket (to get official AirVPN support) and a thread of your own (for community support). In general, check here for the performance you can expect in AirVPN when no adverse conditions (for example traffic shaping by the ISP, MTU size problems etc. etc.) are met: https://airvpn.org/status/ Watch the "Top User Speed" table. Moreover, by checking the status page you can also have immediate and updated information on the infrastructure status, so you'll know whether some problem is affecting the infrastrucutre and/or specific servers. A screenshot of the table we mentioned to have a photo of the status of the infrastructure soon after you published the message: Kind regards
  11. Hello! Yes, a generic message, there are no unaddressed complaints in AirVPN. Kind regards
  12. Hello! The screenshot you published shows that it's not a block but a verification that the user is human through the usual Public Turing test. It may happen when there are numerous, concurrent connections from the same IP address, it's not a case of a black listed IP address. Google should never be used, VPN or not, anyway you can also rely on https://startpage.com which will act as a proxy to Google Search, therefore adding some additional privacy layer between you and Google Search. Kind regards
  13. @ms2738 On AirVPN, ads blocking features and much more were implemented in 2021, go figure what level of corruption and inaccuracy these infamous "reviews" sites have reached... https://airvpn.org/forums/topic/49876-new-feature-dns-block-lists/ Avoid to link them here, it's just advertising them and the usual VPN they get money and bribes from. Also consider that many "review" sites belong to editorial groups which in turn belong to Kape, which in turn owns Express, PIA, Cyberghost and ZenMate: https://embed.kumu.io/9ced55e897e74fd807be51990b26b415#vpn-company-relationships/kape-vpns In particular, that's exactly the case of what you linked: the web site you linked belongs to Kape. AirVPN is one of the very very few independent VPNs which still experience periods of explosive growth, so it's obvious that we are targeted and defamed. Add on top of this that we refuse to pay ransoms to lift or delete bad reviews, or to pay for reviews altogether, and you have the picture. By the way, in the face of scullions, corrupt scoundrels and the mentioned picture, AirVPN thrives. Kind regards
  14. Hello! We're glad to inform you that we have an agreement and we are going to configure the new server. When the configuration is complete, we just need a day or two to test and then the server will be available. Kind regards
  15. EDIT: the promotion has been re-activated to honor the 1st declaration in the original message. Hello! We apologize for any inconvenience; due to a misunderstanding and a typo the promotion ended almost 24 hours earlier than announced here. Please open a ticket to get the discount. Any other reader still wanting the discount can open a ticket and obtain it. Kind regards
  16. @mackerel Hello! Is the problem solved? If not, please make sure to open a ticket. We have just checked and we don't see any ticket coming from your account. Kind regards
  17. @evelynne Hello! Please open a ticket and list the blocked URLs and the VPN servers you experience the problem from, with the exception of banks, e-commerce sites, government institutional sites, and sites streaming copyrighted content. These sites block any connection coming from a shared IP address or from non-residential IP addresses by policy. For banks, government identification sites and e-commerce sites it's an attempt to mitigate frauds, attacks or scams, with the idea that frauds and attacks could be more likely on connections coming from VPN, Tor, anonymous proxy etc. For providers of copyrighted content it's an almost-mandatory policy because when a connection is behind a VPN or Tor, then the originating country is dubious, however due to granular country licensing of content to maximize profit, that can not be tolerated by copyright holders. Another reason of blocking is the fact that VPN usage harms any business based on personal data harvesting and reselling as well as detailed profiling. This is a typical case for social networks. Many of them by ToS forbid you from connecting from VPN or behind any anonymous layer, but there are many other sites basing their business on personal data and profiling, therefore a VPN (or Tor) is a threat to their own business and they try to discourage usage. In several cases you must make a choice between access and privacy as some services will do all they can to convince you to connect renouncing to your privacy. This is not the case for some service, e.g. your bank or your government services based on your identity, which already know your personal data and/or your identity obviously. For the readers, many years ago @LZ1 wrote this article, which we remind everyone to read: https://airvpn.org/forums/topic/18555-is-a-website-blocked-then-check-this-guide-first-feedback-appreciated/ Kind regards
  18. Hello! For the readers: customer @Sara Mize resolved the problem which was caused by a concurrent third party VPN connection already running before Eddie was launched. Kind regards
  19. Staff

    Google Authenticator

    Hello! Definitely, that reference to Google Authenticator was an old remnant of board's scrambled text. Please verify that everything has been fixed properly now. Thank you for the head-up. Kind regards
  20. Staff

    Google Authenticator

    Hello! Google Authenticator has become closed source software (proprietary freeware) recently. It was open source software for a decade or so, and then it was closed, bad decision in our opinion. So you might (should?) prefer anyway an open source alternative. See also: https://en.wikipedia.org/wiki/Comparison_of_OTP_applications The potential correlation you talk about, which can happen with any TOTP based application, could come from the unlikely comparison between your secret shared key if you have your device stolen/seized and decrypted/cracked, and all the secret shared keys stored in AirVPN, if they are at the same time stolen or seized. But then this would only prove that you are an AirVPN customer, not how you used AirVPN. Also remember that you don't need a mobile platform and/or an Android system to use an OTP based application. Kind regards
  21. Staff

    Google Authenticator

    In your fantasy world only. In AirVPN 2FA is based on TOTP https://en.wikipedia.org/wiki/Time-based_one-time_password which does not require any Google app and does not require any phone number. TOTP is an open protocol described by IETF in RFC 6238
  22. Hello! The alien VPN interface causes a critical error to OpenVPN. Please see here for a quick and effective solution: https://airvpn.org/forums/topic/56643-stuck-in-a-broken-route-never-connects/?do=findComment&comment=225323 Kind regards
  23. Hello! You will receive a reply soon, unfortunately no solution was found in these 11 days to the problem you mentioned in the ticket so the support guys were still trying something else. We we swiftly proceed to your 2nd request according to your instructions. Kind regards
  24. Hello! Please open a ticket to have support in French. Veuillez ouvrir un ticket, vous obtiendrez de l'aide en français, merci. Ce forum est uniquement en anglais afin d'éviter toute confusion causée par des langues différentes. Kind regards
  25. Please open a ticket to have support in French. Veuillez ouvrir un ticket, vous obtiendrez de l'aide en français, merci. Ce forum est uniquement en anglais afin d'éviter toute confusion causée par des langues différentes. Kind regards
×
×
  • Create New...