Jump to content
Not connected, Your IP: 216.73.216.205

Staff

Staff
  • Content Count

    11395
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1982

Everything posted by Staff

  1. Hello! Your account does not have a valid subscription so you can't use it to connect to VPN servers. If you experience problems to purchase a plan please open a ticket at your earliest convenience by clicking "Contact us" on the web site or by writing to support@airvpn.org Kind regards
  2. Hello! All the dc SLAs are within 24 hours except for hardware failures, which can vary according to hardware replacement availability. The problems in Los Angeles are being tackled and you will see relevant news in a few weeks. We will also take care of Phoenix area if necessary. In general the North American infrastructure has grown remarkably in the last weeks and months. For example, 10 Gbit/s servers have been added in Toronto, New York City, Los Angeles and Denver (this last one with 3 Gbit/s guaranteed). As usual infrastructure modifications will closely follow bandwidth demand and amount of users in specific areas. Kind regards
  3. Hello! Thank you very much. Sabik, Merope and Alkes IP addresses are already located in Los Angeles, in the IANA / ARIN databases, so any geo-location database which reports otherwise is poorly maintained. However, we have decided (breaking news 🙂 ) that those servers will be withdrawn in early 2024 and replaced by more powerful hardware in the LA area (please follow the "News" forum in the next weeks). Kind regards
  4. Hello! The server features a 10 Gbit/s NIC connected to a 10 Gbit/s port. 3 Gbit/s (full duplex) are guaranteed and unmetered. Fully burstable to 10 Gbit/s best effort, 3 Gbit/s (full duplex) commitment 100% guaranteed. Kind regards
  5. @88incher Hello and thank you! Yes, we recommend a prompt update of OpenSSH, of course. If you need OpenVPN over SSH to our servers, we assure you that updates are performed frequently so the update will be applied soon, when it is available in the official repository. Remember that the update must be applied even client side. Anyway, remember that the OpenVPN client, at a first analysis, can't be fooled by this method: if you have connected via SSH, by running a vulnerable SSH client and library, to some entity in the middle which pretends to be us by exploiting the vulnerability, that entity will fail to mimic an OpenVPN connection to one of our servers, because it lacks the proper certificates and keys. On the client side you will be able to establish an SSH connection to the attacker machine (provided that you run a vulnerable ssh), but then OpenVPN will fail to connect. Kind regards
  6. Hello! This is exactly what we do, if you read the mission page you can see it, including the organizations we support through 1) active infrastructural management, 2) monetary support and 3) logistic support with free access. We also support services which are technical, essential platforms for media outlets or single individuals to exercise freedom of expression. Freedom of speech is explicitly mentioned in the mission as we already wrote with the citation in our previous message. Kind regards
  7. Awesome, can't wait! Hello! 2023 Christmas deal is live! Kind regards
  8. Hello! The current information unfortunately are insufficient to tell something effective. As a preliminary suggestion, please make sure that your VPS has tun support enabled. This support must be enabled on the host hypervisor, so it's up to your VPS provider to make sure that the VPS supports a "tun" VPN interface (without it, OpenVPN and WireGuard can't work). Please open a ticket, the support team will ask you for additional information and reports to diagnose the problem both on your PC and VPS and offer a possible solution. In order to open a ticket you can click "Contact us" or write to support@airvpn.org. Do not add insults anyway, the support team is instructed to ignore tickets with insults and forward them to us, so you will only waste a lot of time. Of course the thread remains open to allow community members to reply to help you, if they wish so. Kind regards
  9. Hello! Let's verify whether changing connection mode helps or not, just in case the ISP is interfering with UDP and/or OpenVPN: from Eddie's main window please select "Preferences" > "Protocols" uncheck "Automatic" select the line with OpenVPN, protocol TCP, port 443, entry-IP address 3 (three). The line will be highlighted click "Save" and test again connections to various servers Kind regards
