Jump to content
Not connected, Your IP: 216.73.216.120

Staff

Staff
  • Content Count

    11580
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    2060

Everything posted by Staff

  1. Hello! Socket buffers are essential both for TCP and UDP. In general it is a feature of sockets, in the OS TCP/IP stack in general, not something peculiar to OpenVPN. Buffers are essential in both connection-oriented sockets (TCP, SCTP...) and conectionless sockets (UDP). In general all sockets including raw sockets (those sockets which are used at IP layer) have two buffers, a read (aka receive) buffer and a write (aka send) buffer. A program (except for NIC kernel drivers ) doesn't read/write data from/to the NIC directly, it does it through the kernel's network stack. If sockets had no buffers, reading and writing would become too slow for any userspace application. Kind regards
  2. @snrtd Hello! Thank you, we are going to verify and look into the issue. @Flx HTTP is correct, the flow is encrypted inside HTTP. This solution offers a few advantages in specific networks, mainly corporate, school, college networks, where HTTPS is not accepted if you don't install root certificates (usually aimed at traffic inspection by MITM attacks by the college, corporate, school networks which want to monitor all the traffic content of their employees/students/teachers). In this way your credentials and AirVPN certificates/keys are protected even when your machine is compromised by fake root certificates. The method can also bypass some other blocks against HTTPS. The disadvantage is that if you're in a network which rejects HTTP completely or blocks HTTP with direct IP addresses (instead of names) then the Suite or Eddie fails to contact the bootstrap servers by default (but we offer custom bootstrap servers to be added in the run control file). Kind regards
  3. Hello! OK, we suspect that's irrelevant. What about the connection and the throughput? Kind regards
  4. @weelilbit Hello! Three servers in three different locations around your node should be more than enough. The problem unfortunately persists. Can you please test with Tunnelblick, just to make sure that the problem is not a specific block against Eddie (from some tool like LittleSnitch for example), or in general a specific Eddie related problem? Tunnelblick is a free and open source software for Mac, a wrapper and a GUI to OpenVPN, you can find instructions here: https://airvpn.org/macos/tunnelblick/ Kind regards
  5. Hello! Which Operating System and Eddie version are you running? If it's not 2.23.2, can you please test it too and report back? Please see here to download it: https://airvpn.org/forums/topic/56428-eddie-desktop-223-beta-released/ Kind regards
  6. Hello! Your account does not have a valid subscription so you can't use it to connect to VPN servers. If you experience problems to purchase a plan please open a ticket at your earliest convenience by clicking "Contact us" on the web site or by writing to support@airvpn.org Kind regards
  7. Hello! All the dc SLAs are within 24 hours except for hardware failures, which can vary according to hardware replacement availability. The problems in Los Angeles are being tackled and you will see relevant news in a few weeks. We will also take care of Phoenix area if necessary. In general the North American infrastructure has grown remarkably in the last weeks and months. For example, 10 Gbit/s servers have been added in Toronto, New York City, Los Angeles and Denver (this last one with 3 Gbit/s guaranteed). As usual infrastructure modifications will closely follow bandwidth demand and amount of users in specific areas. Kind regards
  8. Hello! Thank you very much. Sabik, Merope and Alkes IP addresses are already located in Los Angeles, in the IANA / ARIN databases, so any geo-location database which reports otherwise is poorly maintained. However, we have decided (breaking news 🙂 ) that those servers will be withdrawn in early 2024 and replaced by more powerful hardware in the LA area (please follow the "News" forum in the next weeks). Kind regards
  9. Hello! The server features a 10 Gbit/s NIC connected to a 10 Gbit/s port. 3 Gbit/s (full duplex) are guaranteed and unmetered. Fully burstable to 10 Gbit/s best effort, 3 Gbit/s (full duplex) commitment 100% guaranteed. Kind regards
