Jump to content
Not connected, Your IP: 216.73.216.167

Staff

Staff
  • Content Count

    11553
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    2044

Everything posted by Staff

  1. Hello! 34000 Mbit/s (full duplex, i.e. 68000 Mbit/s total) available in Canada, in peak hours about 23000 Mbit/s used. Plenty of bandwidth still available. Considering Canada extension, and the fact that WireGuard diffusion will cause higher bandwidth demand (mobile devices and routers can get more), the asymmetry between Vancouver (12000 Mbit/s) and Toronto (52000 Mbit/s) will be progressively balanced according to needs (probably you have seen that 2000 Mbit/s have been added today in Toronto). Please consider that the available bandwidth is real, it's not like having a 10 Gbit/s line, sharing it with dozens of servers, and declaring each of those servers as "10 Gbit/s" servers, as some competitors do. @knighthawk The kernel of the servers balance the demand quite efficiently. For example, if a client is draining 1 Gbit/s (i.e. 2 Gbit/s on the server, 100%) while 20 other clients are idle, the first client may continue to do so. As soon as the idle clients start demanding bandwidth, the provided bandwidth will be re-distributed in a very short time, and the initial client will be no more able to use 2 Gbit/s. On top of that, we also take care (again thanks to kernel features) to distribute the incoming connections to different OpenVPN instances, so that a round robin distribution will contribute to keep balance. It's necessary only with OpenVPN, as a single OpenVPN process runs always in a single thread, while with WireGuard this is not necessary (and not applied). Kind regards
  2. Hello! We offer WireGuard with per-client pre-shared key for post-quantum resistance, so we're ready, in the extremely unlikely event that a powerful quantum computer could work effectively during our life time. WireGuard pre-shared key is offered by default, you don't need any specific action. Kind regards
  3. Hello! Your message is from 2019 and in the meantime new challenges and problems arose in quantum computing, but anyway we have an important update. We offer WireGuard with per-client pre-shared key for post-quantum resistance, so we're ready, in the extremely unlikely event that a powerful quantum computer could work effectively during our life time. WireGuard pre-shared key is offered by default, you don't need any specific action. Kind regards
  4. Hello! We're very glad to inform you that a new 1 Gbit/s full duplex server located in Vancouver (Canada) is available: Ginan. The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637 and 47107 UDP for WireGuard. Ginan supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server. You can check the status as usual in our real time servers monitor: https://airvpn.org/servers/Ginan Do not hesitate to contact us for any information or issue. Kind regards and datalove AirVPN Team 
  5. Hello! The proper guide is this one: https://openwrt.org/docs/guide-user/services/vpn/wireguard/client Keep a profile generated by the Configuration Generator, according to your preferences, available (it's just a text file). From it, you can find the settings for the initial configuration: WG_IF="vpn" WG_SERV="SERVER_ADDRESS" <-- the VPN server address you see in the "Endpoint" entry WG_PORT="1637" <-- you can see it in the "Endpoint" entry WG_ADDR="..." <-- the IPv4 address you find in the profile "Address" entry WG_ADDR6="..." <-- the IPv6 address you find in the profile "Address" entry Skip the "Key management" section. In our system your WireGuard key is generated by our infrastructure. In the same file you also find the public key, the pre-shared key and the DNS server address that you will need to complete the configuration, respectively in the PublicKey entry, the PresharedKey entry and the DNS entry. Kind regards
  6. @geno5 Hello! If the notice is authentic, you must have suffered a traffic leak outside the VPN tunnel, so you must have had "Network Lock" feature disabled.. Please make sure you have Network Lock enabled. It will prevent any possible traffic leak outside the VPN tunnel, even leaks caused by misconfiguration of any program and unexpected VPN disconnection. It will prevent leaks even in case Eddie or OpenVPN or WireGuard suffer a crash (it is as reliable as your system packet filtering tool is, nothing to share with obsolete and unreliable kill switches). Network Lock, as you know from the welcome e-mail, the guide for beginners, the FAQ answers, the general recommendations on the How-To forum, is a set of firewall rules, therefore it works properly regardless of the underlying VPN protocol (OpenVPN, WireGuard). It can be activated from Eddie's main window before you start a connection (and you can tell Eddie to activate it automatically when it starts). It is also active by default in the Eddie Android edition app and on the AirVPN Suite. To optimize your torrent software performance and make sure that it is not misconfigured you can follow this guide: https://airvpn.org/faq/p2p/ Kind regards
  7. @Lee47 Hello! Just out of information, your requirements for 4K HDR are excessive! Netflix recommends 25 Mbit/s and Amazon 15 Mbit/s. https://nvidia.custhelp.com/app/answers/detail/a_id/4182/~/what-bandwidth-do-i-need-for-4k-hdr-streaming Kind regards
  8. @SurprisedItWorks Hello, that's correct. According to recent reports, Netflix USA allows streaming through our servers only of those contents of Netflix exclusive property, even when the user who tries to access such content is a USA citizen.. The other contents are perhaps too problematic (because of the copyright mafia, one might argue) to allow access from dedicated servers (or IP addresses not assigned to USA residential ISPs), even when such access is performed by a citizen living in the USA. Kind regards
