Jump to content
Not connected, Your IP: 216.73.216.156

Staff

Staff
  • Content Count

    11650
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    2075

Reputation Activity

  1. Like
    Staff got a reaction from Zerolight in Three new 10 Gbit/s servers available (CA)   ...
    Hello!

    We're very glad to inform you that three new 10 Gbit/s full duplex servers located in Toronto (Ontario), Canada, are available: Castula, Chamukuy and Elgafar. 

    The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. They support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the status as usual in our real time servers monitor :
    https://airvpn.org/servers/Castula
    https://airvpn.org/servers/Chamukuy
    https://airvpn.org/servers/Elgafar/
     
    Do not hesitate to contact us for any information or issue.

    Kind regards & datalove
    AirVPN Staff

  2. Like
    Staff got a reaction from Zerolight in Three new 10 Gbit/s servers available (CA)   ...
    Hello!

    We're very glad to inform you that three new 10 Gbit/s full duplex servers located in Toronto (Ontario), Canada, are available: Castula, Chamukuy and Elgafar. 

    The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. They support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the status as usual in our real time servers monitor :
    https://airvpn.org/servers/Castula
    https://airvpn.org/servers/Chamukuy
    https://airvpn.org/servers/Elgafar/
     
    Do not hesitate to contact us for any information or issue.

    Kind regards & datalove
    AirVPN Staff

  3. Like
    Staff got a reaction from Andrew109 in Eddie Android edition 4.0.0 preview available   ...
    Hello!
     
    We're very glad to announce that Eddie Android edition 4.0.0 Beta 1 is now available.
    This is a major update: for the first time Eddie Android edition features AmneziaWG complete support.

    Eddie Android edition is a fully integrated with AirVPN, free and open source client allowing comfortable connections to AirVPN servers and generic VPN servers offering compatible protocols. Eddie 4.0.0 aims primarily at adding, besides the already available OpenVPN and WireGuard, a thorough and comfortable AmneziaWG support. 

    AmneziaWG is a free and open source fork of WireGuard by Amnezia inheriting the architectural simplicity and high performance of the original implementation, but eliminating the identifiable network signatures that make WireGuard easily detectable by Deep Packet Inspection (DPI) systems. It can operate in several different ways, including a fallback, "compatibility mode" with WireGuard featuring anyway various obfuscation techniques.
     
    What's new in Eddie 4.0.0
      AmneziaWG support Amnezia WireGuard API updated OpenSSL, OpenVPN3-AirVPN and WireGuard libraries see the complete changelog below  
    AmneziaWG overview
      From the official documentation: https://docs.amnezia.org/documentation/amnezia-wg AmneziaWG offers:
    Dynamic Headers for All Packet Types (compatibility with WireGuard: YES)
    During tunnel initialization, the library generates a set of random constants applied to each of the four WireGuard packet formats: Init, Response, Data, Under‑Load. These constants:
    Replace predictable WireGuard packet identifiers; Shift offsets of Version/Type fields; Modify reserved bits. As a result, no two clients have identical headers, making it impossible to write a universal DPI rule.
     
    Handshake Length Randomization (compatibility with WireGuard: NO)
    In WireGuard, the Init packet is exactly 148 bytes, and the Response packet is exactly 92 bytes. AmneziaWG adds pseudorandom prefixes S1 and S2 (0-64 bytes by default):
    len(init) = 148 + S1 len(resp) = 92  + S2 Offsets of the remaining fields are automatically adjusted, and MAC tags are recalculated accordingly. In order to keep backward compatibility with WireGuard, S1 and S2 must be set to 0. 
      Obfuscation Packets I1-I5 (Signature Chain) & CPS (Custom Protocol Signature) (compatibility with WireGuard: partial, with fallback)
    Before initiating a "special" handshake (every 120 seconds), the client may send up to five different UDP packets fully described by the user in the CPS format. In this way AmneziaWG can mimic perfectly QUIC, DNS and other protocols adding powerful methods to circumvent blocks. QUIC is particularly interesting as HTTP/3 is built on it and currently, from Chrome and other compatible browsers, 50% of traffic to/from Google is QUIC traffic. Therefore, blocking QUIC may have major disruptions for any ISP.
     
