Jump to content
Not connected, Your IP: 13.58.36.141

Staff

Staff
  • Content Count

    10598
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1761

Posts posted by Staff


  1. 1 hour ago, spinmaster said:

    What is or was the main intention to choose WireGuard as the (new) default protocol over OpenVPN? I never had any issue with one or the other in Eddie, but I'm just curious.


    Hello!

    Some preliminary considerations:
    https://airvpn.org/forums/topic/56989-can-the-10g-full-duplex-servers-operate-at-nearly-or-full-bandwidthcapacity/?do=findComment&comment=228405

    Also, the choice is not hard coded. The connection mode picked when "Automatic" is selected may now be driven by the bootstrap servers' manifest file. We would gladly welcome feedback on the current WireGuard choice as well.

    Kind regards
     

  2. Hello!

     

    We're very glad to inform you that a new Eddie Air client version has been released: 2.24 beta. It is ready for public beta testing.

     

    How to test our experimental release:


    This is a new version of Eddie Desktop (Windows / Linux / MacOS).
    We know there is still 2.21.8 as stable, and 2.22.x and 2.23.x series never reached the stable version.
    We hope that this version 2.24.x will be tested and reach a stable release.

    Internally (in terms of development and code) it represents a significant step forward for us: the CLI editions are compiled with dotnet 7, without Mono, Xamarin and any dependency on NetFramework (Windows) or Mono (Linux, MacOS). 
    All CLI projects can be opened in Visual Studio Code and debugged on any OS (macOS, Linux, Windows) without the need to use Xamarin, Visual Studio or Visual Studio for Mac. 
    A new UI is in the works that will finally remove the dependency on Mono and Xamarin, but we don't have a release date to announce yet. 
    The MacOS CLI is new (previously there was only the UI, or the UI with "-cli"), and it's also native for arm64. 
    Overall, there has been a significant effort to clean up and modernise the code, and to prepare our build/deploy scripts for the new UI as well. 

    We understand that there are still tickets or posts that we haven't responded to yet, but we preferred to complete this step first.

    Main changelog:
    • [new] WireGuard is now the default communication protocol
    • [new] All CLI editions can be compiled and debugged with VSCode and .NET7
    • [new] [macOS] CLI-only edition, built with .NET7, without Xamarin
    • [new] New commandline only option "elevated.method"
    • [change] OpenVPN 2.6.9
    • [change] [linux] CLI edition, built with .NET7, without Mono
    • [change] [linux] .deb and .rpm, removed Mono dependency
    • [change] [linux] .deb package tries to initialize elevated service at install/uninstall, .rpm package still missing this feature.
    • [change] [windows] CLI edition, built with .NET7
    • [change] [all] Better management of SIGTERM signal
    • [change] [all] Don't check if app dir is writable for portable-mode, now managed by presence of "portable.txt".
    • [bugfix] [linux] terminal issue with sudo elevation
    • [deprecation] [all] -cli mode for UI. Use CLI edition directly, now available in all supported platform.
    • [deprecation] [windows] Vista builds
    • [deprecation] [windows] Windows Firewall Network Lock mode
    • [deprecation] [linux] x86 builds
    • [deprecation] [linux] Portable Mono builds

     

  3. 28 minutes ago, cspr said:

    With VPN
    626 [Mbit/s] down / 606 [Mbit/s] up


    Hello!

    Excellent in our infrastructure even on agnostic networks. We would not modify anything else, especially because you are in a network that's shaping VPN traffic.
     
    28 minutes ago, cspr said:

    guess there is no "non heavy CPU" solution to get around traffic shaping?


    Obfuscation in place of true encryption is less CPU intensive but the solution you adopted is solid. According to a recent paper by Usenix titled OpenVPN is Open to VPN Fingerprinting, OpenVPN over SSH has a filter rate of 0.32, making it the third best technique to defeat filters against OpenVPN.

    Kind regards
     

  4. @cyberslav

    Hello!

