Jump to content
Not connected, Your IP: 216.73.216.171

Staff

Staff
  • Content Count

    11390
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1979

Everything posted by Staff

  1. Hello! It's not you, the message "DNS Detect feature under maintenance" means that the DNS detection feature is under maintenance (i.e you can interpret it literally). Please see here for some additional complications which arose recently: https://airvpn.org/forums/topic/53074-ipleaknet-not-working/?do=findComment&comment=189566 Kind regards
  2. Hello! It mainly depends on WireGuard and OpenVPN after all. QUIC looks very promising and is widely used by Chrome for HTTPS/2 (mainly with Google sites) so we guess it's quite robust after 9 years of tests and no critical problems found. However we frankly don't know how it would speed up OpenVPN or WireGuard, because it includes some error correction and packet re-ordering routines working on packets on the userspace which are, apparently, quite unwelcome by WireGuard (and OpenVPN too, due to its efficiency in packet re-ordering in UDP), exactly because they tend to waste a lot of time. Kind regards
  3. Hello! Very interesting analytical and investigative work by Windscribe disclosing ties (even hidden ones) between VPN companies, publishers, review web sites. Click on node icons to read more details. Very sinister situation at a glance. Note for example how Crossrider (now Kape), well known malware company co-founded by a member of israeli Defense Forces Unit 8200, nowadays controls major VPNs and review web sites: https://embed.kumu.io/9ced55e897e74fd807be51990b26b415#vpn-company-relationships/control-d Kind regards
  4. Hello! An exception could be attempted, as "opt-in" and not part of the main service, in order to avoid contract violation with our customers. We need a legal advice first, however under a practical point of view we really don't know who would connect to a server where you can't do HTTP(S). As a second option we could run servers which only block outbound ports 22, 25, 465 and 587 (to prevent many SSH attacks, and spam mails), but again we would be subjected to black listing due to HTTP(S) based attacks (malicious forms, injections etc. etc.). Frankly it seems that the pervasive monitoring and logging required to punish those who allegedly perform attacks based on HTTP(S) would impact legit users remarkably, and it would make our service more or less the same as using directly your ISP (or worse in some circumstances), as it already happens with most VPNs out there. Kind regards
  5. Hello! The main reason of complaints and black list presence of IP addresses are attacks via HTTP(S) and spam mails. A server with blocked outbound ports 80 and 443 blocked would be avoided by anyone, we think, while we might consider to block outbound ports 465 and 587 (outbound port 25 is already blocked on all servers) and renounce to our fight to defend net neutrality. This will require however a mission as well as Terms of Service modification, as noted by @OpenSourcerer , so it's not a viable solution for the current management administration and the contracts with our current users. Out there you can already find tons of VPNs which violate net neutrality by inspecting your traffic and blocking (or shaping) applications, protocols and ports. Or you can just use your own ISP. The peculiarity of AirVPN is that it doesn't enforce that rubbish.. If one asks for traffic inspection, ports blocking and so on and so forth to get a "cleaner" IP address, then he/she probably "deserves" a pervasive surveillance and must take into account that his/her personal information and his/her behavior will be sooner or later used against him/her, as it already happened to millions and millions of people around the world in the last years. Kind regards
  6. Hello! Interestingly, a sharp flood attack hindering the DNS detection feature has overlapped the maintenance. It will be used by the maintainer as an opportunity to update the server, rewrite the firewall rules, perform a deep maintenance and check whether the new setup will be able to neutralize the attack. In the meantime all the functions are working except the DNS detection related routines, which are most vulnerable to the type of ongoing attack, according to the web site maintainer. The web site is totally split from AirVPN infrastructure, so there's no time pressure as AirVPN service is completely unaffected, of course. Kind regards
  7. Hello and thank you for your tests! Can you please generate and send us a report after the problem has occurred (the log will be wiped out, but the logcat will still be available)? In the "Log" view please tap the "send" arrow, it will create and send to our servers a full report, and you will be given the link to it. Note down the link or the code and send it to us a in a private ticket, or via e-mail to support@airvpn.org. Thank you! Kind regards
  8. Hello! Also remember to reply, at your convenience, to the support team request for info in your own ticket. Kind regards
  9. @harold.lewis Hello! No malfunctions detected, the behavior is expected, because the device is not connected to any network and correctly Eddie can not initiate a new connection. It's a very different case from the one reported by @183aTr78f9o - in his case the network is up and Eddie tries to reconnect, then an error occurs and an exception is thrown. We would like to cross-check with the logcat the network status. Please follow our previous instructions to send us a report. Do not send us only the log but a whole report (by tapping the "send" icon, i.e. the arrow-like, rightmost icon) and preferably do not publish it here if you don't edit your real IP address beforehand, for you own privacy protection! Send to us, in private via a ticket or an e-mail to support@airvpn.org, only the link. Kind regards
