Jump to content
Not connected, Your IP: 216.73.216.120

Staff

Staff
  • Content Count

    11590
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    2061

Reputation Activity

  1. Thanks
    Staff reacted to alekas in More tunneling options   ...
    I installed AmneziaVPN, downloaded generated configuration (Nederland) UPD 1637 and connected. It works with and without these changes in [Interface] section.
    I did not change any other config values in AmneziaVPN.
    Now, I tried to use EddieUI with default params and it works too! Looks like domestic regulators have holiday in Uzbekistan...
    I will try again tomorrow.
  2. Like
    Staff reacted to EMULE in More tunneling options   ...
    Yes, the addition of the AmneziaWG protocol can solve the connection problems for most people at present, and I hope that AmneziaWG can be used for a long time. If in the future, when the existing protocol can no longer connect, I believe that AirVPN will add a new protocol to solve the connection problem. I will always believe in your technology and capabilities, and I believe that you will always let us breathe real internet. I will always love you, AirVPN. Keep it up!😘😘😘
  3. Like
    Staff got a reaction from EMULE in More tunneling options   ...
    Hello!

    Not anymore, and even less in the near future. HTTP/3 is quickly spreading. Today, HTTP/3 is used by 36.5% of all the websites, including major web sites inside countries that enforce blocks against VPN. Furthemore, blocking UDP as such is no more realistic, not even in China, where UDP has become an instrumental protocol for many companies in any sector (video streaming, video conference, VoIP, marketing, social media marketing, regime propaganda and more), for regime aligned or regime owned activities.
     
    In China you have a near 100% success rate and no shaping (apart from the normal shaping for anything outside China) with the current Amnezia "weak obfuscation" (no CPS) implementation, i.e. at the moment you don't even need QUIC mimicking (which is anyway available and very effective). Currently, bypassing blocks via UDP than via TCP is more efficient in China.
     
    At the moment there is nothing more effective than mimicking QUIC with the signature / fingerprint of an existing web site that's not blocked, and you have this option right now. We see > 95% success rate, which is better than the success rates of SSH (not exceeding 75%), shadowsocks and XRay, V2Ray etc (but a lot faster!). The success rate is similar to any VPN protocol over HTTP/2, but, again, dramatically faster.
     
    We're glad to know it. It is also very flexible. Thanks to CPS, you may mimic any transport layer protocol built on UDP, for example DNS, QUIC, SIP.

    Kind regards
     
  4. Like
    Staff got a reaction from Justinalee in OpenVPN Certificate has expired   ...
    Hello!

    The problem affects those users who run Eddie Desktop edition with OpenVPN and never logged out for more than a year, or use OpenVPN clients with configuration files generated before 2021. Since Eddie Desktop edition re-downloads certificates and keys only when the operator logs in, locally some certificates have expired because we extend their expiration date automatically at least one year in advance (three years normally).

    Please try the following procedure to quickly resolve the problem:
    run Eddie on Eddie's main window uncheck "Remember me" log your account out log your account in (you'll need to re-enter your AirVPN credentials) try again a connection Kind regards
     
  5. Thanks
    Staff reacted to HUHHII in Review of AirVPN after a year of use   ...
    Hello!

    After a year of using AirVPN I'm very happy with the product. Website has no bloat whatsoever and it's super easy to find what you are looking for. A huge plus goes out for having an active forum available! Much better option compared to social media idiocies. Also port forwarding has been executed greatly - many other VPN services miss that altogether but even those which support it can't match AirVPN's easy-to-use robust system. Config generator is a great plus too since I'm using both WireGuard app and WireSock depending on the situation and needs. Both run just fine and very few VPN's could match this level of usability.

    I sometimes have dissapointing speeds with P2P, but usually a simple server change fixes it.

    Overall very happy customer. Please have a beer AirVPN staff, you've deserved it!
  6. Thanks
    Staff got a reaction from 9zkHR9tCN7bo in Eddie Android edition 4.0.0 preview available   ...
    Hello!
     
    We're very glad to announce that Eddie Android edition 4.0.0 Beta 1 is now available.
    This is a major update: for the first time Eddie Android edition features AmneziaWG complete support.

    Eddie Android edition is a fully integrated with AirVPN, free and open source client allowing comfortable connections to AirVPN servers and generic VPN servers offering compatible protocols. Eddie 4.0.0 aims primarily at adding, besides the already available OpenVPN and WireGuard, a thorough and comfortable AmneziaWG support. 

    AmneziaWG is a free and open source fork of WireGuard by Amnezia inheriting the architectural simplicity and high performance of the original implementation, but eliminating the identifiable network signatures that make WireGuard easily detectable by Deep Packet Inspection (DPI) systems. It can operate in several different ways, including a fallback, "compatibility mode" with WireGuard featuring anyway various obfuscation techniques.
     
    What's new in Eddie 4.0.0
      AmneziaWG support Amnezia WireGuard API updated OpenSSL, OpenVPN3-AirVPN and WireGuard libraries see the complete changelog below  
    AmneziaWG overview
      From the official documentation: https://docs.amnezia.org/documentation/amnezia-wg AmneziaWG offers:
    Dynamic Headers for All Packet Types (compatibility with WireGuard: YES)
    During tunnel initialization, the library generates a set of random constants applied to each of the four WireGuard packet formats: Init, Response, Data, Under‑Load. These constants:
    Replace predictable WireGuard packet identifiers; Shift offsets of Version/Type fields; Modify reserved bits. As a result, no two clients have identical headers, making it impossible to write a universal DPI rule.
     
