Jump to content
Not connected, Your IP: 216.73.216.7

Staff

Staff
  • Content Count

    11386
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1978

Everything posted by Staff

  1. Hello! We regret to inform you that we will be discontinuing the service to residents of Italy as of February the 19th, 2024. From the above date, any user registering on the platform must declare that he/she is not a resident of Italy. The purchase page will have IP address-based geolocation and will not be served to IP addresses located in Italy. We will not interrupt the service to current subscribers until the natural expiry date and the refund policy will be granted as usual. REASONS FOR DISCONTINUATION The so-called "Italian Piracy Shield" is a legal framework with implementing regulation by AGCOM (Italian Telecommunications Authority) that forces operators offering services in Italy to block access to end services through IP blocking and/or DNS poisoning. The list of IP addresses and domain names to be blocked is drawn up by private bodies authorised by AGCOM (currently, for example, Sky and DAZN). These private bodies enter the blocking lists in a specific platform. The blocks must be enforced within 30 minutes of their first appearance by operators offering any service to residents of Italy. There is no judicial review and no review by AGCOM. The block must be enforced inaudita altera parte and without the possibility of real time refusal, even in the case of manifest error. Any objection by the aggrieved party can only be made at a later stage, after the block has been imposed. For further details: https://www-wired-it.translate.goog/article/piracy-shield-agcom-piattaforma-streaming-pirata-calcio-segnalazioni/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp The above requirements are too burdensome for AirVPN, both economically and technically. They are also incompatible with AirVPN's mission and would negatively impact service performance. They pave the way for widespread blockages in all areas of human activity and possible interference with fundamental rights (whether accidental or deliberate). Whereas in the past each individual blockade was carefully evaluated either by the judiciary or by the authorities, now any review is completely lost. The power of those private entities authorized to compile the block lists becomes enormous as the blocks are not verified by any third party and the authorized entities are not subject to any specific fine or statutory damage for errors or over-blocking. By withdrawing service availability from Italy, AirVPN will be able to stay outside the scope of the framework and maintain integrity and efficient operations. We certainly sympathise with our fellow Italian citizens, and we will be happy to offer advice and alternatives. We would also like to remind them of our more than ten years of support for the Tor network, which is freely accessible even from Italy, and which is becoming increasingly reliable and fast thanks to a myriad of small contributions like ours. Kind regards and datalove AirVPN Staff
  2. Hello! Unfortunately not, you need Eddie 2.23.2 or higher version. Kind regards
  3. @kbps Thank you. Very puzzling, we can just confirm that from our testing lines in Holland and Italy the performance we get while connected to UK M247 servers is very similar to the best performance you got on the screenshot you sent us. We use WIreGuard with 1320 bytes MTU. Mullvad software forces 1280 bytes, please try with 1280 bytes MTU when you connect to our servers too. To change MTU in Eddie Desktop edition (2.23.2 or higher version required) open the "Preferences" > "WireGuard" window. If you use WireGuard configuration file, please edit it with any text editor and add in the [Interface] section the following line: MTU = 1280 Test also bigger MTU up to 1400 bytes. Kind regards
  4. @organicchocolate Hello! Your setup is fine. On your side you may either use WireGuard or OpenVPN. You can't use them at the same time on the same machine. In many cases WireGuard can provide higher performance especially on devices without AES-NI acceleration, such as your iPhone. WireGuard kernel module, which plays an important role to make WIreGuard faster than OpenVPN, is not available in macOS, so you may also compare in your Mac OpenVPN vs. WireGuard and pick the one which can provide the better performance. Kind regards
  5. Hello! Since WireGuard works, we can rule out that the problem is caused by a general block against UDP. Possible causes include a selective block by your ISP (UDP to certain ports, or OpenVPN in itself) or a local problem with OpenVPN and/or OpenVPN adapter We see that you have a DCO adapter, probably installed by openvpn-connect: this adapter is incompatible with OpenVPN versions older than 2.6, like the one packaged with Eddie Windows edition and may be the source of the problem. Useful clues may come from a system report generated by Eddie: Kind regards
  6. Hello! Server load is indeed, and it has always been, one of the variables which are taken into calculation to determine the server rating and therefore recommend a server over another. Furthermore we have other inner variables which are monitored and are indicative of a server overload. In extreme cases yes, a server may be even closed to new connections due to overload, nothing new here. Such events are quite rare. Where does this assumption come from? There's no evidence that OpenVPN users are slowing down WireGuard users. The problem is mainly on the OpenVPN client side, as users running OpenVPN on agnostic networks and/or on devices not supporting AES-NI might be unable to reach the performance which they would enjoy with WireGuard. Again, whether or not prioritizing WireGuard over OpenVPN on the client side through our software default settings is not a problem due to OpenVPN stealing CPU time to WireGuard on server side (as incorrectly understood by @ms2738 too, we see now), as all servers have plenty of CPU available time for WireGuard, but a problem of customer satisfaction (in our previous message we mentioned the pros and cons which make the choice non trivial). Kind regards