  10. Question for @harold.lewis too: what is in your case an extended period of time? @harold.lewis Can you please send us a report from Eddie via the dedicated option in "Log" view (tap the "send" arrow and note down the code)? You can send us the link to it in a ticket. Kind regards
  11. Hello! We suspect that you have improperly cut the log and therefore the problem is completely different. Just in case, please read here: https://airvpn.org/forums/topic/53004-openssl-error-restart-every-3-secondes/?do=findComment&comment=187787 You will need to renew your client certificate when you use OpenSSL 3 so it's not wasted time in any case. Kind regards
  12. @moejoe Hello! Please read here, it will probably help you: https://eddie.website/support/data-path/ Kind regards
  13. @harold.lewis Hello! With VPN Lock enabled Eddie can not reconnect by itself: the operator intervention is mandatory to manually disconnect and re-connect. When you have enabled Always on VPN and Block traffic if VPN is inactive Android settings you can safely disable VPN Lock which is an obsolete option in Android 8 and higher versions. VPN Lock is still available to prevent leaks on older versions. Can you please test whether the problem you confirmed still occurs with VPN Lock disabled? Kind regards
  14. @moejoe Hello! For comparison purposes which may help us discern whether the problem is OpenVPN, tun interface or Eddie specific, what happens if you use WIreGuard (which only works in UDP)? Kind regards
  15. Hello! We're very glad to inform you that Eddie Android edition 3.0 alpha 3 is now available. The original post has been updated accordingly. New in Alpha 3: bugfix related to WireGuard default MTU size (please test again by setting "0" as MTU size in settings) bugfix related to WireGuard re-connection failure bugfix related to WireGuard profiles parsing some events handling rewrite NEW: (re)connection ability implementation, fixing specific WireGuard failures, for example when switching networks in Android 12 Find full description, download link and SHA256 signature in the first post of this very thread. Thank you very much for your tests and please report and describe any bug you find! Kind regards
  16. Hello! You connect to entry-IP addresses. Such addresses never sends out clients packets to the Internet, so they will never be seen by any destination service. Your outgoing packets are sent out by exit-IP addresses. Therefore it's just the very usual MB nonsense; they tend to include entire IP addresses ranges when one single IP address in the range is reported by someone as a source of malicious activity. For example in 2012 MB blocked hundreds and hundreds of web sites in a Luxembourg datacenter (including our web site) because in the /21 range of those web servers ONE web site was suspected to host a virus. So they blocked 2048 addresses because of ONE single dubious address.. Enough said... Kind regards
  17. @cheapsheep Hello! Bugs were found and fixed. Can you please try again and check whether the problem is resolved? Also, to clarify: speed_read (read bytes per second from client to server, upload for client) speed_write (written bytes per second from server to client, download for client) Last but not least, Eddie reports amounts in (multiples of) bit/s while the API in B/s. Kind regards
  18. @HeyWAZZab33 Hello! Please test Eddie 2.22.0 version, available in the download page by clicking "Other versions" and selecting "Experimental", and feel free to keep us posted. Kind regards
  19. Hello! France servers are not planned at the moment, we're sorry (usual problem of mandatory data retention for hosting providers). We have a "geo-routing" server in France, we may try to "geo-route" services which restrict access to IP addresses geo-located in France: please open a ticket and give the support team the URLs of the services. Kind regards
  20. Hello! Thank you, you're a very long time customer! Please check the following message to resolve the issue quickly: Kind regards
  21. Hello! A Master Password can't be reset by definition. You can delete the local data (the profile stored in your device) while Eddie is not running to re-start from scratch. For Eddie Android edition you can do it from Android app settings, while for Eddie desktop edition you can delete the profile file (while Eddie is NOT running). To locate it, please see here: https://eddie.website/support/data-path/ When you re-start Eddie, a new profile with default settings will be created. You will need to re-enter your AirVPN account credentials. Kind regards
  22. Hello! Brief documentation is here: https://airvpn.org/faq/api/ Yes, in the returned sessions array speed_read and speed_write are in bytes per second. Kind regards
  23. Hello! Since it's clear please feel free to explain, we are very interested in understanding your problem's cause. Kind regards
  24. Hello! We can't reproduce the problem, our connections via WireGuard to Minchir are fine. Kind regards
  25. Hello! We're sorry, we can't find that ticket. We have just read your thread and we will investigate. Kind regards
×
×
  • Create New...