    Eddie needs pkexec but it is not pre-installed. Please install it and the problem should get solved. Usually it is included in the policykit-1 package:
    sudo apt install policykit-1

    but it could now have its own package in 23.10:
    https://ubuntu.pkgs.org/23.10/ubuntu-main-amd64/pkexec_123-1_amd64.deb.html

    After the installation you should see (among other new files) /usr/bin/pkexec and Eddie will find it as the directory is in the command path.

    Kind regards
     

  5. 10 hours ago, sinthome said:

    I would prefer to just use auto select, set and forget, but am I missing out on a faster server closer to me?


    Hello!

    If you prefer that Eddie picks always a server in the USA please open the "Countries" window, select the United States and click the green check-mark on the right. USA servers will be added to the countries' white list. Eddie chooses, at each session, the highest rated server among those included in a white list.
     
    10 hours ago, sinthome said:

    why is the client called Eddie?


    It is a tribute to Douglas Adams: https://en.wikipedia.org/wiki/List_of_The_Hitchhiker's_Guide_to_the_Galaxy_characters#Eddie
     
    10 hours ago, sinthome said:

    Thanks! I'm really happy to have found a decent VPN, hopefully I'll be with AirVPN for a long time! 


    That's great. Welcome aboard!

    Kind regards
     

  6. @visy

    Hello!

    Apparently either UDP packets or OpenVPN are blocked. Please check any packet filtering tool both on your system and router. On the router check any "Quality of Service" or "traffic management" tool as well.  Also, test a connection through WireGuard. It works only in UDP so if it can connect successfully then you know that the block is OpenVPN or port specific, and not against UDP in general. To have Eddie switch to WireGuard:
    • from Eddie's main window please select "Preferences" > "Protocols"
    • uncheck "Automatic"
    • select any line with WireGuard, for example WireGuard port 51820. The line will be highlighted.
    • click "Save" and re-start a connection to apply the change
    • please make sure to test a few servers in different locations around your node

    Kind regards
     

  7. 21 hours ago, AuContraire said:

    Which of the AirVPN Suite packages do you suggest I use?  The only one that seems specifically for Raspberry is the 32 Bit and I know that the 32 bit version of Eddie will not even install.


    Hello!

    Please avoid the 32 bit version. You need the 64 bit version (NOT the legacy version), direct link:
    https://eddie.website/repository/AirVPN-Suite/1.3.0/AirVPN-Suite-aarch64-1.3.0.tar.gz

    Kind regards
     

  8. Hello!

    We're very glad to inform you that 6 new 1 Gbit/s (full duplex) servers located in Miami, Florida (USA), are available: Aladfar, Ascella, Chertan, Elkurud, Giausar, Meleph.

    The servers supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Aladfar
    https://airvpn.org/servers/Ascella
    https://airvpn.org/servers/Chertan
    https://airvpn.org/servers/Elkurud
    https://airvpn.org/servers/Giausar
    https://airvpn.org/servers/Meleph

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff

    miami-5152178_1280._strip.jpeg.thumb.jpg.c8ae56239d10030da51c25318a993edf.jpg


  9. 12 hours ago, Moat said:
    Reality is the Swiss data center has to log anything which crosses the border for the Stasi .

    Hello!

    Sorry, but your message contains FUD and fantasy. The Swiss Federal law about the Surveillance of the Post and Telecommunications enforces 6 months of metadata and e-mail headers retention to ISPs with more than 100 M CHF of revenue per year for at least two years in a row or receiving more than 100 requests of information in a single year. All the exemptions and obligations here. Furthermore, your alleged retention obligation of encrypted transiting data in unencrypted form not only is not required, but it is also physically impossible when the ISPs don't have the decryption keys, i.e. always, for any practical purpose (impossible every time end-to-end encryption is used). In this case the law does not try to enforce something impossible, at least.

    Kind regards
     

  10. @KingBletsoe

    Hello!

