-
Content Count
11488 -
Joined
... -
Last visited
... -
Days Won
2022
Everything posted by Staff
-
Hello! Yes, a problem with the network interface arose, we're sorry. We are bringing the server down. We will work with the datacenter technicians to resolve the issue. Kind regards
-
Hello! We're very glad to inform you that a new 10 Gbit/s full duplex server located in Toronto (Ontario, Canada), is available: Kornephoros. The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. Kornephoros supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the status as usual in our real time servers monitor . Do not hesitate to contact us for any information or issue. Kind regards & datalove AirVPN Staff
-
Hello! When VPN_SERVICE_PROVIDER is set to airvpn the optional environment variables deciding the end point are: SERVER_COUNTRIES: Comma separated list of countries SERVER_REGIONS: Comma separated list of regions SERVER_CITIES: Comma separated list of cities SERVER_NAMES: Comma separated list of server names SERVER_HOSTNAMES: Comma separated list of server hostnames https://github.com/qdm12/gluetun-wiki/blob/main/setup/providers/airvpn.md If you feel that this is a bug or unexpected behavior (we see your point: WIREGUARD_ENDPOINT_IP should not be ignored when a non-generic VPN provider is selected, as it apparently happens in your case), the matter should be reported to GlueTun's developer. Please keep in mind that GlueTun is fully compatible and well integrated with AirVPN but it is not developed by AirVPN so every issue should be reported properly also here: https://github.com/qdm12/gluetun-wiki/issues Kind regards
-
Hello! Your setup is fine and we can reach your listening software through the port that you remotely forwarded. If you need more ports please make sure to pick a free port (the proper tools on the bottom of your AirVPN account port panel will let you find free ports) or just let the system pick a free one for you by leaving the "Port number" field blank and clicking the '+' button. Kind regards
-
Hello! Thank you! No reason apart from obsolescence of the announcement. Build is anyway for M1. Kind regards
-
I am also interested in this, but I didn't get it working. Could you please provide more details on how to set it up? A few snippets for the Powershell would be very helpful. Allowing DHCP traffic out, seems to be an default rule with Windows 10. Hello! Something like this will do the trick, starting from a clean status and Windows Firewall enabled. Make sure you operate from a Powershell with administrator privileges. The rules will survive at reboot. You must adjust your local network address/netmask (change 192.168.0.0/16 and fe80::/10 if necessary). Do not proceed if you don't understand exactly every single command; instead, get documented first. netsh advfirewall firewall add rule name="Allow DHCPv4" protocol=UDP dir=out localport=67,68 action=allow netsh advfirewall firewall add rule name="Allow DHCPv6" protocol=UDP dir=out localport=546,547 action=allow netsh advfirewall firewall add rule name="Allow Local IPv4 Network" protocol=TCP dir=out remoteip=192.168.0.0/16 action=allow netsh advfirewall firewall add rule name="Allow Local IPv6 Network" protocol=TCP dir=out remoteip=fe80::/10 action=allow netsh advfirewall firewall add rule name="Allow Localhost Outbound" dir=out action=allow remoteip=127.0.0.1 netsh advfirewall firewall add rule name="Block All Other Outbound Traffic" dir=out action=block protocol=any You may also consider to backup the rules and enable them only when needed, instead of keeping them permanent. Check your system manual to do this. Kind regard
-
Hello! Yes, perfectly possible. Just configure your application(s) to connect to your proxy and use it/them while the system is connected to the VPN. Kind regards
-
@Hitotsume Hello! Traffic splitting on a destination address basis is not implemented in the Suite and as a consequence exceptions to Network Lock are not available from the options: you would need to add specific rule(s) after the lock has been enforced. However, in your case this is not necessary as Network Lock already allows local networks. Furthermore, the Suite may take care to avoid VPN traffic tunneling into the local network even with WireGuard (default behavior). The behavior can be set through the specific option allowprivatenetwork as you might already know from the manual: * allowprivatenetwork (yes/no) Control how the local and private network traffic can pass through the Network Lock. When disabled, only VPN traffic is allowed through the Network Lock. When enabled local and private network traffic, as well as VPN traffic, is allowed to pass through the Network Lock. Default: yes Please note that WireGuard support and configuration of Network Lock behavior for local network are implemented on AirVPN Suite 2.0.0, currently available as Release Candidate 2: https://airvpn.org/forums/topic/66706-linux-airvpn-suite-200-preview-available/ AirVPN Suite 2.0.0 also implements traffic splitting on an application basis. Although not required in your specific case, since from your description it sounds like you need to connect to sshd only locally, in various scenarios per app traffic splitting may be more useful and/or a valid replacement of traffic splitting on a destination basis. In your case, if you need to have sshd traffic outside the VPN tunnel (i.e. you explicitly want to leak SSH traffic outside the VPN tunnel so that you can reach sshd from the Internet without pointing to AirVPN server addresses and without AirVPN remote port forwarding) it's preferable to just split ssh traffic (read the 2.0.0 user's manual to achieve in a very simple way this purpose if it is necessary). Kind regards