    Junk‑train (Jc) (compatibility with WireGuard: YES)
    Immediately following the sequence of I-packets, a series Jc of pseudorandom packets with lengths varying between Jmin and Jmax is sent. These packets blur the timing and size profile of the session start, significantly complicating handshake detection.
     
    Under‑Load Packet (compatibility with WireGuard: YES)
    In WireGuard, a special keep-alive packet (“Under-Load”) is used to bypass NAT timeouts. AmneziaWG replaces its fixed header with a randomized one, the value of which can be set manually. This prevents DPI from filtering short ping packets, ensuring stable tunnel connections, especially on mobile networks.
     
     
    How to use Eddie with AmneziaWG

    To enable AmneziaWG mode, just tap the connection mode available in the main and other views. It will rotate between WireGuard, AmneziaWG and OpenVPN. Set it to AmneziaWG. In its default AmneziaWG mode, Eddie will use all the possible obfuscation, except protocol mimicking, that keeps WireGuard compatibility, thus allowing connections to AirVPN servers. The default settings choice was possible thanks to the invaluable support of persons living in countries where VPN blocks are widespread. Such settings have been tested as working and capable to bypass the current blocking methods in various countries. You may consider to modify them if they are ineffective to bypass "your" specific blocks.
      In Settings > Advanced, you will find, at the bottom of the page, a new "Custom Amnezia WG directives" item. By tapping it you will summon a dialog that will let you customize any possible AmneziaWG parameter.

    You can maintain backward compatibility with WireGuard in the dialog WireGuard section, or enable the full AmneziaWG support in the Amnezia section, which is not compatible (at the moment) with AirVPN WireGuard servers. This mode will be mostly valuable in a not distant future, when AirVPN servers will start to support AmneziaWG natively. You may also enable QUIC or DNS mimicking for additional obfuscation efficacy. 

    In order to maintain WireGuard backward compatibility, with or without QUIC or DNS mimicking, you must set:
    S1 = S2 = 0
    Hn ∈ {1, 2, 3, 4}
    H1 ≠ H2 ≠ H3 ≠ H4

    Furthermore, do not exceed the valid limit of the J parameters (anyway Eddie will not let you do it). In this preview version, Eddie's formal control of the input data is based on the following document. We strongly recommend you read it if you need to modify manually parameters:
    https://github.com/amnezia-vpn/amneziawg-linux-kernel-module?tab=readme-ov-file#configuration


    Please do not modify In parameters if you don't know exactly what you're doing. 

    Eddie implements QUIC and DNS mimicking and random obfuscation packets for each specific "I" parameter (by using the corresponding "Generate" button). You can enable them with a tap on the proper buttons. You may mimic QUIC and DNS even to connect to WireGuard based servers.

    When you enable QUIC mimicking and you maintain WireGuard backward compatibility, you add a powerful tool against blocks, because the first packets will be actual QUIC packets. AmneziaWG will fall back to WireGuard compatibility very soon. However, when DPI and SPI tools, and demultiplexers in general, identify the initial QUIC flow, most of them will be unable to detect a WireGuard flow for several minutes. This has been tested thoroughly with deep packet inspection on Linux and FreeBSD based machines by AirVPN staff.

    Therefore, in different blocking scenarios the QUIC mimicking increases likelihood of successful block bypass. NOTE: the same does not happen with DNS mimicking. In this case DPI / SPI tools identify the stream initially as DNS, but are much quicker (just in a few dozens of packets) to identify the stream as WireGuard's, after the initial DNS identification.
     
    If you decide to test, please report at your convenience any bug and problem in this thread. If possible generate a report from the app in a matter of seconds: by tapping the paper plane icon on the Log view bar rightmost side you will generate a full system report which will include both log and logcat and have it sent to our servers. Then you just need to send us the link the app shows you (open a ticket if you prefer to do it in private).  
    Download link, checksum and changelog
    https://eddie.website/repository/Android/4.0.0-Beta1/EddieAndroid-4.0.0-Beta-1.apk
     
    This is a build debug package and side load is mandatory.
     