    Handshake Length Randomization (compatibility with WireGuard: NO)
    In WireGuard, the Init packet is exactly 148 bytes, and the Response packet is exactly 92 bytes. AmneziaWG adds pseudorandom prefixes S1 and S2 (0-64 bytes by default):
    len(init) = 148 + S1 len(resp) = 92  + S2 Offsets of the remaining fields are automatically adjusted, and MAC tags are recalculated accordingly. In order to keep backward compatibility with WireGuard, S1 and S2 must be set to 0. 
      Obfuscation Packets I1-I5 (Signature Chain) & CPS (Custom Protocol Signature) (compatibility with WireGuard: partial, with fallback)
    Before initiating a "special" handshake (every 120 seconds), the client may send up to five different UDP packets fully described by the user in the CPS format. In this way AmneziaWG can mimic perfectly QUIC, DNS and other protocols adding powerful methods to circumvent blocks. QUIC is particularly interesting as HTTP/3 is built on it and currently, from Chrome and other compatible browsers, 50% of traffic to/from Google is QUIC traffic. Therefore, blocking QUIC may have major disruptions for any ISP.
     
    Junk‑train (Jc) (compatibility with WireGuard: YES)
    Immediately following the sequence of I-packets, a series Jc of pseudorandom packets with lengths varying between Jmin and Jmax is sent. These packets blur the timing and size profile of the session start, significantly complicating handshake detection.
     
    Under‑Load Packet (compatibility with WireGuard: YES)
    In WireGuard, a special keep-alive packet (“Under-Load”) is used to bypass NAT timeouts. AmneziaWG replaces its fixed header with a randomized one, the value of which can be set manually. This prevents DPI from filtering short ping packets, ensuring stable tunnel connections, especially on mobile networks.
     
     
    How to use Eddie with AmneziaWG

    To enable AmneziaWG mode, just tap the connection mode available in the main and other views. It will rotate between WireGuard, AmneziaWG and OpenVPN. Set it to AmneziaWG. In its default AmneziaWG mode, Eddie will use all the possible obfuscation, except protocol mimicking, that keeps WireGuard compatibility, thus allowing connections to AirVPN servers. The default settings choice was possible thanks to the invaluable support of persons living in countries where VPN blocks are widespread. Such settings have been tested as working and capable to bypass the current blocking methods in various countries. You may consider to modify them if they are ineffective to bypass "your" specific blocks.
      In Settings > Advanced, you will find, at the bottom of the page, a new "Custom Amnezia WG directives" item. By tapping it you will summon a dialog that will let you customize any possible AmneziaWG parameter.

    You can maintain backward compatibility with WireGuard in the dialog WireGuard section, or enable the full AmneziaWG support in the Amnezia section, which is not compatible (at the moment) with AirVPN WireGuard servers. This mode will be mostly valuable in a not distant future, when AirVPN servers will start to support AmneziaWG natively. You may also enable QUIC or DNS mimicking for additional obfuscation efficacy. 

    In order to maintain WireGuard backward compatibility, with or without QUIC or DNS mimicking, you must set:
    S1 = S2 = 0
    Hn ∈ {1, 2, 3, 4}
    H1 ≠ H2 ≠ H3 ≠ H4

    Furthermore, do not exceed the valid limit of the J parameters (anyway Eddie will not let you do it). In this preview version, Eddie's formal control of the input data is based on the following document. We strongly recommend you read it if you need to modify manually parameters:
    https://github.com/amnezia-vpn/amneziawg-linux-kernel-module?tab=readme-ov-file#configuration


    Please do not modify In parameters if you don't know exactly what you're doing. 

    Eddie implements QUIC and DNS mimicking and random obfuscation packets for each specific "I" parameter (by using the corresponding "Generate" button). You can enable them with a tap on the proper buttons. You may mimic QUIC and DNS even to connect to WireGuard based servers.

    When you enable QUIC mimicking and you maintain WireGuard backward compatibility, you add a powerful tool against blocks, because the first packets will be actual QUIC packets. AmneziaWG will fall back to WireGuard compatibility very soon. However, when DPI and SPI tools, and demultiplexers in general, identify the initial QUIC flow, most of them will be unable to detect a WireGuard flow for several minutes. This has been tested thoroughly with deep packet inspection on Linux and FreeBSD based machines by AirVPN staff.

    Therefore, in different blocking scenarios the QUIC mimicking increases likelihood of successful block bypass. NOTE: the same does not happen with DNS mimicking. In this case DPI / SPI tools identify the stream initially as DNS, but are much quicker (just in a few dozens of packets) to identify the stream as WireGuard's, after the initial DNS identification.
     