-
Hello! We're very glad to inform you that Hummingbird 2.0.0 Release Candidate 2 is now available for macOS, both for Intel and M1/M2/M3 based systems. The links to the latest RC 2 and the main changes have been updated in the first message of this thread. This version does not differ from RC 1: RC 2 is out just for cross platform versioning consistency. Kind regards
-
Hello! We're very glad to inform you that AirVPN Suite 2.0.0 Release Candidate 2 for Linux is now available. The original post is updated to show the new download URLs. The important improvements over RC 1 are: Cuckoo's design flaw has been fixed. Now cuckoo can be run when no graphic environment is installed added check and warning to clearly inform the user when firewalld is configured to be the exclusive owner of its tables / chains / rules in case VPN is busy in a pending process (such as reconnecting) stop_connection command is not performed by Bluetit, thus avoiding potential problems a few changes to greatly improve network management during sessions based on WireGuard libxml2 is now statically linked. This pondered decision was driven by various problems caused by a few Linux distributions inconsistencies with established practices and standards linked against the new OpenVPN3-AirVPN 3.12 library Special note for firewalld users Please read here, it's very important: https://airvpn.org/forums/topic/70164-linux-network-lock-and-firewalld/ Please note that compatibility with Debian 10 and its derivatives, that reached end of long term support and end of life on June 2024, is lost even for the legacy version, mainly because the Suite is now C++20 compliant. The legacy version remains suitable for Debian 11 and its derivatives. Kind regards
-
What is the AirVPN suite, and why would I need it?
Staff replied to chikuwasuka's topic in General & Suggestions
@arcanapluvia Hello! The AirVPN Suite offers complete integration with the AirVPN infrastructure, a client/daemon architecture, connections via OpenVPN3-AirVPN and WireGuard, Network Lock compatible with any currently available Linux firewall, per app traffic splitting, synchronous and asynchronous modes, and several other features that you don't have with the native OpenVPN and WireGuard clients. As far as we can evaluate from the feedback the most required features are the infrastructure integration, the Network Lock and the traffic splitting on an application basis, all available in a very light daemon with minimal RAM footprint. Please note that only the Suite 2.0.0 offers all of the above, and it is currently at Release Candidate stage: https://airvpn.org/forums/topic/66706-linux-airvpn-suite-200-preview-available/ Apart from the regular user, for the developer Bluetit exposes a D-Bus interface which can be used by client applications in order to control the daemon (thorough developer's manual included). So it is also instrumental to develop clients or have a deep look at how the infrastructure works. Normally you should be up and running in a couple of minutes. If you still experience issues with 2.0.0 version after you have read the user's manual please do not hesitate to open a ticket. Remember to declare your distribution name and version and if possible include a Bluetit log (for example if you are in a systemd based system you can extract it through journalctl). Kind regards -
Wireguard on iOS not opening .conf files from AirVPN
Staff replied to jhg23's topic in Troubleshooting and Problems
@jhg23 Hello! A plausible explanation is that the browser downloaded the whole page and not the actual profile. Please try with another browser or use the QR code with the aid of a computer. If a different browser solves the issue, can you please tell us which browser caused it? Kind regards -
ANSWERED airvpn.org broken DNSSEC trust chain
Staff replied to copykitty's topic in Troubleshooting and Problems
Hello! It's all pre-defined by GoDaddy and nothing can be configured on our side, unfortunately. We will query GoDaddy and warn them about the issue. We own and control authoritative DNS for almost all of our domain names but not for airvpn.org. to add redundancy. Kind regards -
Hello! Already explained in the previous post: enable Network Lock to allow connections to AirVPN infrastructure. Kind regards
-
Hello! Thank you for the feedback! That's our contribution to cover the expenses. Just check the price for each 10 Gbit/s full duplex unmetered dedicated line for 1 year to get an idea of expenses for the network traffic, then also consider the depreciation of 20 servers and their maintenance (hardware replacements, manpower maintenance hours...) over the years. It's not like managing a VPS with a few TB per month and a few Mbit/s shared line, and we're talking about exit nodes. Kind regards