  9. @nemoomen Hello! This is the fatal error which causes Eddie to exit: Routes, add 2607:ff48:aa81:200:7624:912a:38e8:a606/128 for interface "enp11s0" failed: Exception: exit:2; err:RTNETLINK answers: File exists It's unclear why that route (to Acamar entry-IP address 3) is already there on enp11s0 ("file exists") this is matter for developer's investigation. Try to delete (while Eddie is not running) the following file: /home/lillianr/.config/eddie/default.profile then reset your TCP/IP stack and interfaces, and check whether Eddie re-starts correctly (that default.profile file is Eddie's configuration file so you will need to re-enter your AirVPN account credentials and Eddie settings). Kind regards
  10. Hello! Can you give us a list of VPN servers which you experience this IPv6 problem on? Kind regards
  11. @DZ-015 Hello! Please test a connection via WireGuard as well as a connection on OpenVPN, protocol TCP, port 443, entry-IP address three, and check whether one of those connection modes resolves the issue. You can change connection mode in the following way: from Eddie's main window select "Preferences" > "Protocols" uncheck "Automatic" select the line describing one of the aforementioned modes. The line will be highlighted click "Save" and test again connections If the problem persists, please open a ticket and include a system report https://airvpn.org/forums/topic/50663-youve-been-asked-for-a-support-filesystem-report-–-heres-what-to-do/ Kind regards
  12. @nan0tEch Hello! Try the following: enforce mssfix n directive (n is in bytes). This directive tells OpenVPN to split TCP packets (inside the UDP tunnel) larger than n bytes. This directive may resolve MTU size problems. Try for example with mssfix 1320 if your connection is via Ethernet or WiFi if you have an asymmetric line (ADSL etc.), make sure that the maximum allowed upload bandwidth of the torrent software does not "choke" the throughput. To stay on the safe side, limit (from its own settings) the torrent software to use at most 66% of your available upload bandwidth Check any combination of the above attempts (only 1, only 2 and both 1 and 2). Kind regards
  13. @Cthulu_007 Hello and thank you for your great feedback and support! AirVPN Suite version 2.0 for Linux will implement traffic splitting on an application basis. The first alpha preview is due in a matter of weeks (the first addition is however WireGuard support and integration, so in the alpha 1 you might not see a full traffic splitting implementation yet). In the meantime, if you need a simplified approach, you can split traffic on an application basis through any means of virtualization. Please remember, as usual, that any traffic splitting poses risks of de-anonymization in specific circumstances. Splitting traffic, therefore, must be considered a sensitive action which should be performed only by those who perfectly understand what they are doing. Kind regards
  14. Hello! Thank you for your great feedback. Try this procedure: - from the left pane select "Logout" - tap the big central button to login again - re-enter your credentials - check whether all the keys appear in the box "AirVPN key" (tap the key name and a full list should pop-up) Kind regards
  15. @ba....z123 Hello! You can already select a port (among the supported ones) on the Configuration Generator. Please make sure you tick "Advanced Mode". Our VPN is based on WireGuard and OpenVPN. SSTP VPN (which works only over TCP) is currently not available and not planned in AirVPN, we're sorry. However, OpenVPN and WireGuard offer a combination which may in most cases beat SSTP performance and circumvention abilities. Kind regards
  16. @fts501 Hello! A bug affecting Eddie 2.21.8 causes a race condition under specific conditions during the round trip times calculation. Eddie never gets out of the tests. The bug has been fixed in Eddie 2.22.2 - thanks to @CMaves https://github.com/AirVPN/Eddie/pull/123 https://airvpn.org/forums/topic/50561-eddie-desktop-edition-2216-released/?do=findComment&comment=203120 Hummingbird does not measure round trip times so the problem simply can't be there. Thus, you have now two options: download and install Eddie 2.22.2 (in the download page for your system click "Switch to experimental", then download as usual) don't run Eddie, but run Hummingbird, included in the AirVPN Suite or Goldcrest and Bluetit, components of the Suite too (however, the Suite does not offer a GUI) Kind regards
  17. Hello! In Eddie Android edition you can split traffic on an application basis. You can define "white" and "black" lists of apps. If a black list is defined, the apps included in the black list will have their traffic routed outside the VPN. Any other app will have its traffic routed into the VPN. If you define a white list, only the apps in the white list will have their traffic routed inside. Any other device traffic will be routed outside the VPN. Traffic splitting will work both on WireGuard and on OpenVPN. In Eddie Desktop edition for Linux, Mac and Windows you can split traffic on a destination basis (IP addresses, IP addresses range, or host names). You can tell Eddie to send the traffic outside the VPN tunnel only for specific destinations, or you can tell Eddie to send all the traffic outside the tunnel except for specific destinations. Traffic splitting will work both on WireGuard and OpenVPN. AirVPN Suite for Linux does not offer any traffic splitting ability, but we are considering to implement an app based traffic splitting in the near future. Kind regards
  18. @NKKA12345 Hello! If you are talking about nVidia Shield TV, we have noticed that nVidia Shield TV devices performance suffer when they rely on WiFi. If possible connect your device via Ethernet. If you are talking about nVidia Shield tablets, try to use Eddie Android edition in WireGuard, OpenVPN over UDP, and OpenVPN over TCP modes, and make a comparison. Kind regards
  19. Hello! Currently not, we have no plans about it, we're sorry. Kind regards
  20. Staff