    If you decide to test, please report at your convenience any bug and problem in this thread. If possible generate a report from the app in a matter of seconds: by tapping the paper plane icon on the Log view bar rightmost side you will generate a full system report which will include both log and logcat and have it sent to our servers. Then you just need to send us the link the app shows you (open a ticket if you prefer to do it in private).  
    Download link, checksum and changelog
    https://eddie.website/repository/Android/4.0.0-Beta1/EddieAndroid-4.0.0-Beta-1.apk
     
    This is a build debug package and side load is mandatory.
     
    $ sha256sum EddieAndroid-4.0.0-Beta-1.apk 617269290a0406237646cc0885e5b10f3916252f89fe82ba9ccb947354980fcb EddieAndroid-4.0.0-Beta-1.apk
    Changelog 4.0.0 (VC 37) - Release date: 26 November 2025 by ProMIND
    Native Library
    [ProMIND] updated to version 4.0.0, API 10 [ProMIND] added Amnezia WireGuard API [ProMIND] updated to OpenVPN-AirVPN 3.12 (20251126)
    AirVPNUser.java
    [ProMIND] getWireGuardProfile(): added Amnezia support

    ConnectAirVPNServerFragment.java
    [ProMIND] showConnectionInfo(): added AmneziaWG logo display [ProMIND] onCreateContextMenu(): added AmneziaWG items [ProMIND] onContextItemSelected(): added AmneziaWG items [ProMIND] added method loadVPNProfile()
    ConnectVpnProfileFragment.java
    [ProMIND] added Amnezia support
    EddieLibraryResult.java
    [ProMIND] added Amnezia WireGuard API
    QuickConnectFragment.java
    [ProMIND] onCreateView(): added AmneziaWG logo display [ProMIND] updateStatusBox(): added AmneziaWG logo display
    SettingsActivity.java
    [ProMIND] added "Custom AmneziaWG directives" setting
    SettingsManager.java
    [ProMIND] added Amnezia specific settings and methods
    SupportTools.java [ProMIND] removed method getVPNProfile()
    VPN.java
    [ProMIND] added methods enableAmneziaWireGuard() and isWireGuardAmneziaEnabled()
    VPNManager.java
    [ProMIND] added method isWireGuardAmneziaEnabled()
    VPNProfileDatabase.java
    [ProMIND] added AMNEZIA type
    WebViewerActivity.java
    [ProMIND] EddieWebViewClient.shouldOverrideUrlLoading(): it now properly opens android asset files
    WireGuardClient.java
    [ProMIND] added WireGuard tunnel node to constructor  [ProMIND] added methods for generating Amnezia's junk settings
    WireGuardTunnel.java
    [ProMIND] added support for Amnezia WireGuard [ProMIND] added Mode enum [ProMIND] added tunnel node to constructor 
    EddieLibrary.java
    [ProMIND] added Amnezia WireGuard API
    Kind regards & datalove
    AirVPN Staff
  7. Like
    Staff got a reaction from UncleAdolf in AirVPN does not recognize ICANN authority anymore   ...
    AIRVPN DOES NOT RECOGNIZE ANYMORE VERISIGN, AFILIAS AND ICANN AUTHORITY. OUR COMMITMENT AGAINST UNITED STATES OF AMERICA UNFAIR AND ILLEGAL DOMAIN NAMES SEIZURES.

    The United States of America authorities have been performing domain names seizures since the end of 2010. The seizures have been performed against perfectly legal web-sites and/or against web-sites outside US jurisdiction.

    Administrators of some of those web-sites had been previously acquitted of any charge by courts in the European Union.

    The domain name seizures affect the world wide web in its entirety since they are performed bypassing the original registrar and forcing VeriSign and Afilias (american companies which administer TLDs like .org, .net, .info and .com) to transfer the domain name to USA authorities property. No proper judicial overview is guaranteed during the seizure.

    Given all of the above, we repute that these acts:

    - are a violation of EU citizens fundamental rights, as enshrined in the European Convention on Human Rights;
    - are an attack against the Internet infrastructure and the cyberspace;
    - are a strong hint which shows that decision capacities of USA Department of Justice and ICE are severely impaired;

    and therefore from now on AirVPN does not recognize VeriSign, Afilias and/or ICANN authority over domain names. AirVPN refuses to resolve "seized" domain names to the IP address designated by USA authorities, allowing normal access to the original servers' websites / legitimate Ip addresses.

    In order to fulfil the objective, we have put in place an experimental service which is already working fine. If you find anomalies, please let us know, the system will surely improve in time.

    Kind regards
    AirVPN admins
  8. Like
    Staff reacted to EMULE in Eddie Android edition 4.0.0 preview available   ...
    Great!
    Eddie finally supports AmneziaWG, and UDP finally has a masquerade protocol. Another protocol has been added to the list of protocols for bypassing China's Great Firewall.
  9. Thanks
    Staff reacted to EMULE in Eddie Android edition 4.0.0 preview available   ...
    These are the AmneziaWG parameters I use in China. This set of parameters can reliably bypass the GFW. Staff can take a look.
    Jc = 20;
    Jmin = 50;
    Jmax = 1000;
    S1 = 0;
    S2 = 0;
    H1 = 3;
    H2 = 1;
    H3 = 4;
    H4 = 2;
  10. Like
    Staff got a reaction from caffeine0030 in [ENDED] 2025 Black Friday Sale   ...
    Hello!