  7. @kbps @rabbit Hello! As promised we monitored the UK servers but again we did not notice any anomaly. This is what we see in the worst conditions, during peak times, from a variety of datacenters in Europe (connection through WireGuard, OS Linux or FreeBSD) to the servers in UK: More or less it's the same on all servers, during peak times. We see more than decent throughput and no significant asymmetry between upload and download. Maybe it's a problem only with peering with some ISP. We publish this not to rule out the option to have another provider in the UK, but just to show that according to our tests and monitoring there is no capping or congestion on the M247 side. @Atien That's not surprising, because the NL servers lines go directly to AMS-IX, so the probability that any other server in Europe can seriously compete with them while having connections from a residential ISP is moderate. Kind regards
  8. Hello! We will look into the issue together with the developer. Your case is peculiar as you enforce a white list of a single server, so it is equivalent to specify the connection to a single server directly and not to a country and not in quick mode. You can be right, the manual may document more thoroughly the interaction and/or the program could manage the situation differently. Something under this respect was planned anyway, please feel free to test next releases of the Suite 2 preview: Kind regards
  9. @ScarAtlas @roklipni @S.O.A. Hello! Please open a ticket and/or your own thread. The problem in this thread has been resolved so you might have a different problem. What's more, each one of you might have a different problem. Adding your messages in this way in a thread which already solved the original problem might probably lead you nowhere unfortunately. Kind regards
  10. Hello! Unfortunately not. This option has been deliberately disabled by Google in Android TV systems (from version 9 if we're not mistaken). On some manufacturer's devices, apps can be launched during the bootstrap through a launcher/boot app running on high privileges but, as far as we know (we would be happy to be corrected if we're wrong), that's not possible with Sony Bravia. The second behavior (hung -> blank screen -> restart without connection) sounds like a bad crash. Please send us (either here or in a ticket to the support team) the complete report. It will contain the logcat too, so it may provide us with valuable information to understand what happened. To send us the log and logcat: open the settings view tap the paper plane icon on the top note down or copy to the clibpoard the URL that the app will give you back send us or the support team the URL Kind regards
  11. Hello! Just for a definitive confirmation, your account is not banned and has no limitations whatsoever. It must be a local problem. In the following thread, two users with this problem found out that it was caused by BitDefender: https://forums.openvpn.net/viewtopic.php?p=120189 Can you check, if you run BitDefender? Kind regards
  12. Hello! Yes, this problem was reported on 2.21.6, as the OP correctly specified. Do you still experience this problem on 2.21.8 and/or 2.23.2? Kind regards
  13. @Rmanso33 Hello! Eddie "Network Lock" modifies firewall rules to prevent traffic leaks outside the VPN tunnel. The blocking rules are not permanent. Even if Eddie's exit is not clean, you can flush firewall rule or you can reboot the system to solve the problem. If Eddie was running with Network Lock on, then it was doing its job. An additional step to improve compatibility with any software is disabling Fast Startup on Windows: https://www.windowscentral.com/how-disable-windows-10-fast-startup If Eddie's exit is not clean, you will need to check DNS settings as well, because VPN DNS is not accessible from outside the VPN and it will remain set even after a reboot. You can fix by re-running Eddie and shutting down it properly, or you can operate manually: https://www.windowscentral.com/how-change-your-pcs-dns-settings-windows-10 You're not forced to run Eddie to connect to AirVPN servers. In this page you can find various alternatives: https://airvpn.org/windows/ Another software for Windows which recently has received a remarkably good feedback by AirVPN users (although it is not open source) is WireSock, please see here: https://airvpn.org/forums/topic/57174-how-to-correctly-use-the-routes-tab-to-only-route-the-torrent-client-through-eddie/?do=findComment&comment=228744 Kind regards
  14. @salvialight Hello! You need to install resolvconf. We're not sure it's available for your Ubuntu / Pi OS version in the official repositories though. Worth a try: sudo apt update sudo apt install resolvconf wg-quick runs resolvconf to manage DNS properly. Side note: please send text and not screenshots whenever possible (in your previous message you could just copy and paste the text in the terminal). Kind regards
  15. Hello! In this case you had better go directly with wg-quick and not nmcli. https://airvpn.org/linux/wireguard/terminal/ Kind regards
  16. Hello! Should you need to install WireGuard in the future on a Raspberry Pi OS, consider that it's a Ubuntu based system, so you can handle the matter just like you would do in Ubuntu. Proceed to install WireGuard components: sudo apt install wireguard WireGuard userspace utilities will be installed too, so you can then proceed with our instructions starting from step 2: https://airvpn.org/linux/wireguard/terminal/ Kind regards
