Jump to content
Not connected, Your IP: 18.188.119.81

Staff

Staff
  • Content Count

    10937
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1845

Everything posted by Staff

  1. Hello! We reluctantly have to announce gloomy news to you all: Spooky Halloween Deals are now available in AirVPN... Save up to 74% on AirVPN longer plans (*) (*) When compared to 1 month plan price Check all plans and discounts here: https://airvpn.org/plans If you're already our customer and you wish to jump aboard for a longer period any additional plan will be added on top of already existing subscriptions and you will not lose any day. Every plan gives you all the features that made AirVPN a nightmare for snoopers and a scary service for competitors. Just check this frighteningly long list of terrific features if you dare: a clear mission without compromises https://airvpn.org/mission WireGuard support exclusive and very flexible, opt-in block lists against malware and other hostile entities. Pick predefined lists, add exceptions or additional blocks, define your own lists, or just use our totally neutral DNS by default improved API functions to let you control and configure VPN features and account settings active OpenVPN 3 AirVPN library open source development IPv6 support, including IPv6 over IPv4 configurable remote port forwarding refined load balancing to squeeze every last bit per second from VPN servers free and open source software for Android, Linux, Mac and Windows easy "Configuration Generator" web interface for access through third party software guaranteed minimum bandwidth allocation GDPR compliance and very high privacy protection standards no log and/or inspection of clients' traffic effective traffic leaks prevention by AirVPN software Tor support via AirVPN software on Linux, Mac and Windows various cryptocurrencies accepted without any intermediary no obligation to use our free and open source software to enter AirVPN infrastructure. Interoperability is an AirVPN priority. perfectly clear and easy to read Privacy Notice and Terms https://airvpn.org/privacy No tricks, only treats! Grim regards & datathrills AirVPN Staff
  2. Hello! We're glad to inform you that Canada servers are NOT overloaded. Even the first screenshot, by the OP, clearly shows that the thread title doesn't match reality. Everybody can additionally verify by checking the real time servers monitor here: https://airvpn.org/status/ The OP also says that he/she can reach 100 Mbit/s even in the worst case scenario, which is 12 times the minimum allocated bandwidth per user we guarantee in the Terms of Service (exclusive feature, no other VPN service does the same). Even during peak hours, Canada servers offer 24000 Mbit/s, or equivalently 12000 Mbit/s full duplex, free, and for lower prices you had in 2011 in spite of the current world situation. Kind regards
  3. Hello! You have already explanations in this very thread and it should be now clear that the problem is Google side. Contact Google! The more contacts they have showing them their error, the more likely they will fix it, although it's unlikely that Google fixes errors in its algorithms after human feedback On our side, we diligently have our addresses providers keep the IANA / ARIN etc. database records correct, as you can easily verify with whois. We don't have the power to fix Google errors. Locking the thread before we arrive to a stupidity overflow. Kind regards
  4. Hello! We're very glad to inform you that Eddie Android edition 3.0 Beta 3 is now available. The original post has been updated accordingly. New in Beta 3: objects management change in order to prevent Android GC from destroying them and causing various issues while Eddie is connected through WireGuard and swiped out latest OpenVPN3-AirVPN library, linked against OpenSSL 1.1.1r bug fixes resolving app crashes after peculiar actions minor bug fixes The first change is critically important and resolves the multiple problems reported both in the current thread and privately. When Eddie 3.0 preview up to beta 2 version is connected via WireGuard and swiped out, if you recall Eddie after some time (especially but not exclusively when the device screen had been turned off or the device had been locked), you may find it reporting incorrect status, reset and stuck connection statistics, quick connection button frozen. All the problems affect every previous Eddie 3.0 preview version, in every Android version, only with WireGuard connections, and have a single common cause which was finally found. The latest beta 3 resolves the whole issue according to our tests. If you experienced any of the above problems we warmly invite you to test again in the same conditions and report back. Find full description, download link and SHA256 signature in the first post of this very thread. Thank you very much for your tests and please report and describe any bug you find! Kind regards