    We're very glad to inform you that the Black Friday weeks have started in AirVPN!

    Save up to 74%
    when compared to one month plan price
     
    Check all plans and discounts here: https://airvpn.org/buy
     
    If you're already our customer and you wish to jump aboard for a longer period, any additional subscription will be added on top of already existing subscriptions and you will not lose any day.

    AirVPN is one of the oldest and most experienced consumer VPN on the market, operating since 2010. It never changed ownership and it was never sold out to data harvesting or malware specialized companies as it regrettably happened to several competitors. Ever since 2010 AirVPN has been faithful to its mission.

    AirVPN does not inspect and/or log client traffic and offers:
    five simultaneous connections per account (additional connection slots available if needed) state of the art and flexible inbound remote port forwarding active daemons load balancing for unmatched high performance - current 'all time high' on client side is 730 Mbit/s with OpenVPN and 2000 Mbit/s with WireGuard flexible and customizable opt-in block lists protecting you from adware, trackers, spam and other malicious sources. You can customize answers or exceptions globally, at account level or even at single device level. powerful API IPv6 full support comfortable management of your client certificates and keys AES-GCM and ChaCha20 OpenVPN ciphers on all servers Perfect Forward Secrecy with unique per-server 4096 bit Diffie-Hellman keys internal DNS. Each server runs its own DNS server. DNS over HTTPS and DNS over TLS are also supported. free and open source software client side software support to traffic splitting on an application basis on Android and Linux and on a destination basis on Windows and macOS GPS spoofing on Android application
    AirVPN is the only VPN provider which is actively developing OpenVPN 3 library with a fork that's currently 330 commits ahead of OpenVPN master and adds key features and bug fixes for a much more comfortable and reliable experience:
    https://github.com/AirVPN/openvpn3-airvpn

    AirVPN, in accordance with its mission, develops only free and open source software for many platforms, including Android, Linux (both x86 and ARM based systems), macOS and Windows.
    Promotion due to end on 2025-12-03 (UTC).

    Kind regards & datalove
    AirVPN Staff
  11. Like
    Staff got a reaction from Delta1409 in [PRC Propaganda] Taiwan, a provincial administrative region of China, is misrepresented with outdated flags. Please correct it.   ...
    We have kept the OP message to show the pervasiveness of the PRC's propaganda lackeys. We consider Taiwan (Republic of China) to be independent and autonomous from the PRC (People's Republic of China), as it is in fact. ipleak uses MaxMind and IANA databases to display results, and we are pleased that these are aligned with an anti-imperialist and democratic vision that is clearly unpalatable to the dictatorial regime of the PRC, which sees it as an obstacle to its expansionist ambitions.
  12. Thanks
    Staff reacted to Oracle04-343 in [ENDED] 2025 Black Friday Sale   ...
    Signed up! 🤙
  13. Like
    Staff got a reaction from Andrew109 in Two new 10 Gbit/s servers available (NL)   ...
    Hello!

    We're very glad to inform you that two new 10 Gbit/s full duplex servers located in Amsterdam, the Netherlands, are available: Taiyangshou and Vindemiatrix. 

    The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. They support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the status as usual in our real time servers monitor :
    https://airvpn.org/servers/Taiyangshou
    https://airvpn.org/servers/Vindemiatrix
     
    Do not hesitate to contact us for any information or issue.

    Kind regards & datalove
    AirVPN Staff

  14. Like
    Staff reacted to Marcus.Aurelius in [ENDED] 2025 Black Friday Sale   ...
    Logbook of an old salt, written on the first day of a fresh two-year voyage aboard the proud AirVPN fleet:

    Brethren and sister privateers,

    The yearly discount chest has been opened once again, and I have filled my hold with twenty-four more months of wind. While the quartermaster counts the gold, let this weathered mariner raise a weather-beaten voice:

    We need a berth in Poland. One single, sturdy server flying the white-and-red banner would save an entire nation of sailors from slow death by a thousand of exceptions.

    Behold the enemies that lie in wait in Polish waters:

    The heavy galleon Poczta Polska (Polish Post) and her tender Envelo (online postage) The ironclad banks that fire broadsides the moment a foreign IP drops anchor The judicial fortresses and their batteries Legal archives, university libraries, and even honest merchant carracks


    All of them roar: “No foreign keel shall pass!”

    The only way to trade with them is to rip plank after plank from our own hulls – dozens, sometimes hundreds of holes in iptables so the cannonballs of “access denied” fly straight through. (Call it split-tunneling if ye be landlubbers; we call it scuttling the ship to save the cargo.)

    I have sailed these waters for years in the AirVPN flotilla, and the oceans grow darker every season. Ports that once welcomed us now slam the gates. The great YouTube leviathan mistakes every one of our frigates for a pirate bot and demands we strike our colours and show papers none of us will ever sign. So we dance the server hornpipe – Netherlands to Switzerland to Sweden to Canada – tacking frantically until one harbour opens its arms for a fleeting moment, only to chase us out again before the song is over.

    Need to see them Canadian iron beasts racing the prairie? We glide in under Japanese colours, drop anchor for a fleeting moment of peace… then, the instant the port starts sniffing at our false ensign, we cut the cable and fly before the black-list cannonade roars.