    $ sha256sum EddieAndroid-4.0.0-Beta-1.apk 617269290a0406237646cc0885e5b10f3916252f89fe82ba9ccb947354980fcb EddieAndroid-4.0.0-Beta-1.apk
    Changelog 4.0.0 (VC 37) - Release date: 26 November 2025 by ProMIND
    Native Library
    [ProMIND] updated to version 4.0.0, API 10 [ProMIND] added Amnezia WireGuard API [ProMIND] updated to OpenVPN-AirVPN 3.12 (20251126)
    AirVPNUser.java
    [ProMIND] getWireGuardProfile(): added Amnezia support

    ConnectAirVPNServerFragment.java
    [ProMIND] showConnectionInfo(): added AmneziaWG logo display [ProMIND] onCreateContextMenu(): added AmneziaWG items [ProMIND] onContextItemSelected(): added AmneziaWG items [ProMIND] added method loadVPNProfile()
    ConnectVpnProfileFragment.java
    [ProMIND] added Amnezia support
    EddieLibraryResult.java
    [ProMIND] added Amnezia WireGuard API
    QuickConnectFragment.java
    [ProMIND] onCreateView(): added AmneziaWG logo display [ProMIND] updateStatusBox(): added AmneziaWG logo display
    SettingsActivity.java
    [ProMIND] added "Custom AmneziaWG directives" setting
    SettingsManager.java
    [ProMIND] added Amnezia specific settings and methods
    SupportTools.java [ProMIND] removed method getVPNProfile()
    VPN.java
    [ProMIND] added methods enableAmneziaWireGuard() and isWireGuardAmneziaEnabled()
    VPNManager.java
    [ProMIND] added method isWireGuardAmneziaEnabled()
    VPNProfileDatabase.java
    [ProMIND] added AMNEZIA type
    WebViewerActivity.java
    [ProMIND] EddieWebViewClient.shouldOverrideUrlLoading(): it now properly opens android asset files
    WireGuardClient.java
    [ProMIND] added WireGuard tunnel node to constructor  [ProMIND] added methods for generating Amnezia's junk settings
    WireGuardTunnel.java
    [ProMIND] added support for Amnezia WireGuard [ProMIND] added Mode enum [ProMIND] added tunnel node to constructor 
    EddieLibrary.java
    [ProMIND] added Amnezia WireGuard API
    Kind regards & datalove
    AirVPN Staff
  4. Like
    Staff got a reaction from EMULE in New 10 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 10 Gbit/s full duplex server located in Los Angeles, California, is available: Revati.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Revati supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.
    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the status as usual in our real time servers monitor , by clicking the server name. Direct link: https://airvpn.org/servers/Revati

    Do not hesitate to contact us for any information or issue.

    Kind regards & datalove
    AirVPN Staff

     

  5. Like
    Staff got a reaction from Zerolight in Three new 10 Gbit/s servers available (CA)   ...
    Hello!

    We're very glad to inform you that three new 10 Gbit/s full duplex servers located in Toronto (Ontario), Canada, are available: Castula, Chamukuy and Elgafar. 

    The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. They support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the status as usual in our real time servers monitor :
    https://airvpn.org/servers/Castula
    https://airvpn.org/servers/Chamukuy
    https://airvpn.org/servers/Elgafar/
     
    Do not hesitate to contact us for any information or issue.

    Kind regards & datalove
    AirVPN Staff

  6. Like
    Staff got a reaction from Zerolight in Three new 10 Gbit/s servers available (CA)   ...
    Hello!

    We're very glad to inform you that three new 10 Gbit/s full duplex servers located in Toronto (Ontario), Canada, are available: Castula, Chamukuy and Elgafar. 

    The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. They support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the status as usual in our real time servers monitor :
    https://airvpn.org/servers/Castula
    https://airvpn.org/servers/Chamukuy
    https://airvpn.org/servers/Elgafar/
     
    Do not hesitate to contact us for any information or issue.