  5. @sarum4n Hello! We're glad to know it! We invite you to follow the "News" forum, so you will be timely informed about any relevant information and news pertaining to AirVPN infrastructure and software. It's a low traffic forum because new topics can be opened only by Staff members. https://airvpn.org/forums/forum/9-news-and-announcement/ The route-noexec directive is not implemented but you will probably be fine (and have even more flexibility) with pull-filter. Find the documentation about pull-filter in the OpenVPN 2.4 manual as it has been ported in 2021 to OpenVPN3 and OpenVPN3-AirVPN libraries: https://openvpn.net/community-resources/reference-manual-for-openvpn-2-4/ You need an ovpn profile since you can't add custom OpenVPN directives to bluetit.rc or goldcrest.rc files. We will consider the whole matter during the next version development. Kind regards
  6. Hello! You need the default option in the command. Check also https://eddie.website/support/cli/ In case you run Linux (your mention of eth0 makes us think of *BSD and Linux) you might like to consider the AirVPN Suite as a total replacement, in particular Goldcrest and Bluetit included in the suite, which will provide you with the maximum flexibility you're looking for and at the same time the security provided by a robust client-server architecture: https://airvpn.org/suite/readme/ The AirVPN Suite, currently, does not offer a GUI at all and is specifically aimed at those many users who prefer a command line interface over a GUI. However, currently it does not support WireGuard (next version will). Kind regards
  7. Hello! We're very glad to inform you that the feature has been implemented. Please check your account API explorer in your API panel for information and usage. Service: devices https://airvpn.org/apisettings/ Kind regards
  8. Hello! We're very glad to inform you that the feature has been implemented. Please check your account API explorer in your API panel for information and usage. Service: devices https://airvpn.org/apisettings/ Kind regards
  9. @sableslayer Hello! Can you please send us the Bluetit log taken just after the problem has occurred? For example, form a terminal: sudo journalctl | grep bluetit > bluetit.log and then send us the bluetit.log file. Kind regards
  10. In 2020 a member of the AirVPN Team suggested we'd be able to to so in the future: The same feature has been requested here and in this thread: Is this feature on the roadmap? Hello! The feature has not been implemented yet, we're sorry. An impact assessment is beginning in a few days. After that, if everything is fine, we will proceed. We will keep you informed. EDIT 2022-10-06: FEATURE IMPLEMENTED Kind regards
  11. @Oldkrow Hello, move to the ticket system for reasons which will be clear there. Kind regards
  12. Hello! Please check here for a very quick solution: https://airvpn.org/forums/topic/53004-openssl-error-restart-every-3-seconds/?do=findComment&comment=187787 Kind regards
  13. Hello! Do you declare an MTU size on the WireGuard conf file? Relevant for this discussion: https://superuser.com/questions/1537638/wireguard-tunnel-slow-and-intermittent Different networks may require different sizes. This is probably the reason for which WireGuard developers opted for the smallest allowed size in Android, 1280 bytes. Of course if it's possible to set higher sizes the performance will improve. Kind regards
  14. Hello! For your information, the official WireGuard Android user app forces MTU to 1280 bytes (in our Eddie app, we also had to force 1320, although MTU remains customizable in Eddie settings). Higher sizes cause malfunctions, timeouts, line breaks or snail throughput on virtually any device and network we tested, almost surely because there is (often) no room in the frame. Even the Linux client forces 1280 bytes (if it doesn't find anything else in the profile) if our memory is correct. Thus your findings are consistent and hint to the necessity to keep a low MTU size. Kind regards
  15. Hello! The promotion is now over. Many thanks to all of our customers. Kind regards
  16. Hello! From the screenshot we can see that you did not enable Network Lock. Please enable it to prevent any possible traffic leak, including leaks caused by configuration errors like yours. In general you must not bind programs to the physical network interface: since the original gateway is not deleted in order to allow connectivity after a VPN connection is closed by the user, by binding to the physical network interface a process may bypass the VPN tunnel when Network Lock is not active and incoming connections arrive. Note that wrong binding will arise even from UPnP, NAT-PMP and any other "automatic port mapping" methods so make sure to disable such options from the torrent program. Anyway Network Lock will prevent traffic leaks even in this case. Check your torrent program settings against the following guide available in the FAQ section: https://airvpn.org/faq/p2p/ Kind regards