    This be not the fault of our admirable Admiral and the crew – ‘tis the spirit of the age trying to chain the very sea itself – but one safe haven on Polish soil would turn a gauntlet of fire into a calm inland lake for all local hands.

    May fair winds fill AirVPN sails forever!
    May the fleet grow stronger every year!
    Hail Poland! Hail AirVPN! Hail all ye beautiful bastards and bitches who still believe the high seas should be free! 

    Yours in rum and packets,
    An old Polish privateer 🇵🇱
     
  15. Thanks
    Staff got a reaction from 9zkHR9tCN7bo in Eddie Android edition 4.0.0 preview available   ...
    Hello!
     
    We're very glad to announce that Eddie Android edition 4.0.0 Beta 1 is now available.
    This is a major update: for the first time Eddie Android edition features AmneziaWG complete support.

    Eddie Android edition is a fully integrated with AirVPN, free and open source client allowing comfortable connections to AirVPN servers and generic VPN servers offering compatible protocols. Eddie 4.0.0 aims primarily at adding, besides the already available OpenVPN and WireGuard, a thorough and comfortable AmneziaWG support. 

    AmneziaWG is a free and open source fork of WireGuard by Amnezia inheriting the architectural simplicity and high performance of the original implementation, but eliminating the identifiable network signatures that make WireGuard easily detectable by Deep Packet Inspection (DPI) systems. It can operate in several different ways, including a fallback, "compatibility mode" with WireGuard featuring anyway various obfuscation techniques.
     
    What's new in Eddie 4.0.0
      AmneziaWG support Amnezia WireGuard API updated OpenSSL, OpenVPN3-AirVPN and WireGuard libraries see the complete changelog below  
    AmneziaWG overview
      From the official documentation: https://docs.amnezia.org/documentation/amnezia-wg AmneziaWG offers:
    Dynamic Headers for All Packet Types (compatibility with WireGuard: YES)
    During tunnel initialization, the library generates a set of random constants applied to each of the four WireGuard packet formats: Init, Response, Data, Under‑Load. These constants:
    Replace predictable WireGuard packet identifiers; Shift offsets of Version/Type fields; Modify reserved bits. As a result, no two clients have identical headers, making it impossible to write a universal DPI rule.
     
    Handshake Length Randomization (compatibility with WireGuard: NO)
    In WireGuard, the Init packet is exactly 148 bytes, and the Response packet is exactly 92 bytes. AmneziaWG adds pseudorandom prefixes S1 and S2 (0-64 bytes by default):
    len(init) = 148 + S1 len(resp) = 92  + S2 Offsets of the remaining fields are automatically adjusted, and MAC tags are recalculated accordingly. In order to keep backward compatibility with WireGuard, S1 and S2 must be set to 0. 
      Obfuscation Packets I1-I5 (Signature Chain) & CPS (Custom Protocol Signature) (compatibility with WireGuard: partial, with fallback)
    Before initiating a "special" handshake (every 120 seconds), the client may send up to five different UDP packets fully described by the user in the CPS format. In this way AmneziaWG can mimic perfectly QUIC, DNS and other protocols adding powerful methods to circumvent blocks. QUIC is particularly interesting as HTTP/3 is built on it and currently, from Chrome and other compatible browsers, 50% of traffic to/from Google is QUIC traffic. Therefore, blocking QUIC may have major disruptions for any ISP.
     
    Junk‑train (Jc) (compatibility with WireGuard: YES)
    Immediately following the sequence of I-packets, a series Jc of pseudorandom packets with lengths varying between Jmin and Jmax is sent. These packets blur the timing and size profile of the session start, significantly complicating handshake detection.
     
    Under‑Load Packet (compatibility with WireGuard: YES)
    In WireGuard, a special keep-alive packet (“Under-Load”) is used to bypass NAT timeouts. AmneziaWG replaces its fixed header with a randomized one, the value of which can be set manually. This prevents DPI from filtering short ping packets, ensuring stable tunnel connections, especially on mobile networks.
     
     
    How to use Eddie with AmneziaWG

    To enable AmneziaWG mode, just tap the connection mode available in the main and other views. It will rotate between WireGuard, AmneziaWG and OpenVPN. Set it to AmneziaWG. In its default AmneziaWG mode, Eddie will use all the possible obfuscation, except protocol mimicking, that keeps WireGuard compatibility, thus allowing connections to AirVPN servers. The default settings choice was possible thanks to the invaluable support of persons living in countries where VPN blocks are widespread. Such settings have been tested as working and capable to bypass the current blocking methods in various countries. You may consider to modify them if they are ineffective to bypass "your" specific blocks.
      In Settings > Advanced, you will find, at the bottom of the page, a new "Custom Amnezia WG directives" item. By tapping it you will summon a dialog that will let you customize any possible AmneziaWG parameter.

    You can maintain backward compatibility with WireGuard in the dialog WireGuard section, or enable the full AmneziaWG support in the Amnezia section, which is not compatible (at the moment) with AirVPN WireGuard servers. This mode will be mostly valuable in a not distant future, when AirVPN servers will start to support AmneziaWG natively. You may also enable QUIC or DNS mimicking for additional obfuscation efficacy. 