  10. Hello! Totally correct. AirVPN forums ("News", "How-To" and "Databases") are technical and service forums where a new thread can be started only by AirVPN staff. "News" is restricted to announcements and news regarding AirVPN and its infrastructure, "How-To" is restricted to guides for the customers, and "Databases" pertains to geo-routing db as well as residential ISPs around the world, to report their behavior and blocks against VPN or Tor. So they are totally inappropriate for any "free speech" purpose. The community forums are a gift of AirVPN to the community, mainly managed by the community itself with self-proposed, voluntary moderation. AirVPN basically provides the infrastructure and cover its expenses. Ads are forbidden, netiquette is enforced, but we do not monitor these forums closely, except for "Troubleshooting", dedicated to technical problems and their resolutions, where we can intervene (if we have the time) before the professional support team is involved through a ticket. However most problems are resolved by the community itself without our intervention. Of course you can't abuse the community forums for generic "freedom of speech" as they would lose their purpose: community member support by other community members. They could also become unreadable if all topics were allowed! In the community forums you also find the "Off-Topic" forum where you can post various arguments, even not specifically related to AirVPN. Ads prohibition and netiquette enforcement stay even in "Off-Topic" of course. More in general, we provide you with an infrastructure to aid free speech trough a layer of privacy and even anonymity, as anonymity as been recognized both by the UN and by the USA Supreme Court as an essential tool in order to exercise freedom of expression and information. We also support or supported monetarily other tools which aid directly freedom of speech, such as PeerTube, Mastodon, Tor, and organizations which support freedom of speech (for example EDRi and EFF). All of the above is in accordance with our mission https://airvpn.org/mission : it's not in our mission to maintain and deliver directly tools to exercise freedom of expression, but it's in our mission to "Deliver a service capable of providing a strong anonymity layer in order to exercise the Right to Remain Anonymous (*), which has been widely recognized as a key to freedom of speech". Specialization is essential in this case given our resources: do one thing and do it well. If we dispersed our resources in more and more projects with too many purposes, we might end up being ineffective in all areas. Kind regards
  11. @ScanFarer Hello! New 10 Gbit/s full duplex server has been added in Los Angeles. Another server with high bandwidth has been added in Denver (Colorado) with a 10 Gbit/s interface and port and 3 Gbit/s bandwidth (full duplex) guaranteed, burstable to 10 Gbit/s. https://airvpn.org/status Kind regards
  12. Hello! We're very glad to inform you that a new 3 Gbit/s (full duplex) server located in Denver, CO (USA) is available: Sadachbia. Sadachbia supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637 and 47107 UDP for WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server. You can check the status as usual in our real time servers monitor: https://airvpn.org/servers/Sadachbia Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Staff
  13. @HenningAlexander Hello! Apparently the router or the implemented ovpn-client does not support IPv6. Please check. If the problem persists even when IPv6 is supported, what happens if you connect over IPv4? Kind regards
  14. Hello! We're very glad to announce a special promotion on our long terms Premium plans. You can get prices as low as 2.20 €/month with a three years plan, which is a 68% discount when compared to monthly plan price of 7 €. You can also send an AirVPN plan as a gift: you have the option to print or send a colorful, dedicated picture with the code to activate the plan. You can do it in your account Client Area -> Your membership: Purchase and credit -> Print X-Mas after you have bought a coupon. If you're already our customer and you wish to stay aboard for a longer period, any additional subscription will be added on top of already existing subscriptions and you will not lose any day. Please check plans special prices on https://airvpn.org and https://airvpn.org/buy Promotion will end on January the 8th, 2024 (UTC). Kind regards & datalove AirVPN Staff
  15. Hello! We're very glad to inform you that a new 10 Gbit/s (full duplex) server located in Los Angeles (California, USA) is available: Saclateni. Saclateni supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server. You can check the status as usual in our real time servers monitor: https://airvpn.org/servers/Saclateni Do not hesitate to contact us for any information or issue. Kind regards and datalove
