Jump to content
Not connected, Your IP: 18.117.188.105

Staff

Staff
  • Content Count

    11042
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1865

Everything posted by Staff

  1. Hello! We're very glad to inform you that a new 1 Gbit/s (full duplex) server located in Taipei (Taiwan), is available: Sulafat. The server supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server. This is our first server in Taiwan; the tests we have performed during the last week have been encouraging but not totally perfect for our quality standards. Your feedback is welcome and it will be crucial to determine whether this server's datacenter can meet your expectations and requirements. You can check the status in our real time servers monitor: https://airvpn.org/servers/Sulafat/ Kind regards & datalove AirVPN Staff
  2. In that case we can, of course. Kind regards
  3. Hello! Eddie Android edition is a fully integrated with AirVPN, free and open source WireGuard and OpenVPN GUI client. It is based on official WireGuard library and latest OpenVPN3-AirVPN library (free and open source software library by AirVPN), allowing comfortable connections to both OpenVPN and WireGuard servers. All Android versions from 5.1 to 14 are supported. We're very glad to inform you that Eddie Android edition 3.2.0 beta is now available. The main goal is fixing all the known bugs affecting Eddie 3.1.0 stable release which went unnoticed or were not properly fixed through the previous beta testing and releasing a new stable version in a short time. Please check Eddie 3.1.0 new features if you are upgrading from a version older than 3.1.0. Please report at your convenience any bug and problem in this thread. If possible generate a report from the app: by tapping the paper plane icon on the Log view bar rightmost side you will generate a full system report which will include both log and logcat and have it sent to our servers. Then you just need to send us the link the app shows you (open a ticket if you prefer to do it in private). Please remember that, starting from Android TV 10, Always On VPN feature has been stripped off in order to prevent users from connecting to a VPN during an Android TV based system bootstrap. Therefore Eddie start & connection at bootstrap, as well as system built in leaks prevention, are not possible on Android TV 10 and higher versions. For leaks prevention you can rely on Eddie's "VPN Lock" feature. Android TV 9 and older versions can still start Eddie during the bootstrap and have it connected when you activate Always on VPN and configure Eddie accordingly. Eddie 3.2.0 beta changes Eddie Android 3.2.0 beta 2 (VC 33) updated to OpenVPN3 3.11 AirVPN (20240912) updated to OpenSSL 3.3.2 fixed pause/resume button status according to network status change (OpenVPN) fixed a bug which caused the app to rely on VPN servers domain names for AirVPN country connections at device bootstrap fixed a bug which caused the app to crash on some systems if no network was available at device bootstrap fixed a bug which caused a paused OpenVPN connection to resume after a network change fixed AirVPN manifest management, particularly during concurrent network access and VPN startup improved Quick Setting Tile interaction improved VPN connection at startup (device bootstrap) by checking and properly managing critical system and network conditions Eddie Android 3.2.0 beta 1 (VC 33) fixed a pre-packaged manifest issue which caused the app to crash when a profile was imported and the proper manifest could not be downloaded fixed a bug which caused the quick tile button to become unresponsive in some systems after the app was swiped out fixed a bug which caused the app's quick connection button to become unresponsive after or during an OpenVPN session fixed a bug which caused the quick tile button status to get misaligned with the actual app status fixed a bug which caused the app to show a status different from the actual device and/or VPN status fixed a bug which caused the app to ignore the white list at the first connection through the quick tile button and in other circumstances fixed a bug which caused the app not to update the white list after a user already defined it and later changed it added profile deletion multiple selection added an optional real time log view update and refresh Download link https://eddie.website/repository/Android/3.2.0-Beta2/EddieAndroid-3.2.0-Beta2.apk SHA-256 checksum 6e8e0f2ee287467a67c1791de4a3ad779d087ae3d7a865b1deb22051d4639d97 *EddieAndroid-3.2.0-Beta2.apk How to sideload Eddie Android edition on Android TV and FireOS devices https://airvpn.org/android/eddie/apk/tv Kind regards & datalove AirVPN Staff
  4. Hello! Leaseweb SG's Antares is not decommissioned, as we have contractual agreements until August 2025 for it, but due to Leaseweb behavior it is down a lot of time, so we will abandon Leaseweb SG definitively after we have fulfilled our contractual commitment. Kind regards
  5. Hello! Yes, we do have expansion plans in Asia. Kind regards
  6. Hello! This is most puzzling, we'll take this into account with M247. Please perform mtr tests and let us know whether you have the same path to Air and Mullvad servers, if you have time and will. Kind regards
  7. Hello! So it's a problem you experience only with UK servers, and only with upload, right? Does it happen both on London and Manchester? It is not reproducible from our sides so at the moment we have to consider that everything looks fine. Any additional hint from other users is welcome. At least the original problem "slow download" is resolved for everyone. Kind regards
  8. Hello! We do not have any M247 server in the Netherlands. Kind regards
  9. Hello! The CG can generate configuration files for OpenVPN 2.4, 2.5, 2.6, 2.6 no-dco and 3. 2.4 does not support several 2.5 directives, while 2.5 and 2.6 deprecate or do not support anymore some 2.4 directives. 2.6 can be incompatible with 2.6 no-dco. Please make sure to generate a configuration file for the proper OpenVPN version you run. Turn on the "Advanced" switch to see the combo box that lets you select the OpenVPN version of the configuration file ("OpenVPN profile" combo box, default value 2.5). Kind regards