    Kind regards & datalove
    AirVPN Staff

  7. Thanks
    Staff got a reaction from Tech Jedi Alex in DBusConnectorException causes shutdown of bluetit.service daemon   ...
    Hello!
     
    Hold on @Tech Jedi Alex, you hit the mark.

    You were just misled by this:
     
    0777 is for a directory, but for data files the default is 0666, here's why the user ends up with 644:
     
    For the reader, if the umask is 022, the newly created file by root will get 644 (rw-r--r--) (the complement of 666 with 022 in octal) which causes the first problem. So that's why /sbin/bluetit doesn't have x even though it does in the extracted package. It doesn't matter that the original bluetit file has 755, the umask starts from 666.

    cp in the original script lacks the -p option so this problem should get resolved by your change with install (it should be solved even by adding "-p" to the cp command, or an additional chmod of course). It looks like a long time installation script issue that went always and strangely unnoticed. Noted down for a fix in the next release or a package hot fix, we'll see. Apparently there is another problem too but maybe it's not related to Suite's installation, we'll keep following the thread.

    Kind regards
     
  8. Like
    Staff got a reaction from v1c705 in Two new 10 Gbit/s servers available (NL)   ...
    Hello!

    The AirVPN integration is kindly maintained by GlueTun developer. In brief, servers information is retrieved from the servers,json file which is updated several times a year. When starting up, Gluetun merges the hardcoded list and the contents of servers.json, preferring newer data and including any custom entries marked to be kept. For more details and a more accurate description please see here:
    https://deepwiki.com/qdm12/gluetun/6-server-management

    At this moment, while we're writing this message, the servers in Amsterdam have not yet been added. You can wait for the next update, or you may add them manually, by abiding to the json format. Alternatively you can point directly, through the proper environment variable, to the correct entry-IP address of the server you wish to connect to. In such cases you find all the information you need on the server status page https://airvpn.org/status and by generating a configuration file with the Configuration Generator.

    Here's an example for Vindemiatrix, only for WireGuard connections. This sub-block must be inserted in the correct position inside the airvpn block: study the file structure to quickly understand. Make sure to edit the file while no container is running. { "vpn": "wireguard", "country": "Netherlands", "region": "Europe", "city": "Amsterdam", "server_name": "Vindemiatrix", "hostname": "nl3.vpn.airdns.org", "wgpubkey": "PyLCXAQT8KkM4T+dUsOQfn+Ub3pGxfGlxkIApuig+hk=", "keep": true, "ips": [ "94.228.209.212" ] }, You then need to restart the container(s) in order to merge the current list with the edited one. The "Keep": true line/flag (inside the server definition) ensures that the server will not be wiped out if you rebuild the server list.

    Kind regards
     
  9. Like
    Staff got a reaction from Zerolight in Three new 10 Gbit/s servers available (CA)   ...
    Hello!

    We're very glad to inform you that three new 10 Gbit/s full duplex servers located in Toronto (Ontario), Canada, are available: Castula, Chamukuy and Elgafar. 

    The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. They support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the status as usual in our real time servers monitor :
    https://airvpn.org/servers/Castula
    https://airvpn.org/servers/Chamukuy
    https://airvpn.org/servers/Elgafar/
     
    Do not hesitate to contact us for any information or issue.

    Kind regards & datalove
    AirVPN Staff

  10. Thanks
    Staff reacted to 4eNJaeEnp9oF in Three new 10 Gbit/s servers available (CA)   ...
    Congratulations on the launch. This is great news for CA which has had most of its 2 Gbit/s servers pretty saturated during peak hours. Hopefully the ghost of Wurren does not come back to haunt us.
  11. Thanks
    Staff reacted to Tech Jedi Alex in Three new 10 Gbit/s servers available (CA)   ...
    Should be Elgafar, right?  Was briefly confused that eldafar had no IP.
  12. Thanks
    Staff reacted to Pit61 in Fresh Tomato setup   ...
    Here is my working Open VPN config on a Netgear R7000 with Fresh Tomato:



  13. Like
    Staff got a reaction from KnightRiderX420 in Plex Media server port forwarding issue   ...
    Thank you very much. 