-
Hello! If the private tracker IP address ended inside some geo-routing for whatever reason (accessibility, or because it is inside some address block that necessitates geo-routing) this behavior would get an explanation. Please disable geo-routing on your AirVPN account DNS panel by switching "AirVPN anti-geolocation system" combo box to "Not active", start a new connection and verify whether the problem disappears or not. Kind regards
-
@discov Hello! We removed the files attached to your message because they contained your private key. You should proceed to renew it immediately from your AirVPN account "Devices" panel. After that, in order to generate a configuration working with tls-auth, on the Configuration Generator simply select entry-IP address 1 after you have turned on the "Advanced" switch and you have selected "2.4" on the "Ovpn profile" combo box. Kind regards
-
Hello! The Suite distribution concept avoids any specific package manager for their excessive proliferation. Most of these package managers are incompatible with each other. We count nowadays 18 package managers on 800+ different distributions. Development team is committed to offering exclusively tarballs and an installation script written in sh to ensure compatibility with a wide range of distributions. Kind regards
-
@discov Hello! Thank you very much. OpenVPN 2.4 is the oldest supported version but you can try to use 2.4 profiles and a connection to entry-IP address 1 to avoid tls-crypt which is not supported by 2.3.x but it is mandatory on entry-IP addresses 3 and 4. Entry-IP addresses 1 and 2 still support tls-auth, supported by OpenVPN 2.3 as well. Also consider that OpenVPN 2.3.7 is affected by many bugs which can potentially interfere with the connection. Please try to upgrade, if possible, to OpenVPN 2.3.17, the latest release of 2.3 branch: https://community.openvpn.net/Changelogs/ChangesInOpenVPN23 If it is not possible to upgrade and you see from the log that the failure is caused by something related to IPv6, consider to disable IPv6 and refuse the IPv6 related push; you have this option on the Configuration Generator, or you can simply delete the following directives from the configuration file: push-peer-info setenv IPV6=yes Kind regards
-
Hello, addition, FTP servers need special configuration care due to data port allocation: https://airvpn.org/forums/topic/1700-ftp-server-and-client-on-air-vpn/?do=findComment&comment=1702 Kind regards
-
Hello! Please follow this preliminary checklist first and then report back:Kind regards
-
Hello! Today we're starting AirVPN 15th Birthday celebrations with big discounts on longer term plans. From a two servers service located in a single country providing a handful of Mbit/s, the baby has grown up to a wide infrastructure in 23 countries on four continents! AirVPN is now one of the few major consumer VPNs that is still independent. In other words, it is not owned by large corporations with diverse interests that interfere through editorial publications or conflict with privacy protection. Since our 14th birthday celebration, our customer base has grown impressively, and we would like to thank all the old and new customers who chose or confirmed AirVPN. AirVPN has focused on comprehensive enhancements, including: line and server expansion to accommodate the outstanding customer growth. The infrastructure can now deliver up to 970,000 Mbit/s. Compared to the 694,000 Mbit/s available in May 2024, this is a 39.7% increase in a single year yet another thorough rewrite of remote inbound port forwarding logic to offer greater convenience and true scalability. The new implementation was designed to meet the growing demand for remote inbound port forwarding the unlimited traffic quota for every and each customer subscription plan has never been modified On the software side: all AirVPN applications and libraries are free and open source software released under GPLv3 new, greatly improved Eddie Desktop and Eddie Android editions Eddie Android edition implements a new community request: an opt-in GPS spoofing feature integrated with the infrastructure in order to provide coordinates consistent with the location of the VPN server the device is connected to Eddie Desktop edition new version included several bug fixes and the new CLI edition is built on .NET7. Thus, it no longer needs Mono (Linux, macOS) and is built without Xamarin (macOS) the development of traffic splitting features on an application basis, already available in AirVPN Eddie Android and Android TV edition, and implemented on the AirVPN Suite for Linux last year, has been improved together with the new Suite features during the year long internal and community tests the OpenVPN3-AirVPN library is actively maintained as usual. If you're already our customer and you wish to extend your stay, any additional subscription will be added to your existing subscriptions and you won't lose any days. Check the promotional prices here: https://airvpn.org/buy Promotion will end on June the 12th, 2025 (UTC). Kind regards and datalove AirVPN Staff