    The Phantom virtual network adapter might be the culprit. Please try to force Eddie not to use other adapters and check whether the problem gets solved:
    https://airvpn.org/forums/topic/56643-stuck-in-a-broken-route-never-connects/?tab=comments#comment-225323

    If the problem persists you might suffer a block against UDP or OpenVPN. Please try to switch to WireGuard:
    • from Eddie's main window please select "Preferences" > "Protocols"
    • uncheck "Automatic"
    • select any line with WireGuard, for example WireGuard port 51820. The line will be highlighted.
    • click "Save" and re-start a connection to apply the change
    • please make sure to test a few servers in different locations around your node
    WireGuard works in UDP too, so if you have a block against UDP WireGuard will be blocked too. In this case please examine the packet filtering rules in your Windows system. We can claim that your ISP and/or your router are not the culprits because a similar connection works from your Linux device (assuming that both systems Internet connectivity is served by the same ISP and router).

    Kind regards
     

  11. @discov

    Hello!

    Please reset the TCP/IP stack of the Operating System of the device with the issue. If this and/or a device reboot resolves the problem, please make sure that the network interface driver is up to date. If the problem persists after the mentioned operations but is resolved only after the router has been rebooted, please upgrade the router firmware, if possible.

    Kind regards
     

  12. Hello!

    We inform you that the all the servers in Miami, Florida (US), will be withdrawn and replaced by six different 1 Gbit/s servers. The replacement is part of our ongoing process to rationalise infrastructure and upgrade hardware in the US. New servers announcement will follow in the very near future.

    The servers which will be replaced are: Acamar, Cursa, Gudja, Kang, Minelauva, Yildun.

    Kind regards and datalove
    AirVPN Staff

     


  13. @amccombs

    Hello!

    UDP or OpenVPN might be blocked. Please make sure that no packet filtering tools, either on your system or router, block UDP. On the router please check any "Quality of Service" or traffic management tool. If you find nothing potentially interfering, please try a connection through WireGuard, just in case your ISP has some block against OpenVPN or specific ports. In order to have Eddie switch to WireGuard:
    • from Eddie's main window please select "Preferences" > "Protocols"
    • uncheck "Automatic"
    • select any line with WireGuard, for example WireGuard port 51820. The line will be highlighted.
    • click "Save" and re-start a connection to apply the change
    • please make sure to test a few servers in different locations around your node
    Kind regards
     

  14. On 2/15/2024 at 11:28 PM, DarkSilver said:

    At this point it is Impossible to move the selection to ANY direction.

    Is this a bug?


    Hello!

    Can you please tell us the FireOS version in your Fire device? Also, please be aware that the Eddie version in the Amazon store is outdated, as Amazon will not accept any newer version due to their policy forbidding apps that may invite to create an account on some web site but not accepting payments through Amazon payment system inside the app itself, a condition which we have no intentions to comply with (we will remove the app in the future from Amazon if terms don't change). So, if you're running an Eddie version that's older than 3.0, please download and install the latest Eddie Android edition APK from our web site and follow the instructions to side load it: https://airvpn.org/android/eddie/apk/tv/

    If you are already running Eddie Android edition latest version (3.0 at the moment) further investigation is needed. When the app becomes unresponsive shut it down, re-run it and send us a report (it will include the logcat, so it should show also what happened when it froze). To send us a report, please open the "Log" view, tap the paper plane icon on the top and send us the link that the app will give you back. For privacy reasons you might like to open a ticket to send us the link to the full report.

    Also, keep in mind that when you run Eddie Android edition, you don't need configuration files to connect to AirVPN servers, as the app is fully integrated with AirVPN infrastructure.

    Kind regards
     

  15. @NaDre

    Hello!

    Extradition process pertains to criminal offenses so it is inappropriate to mention it here. Quad9 was already challenged in a German court by Sony Germany following a preliminary injunction against Quad9 with the Regional Court in Hamburg to force Quad9 to stop resolving certain domain names. Quad9, according to their press release, received another request by Sony Italia et al. for other DNS poisoning before the previous appeal trial was concluded. In order not to open multiple legal fronts they momentarily complied. Now that Quad9 won clearly against Sony Germany who knows, they could decide to refuse Sony Italia et al. requirements as well and see whether, after the important victory in court which sets a great precedent in Germany, Sony Italia et al. can manage to obtain some preliminary injunction by some court or not. We're talking here of attempts which are matter for civil law, nobody ever called for any criminal offense.