    For the readers: the key information here and other threads where the problem could be resolved swiftly is that it does not matter how you configure it: Plex will always listen to port 32400 of the VPN interface. Therefore, AirVPN's port "re-mapping" function comes handy. Once you choose a random port for your Plex server on your AirVPN account port panel, fill the "Local" field with "32400". Reach the Plex server from the Internet on the port remotely forwarded and the VPN server will take care to forward the packets to port 32400 of your local VPN interface.

    Kind regards
     
  14. Like
    Staff got a reaction from EMULE in New 10 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 10 Gbit/s full duplex server located in Los Angeles, California, is available: Revati.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Revati supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.
    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the status as usual in our real time servers monitor , by clicking the server name. Direct link: https://airvpn.org/servers/Revati

    Do not hesitate to contact us for any information or issue.

    Kind regards & datalove
    AirVPN Staff

     

  15. Like
    Staff got a reaction from EMULE in New 10 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 10 Gbit/s full duplex server located in Los Angeles, California, is available: Revati.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Revati supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.
    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the status as usual in our real time servers monitor , by clicking the server name. Direct link: https://airvpn.org/servers/Revati

    Do not hesitate to contact us for any information or issue.

    Kind regards & datalove
    AirVPN Staff

     

  16. Like
    Staff got a reaction from EMULE in New 10 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 10 Gbit/s full duplex server located in Los Angeles, California, is available: Revati.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Revati supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.
    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the status as usual in our real time servers monitor , by clicking the server name. Direct link: https://airvpn.org/servers/Revati

    Do not hesitate to contact us for any information or issue.

    Kind regards & datalove
    AirVPN Staff

     

  17. Like
    Staff got a reaction from tw0fer in AirVPN on mobile phone in China   ...
    @itsmeprivately

    Hello!

    Please try the following settings (usually they are strictly necessary to bypass China blocks): switch to OpenVPN (if you haven't already done so) by tapping the icon "VPN Type" on the main view. Each tap switches between WireGuard and OpenVPN. force connection over TCP to port 443 in the following way: open "Settings" and expand "AirVPN" by tapping on it tap "Default OpenVPN protocol", select "TCP" and tap "OK" tap "Default OpenVPN port", select "443" and tap "OK" tap "Quick connection mode", select "Use default options only" and tap "OK" Finally test again connections to various servers in various locations.

    Kind regards
     
  18. Like
    Staff got a reaction from ry9811 in New 10 Gbit/s server available (CA)   ...
    Hello!

    We're very glad to inform you that a new 10 Gbit/s full duplex server located in Toronto (Ontario, Canada), is available: Kornephoros.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Kornephoros supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the status as usual in our real time servers monitor .
    Do not hesitate to contact us for any information or issue.

    Kind regards & datalove
    AirVPN Staff

  19. Like
    Staff got a reaction from ry9811 in New 10 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you a new 10 Gbit/s full duplex server located in Miami, Florida (USA), is available: Dziban.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator.

    The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. It supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the status as usual in our real time servers monitor :
    https://airvpn.org/servers/Dziban
     
    Do not hesitate to contact us for any information or issue.

    Kind regards & datalove
    AirVPN Staff

  20. Like
    Staff got a reaction from chrisjones.unixmen in Linux ip -6 addr add failed   ...
    Hello!
     
    This is interesting.

    We are gradually activating IPv6 on every server, but you have IPv6 disabled at OS level, and this causes a fatal error.

    For the moment, you can:

    - Reactivate IPv6
    No good reason is known to disable IPv6 at OS level. If you are scared about IPv6 leak when connecting to servers without IPv6 support,
    a cleaner solution is simply blocking IPv6 traffic with ip6tables.
     
    OR
     
    - Append the following directives in your .ovpn files:
     
    pull-filter ignore "route-ipv6" pull-filter ignore "redirect-gateway ipv6" pull-filter ignore "dhcp-option DNS6" pull-filter ignore "tun-ipv6" pull-filter ignore "ifconfig-ipv6" redirect-gateway def1 bypass-dhcp  
    This will skip IPv6 configuration of tunnel and avoid your error. We are considering related options to Config Generator.
     