    Guidelines

    Entities and persons supported in 2019-now period (NGOs / persons working in highly dangerous areas not mentioned for security reasons): 2019: Mastodon (recurring support) Tor (recurring support) AccessNow (recurring support) Apollo NG Mobile Hackerspace (recurring support) Caitlin Johnston Chelsie Manning WIkiLeaks Electronic Frontier Foundation 2020: Tor (recurring support) Mastodon (recurring support) AccessNow (recurring support) Apollo HG Mobile Hackerspace (recurring support) 2021: WikiLeaks Tor (recurring support) Mastodon (recurring support) AccessNow (recurring support) Apollo HG Mobile Hackerspace (recurring support) 2022: Tor (recurring support) Mastodon (recurring support) AccessNow (recurring support) Apollo HG Mobile Hackerspace (recurring support) XNet 2023 (so far, updated 01 Feb 2023): Tor (recurring support) Mastodon (recurring support) AccessNow (recurring support) Apollo HG Mobile Hackerspace (recurring support) PeerTube For a full list including previous years, relevant links, and details about how the support is actualized please see https://airvpn.org/mission Kind regards
  21. Hello! Please see here: https://airvpn.org/android/eddie/ Direct link to the latest APK: https://airvpn.org/mirrors/eddie.website/download/?platform=android&version=latest Specific instructions for Android TV and Fire OS: https://airvpn.org/android/eddie/apk/tv/ Kind regards
  22. Hello! In Eddie Android edition you can split traffic on an application basis. You can define "white" and "black" lists of apps. If a black list is defined, the apps included in the black list will have their traffic routed outside the VPN. Any other app will have its traffic routed into the VPN. If you define a white list, only the apps in the white list will have their traffic routed inside. Any other device traffic will be routed outside the VPN. Traffic splitting will work both on WireGuard and on OpenVPN. Please open "Settings" and expand "System". Tap "Application filter type" and select the type you want: Whitelist: only apps included in the whitelist will have their traffic tunneled. Anything else's traffic will go outside the tunnel, including system traffic. Blacklist: all the traffic will be tunneled except the traffic of the apps in the Blacklist. After you enable a filter type a new item will appear just below the "Application filter type". Tap it to select the apps you want to be "white" or "black" listed. In Eddie Desktop edition for Linux, Mac and Windows you can split traffic on a destination basis (IP addresses, IP addresses range, or host names). You can tell Eddie to send the traffic outside the VPN tunnel only for specific destinations, or you can tell Eddie to send all the traffic outside the tunnel except for specific destinations. Traffic splitting will work both on WireGuard and OpenVPN. AirVPN Suite for Linux does not offer any traffic splitting ability, but we are considering to implement an app based traffic splitting feature in the near future. EDIT: Starting from version 2.0.0, AirVPN Suite implements per-app traffic splitting. Kind regards
  23. Hello! Thanks for the head up, something seems wrong. Under investigation. Kind regards
  24. Please open a ticket for private communications we have to send you.
  25. Hello! @OpenSourcerer Feel free to evaluate whether it's the case to merge both threads or not. Kind regards
×
×
  • Create New...