  16. Hello! Can you please open a ticket? We need to investigate this issue more thoroughly as we detected an apparent anomaly after a ticket by a different user with identical route outside problem even when the IP addresses were correctly entered. NOTE: if you are the same person and you opened a ticket from a different account, can you please reply to the support team? They are waiting for an important information from you since days ago and they have not received any reply. You need to re-start the VPN connection. Kind regards
  17. Hello! Yes, stay tuned! Kind regards
  18. Hello! For the readers, the problem has been explained, simply AROU666 does not have and has never had access to the VPN servers. 😲🤨 The community forums are open to everyone, not only to users with a valid VPN access plan. Kind regards
  19. Hello! All servers except Metallah (Pennsylvania, USA) support IPv6. IPv6 malfunctions in datacenters are more frequent than IPv4 malfunctions, but our server monitor will detect them and a server with IPv6 problems will become "yellow" (ongoing problems) or "red" (inaccessible). Kind regards
  20. Hello! Please keep using WireGuard and modify the MTU size through the "MTU = n" directive, where n is in bytes. For each size re-start the connection and test the performance thoroughly. Consider at least a couple of VPN servers located around your node and maintain them to cross-test consistently. To modify the MTU size please edit (with any text editor) WireGuard's configuration file and add a line in the [Interface] section. Start with: MTU = 1280 then go up at 20 bytes steps (1300, 1320, 1340, ..., 1420). Do not exceed 1420 at the moment. If you see a performance improvement, keep going up. When you see a performance degradation, fine tune between the last and the current value. If you see poor performance regardless of the MTU size, consider to switch to OpenVPN in TCP mode, in case UDP is capped in your network. Kind regards
  21. Hello! It is probably impossible for the community to give you a problem solving suggestion with the current information and maybe someone will ask you for more info, such as your system name and version, the log of the program you run to connect to the VPN and so on. Please feel free to open a ticket in the meantime (by clicking "Contact us" on the web site or by writing to support@airvpn.org) to receive assistance directly from the "AirVPN Support Team". Kind regards
  22. Hello! Relevant vulnerabilities affect OpenVPN from 2.6.0 to 2.6.6, from 2.5.0 to 2.5.2, and 2.5.6 (as well as multiple openvpn-connect versions, not relevant here), but not 2.5.5. https://www.cvedetails.com/vulnerability-list/vendor_id-3278/Openvpn.html Do you have any breaking news on OpenVPN 2.5.5? Kind regards
  23. Hello! We see two different problems. Please see here for an explanation and a quick solution of the first problem: https://airvpn.org/forums/topic/56657-cant-connect-to-anything/?do=findComment&comment=225418 The second problem seems related to IPv6. Maybe your ISP does not support it, or the first problem is causing the second one too. If the solution to the first problem does not solve the second one, please go back to the default setting. You have forced Eddie to connect over IPv6 in "Preferences" > "Networking" window. Switch the "Protocol used for connection" combo box back to "IPv4, IPv6" (currently you have set it to "IPv6, IPv4"). Kind regards
  24. @Koalaman Hello! Even better now. And yes, 396 Mbit/s in download is expected from New Zealand servers (consider that on the server 2x bandwidth is needed). It's anyway a good performance in general in our infrastructure. The upload speed is very close to max capacity (40 Mbit/s) so it's perfect now. Kind regards
  25. Hello! With connection timeout (error 110) the port tester did not receive any reply. With connection refused (error 111) the connection was reset (packet "actively rejected") by your node (with error 111 you know for sure that the packet reached your client). In both cases you must make sure that the docker is configured to accept unsolicited packets on the proper ports and that the respective listening programs are really running and listening to the correct ports. Furthermore, no packet filtering tool must block incoming packets. Support team is available if you need official support. In this case, if you decide to open a ticket, it may be useful that you include the docker-compose file and the list of the programs which should receive (and reply to) the incoming packets. Kind regards
×
×
  • Create New...