  10. @88incher Hello and thank you! Yes, we recommend a prompt update of OpenSSH, of course. If you need OpenVPN over SSH to our servers, we assure you that updates are performed frequently so the update will be applied soon, when it is available in the official repository. Remember that the update must be applied even client side. Anyway, remember that the OpenVPN client, at a first analysis, can't be fooled by this method: if you have connected via SSH, by running a vulnerable SSH client and library, to some entity in the middle which pretends to be us by exploiting the vulnerability, that entity will fail to mimic an OpenVPN connection to one of our servers, because it lacks the proper certificates and keys. On the client side you will be able to establish an SSH connection to the attacker machine (provided that you run a vulnerable ssh), but then OpenVPN will fail to connect. Kind regards
  11. Hello! This is exactly what we do, if you read the mission page you can see it, including the organizations we support through 1) active infrastructural management, 2) monetary support and 3) logistic support with free access. We also support services which are technical, essential platforms for media outlets or single individuals to exercise freedom of expression. Freedom of speech is explicitly mentioned in the mission as we already wrote with the citation in our previous message. Kind regards
  12. Awesome, can't wait! Hello! 2023 Christmas deal is live! Kind regards
  13. Hello! The current information unfortunately are insufficient to tell something effective. As a preliminary suggestion, please make sure that your VPS has tun support enabled. This support must be enabled on the host hypervisor, so it's up to your VPS provider to make sure that the VPS supports a "tun" VPN interface (without it, OpenVPN and WireGuard can't work). Please open a ticket, the support team will ask you for additional information and reports to diagnose the problem both on your PC and VPS and offer a possible solution. In order to open a ticket you can click "Contact us" or write to support@airvpn.org. Do not add insults anyway, the support team is instructed to ignore tickets with insults and forward them to us, so you will only waste a lot of time. Of course the thread remains open to allow community members to reply to help you, if they wish so. Kind regards
  14. Hello! Let's verify whether changing connection mode helps or not, just in case the ISP is interfering with UDP and/or OpenVPN: from Eddie's main window please select "Preferences" > "Protocols" uncheck "Automatic" select the line with OpenVPN, protocol TCP, port 443, entry-IP address 3 (three). The line will be highlighted click "Save" and test again connections to various servers Kind regards
  15. Hello! Totally correct. AirVPN forums ("News", "How-To" and "Databases") are technical and service forums where a new thread can be started only by AirVPN staff. "News" is restricted to announcements and news regarding AirVPN and its infrastructure, "How-To" is restricted to guides for the customers, and "Databases" pertains to geo-routing db as well as residential ISPs around the world, to report their behavior and blocks against VPN or Tor. So they are totally inappropriate for any "free speech" purpose. The community forums are a gift of AirVPN to the community, mainly managed by the community itself with self-proposed, voluntary moderation. AirVPN basically provides the infrastructure and cover its expenses. Ads are forbidden, netiquette is enforced, but we do not monitor these forums closely, except for "Troubleshooting", dedicated to technical problems and their resolutions, where we can intervene (if we have the time) before the professional support team is involved through a ticket. However most problems are resolved by the community itself without our intervention. Of course you can't abuse the community forums for generic "freedom of speech" as they would lose their purpose: community member support by other community members. They could also become unreadable if all topics were allowed! In the community forums you also find the "Off-Topic" forum where you can post various arguments, even not specifically related to AirVPN. Ads prohibition and netiquette enforcement stay even in "Off-Topic" of course. More in general, we provide you with an infrastructure to aid free speech trough a layer of privacy and even anonymity, as anonymity as been recognized both by the UN and by the USA Supreme Court as an essential tool in order to exercise freedom of expression and information. We also support or supported monetarily other tools which aid directly freedom of speech, such as PeerTube, Mastodon, Tor, and organizations which support freedom of speech (for example EDRi and EFF). All of the above is in accordance with our mission https://airvpn.org/mission : it's not in our mission to maintain and deliver directly tools to exercise freedom of expression, but it's in our mission to "Deliver a service capable of providing a strong anonymity layer in order to exercise the Right to Remain Anonymous (*), which has been widely recognized as a key to freedom of speech". Specialization is essential in this case given our resources: do one thing and do it well. If we dispersed our resources in more and more projects with too many purposes, we might end up being ineffective in all areas. Kind regards
