Jump to content
Not connected, Your IP: 216.73.216.62

Staff

Staff
  • Content Count

    11395
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1982

Everything posted by Staff

  1. Hello! The paper re-launches the anti-censorship abilities of OpenVPN over SSH which we proposed 13 years ago! It had a filter rate of 0.32, the third best outcome in the world, very remarkable and putting AirVPN in the top 3 worldwide best filtering escaping VPN. As usual we anyway recommend Tor with private obfs bridges to reach filter rates next to 0. We have invested a lot on Tor and the solution is free for everyone. In Iran and Russia Tor obfs and private bridges are instrumental against blocks. Kind regards
  2. Hello! From the support team in reply to a ticket mentioning this problem with T-Mobile: Kind regards
  3. Hello! We have noticed only now that this thread contains ads for Azire. Please, at least do not link their promotional messages and press releases! Links now have been removed. The whole forum is meant to report first hand experiences from other VPNs freely but it's not meant to advertise them. Momentarily locking to re-consider the whole forum. Kind regards
  4. Hello! If you read https://airvpn.org/road_to_openvpn26/ you will notice that the beta testing phase will end when DCO is stable. Current reported status is: ** NOTE ** ovpn-dco is currently under heavy development, therefore neither its userspace API nor the code itself is considered stable and may change radically over time. Under the condition of code 1) not stable and 2) subjected to radical changes it is not possible to consider the beta testing phase over. Kind regards
  5. @russellr50 Hello! That's fine and intended, the Network Lock activation button must disappear during a connection for good reasons. Please verify that the button is visible while Eddie is NOT "connected" as expected in 2.21.8 and report at your convenience. For the readers: the bug detected in this thread is different and affects 2.23. Kind regards
  6. Hello! Thank you. We could not manage to reproduce this issue in 2.21.8. It's puzzling because 2.21.8 was released more than a year ago and this problem was never reported by anyone. Can you send us a screenshot showing the main window without the "Activate Network Lock" button? Kind regards
  7. Hello! Which Eddie version exactly, please? Can you also specify your OS name and version? Kind regards
  8. Hello! We have used a lot of resources in the last decade to support Tor and Tor Project, and our main recommendation is always the same: rely on Tor first and foremost, using Tor bridges with various Pluggable Transports when necessary (for example from Iran they are now the only remaining resource to bypass blocks). Tor bridges are available even in Android (easy configuration with Tor Browser or Orbot). Regardless of any "super-obfuscating-protocol" we may propose, any regime can collect our IP addresses and block them all. Thanks to volunteers, the every day addition of new Tor bridges with new IP addresses, as well as the addition of private unlisted Tor bridges, makes the regime lackeys "job" much more difficult. The flexibility of the addition of nodes and IP addresses worldwide in this case beats any possible commitment of a single, small private company. See also: https://tb-manual.torproject.org/circumvention/ Kind regards
  9. @OpenSourcerer Hello! Thanks a lot. It seems a bug indeed @Clodo - feel free to report it on the Eddie 2.23 testing thread, where we try to gather all the detected bugs. @britishstyle Can you see the "Activate Network Lock" button on Eddie's main window? Kind regards
  10. Hello! Yes, various users found the problem in their configuration, you may check whether their solutions are applicable for your case too: https://airvpn.org/forums/topic/56370-portforwarding-not-working-gluetun-and-desktop-app/?tab=comments#comment-223375 https://airvpn.org/forums/topic/56288-proper-way-to-set-up-airvpn-wireguard-with-portforwarding-in-a-docker-with-gluetun-on-nas/?tab=comments#comment-222853 Also consider to contact Gluetun community as Gluetun supports AirVPN. Kind regards
  11. @VinXI Hello! The screenshot has cut out the option which does exist but has not been documented in the guide. We're glad to know that you have found it. As @overbuilt985 pointed out, it does not work all the times when you use WireGuard and you turn off and on the network and under other sleep conditions. While WireGuard becomes more refined, we are confident that this problem will be mitigated. Development team is also informed. If you switch to OpenVPN at the moment you will have a much more accurate network control. Kind regards
  12. Hello! Please note that automatic re-connection is an option that's available from Eddie Android edition 1 throughout Eddie Android edition 3.0. Which version are you running? Check Settings > VPN > VPN reconnection and make sure you enable Always on VPN and Block connections without VPN to prevent any possible leak during re-connections (please read the instructions if needed). Kind regards
  13. Hello! Paper of Tunnelcrack attack: https://www.usenix.org/system/files/usenixsecurity23-xue.pdf First quick reply, we might add information in the future. The Tunnelcrack can be finalized with two different attacks: LocalNet and ServerIP, provided that: the victim connects to a network fully controlled by the attacker (for Localnet attack) the victim DNS queries are poisoned and the attacker has all the features of an "on path" attacker (for ServerIP attack) LocalNet attack If you are in a WiFi unencrypted or not trusted (even if encrypted) network, or you are in an untrusted network in general (including Ethernet) prevent LocalNet attack by not allowing communications within the local network. Please make sure that Allow LAN is not checked in Preferences > Network Lock settings window. The AirVPN Suite for Linux allows this traffic by default so do not use it in untrusted network until we implement the option to block local network (EDIT: option implemented in AirVPN Suite 2.0.0). Eddie Android edition forbids local traffic by default but you can enable this option in the Settings. Make sure you do NOT enable it when the device is connected to an untrusted network. ServerIP attack ServerIP attack requires DNS poisoning/spoofing, so Eddie Desktop Edition and Bluetit/Goldcrest are immune. It's mainly up to the local system to use reliable DNS (consider DNS over TLS or DNS over HTTPS) and protect the queries, but for additional safety use profiles with only IP addresses, and not host names, if you run directly OpenVPN, WireGuard, Hummingbird, or any other software needing profiles. Our CG will generate profiles with country domain names, so avoid country selection but prefer single server selection, or secure your DNS queries. When you select specific servers, the CG will insert IP addresses for the servers and not names. Eddie Android edition and the AirVPN Suite resolve domain names if you order a connection to a country, so avoid this type of connection. It is planned that next release will no more use country domain names. Once inside the VPN, ServerIP attack variation with "route hijack" (described in an old paper) fails in AirVPN (even if you query the VPN DNS) because the DNS server address matches the VPN gateway address. TL;DR The Tunnelcrack attack can be easily defeated by not allowing communications with the local network when you are in an untrusted network and by using secure DNS or direct IP addresses to point to VPN servers when you start the VPN connection. All of the above can be easily obtained with our service or it is already implemented by default. Kind regards
  14. Hello! Currently it is not in our interest to accept it, we are sorry. Kind regards
  15. Hello! Activate Network Lock before you start a connection by clicking the big button on the main (overview) window: Or tell Eddie to activate Network Lock as soon as Eddie itself starts with the following option in "Preferences" > "General": NOTE: starting from Eddie 2.23.0 (and NOT in any previous version), by default Network Lock is enabled during a connection and disabled at the disconnection, if it is not explicitly activated. This behavior is set by the "Ensure in session" item in "Preferences" > "Network Lock" window (enabled by default). If Network Lock is explicitly activated then it remains active as long as Eddie runs, and is de-activated as soon as Eddie is properly shut down or Network Lock is explicitly disabled from the main window. Kind regards
  16. Hello! Please delete all Eddie's local data (not only the cache, all data) from the app settings menu of your FireStick. You will then need to re-enter your AirVPN credentials at the next run. Alternatively uninstall and re-install Eddie. Starting from Eddie 3.0 the Master Password is disabled by default and opt-in. Kind regards
  17. Hello! Your proxy is not responding, or maybe it is refusing connections. Check the settings in the "Preferences" > "Proxy / Tor" window. Don't use an additional proxy unless it is absolutely necessary (for example if you are behind a proxy). We infer that you configured a connection over some proxy, without credentials, from the entry which we can sneak on the screenshot you posted. For a more complete analysis please post the whole system report. Please see here to do so: https://airvpn.org/forums/topic/50663-youve-been-asked-for-a-support-filesystem-report-–-heres-what-to-do/ Kind regards
  18. New record! 1.02 Gbit/s on Haedus (2.04 Gbit/s on server's side for a single client). Kind regards
  19. Hello! The Windscribe interface is causing a critical error to OpenVPN. To solve the problem please see here: https://airvpn.org/forums/topic/53451-after-airvpn-changed-a-device-it-was-unable-to-connect-normally/?do=findComment&comment=194389 Kind regards
  20. Hello! Yes, because you generated profiles for openvpn-connect with the new keys you have created. Each time you change keys, you need the new profiles, obviously (as the previous ones contain the old keys...). With Eddie Desktop edition, to update the keys just follow the simple procedure specified the instructions, which is necessary each time you renew your keys or create new keys. In general, read the documentation. Kind regards
  21. Hello! To clarify, this message comes handy: https://airvpn.org/forums/topic/56149-why-hard-disks/?do=findComment&comment=221245 Kind regards
  22. Hello! When you check "Don't ask elevation every run", Eddie creates a systemd unit (you don't need to create it manually) and therefore after you reboot the system, even if you run Eddie from your DE, no password should be asked, except the keyring password, or the Master Password if you enabled it. Might it be that you were prompted for that password? If you reproduce the issue, can we see a screenshot showing this password prompt? Kind regards
  23. Hello! You have just renewed you client key and created a new one. Please follow the instructions to fix this error: Pay attention to the last paragraph in bold. Before jumping to conclusions or panicking always read the documentation first, consult the FAQ and if necessary write to the support team (open a ticket). Kind regards
  24. Hello! It looks like you need the list of entry-IP addresses 3, therefore you must resolve europe3.all.vpn.airdns.org. europe.all.vpn.airdns.org is updated as usual, anyway. It resolves into all the entry-IP addresses 1 of servers in Europe. europe3.vpn.airdns.org resolves into the single entry-IP address 3 of the unique server in Europe with the "best" rating. Please see https://airvpn.org/faq/servers_ip/ Kind regards
  25. Hello! Yes, a new configuration file is strictly necessary, for the key is different for each device. If you run Eddie you need to select the key you prefer from the combo box just under the login credential fields. If you run Bluetit+Goldcrest you can select a specific key with the air-key Goldcrest option (or airkey in Bluetit run control file). Kind regards
×
×
  • Create New...