  10. Hello! You might have a cap in UDP upload, very typical of many ISPs throughout the whole European Union, 24h/24 or during peak hours, or even unconditional upload cap for any protocol not white listed (typically they list only HTTP, HTTPS, sometimes FTP). The price of traffic routed outside the ISP local network is very different from the price of incoming traffic and activities like seeding, streaming etc. from a residential line are heavily curbed. If you connect to servers in another country with an identical connection mode, do you see higher upload speed? If you connect OpenVPN over TCP to UK servers do you see any upload improvement? We're glad to see anyway that your download speeds are now very good. Kind regards
  11. Hello! You might have a cap in UDP upload, very typical of many ISPs throughout the whole European Union, 24h/24 or during peak hours, or even unconditional upload cap for any protocol not white listed (typically they list only HTTP, HTTPS, sometimes FTP). The price of traffic routed outside the ISP local network is very different from the price of incoming traffic and activities like seeding, streaming etc. from a residential line are heavily curbed. If you connect OpenVPN over TCP do you see any upload improvement? If you connect to servers in another country with an identical connection mode, do you see higher upload speed? Kind regards
  12. @SiblingHacker Hello! Thank you very much for your tests! Bluetit implements reverse traffic splitting through a dedicated namespace and the utility cuckoo. According to your description, possible malfunctions come from: the fact that you do not run cuckoo utility to start applications inside the namespace aircuckoo. Use cuckoo to start any application whose traffic must be outside the VPN tunnel the fact that you specify a physical network interface that doesn't exist. What is ens1 in your system exactly? Bluetit must find a physical network interface to route the traffic outside the tunnel, it can't create in your hardware a new network card aircuckoo's virtual network interface is attached/paired to the physical network interface to obtain reverse traffic splitting (without any "reverse" DNS leak) any block to the physical network interface, which of course must route even the VPN traffic (although wrapped and encrypted): somewhere the virtual network must use a real, physical network Try to not specify the directive trafficsplitinterface, so you're sure that Bluetit will pick the physical network interface for the namespace aircuckoo for the mentioned attach, thus routing the traffic outside the VPN. Then make sure to start anything you need outside the VPN tunnel via cuckoo. Please feel free to report back. Kind regards
  13. Hello! Bluetit works perfectly in many distributions, but this does not mean that it works perfectly in all the 800 (?) existing Linux distributions. Lubuntu is an Ubuntu derivative, so let's check first whether it is affected by this long standing bug which is still not fixed nowadays on Ubuntu: https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1872015 To verify whether your Lubuntu system is bugged, just send us the output of ls -l /etc/resolv.conf while Bluetit is not running and the system is in pristine conditions. This bug is crucial in DNS management and could explain one (but not all) of the problems you reported. Of course it is not Bluetit developers' responsibility but a workaround can be found and implemented in the next Suite release as we don't think that the bug will be fixed in a reasonable time (it's still unassigned after so many years) so that no manual fix by the user will be needed. The manual fix is simple but it could be beyond the ability of some Ubuntu and Ubuntu derivative users. No, sorry, this is not acceptable when the lock file is existing. This belief was popular on Windows and now it has its supporters among some of systemd zealots, and look what the Linux world of many systemd based distributions have become today (also) as a result of contamination from Windows. An unclean exit that's not inside the range of recoverable causes foreseen by the software, especially when this software is a real daemon modifying routing table, firewall rules and DNS settings, requires investigation by the superuser, otherwise the superuser might be prevented forever to spot and detect an unclean exit, and that would be a huge problem indeed. Unfortunately this is not reproducible on our testing systems and we don't have other similar cases in the tickets. We don't have Lubuntu in testing systems, though, so it might be a distribution specific problem. We will investigate. In the meantime, if you haven't already done so, can you please remove the Suite 1.3.0 and test the 2.0.0 beta 1? Check whether any of the problems you report is solved or not, thanks in advance. To download the Suite 2.0.0 please see here: https://airvpn.org/forums/topic/56704-linux-airvpn-suite-200-beta-available/ Suite 2.0.0 beta 1 addresses various bugs, implements reverse traffic splitting and extends compatibility to a few more distributions, but remember that Lubuntu is not among our testing systems, so your reports will be valuable again. If any problem persists, we need to see again the complete Bluetit log after any problem occurred. Kind regards
  14. @Exactlie Hello! OpenVPN is a system including protocol, client and server applications to establish point-to-point or site-to-site connections in routed or bridged mode. AirVPN infrastructure uses WireGuard and OpenVPN systems (which are quite different) to let customers enter the private network. That's expected. Eddie is an AirVPN software which relies either on OpenVPN binary or WireGuard code to let your system connect to the VPN. To avoid conflicts, if you already launched some OpenVPN program, then you must not run Eddie, and if you run Eddie then you must not run OpenVPN separately (it's Eddie that will launch, configure and manage OpenVPN, if you choose OpenVPN and not WireGuard). If you found nothing blocking UDP in your system or local network and the problem persists then it's possible that the block comes for example from your ISP. Kind regards