    The above case pertains to requests by private actors to other private actors. A request by a Telecommunication Authority of a country to a private company in a foreign country should follow the proper jurisdictional channels through the courts and/or the Authority of the foreign country, if at all possible, and to date it is not known at least for what we know. The harmonization of the Single Market should aim at avoiding inconsistencies between Member States in policy matters which fall under the EU competence so some of your questions still remain unanswered.

    Kind regards
     

  16. @matmat

    Hello!

    WireGuard doesn't ever remove the public IP address of the peer. It must be done by a specific non-WireGuard task which does it for each session who had no handshake in any given 180 s timeframe. Therefore, this important WireGuard problem is greatly mitigated because the public IP addresses of the peers will not remain forever on the VPN servers (which is a grave privacy concern), but only for 3 minutes after a disconnection. "Reapplied" is just a glitch in the description, you can ignore it. Just use OpenVPN if this mitigation is not enough for your needs or threat model.

    Kind regards
     

  17. @go558a83nk

    Hello!

    😋 You are mentioning a case requiring a specific pre-routing and a specific forward rule on your pfSense machine which takes care of the additional forwarding strictly needed in this case. It's the pfSense machine with acts as a router, builds a NAT for any other device and also connects to the VPN server as its virtual upstream. pfSense then decides how the NAT operates, for example it pre-routes and forwards incoming packet reaching its VPN interface port 32400 to 192.168.1.4:32400 (port 32400 of the IP address of the physical interface of the machine running Plex).

    By the way nothing changes indeed: when you modified your AirVPN account port panel, note that you were obliged to modify the pfSense rule as well (you changed XUANGE_WG interface port 27183 to 32400), otherwise the rule would have never been fired, as nothing was sent to port 27183, and you would have had the same problem of the OP, obviously.

    The main difference with @robzeta setup which must be taken into account to offer correct suggestions is that robzeta's Plex receives packets on its sytstem's virtual tun interface (therefore "External port" in Plex settings terminology), while in your setup Plex receives packets on the physical network interface ("Internal port", in Plex terminology) thanks to the in-between NAT built by your router, but the principles are all the same.

    The original problem could be resolved therefore in two alternative ways:
    1. modify Plex settings to have it listen to port 32400 even as "external port" and leave VPN remote port "re-mapped" to client port 32400
    2. modify the port panel to forward remote VPN port 39186 to VPN client port 39186 (same numbers, no "re-mapping") and leave Plex listen to "external port"  39186

    robzeta resolved by applying the 2nd method.

    Kind regards
     

  18. 12 hours ago, vfgbgsbgfvfcwed said:

    I think the use of ram disks is very good. But what if something is plugged into the server? E.g. USB sticks, cables, keyboards or similar? Are the servers protected against such "attacks"? Ram disks help against taking the servers but not against someone sitting down at the server and looking in.


    Hello!

    The other questions are answered in the ToS, specification page and Privacy Notice, therefore we invite you to read those documents, further clarifications may come from the community or from us if necessary:
    https://airvpn.org/tos The Terms of Service
    https://airvpn.org/privacy The privacy notice and terms, scroll down for additional safety measures according to best practices as well as GDPR prescriptions
    https://airvpn.org/specs Specs overview

    In AirVPN, the problem you mention is not related to USB specifically, because USB support is disabled on the kernel of our servers and any reboot to make the server re-start to run a different kernel in order to plug secretly USB devices will cause the server to be rejected by the infrastructure, but adversaries don't need to plug in USB peripherals. A more effective attack comes from outside the server and a defense against this attack is not possible on the server itself (simply because the adversary does not interfere with or touch the server), it must come from a pro-active action by the user. Please see here:
    https://airvpn.org/forums/topic/57163-pen-register-connection-logging-on-airvpn-server-janfeb-2020/

    Kind regards
     
×
×
  • Create New...