  16. @ScanFarer Hello! New 10 Gbit/s full duplex server has been added in Los Angeles. Another server with high bandwidth has been added in Denver (Colorado) with a 10 Gbit/s interface and port and 3 Gbit/s bandwidth (full duplex) guaranteed, burstable to 10 Gbit/s. https://airvpn.org/status Kind regards
  17. Hello! We're very glad to inform you that a new 3 Gbit/s (full duplex) server located in Denver, CO (USA) is available: Sadachbia. Sadachbia supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637 and 47107 UDP for WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server. You can check the status as usual in our real time servers monitor: https://airvpn.org/servers/Sadachbia Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Staff
  18. @HenningAlexander Hello! Apparently the router or the implemented ovpn-client does not support IPv6. Please check. If the problem persists even when IPv6 is supported, what happens if you connect over IPv4? Kind regards
  19. Hello! We're very glad to announce a special promotion on our long terms Premium plans. You can get prices as low as 2.20 €/month with a three years plan, which is a 68% discount when compared to monthly plan price of 7 €. You can also send an AirVPN plan as a gift: you have the option to print or send a colorful, dedicated picture with the code to activate the plan. You can do it in your account Client Area -> Your membership: Purchase and credit -> Print X-Mas after you have bought a coupon. If you're already our customer and you wish to stay aboard for a longer period, any additional subscription will be added on top of already existing subscriptions and you will not lose any day. Please check plans special prices on https://airvpn.org and https://airvpn.org/buy Promotion will end on January the 8th, 2024 (UTC). Kind regards & datalove AirVPN Staff
  20. Hello! We're very glad to inform you that a new 10 Gbit/s (full duplex) server located in Los Angeles (California, USA) is available: Saclateni. Saclateni supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server. You can check the status as usual in our real time servers monitor: https://airvpn.org/servers/Saclateni Do not hesitate to contact us for any information or issue. Kind regards and datalove
  21. Hello! Can you please open a ticket? We need to investigate this issue more thoroughly as we detected an apparent anomaly after a ticket by a different user with identical route outside problem even when the IP addresses were correctly entered. NOTE: if you are the same person and you opened a ticket from a different account, can you please reply to the support team? They are waiting for an important information from you since days ago and they have not received any reply. You need to re-start the VPN connection. Kind regards
  22. Hello! Yes, stay tuned! Kind regards
  23. Hello! For the readers, the problem has been explained, simply AROU666 does not have and has never had access to the VPN servers. 😲🤨 The community forums are open to everyone, not only to users with a valid VPN access plan. Kind regards
  24. Hello! All servers except Metallah (Pennsylvania, USA) support IPv6. IPv6 malfunctions in datacenters are more frequent than IPv4 malfunctions, but our server monitor will detect them and a server with IPv6 problems will become "yellow" (ongoing problems) or "red" (inaccessible). Kind regards
  25. Hello! Please keep using WireGuard and modify the MTU size through the "MTU = n" directive, where n is in bytes. For each size re-start the connection and test the performance thoroughly. Consider at least a couple of VPN servers located around your node and maintain them to cross-test consistently. To modify the MTU size please edit (with any text editor) WireGuard's configuration file and add a line in the [Interface] section. Start with: MTU = 1280 then go up at 20 bytes steps (1300, 1320, 1340, ..., 1420). Do not exceed 1420 at the moment. If you see a performance improvement, keep going up. When you see a performance degradation, fine tune between the last and the current value. If you see poor performance regardless of the MTU size, consider to switch to OpenVPN in TCP mode, in case UDP is capped in your network. Kind regards
×
×
  • Create New...