  15. Hello! The maintenance work in UK is over. Do you notice any improvement? We see a good performance from Italy and a few countries in Europe. After the maintenance/upgrade a UK server has also reached the Top 10 (!) user speed with 631 Mbit/ to a single client. Kind regards
  16. Hello! Would you disclose those reasons (in private, if necessary)? We have put Hetzner in a black list (to avoid to rent or house servers of any kind in their infrastructure) since 2014 or so, but the reasons for the black listing have been lost in the notes unfortunately after this last decade. Kind regards
  17. Hello! AirVPN DDNS management is not strictly related to your system as the domain names are managed by AirVPN and through your AirVPN account port panel. Please see here: https://airvpn.org/faq/ddns/ DDNS comes very handy together with inbound remote port forwarding, please see here: https://airvpn.org/faq/port_forwarding/ OPNSense configuration should be based on OPNSense manuals, but for the concepts related to AirVPN and a program listening to some specific port on the VPN interface you may also consult this very good pfSense guide: https://nguvu.org/pfsense/pfsense-port-forward/ Kind regards
  18. Ok, you had written a completely different story. In this case, check the best answer in this thread, it tells you all. Kind regards
  19. Hello! Assuming that you are right in reporting that Hetzner doesn't want torrent at all, then we say that it should be avoided because forbidding torrents hinders distribution of content, in particular free and open source software, blocks applications that may be useful or vital for a user of a dedicated or virtual server, and in general affirms the dangerous principle according to which it is reasonable to offer a subset of Internet application layer protocols by discriminating a specific protocol at a specific higher layer on a datacenter. It may also be matter of debate for potential breach of the regulatory framework set by EU 2018/1972 Directive etc. No discrimination or white listing at transport layer and application layer should be enforced. Can you point us and the readers to the policy where it is stated that BitTorrent is not allowed in Hetzner infrastructure? Kind regards
  20. @georgek3r Hello! Hetzner can not prove which protocol/application you run in the VPN tunnel and what type of traffic you tunnel, as we do not have servers in Hetzner infrastructure, but it can see that you run qBitorrent if personnel accesses your server from KVM/IPMI (and potentially this is possible). If your server is virtual, they can see it even more easily. If (and only if) what you claim is true (we have no idea), Hetzner should be avoided because p2p protocols, including BitTorrent, are very important to the Internet today and used by a wide variety of services. Connecting to a VPN server in a country different from the one you live in is a golden rule that can make life harder to snoopers and wiretappers as the servers are in different networks and different jurisdictions. Assuming no traffic leaks outside the VPN tunnel (important!), any activity observed by an external observer will be seen as coming from the VPN server exit-IP address and the correlation to your Hetzner IP address is impossible unless the observer is a very powerful adversary (NSA for example, or an entity monitoring the whole "your home country" infrastructure in real time and globally - another reason to pick a server outside your home country) or your system is compromised (remember how any VM can be easily observed by dc personnel). Kind regards
  21. @OpenSourcerer Hello! Our source is M247 only. The problem affected intra-Asia connectivity and Europe to Asia connectivity at least and was visible on the other provider in Singapore (Leaseweb SG) too. From Europe you should have been able to see for example troubles on NTT when you reached Japan and Singapore. The problem was generally limited to some notable congestion on peak times but some packet loss was visible frequently. As of yesterday night (CEST) some problems seem solved and the connectivity has improved remarkably. The last ETR reports Sep-23 but that's a worst case, it looks like some repairs were completed if you look at performance (we may ask for a new report in a few days if problems re-appear after that date). Kind regards
  22. @Fred H Hello! No domain names exist for bootstrap server IP addresses but we see that they are not blocked, in spite of what you wrote Eddie can talk with them fine. From the report the problem is different, apparently it's the VPN connection (by WireGuard in your case) that's blocked, probably you just need to require no restriction against UDP toward one of the WireGuard ports of our servers (1637, 51820). Kind regards
  23. Hello! Thanks, problem understood. A bug fix is coming in the very near future. Kind regards
  24. Hello! Eddie also sends out data to bootstrap servers over HTTP, toward port 80. The data is encrypted. Additional checks you might like to perform are: make sure that the system does not block HTTP connections without a domain name resolution (Eddie uses direct IP addresses, and this behavior can be blocked by specific security systems) make sure that the system does not block encrypted data inside an HTTP flow to port 80 Also feel free to send us a system report generated by Eddie if you want that we examine what apparently goes wrong. Kind regards
  25. @ltwally Hello! The bluetit.lock file shows that Bluetit is right in claiming "It seems Bluetit did not exit gracefully or has been killed." etc. While Bluetit is not running delete that file and set the proper DNS for your system to restore a clean status. If you killed Bluetit without grace this behavior is fine. But if your did not, then the reasons of the previous crash should be investigated. As soon as the problem re-surfaces please send us the complete Bluetit log from journalctl. Kind regards
×
×
  • Create New...