  17. Thank you, this is a relevant information. You can stop sending us reports, we have collected enough data. Now you should tell us, if you can, and this is very important too, the exact name and version of your phone custom ROM. Kind regards
  18. Hello! Local network exclusion is not possible when the connection is on LTE/mobile, so it's irrelevant, don't worry about it. Please review our previous questions and reply when you have time to do so, because we have some ideas and we need confirmations (or denials) from you to fully understand the issue. Kind regards
  19. We released a new experimental version, mainly to fix some failure related to network adapter not related to OpenVPN/WireGuard.Other issues still under investigation. Version 2.22.1 (Thu, 15 Sep 2022 12:54:46 +0000) [change] [all] OpenVPN 2.5.7 [change] [Windows] Fix detection/conflict with some unusable VPN network interfaces
  20. Thanks a lot. Now, about point 3 and 4, can you please check? Turn on the screen, and wait some time, until the network is up (check Android indicator), Also try to access the Log via the side panel (the drawer which you can access settings etc. from). Note whether the log view opens or not (it should be accessible regardless of network and Eddie condition). When the network is up, go to Eddie and check again whether Eddie still does not reconnect by itself (big button still unresponsive or not? does Eddie report "disconnected" status in spite of network up?). If the network never comes up (wait at least a minute or two after you have turned the screen on, and keep thee screen on, do not allow it to go off again) try to switch off your LTE connection (from Android settings (*) ) and then on again, and check what happens both to your device and Eddie. Thank you in advance for all the additional tests. (*) IMPORTANT: If your device connects via WiFi to an LTE router (and not directly by using a SIM in itself), and your switching on/off the WiFi card doesn't change Eddie status, reboot the router (or press the activation button which is available on certain LTE routers) and check whether Eddie status changes after the router has re-established the LTE connection. Kind regards
  21. Hello! It will end on September the 21st. Kind regards
  22. Hello! Can you please tell us the exact system you run in your phone? We see Android 13 from the report but probably you have a custom ROM since you have a Pixel 6. We would like to know what it is to check whether the malfunction is specific. We need to understand this part fully. Please check below and confirm or deny that each step is right: You leave the device unattended After some time, you find the device with the screen off You turn the screen on and you find Eddie disconnected. At this stage, check on Android bar whether your network is up or not (according to Eddie it's not) and tell us what you find (do not test with a browser because your leak prevention Android settings will not allow traffic) You can't access Eddie's log view at all (please make sure you can confirm or deny this for sure). What happens when you tap the "Log" entry in the side drawer? Is it totally unresponsive? Note that it is normal that the Log button on the status tab is missing when network is off. The big button for quick connection and disconnection is unresponsive too You force a connection by selecting manually a server and immediately the log view is again available and Eddie connects to that server instantly. Kind regards
  23. For your comfort and peace of mind, check with traceroute (tracert in Windows) or mtr, and/or access various end points which tell you the IP address your packets come from. Typical speed tests sites and "what is my address" web services are perfect. Compare the IP address you get with the supposed exit-IP address of the VPN server you're connected to and verify they match. Finally, query the IANA database (with whois) for a final cross-check. Repeat multiple times for each server to minimize the likelihood that you end up to services which are accomplices of the attackers and therefore mask your IP address making you believe that you have a perfectly fine IP address while in reality your packet has come out from inside the evil Russian network. As a welcome and smart side-effect, while the attackers could do nothing with the data in transit inside their nodes because of end-to-end encryption, a re-routing of such a kind which would add an additional exit node would turn infringement notices against us exactly to zero, and alas this is not what we observe, not at all 🙄. We have never met such kind and gentle attackers, unfortunately. Kind regards 😋
  24. Hello! OK, as soon as we have the exact version or image of the distribution you experience this problem on, we will investigate thoroughly. Kind regards
×
×
  • Create New...