    In order to maintain WireGuard backward compatibility, with or without QUIC or DNS mimicking, you must set:
    S1 = S2 = 0
    Hn ∈ {1, 2, 3, 4}
    H1 ≠ H2 ≠ H3 ≠ H4

    Furthermore, do not exceed the valid limit of the J parameters (anyway Eddie will not let you do it). In this preview version, Eddie's formal control of the input data is based on the following document. We strongly recommend you read it if you need to modify manually parameters:
    https://github.com/amnezia-vpn/amneziawg-linux-kernel-module?tab=readme-ov-file#configuration


    Please do not modify In parameters if you don't know exactly what you're doing. 

    Eddie implements QUIC and DNS mimicking and random obfuscation packets for each specific "I" parameter (by using the corresponding "Generate" button). You can enable them with a tap on the proper buttons. You may mimic QUIC and DNS even to connect to WireGuard based servers.

    When you enable QUIC mimicking and you maintain WireGuard backward compatibility, you add a powerful tool against blocks, because the first packets will be actual QUIC packets. AmneziaWG will fall back to WireGuard compatibility very soon. However, when DPI and SPI tools, and demultiplexers in general, identify the initial QUIC flow, most of them will be unable to detect a WireGuard flow for several minutes. This has been tested thoroughly with deep packet inspection on Linux and FreeBSD based machines by AirVPN staff.

    Therefore, in different blocking scenarios the QUIC mimicking increases likelihood of successful block bypass. NOTE: the same does not happen with DNS mimicking. In this case DPI / SPI tools identify the stream initially as DNS, but are much quicker (just in a few dozens of packets) to identify the stream as WireGuard's, after the initial DNS identification.
     
    If you decide to test, please report at your convenience any bug and problem in this thread. If possible generate a report from the app in a matter of seconds: by tapping the paper plane icon on the Log view bar rightmost side you will generate a full system report which will include both log and logcat and have it sent to our servers. Then you just need to send us the link the app shows you (open a ticket if you prefer to do it in private).  
    Download link, checksum and changelog
    https://eddie.website/repository/Android/4.0.0-Beta1/EddieAndroid-4.0.0-Beta-1.apk
     
    This is a build debug package and side load is mandatory.
     
    $ sha256sum EddieAndroid-4.0.0-Beta-1.apk 617269290a0406237646cc0885e5b10f3916252f89fe82ba9ccb947354980fcb EddieAndroid-4.0.0-Beta-1.apk
    Changelog 4.0.0 (VC 37) - Release date: 26 November 2025 by ProMIND
    Native Library
    [ProMIND] updated to version 4.0.0, API 10 [ProMIND] added Amnezia WireGuard API [ProMIND] updated to OpenVPN-AirVPN 3.12 (20251126)
    AirVPNUser.java
    [ProMIND] getWireGuardProfile(): added Amnezia support

    ConnectAirVPNServerFragment.java
    [ProMIND] showConnectionInfo(): added AmneziaWG logo display [ProMIND] onCreateContextMenu(): added AmneziaWG items [ProMIND] onContextItemSelected(): added AmneziaWG items [ProMIND] added method loadVPNProfile()
    ConnectVpnProfileFragment.java
    [ProMIND] added Amnezia support
    EddieLibraryResult.java
    [ProMIND] added Amnezia WireGuard API
    QuickConnectFragment.java
    [ProMIND] onCreateView(): added AmneziaWG logo display [ProMIND] updateStatusBox(): added AmneziaWG logo display
    SettingsActivity.java
    [ProMIND] added "Custom AmneziaWG directives" setting
    SettingsManager.java
    [ProMIND] added Amnezia specific settings and methods
    SupportTools.java [ProMIND] removed method getVPNProfile()
    VPN.java
    [ProMIND] added methods enableAmneziaWireGuard() and isWireGuardAmneziaEnabled()
    VPNManager.java
    [ProMIND] added method isWireGuardAmneziaEnabled()
    VPNProfileDatabase.java
    [ProMIND] added AMNEZIA type
    WebViewerActivity.java
    [ProMIND] EddieWebViewClient.shouldOverrideUrlLoading(): it now properly opens android asset files
    WireGuardClient.java
    [ProMIND] added WireGuard tunnel node to constructor  [ProMIND] added methods for generating Amnezia's junk settings
    WireGuardTunnel.java
    [ProMIND] added support for Amnezia WireGuard [ProMIND] added Mode enum [ProMIND] added tunnel node to constructor 
    EddieLibrary.java
    [ProMIND] added Amnezia WireGuard API
    Kind regards & datalove
    AirVPN Staff
  16. Like
    Staff got a reaction from ASiC666 in User load balancing   ...
    Hello!

    Yes. The kernel already does a wonderful job to distribute fairly bandwidth, aided by the excellent ability to scale of WireGuard. OpenVPN is a little more problematic but we force a round robin distribution of peers on different instances to balance core load. Where a limit must be enforced artificially is in the amount of concurrent connections INSIDE the tunnel. Normally we allow the maximum amount supported by a powerful home router, i.e. 20000 concurrent connections per node. This limit is usually not even noticed by the users as it is well beyond the usage of virtually all of our user base.