    Kind regards
  21. Like
    Staff reacted to EMULE in Eddie Android edition 4.0.0 preview available   ...
    Hello!

    Great news!

    I captured the first QUIC packet accessing bing.com using Wireshark and used that packet to create a complete CPS, with I1-I5 parameters in the following file.

    Using this CPS, I successfully connected to a US server and achieved good speed and stability. In my network environment, this was more effective than random CPS packets.

    Everyone can test this set of parameters (it needs to be accessible without a VPN to bing.com). I welcome any better optimization suggestions from everyone.

    Jc = 8
    Jmin = 86
    Jmax = 892
    S1 = 0
    S2 = 0
    H1 = 2
    H2 = 3
    H3 = 4
    H4 = 1
    I1 = ...
    I2 = ...
    I3 = ...
    I4 = ...
    I5 = ...
    CPS I1-I5(bing.com-initial QUIC).txt
  22. Like
    Staff got a reaction from chrisjones.unixmen in airvpn push ipv6 on ipv4 only connection floods log   ...
    Hello!

    Please follow this message to quickly resolve the issue:
    https://airvpn.org/forums/topic/26548-linux-ip-6-addr-add-failed/?do=findComment&comment=72069

    The OP problem might be different so your case should not be discussed here.

    Kind regards
     
  23. Thanks
    Staff reacted to zebulon in [SOLVED] Network lock protection lost when eddie-ui crashes   ...
    Hello!

    Many thanks for all these information and insight. Indeed I completely agree with what you state.

    Meanwhile, I identified the culprit of plasmashell crashing: a system resource plasmoid I use on the Plasma desktop background. If I remove it, no crashes happen anymore. So the safe solution is to report it to its owner/author. Despite this I was unable to crash and end Eddie GUI gracefully, so I might have misidentified this happening. That said I will keep an eye and report again if I find a reproducible way. And I understand this is beyond your control and thank you very much for the feedback.

    Kind regards!
  24. Like
    Staff got a reaction from derechte in AirVPN does not recognize ICANN authority anymore   ...
    AIRVPN DOES NOT RECOGNIZE ANYMORE VERISIGN, AFILIAS AND ICANN AUTHORITY. OUR COMMITMENT AGAINST UNITED STATES OF AMERICA UNFAIR AND ILLEGAL DOMAIN NAMES SEIZURES.

    The United States of America authorities have been performing domain names seizures since the end of 2010. The seizures have been performed against perfectly legal web-sites and/or against web-sites outside US jurisdiction.

    Administrators of some of those web-sites had been previously acquitted of any charge by courts in the European Union.

    The domain name seizures affect the world wide web in its entirety since they are performed bypassing the original registrar and forcing VeriSign and Afilias (american companies which administer TLDs like .org, .net, .info and .com) to transfer the domain name to USA authorities property. No proper judicial overview is guaranteed during the seizure.

    Given all of the above, we repute that these acts:

    - are a violation of EU citizens fundamental rights, as enshrined in the European Convention on Human Rights;
    - are an attack against the Internet infrastructure and the cyberspace;
    - are a strong hint which shows that decision capacities of USA Department of Justice and ICE are severely impaired;

    and therefore from now on AirVPN does not recognize VeriSign, Afilias and/or ICANN authority over domain names. AirVPN refuses to resolve "seized" domain names to the IP address designated by USA authorities, allowing normal access to the original servers' websites / legitimate Ip addresses.

    In order to fulfil the objective, we have put in place an experimental service which is already working fine. If you find anomalies, please let us know, the system will surely improve in time.

    Kind regards
    AirVPN admins
  25. Thanks
    Staff got a reaction from Y7h-2dfrgrtAA-3 in [ENDED] Christmas Deal 2025   ...
    Hello!

    It's by Telecomix, a group an AirVPN founder co-operated with! https://en.wikipedia.org/wiki/Telecomix

    Kind regards
     
×
×
  • Create New...