  17. Hello! Can you tell us the laptop Operating System name and version? Kind regards
  18. @AntairVPN Hello! Can you please switch to WireGuard and check whether the same problem occurs or not? In order to switch to WireGuard: from Eddie's main window please select "Preferences" > "Protocols" uncheck "Automatic" select any line with WireGuard. The line will be highlighted. click "Save" and re-start a connection to apply the change please make sure to test a few servers in different locations around your node If the problem persists, disable the route check, just in case the failure is a false positive: from Eddie's main window select "Preferences" > "Advanced" uncheck "Check if the Air VPN tunnel works" click "Save" enable "Network Lock" from the main window from Eddie's main window select "Preferences" > "DNS" uncheck "Check Air VPN DNS" click "Save" test again Kind regards
  19. Hello! With the current information unfortunately we can't say what you should look into. Try to open a ticket and investigate together with the support team. Let them know your Operating System, the browser you run, the software you use to connect to VPN servers... probably they will ask you for even more info in an attempt to understand the cause of the problem. Kind regards
  20. Hello! We have just tested Nahn, Pisces, Telescopium, Titawin and Sham. https://yahoo.com is perfectly reachable from all of them. The connections were performed via WireGuard and the VPN DNS (10.128.0.1) correctly resolves the name. No block of any kind has been detected. More and more it sounds like your own local problem, let's see the feedback from other users. Note that in the route checker, "301" is correct (although it is questionable that the checker displays it with a red token), as yahoo.com replies "moved permanently" to ca.yahoo.com (re-direction is fine). Kind regards
  21. @madrat Hello! Can you give us the name of those servers you can't access yahoo.com from? Kind regards
  22. @salvialight Hello! Please note that you resurrected an 8 years old thread. Many things have changed in the meantime. The alleged problem heavily depends on the DNS management of the software you run to connect. In general, WireGuard, Eddie (the Air software client) and the AirVPN Suite for Linux do that, while OpenVPN does not. Note: if your system runs systemd-resolved only Eddie 2.23.1 and newer versions added full support with proper DNS management for every systemd-resolved working mode. For manual DNS setup purposes, since you mention Pi OS we guess that it's the latest Pi OS based on Ubuntu 22/23, so you can consult Ubuntu, or general Linux, and systemd-resolved guides on DNS settings. Also note that only with the introduction of some new systemd-resolved "on link" working modes the "DNS leaks" plague entered the Linux world, while previously it was a Windows-only pest. Before systemd-resolved specific working modes were activated by default in various distributions, DNS leaks did not exist in Linux. it seems no accident that shady pestilence spreaders who infect Linux with endemic Windows plagues then end up hired by Microsoft. Kind regards
  23. Hello! The following errors thrown by OpenVPN: . 2024.01.28 17:17:24 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.01.28 17:17:24 - OpenVPN > write UDP: Unknown error (code=10065) . 2024.01.28 17:17:24 - OpenVPN > write UDP: Unknown error (code=10065) hint to something blocking UDP and/or OpenVPN packets. Please check any packet filtering and traffic management tools both on your system and router and make sure you remove any such block. Also test a connection over WireGuard to discern whether the block is against UDP or against OpenVPN specifically. To switch to WireGuard: from Eddie's main window please select "Preferences" > "Protocols" uncheck "Automatic" select any line with WireGuard. The line will be highlighted. click "Save" and re-start a connection to apply the change Please make sure to test various servers in different locations. Kind regards
  24. Hello! Is that the complete error message, no additional info? Can you tell us the Operating System and whether the configuration file pertains to OpenVPN or WireGuard? Which OpenVPN or WireGuard version do you run? Kind regards
  25. @air92186 Hello! We fear that Gluetun's server list is hard coded here: https://raw.githubusercontent.com/qdm12/gluetun/master/internal/storage/servers.json Saclateni is not included in that list, maybe the list must be updated manually? To avoid hard coded lists a developer could parse the AirVPN manifest. How to download and how to parse the manifest must be seen on Eddie Android (Java) or AirVPN Suite (C++) source code, which is (in our opinion) very readable and well commented. A developer could also use the Bluetit daemon (developer's reference manual available here) for all the needed operations for a full integration with AirVPN (Bluetit exposes a D-Bus interface), although the integration requires that the target functions and/or classes are developed according to the AirVPN–SUITE classes marshaling mechanism (thoroughly documented anyway). However, there is no official document describing the manifest format and the procedure to download it from the bootstrap servers, we're sorry. We might plan a fully documented API for third party developers so they don't need hard coded lists of servers and IP addresses, or we might document the manifest download procedure and its format... we'll think about it. Kind regards
×
×
  • Create New...