Jump to content
Not connected, Your IP: 3.145.38.67

Staff

Staff
  • Content Count

    11043
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1866

Everything posted by Staff

  1. @Maggie144 Hello! Congratulations to Mullvad for this discovery and shame on Google. Some answers by Google personnel in the issue tracker https://issuetracker.google.com/issues/250529027 are embarrassing (to say the least...) and Mullvad replies are effective and clear. The issue must be taken seriously especially if you live in certain countries and the suggested solution via adb should be applied. It requires a computer and minimal knowledge, though. Kind regards
  2. Hello! When a stable version is available. Since there are no bug reports so far and the internal testing is just fine, it could be quite soon. Kind regards
  3. Hello! All the percentages are computed against the standard 1 month plan, even when there is no special offer. Kind regards
  4. @Xoese Hello! As it's an Halloween deal, you can safely assume that it will not end before the HALLOWEEN NIGHT. grim regards
  5. Hello! We reluctantly have to announce gloomy news to you all: Spooky Halloween Deals are now available in AirVPN... Save up to 74% on AirVPN longer plans (*) (*) When compared to 1 month plan price Check all plans and discounts here: https://airvpn.org/plans If you're already our customer and you wish to jump aboard for a longer period any additional plan will be added on top of already existing subscriptions and you will not lose any day. Every plan gives you all the features that made AirVPN a nightmare for snoopers and a scary service for competitors. Just check this frighteningly long list of terrific features if you dare: a clear mission without compromises https://airvpn.org/mission WireGuard support exclusive and very flexible, opt-in block lists against malware and other hostile entities. Pick predefined lists, add exceptions or additional blocks, define your own lists, or just use our totally neutral DNS by default improved API functions to let you control and configure VPN features and account settings active OpenVPN 3 AirVPN library open source development IPv6 support, including IPv6 over IPv4 configurable remote port forwarding refined load balancing to squeeze every last bit per second from VPN servers free and open source software for Android, Linux, Mac and Windows easy "Configuration Generator" web interface for access through third party software guaranteed minimum bandwidth allocation GDPR compliance and very high privacy protection standards no log and/or inspection of clients' traffic effective traffic leaks prevention by AirVPN software Tor support via AirVPN software on Linux, Mac and Windows various cryptocurrencies accepted without any intermediary no obligation to use our free and open source software to enter AirVPN infrastructure. Interoperability is an AirVPN priority. perfectly clear and easy to read Privacy Notice and Terms https://airvpn.org/privacy No tricks, only treats! Grim regards & datathrills AirVPN Staff
  6. Hello! We're glad to inform you that Canada servers are NOT overloaded. Even the first screenshot, by the OP, clearly shows that the thread title doesn't match reality. Everybody can additionally verify by checking the real time servers monitor here: https://airvpn.org/status/ The OP also says that he/she can reach 100 Mbit/s even in the worst case scenario, which is 12 times the minimum allocated bandwidth per user we guarantee in the Terms of Service (exclusive feature, no other VPN service does the same). Even during peak hours, Canada servers offer 24000 Mbit/s, or equivalently 12000 Mbit/s full duplex, free, and for lower prices you had in 2011 in spite of the current world situation. Kind regards
  7. Hello! You have already explanations in this very thread and it should be now clear that the problem is Google side. Contact Google! The more contacts they have showing them their error, the more likely they will fix it, although it's unlikely that Google fixes errors in its algorithms after human feedback On our side, we diligently have our addresses providers keep the IANA / ARIN etc. database records correct, as you can easily verify with whois. We don't have the power to fix Google errors. Locking the thread before we arrive to a stupidity overflow. Kind regards
  8. Hello! We're very glad to inform you that Eddie Android edition 3.0 Beta 3 is now available. The original post has been updated accordingly. New in Beta 3: objects management change in order to prevent Android GC from destroying them and causing various issues while Eddie is connected through WireGuard and swiped out latest OpenVPN3-AirVPN library, linked against OpenSSL 1.1.1r bug fixes resolving app crashes after peculiar actions minor bug fixes The first change is critically important and resolves the multiple problems reported both in the current thread and privately. When Eddie 3.0 preview up to beta 2 version is connected via WireGuard and swiped out, if you recall Eddie after some time (especially but not exclusively when the device screen had been turned off or the device had been locked), you may find it reporting incorrect status, reset and stuck connection statistics, quick connection button frozen. All the problems affect every previous Eddie 3.0 preview version, in every Android version, only with WireGuard connections, and have a single common cause which was finally found. The latest beta 3 resolves the whole issue according to our tests. If you experienced any of the above problems we warmly invite you to test again in the same conditions and report back. Find full description, download link and SHA256 signature in the first post of this very thread. Thank you very much for your tests and please report and describe any bug you find! Kind regards