    Kind regards
     
  17. Thanks
    Staff got a reaction from 9zkHR9tCN7bo in Eddie Android edition 4.0.0 preview available   ...
    Hello!
     
    We're very glad to announce that Eddie Android edition 4.0.0 Beta 1 is now available.
    This is a major update: for the first time Eddie Android edition features AmneziaWG complete support.

    Eddie Android edition is a fully integrated with AirVPN, free and open source client allowing comfortable connections to AirVPN servers and generic VPN servers offering compatible protocols. Eddie 4.0.0 aims primarily at adding, besides the already available OpenVPN and WireGuard, a thorough and comfortable AmneziaWG support. 

    AmneziaWG is a free and open source fork of WireGuard by Amnezia inheriting the architectural simplicity and high performance of the original implementation, but eliminating the identifiable network signatures that make WireGuard easily detectable by Deep Packet Inspection (DPI) systems. It can operate in several different ways, including a fallback, "compatibility mode" with WireGuard featuring anyway various obfuscation techniques.
     
    What's new in Eddie 4.0.0
      AmneziaWG support Amnezia WireGuard API updated OpenSSL, OpenVPN3-AirVPN and WireGuard libraries see the complete changelog below  
    AmneziaWG overview
      From the official documentation: https://docs.amnezia.org/documentation/amnezia-wg AmneziaWG offers:
    Dynamic Headers for All Packet Types (compatibility with WireGuard: YES)
    During tunnel initialization, the library generates a set of random constants applied to each of the four WireGuard packet formats: Init, Response, Data, Under‑Load. These constants:
    Replace predictable WireGuard packet identifiers; Shift offsets of Version/Type fields; Modify reserved bits. As a result, no two clients have identical headers, making it impossible to write a universal DPI rule.
     
    Handshake Length Randomization (compatibility with WireGuard: NO)
    In WireGuard, the Init packet is exactly 148 bytes, and the Response packet is exactly 92 bytes. AmneziaWG adds pseudorandom prefixes S1 and S2 (0-64 bytes by default):
    len(init) = 148 + S1 len(resp) = 92  + S2 Offsets of the remaining fields are automatically adjusted, and MAC tags are recalculated accordingly. In order to keep backward compatibility with WireGuard, S1 and S2 must be set to 0. 
      Obfuscation Packets I1-I5 (Signature Chain) & CPS (Custom Protocol Signature) (compatibility with WireGuard: partial, with fallback)
    Before initiating a "special" handshake (every 120 seconds), the client may send up to five different UDP packets fully described by the user in the CPS format. In this way AmneziaWG can mimic perfectly QUIC, DNS and other protocols adding powerful methods to circumvent blocks. QUIC is particularly interesting as HTTP/3 is built on it and currently, from Chrome and other compatible browsers, 50% of traffic to/from Google is QUIC traffic. Therefore, blocking QUIC may have major disruptions for any ISP.
     
    Junk‑train (Jc) (compatibility with WireGuard: YES)
    Immediately following the sequence of I-packets, a series Jc of pseudorandom packets with lengths varying between Jmin and Jmax is sent. These packets blur the timing and size profile of the session start, significantly complicating handshake detection.
     
    Under‑Load Packet (compatibility with WireGuard: YES)
    In WireGuard, a special keep-alive packet (“Under-Load”) is used to bypass NAT timeouts. AmneziaWG replaces its fixed header with a randomized one, the value of which can be set manually. This prevents DPI from filtering short ping packets, ensuring stable tunnel connections, especially on mobile networks.
     
     
    How to use Eddie with AmneziaWG

    To enable AmneziaWG mode, just tap the connection mode available in the main and other views. It will rotate between WireGuard, AmneziaWG and OpenVPN. Set it to AmneziaWG. In its default AmneziaWG mode, Eddie will use all the possible obfuscation, except protocol mimicking, that keeps WireGuard compatibility, thus allowing connections to AirVPN servers. The default settings choice was possible thanks to the invaluable support of persons living in countries where VPN blocks are widespread. Such settings have been tested as working and capable to bypass the current blocking methods in various countries. You may consider to modify them if they are ineffective to bypass "your" specific blocks.
      In Settings > Advanced, you will find, at the bottom of the page, a new "Custom Amnezia WG directives" item. By tapping it you will summon a dialog that will let you customize any possible AmneziaWG parameter.

    You can maintain backward compatibility with WireGuard in the dialog WireGuard section, or enable the full AmneziaWG support in the Amnezia section, which is not compatible (at the moment) with AirVPN WireGuard servers. This mode will be mostly valuable in a not distant future, when AirVPN servers will start to support AmneziaWG natively. You may also enable QUIC or DNS mimicking for additional obfuscation efficacy. 

    In order to maintain WireGuard backward compatibility, with or without QUIC or DNS mimicking, you must set:
    S1 = S2 = 0
    Hn ∈ {1, 2, 3, 4}
    H1 ≠ H2 ≠ H3 ≠ H4

    Furthermore, do not exceed the valid limit of the J parameters (anyway Eddie will not let you do it). In this preview version, Eddie's formal control of the input data is based on the following document. We strongly recommend you read it if you need to modify manually parameters:
    https://github.com/amnezia-vpn/amneziawg-linux-kernel-module?tab=readme-ov-file#configuration


    Please do not modify In parameters if you don't know exactly what you're doing. 

