Jump to content
Not connected, Your IP: 216.73.216.170

Staff

Staff
  • Content Count

    11390
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1979

Everything posted by Staff

  1. Hello! Since OpenVPN works, it is plausible that your ISP blocks WireGuard. If that's the case you must keep using OpenVPN only (or change ISP of course). You might like to get informed about the block / traffic management policy enforced by your ISP. To investigate on the Android side, please open a ticket at your convenience. Kind regards
  2. @AROU666 Hello! First and foremost please check the post set as best answer in this thread, the mentioned setting modification resolved the problem in other cases. In your specific case, you have an apparent double mis-configuration, as you keep even UPnP enabled, on top of NAT-PMP. Kind regards
  3. Hello! Yes, definitely. Stay tuned and follow the "News" AirVPN forum for updates. 😉 Kind regards
  4. @JebediahWolfe Hello! Once again we invite you to open a ticket. Other users in this thread have all resolved their problems when they did so. Kind regards
  5. @absolution Hello! New pieces of information from another thread:Kind regards
  6. @Aeto Hello! We're sorry, we do not offer SOCKS5 proxies. Please see also/again (thanks @ace0o0o ) https://github.com/qdm12/gluetun/issues/1523#issuecomment-1674569764 Kind regards
  7. @BettyIsBoop Hello! We're going to look into the issue. Since you get SERVFAIL, the mappy.fr authoritative DNS might be down or more probably it's blocking some or all of our VPN servers. Can you also tell us which VPN server(s) you experience this problem on? Kind regards
  8. @dshbfjdsaauj Hello! Something is not working properly, can we see Eddie's system report generated while the system is connected to the VPN? https://airvpn.org/forums/topic/50663-youve-been-asked-for-a-support-filesystem-report-–-heres-what-to-do/ Kind regards
  9. Hello! Try to see how Gluetun can know and reach your local DNS. Also check the following thread: https://airvpn.org/forums/topic/56915-very-rarely-getting-rogue-dns-servers-when-checking-for-dns-leaks/?tab=comments#comment-227164 You might also like to contact Gluetun community and support. Kind regards
  10. Hello! We're very glad to inform you that a new 1 Gbit/s full duplex server located in Chicago, IL (USA) is available: Praecipua. The AirVPN client will show automatically the new server. If you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts OpenVPN connections on ports 53, 80, 443, 1194, 2018 UDP and TCP, and WireGuard connections on ports 1637, 47107 and 51820. Just like every other Air server, Praecipua supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/Praecipua Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  11. Hello! We're very glad to inform you that a new 1 Gbit/s full duplex server located in Miami, FL (USA) is available: Minelauva. The AirVPN client will show automatically the new server. If you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts OpenVPN connections on ports 53, 80, 443, 1194, 2018 UDP and TCP, and WireGuard connections on ports 1637, 47107 and 51820. Just like every other Air server, Minelauva supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/Minelauva Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team
  12. @Koalaman Hello! Very well! Now you can perform an additional, slight fine tuning, by modifying little by little (e.g. 5 bytes steps) the MTU size and checking for each value. Kind regards
  13. Hello! For the readers: the problem was caused by OpenVPN 2.5 configuration files used on OpenVPN 2.3. Remember that OpenVPN 2.5 profiles broke backward compatibility with the addition of new directives and other modifications. If you need a file for OpenVPN 2.3 and 2.4 you must tell the Configuration Generator to generate a profile for OpenVPN 2.4 by setting "OpenVPN Type" comb box to the proper version. In case of OpenVPN 2.3 you must also take care to connect to entry-IP address 1 (ONE) because OpenVPN 2.3 supports only tls-auth, which is NOT offered on entry-IP addresses 3 and 4. If you have the chance to do so, anyway, please consider to drop obsolete OpenVPN versions and upgrade. Kind regards
  14. Hello! Correct, we can't know it. @Rodent The problem would perhaps arise only if the client is still connected and it was constantly and still is the only one connected to a VPN server (which is nearly impossible). Kind regards
  15. Hello! Probably no mistakes, it's just that your listening program listens to IPv4 address and not IPv6. Some programs do so by default, some programs can be configured to listen either to v4 or v6 IP addresses. Listening to IPv4 is normally preferred because most services and nodes still stick to IPv4, and those which use IPv6 can use IPv4 too, while some don't support IPv6 at all. Kind regards
  16. Hello! If we understand the problem correctly, it's because WireGuard tries to tunnel the whole IP address space, including the private subnets, in your current configuration (see line "AllowedIPs"). The following message explains the matter more thoroughly and shows how to solve it: https://airvpn.org/forums/topic/55801-wireguard-access-local-network/?do=findComment&comment=217458 Kind regards
  17. Hello! Please move here: https://airvpn.org/forums/topic/56980-japan-and-singapore-servers-mostly-blocked-by-reddit/?do=findComment&comment=227674 Kind regards
  18. Hello! Please click "Contact us" button while your account is logged in to the web site, or write to support@airvpn.org (specify your username in this latter case). Kind regards
  19. @p9974839 Google Search should never be used, but if you really want it, why not just use https://startpage.com ? Kind regards
  20. Hello! Please set a small MTU size as a first test. Try for example 1320 bytes. To do so add the following line in the WireGuard configuration [Interface] section: MTU = 1320 Also make sure that uTP is disabled in the torrent program settings, as it will shape traffic, and check your torrent program settings against the following guide: https://airvpn.org/faq/p2p/ Connection and torrent program must both be re-started in order to apply the changes. If the problem persists please try a direct connection from another device, just to rule out that the bottleneck is in the pfSense box and to make a comparison. Do you see packet errors in the OpenVPN log, when connected over UDP? Last but not least, please remember to open a ticket (if you haven't already done so) for AirVPN support (here you will get community support, so you might like to get both professional and community support). Kind regards
  21. @mazenahmed Hello! We see two problems. Please find first problem explanation and quick solution here: https://airvpn.org/forums/topic/56657-cant-connect-to-anything/?do=findComment&comment=225418 The 2nd problem might be a direct consequence of the first, let's see whether it gets resolved simply by fixing the DCO issue. If the 2nd problem persists please send again a system report (created with the new settings). Kind regards
  22. @Miracles Hello! Watch out, the mentioned data are not stored in the VPN system, but they are stored in PayPal servers and can be accessed by the account holders while entering the account. In this way it's still possible to verify through the transaction ID and deliver a refund, for example. Account holders can not delete such data and PayPal must preserve them for several years according to the legal frameworks concerning banks, payment processors, financial entities in general, anti money-laundering rules, of the countries PayPal operates in. With that said, we confirm that it's impossible, even for the data processor, to correlate any account with any VPN usage, not even with which server the account has been used for connections and we also confirm the validity of the ToS and the Privacy Notice. Kind regards
  23. Hello! We inform you that due to datacenter needs, Aquila VPN server (Fremont, California) has been assigned new IP addresses. If you use Aquila-specific configuration files please re-generate them. If you run Eddie (any edition), no specific action is required, Eddie will update data automatically. Kind regards AirVPN Staff
  24. Hello! This forum is specifically dedicated to reviews of AirVPN, please browse the various threads. Kind regards
  25. Hello! We don't deem those tests reliable at all. Why are they performed against servers in Malaysia (Kuala Lumpur and Puchong)? That's a questionable choice for our servers in New Zealand, Japan and Singapore. Try with comparison servers and VPN servers in the same country. The only correct choice was Sydney when you were not connected to the VPN. Trying OpenVPN makes sense in case WireGuard and/or UDP are shaped. In this latter case please make sure to test OpenVPN over TCP. Kind regards
×
×
  • Create New...