  9. @sarum4n Hello! We're glad to know it! We invite you to follow the "News" forum, so you will be timely informed about any relevant information and news pertaining to AirVPN infrastructure and software. It's a low traffic forum because new topics can be opened only by Staff members. https://airvpn.org/forums/forum/9-news-and-announcement/ The route-noexec directive is not implemented but you will probably be fine (and have even more flexibility) with pull-filter. Find the documentation about pull-filter in the OpenVPN 2.4 manual as it has been ported in 2021 to OpenVPN3 and OpenVPN3-AirVPN libraries: https://openvpn.net/community-resources/reference-manual-for-openvpn-2-4/ You need an ovpn profile since you can't add custom OpenVPN directives to bluetit.rc or goldcrest.rc files. We will consider the whole matter during the next version development. Kind regards
  10. Hello! You need the default option in the command. Check also https://eddie.website/support/cli/ In case you run Linux (your mention of eth0 makes us think of *BSD and Linux) you might like to consider the AirVPN Suite as a total replacement, in particular Goldcrest and Bluetit included in the suite, which will provide you with the maximum flexibility you're looking for and at the same time the security provided by a robust client-server architecture: https://airvpn.org/suite/readme/ The AirVPN Suite, currently, does not offer a GUI at all and is specifically aimed at those many users who prefer a command line interface over a GUI. However, currently it does not support WireGuard (next version will). Kind regards
  11. Hello! We're very glad to inform you that the feature has been implemented. Please check your account API explorer in your API panel for information and usage. Service: devices https://airvpn.org/apisettings/ Kind regards
  12. Hello! We're very glad to inform you that the feature has been implemented. Please check your account API explorer in your API panel for information and usage. Service: devices https://airvpn.org/apisettings/ Kind regards
  13. @sableslayer Hello! Can you please send us the Bluetit log taken just after the problem has occurred? For example, form a terminal: sudo journalctl | grep bluetit > bluetit.log and then send us the bluetit.log file. Kind regards
  14. In 2020 a member of the AirVPN Team suggested we'd be able to to so in the future: The same feature has been requested here and in this thread: Is this feature on the roadmap? Hello! The feature has not been implemented yet, we're sorry. An impact assessment is beginning in a few days. After that, if everything is fine, we will proceed. We will keep you informed. EDIT 2022-10-06: FEATURE IMPLEMENTED Kind regards
  15. @Oldkrow Hello, move to the ticket system for reasons which will be clear there. Kind regards
  16. Hello! Please check here for a very quick solution: https://airvpn.org/forums/topic/53004-openssl-error-restart-every-3-seconds/?do=findComment&comment=187787 Kind regards
  17. Hello! Do you declare an MTU size on the WireGuard conf file? Relevant for this discussion: https://superuser.com/questions/1537638/wireguard-tunnel-slow-and-intermittent Different networks may require different sizes. This is probably the reason for which WireGuard developers opted for the smallest allowed size in Android, 1280 bytes. Of course if it's possible to set higher sizes the performance will improve. Kind regards
  18. Hello! For your information, the official WireGuard Android user app forces MTU to 1280 bytes (in our Eddie app, we also had to force 1320, although MTU remains customizable in Eddie settings). Higher sizes cause malfunctions, timeouts, line breaks or snail throughput on virtually any device and network we tested, almost surely because there is (often) no room in the frame. Even the Linux client forces 1280 bytes (if it doesn't find anything else in the profile) if our memory is correct. Thus your findings are consistent and hint to the necessity to keep a low MTU size. Kind regards
  19. Hello! The promotion is now over. Many thanks to all of our customers. Kind regards
  20. Hello! From the screenshot we can see that you did not enable Network Lock. Please enable it to prevent any possible traffic leak, including leaks caused by configuration errors like yours. In general you must not bind programs to the physical network interface: since the original gateway is not deleted in order to allow connectivity after a VPN connection is closed by the user, by binding to the physical network interface a process may bypass the VPN tunnel when Network Lock is not active and incoming connections arrive. Note that wrong binding will arise even from UPnP, NAT-PMP and any other "automatic port mapping" methods so make sure to disable such options from the torrent program. Anyway Network Lock will prevent traffic leaks even in this case. Check your torrent program settings against the following guide available in the FAQ section: https://airvpn.org/faq/p2p/ Kind regards
  21. Thank you, this is a relevant information. You can stop sending us reports, we have collected enough data. Now you should tell us, if you can, and this is very important too, the exact name and version of your phone custom ROM. Kind regards
  22. Hello! Local network exclusion is not possible when the connection is on LTE/mobile, so it's irrelevant, don't worry about it. Please review our previous questions and reply when you have time to do so, because we have some ideas and we need confirmations (or denials) from you to fully understand the issue. Kind regards
  23. We released a new experimental version, mainly to fix some failure related to network adapter not related to OpenVPN/WireGuard.Other issues still under investigation. Version 2.22.1 (Thu, 15 Sep 2022 12:54:46 +0000) [change] [all] OpenVPN 2.5.7 [change] [Windows] Fix detection/conflict with some unusable VPN network interfaces
×
×
  • Create New...