    Eddie implements QUIC and DNS mimicking and random obfuscation packets for each specific "I" parameter (by using the corresponding "Generate" button). You can enable them with a tap on the proper buttons. You may mimic QUIC and DNS even to connect to WireGuard based servers.

    When you enable QUIC mimicking and you maintain WireGuard backward compatibility, you add a powerful tool against blocks, because the first packets will be actual QUIC packets. AmneziaWG will fall back to WireGuard compatibility very soon. However, when DPI and SPI tools, and demultiplexers in general, identify the initial QUIC flow, most of them will be unable to detect a WireGuard flow for several minutes. This has been tested thoroughly with deep packet inspection on Linux and FreeBSD based machines by AirVPN staff.

    Therefore, in different blocking scenarios the QUIC mimicking increases likelihood of successful block bypass. NOTE: the same does not happen with DNS mimicking. In this case DPI / SPI tools identify the stream initially as DNS, but are much quicker (just in a few dozens of packets) to identify the stream as WireGuard's, after the initial DNS identification.
     
    If you decide to test, please report at your convenience any bug and problem in this thread. If possible generate a report from the app in a matter of seconds: by tapping the paper plane icon on the Log view bar rightmost side you will generate a full system report which will include both log and logcat and have it sent to our servers. Then you just need to send us the link the app shows you (open a ticket if you prefer to do it in private).  
    Download link, checksum and changelog
    https://eddie.website/repository/Android/4.0.0-Beta1/EddieAndroid-4.0.0-Beta-1.apk
     
    This is a build debug package and side load is mandatory.
     
    $ sha256sum EddieAndroid-4.0.0-Beta-1.apk 617269290a0406237646cc0885e5b10f3916252f89fe82ba9ccb947354980fcb EddieAndroid-4.0.0-Beta-1.apk
    Changelog 4.0.0 (VC 37) - Release date: 26 November 2025 by ProMIND
    Native Library
    [ProMIND] updated to version 4.0.0, API 10 [ProMIND] added Amnezia WireGuard API [ProMIND] updated to OpenVPN-AirVPN 3.12 (20251126)
    AirVPNUser.java
    [ProMIND] getWireGuardProfile(): added Amnezia support

    ConnectAirVPNServerFragment.java
    [ProMIND] showConnectionInfo(): added AmneziaWG logo display [ProMIND] onCreateContextMenu(): added AmneziaWG items [ProMIND] onContextItemSelected(): added AmneziaWG items [ProMIND] added method loadVPNProfile()
    ConnectVpnProfileFragment.java
    [ProMIND] added Amnezia support
    EddieLibraryResult.java
    [ProMIND] added Amnezia WireGuard API
    QuickConnectFragment.java
    [ProMIND] onCreateView(): added AmneziaWG logo display [ProMIND] updateStatusBox(): added AmneziaWG logo display
    SettingsActivity.java
    [ProMIND] added "Custom AmneziaWG directives" setting
    SettingsManager.java
    [ProMIND] added Amnezia specific settings and methods
    SupportTools.java [ProMIND] removed method getVPNProfile()
    VPN.java
    [ProMIND] added methods enableAmneziaWireGuard() and isWireGuardAmneziaEnabled()
    VPNManager.java
    [ProMIND] added method isWireGuardAmneziaEnabled()
    VPNProfileDatabase.java
    [ProMIND] added AMNEZIA type
    WebViewerActivity.java
    [ProMIND] EddieWebViewClient.shouldOverrideUrlLoading(): it now properly opens android asset files
    WireGuardClient.java
    [ProMIND] added WireGuard tunnel node to constructor  [ProMIND] added methods for generating Amnezia's junk settings
    WireGuardTunnel.java
    [ProMIND] added support for Amnezia WireGuard [ProMIND] added Mode enum [ProMIND] added tunnel node to constructor 
    EddieLibrary.java
    [ProMIND] added Amnezia WireGuard API
    Kind regards & datalove
    AirVPN Staff
  18. Like
    Staff got a reaction from Delta1409 in [PRC Propaganda] Taiwan, a provincial administrative region of China, is misrepresented with outdated flags. Please correct it.   ...
    We have kept the OP message to show the pervasiveness of the PRC's propaganda lackeys. We consider Taiwan (Republic of China) to be independent and autonomous from the PRC (People's Republic of China), as it is in fact. ipleak uses MaxMind and IANA databases to display results, and we are pleased that these are aligned with an anti-imperialist and democratic vision that is clearly unpalatable to the dictatorial regime of the PRC, which sees it as an obstacle to its expansionist ambitions.
  19. Like
    Staff got a reaction from pasturetinswell in How do I allow steam through the VPN?   ...
    Hello!

    You could split the traffic of the application you run to access CS2 or Steam (a browser and/or a dedicated game client, we don't know). All the traffic of the system would continue flowing into the VPN tunnel except the specific Steam related applications traffic. While no trivial solution is available for macOS at the moment (you could consider virtualization), on Linux you can achieve app traffic splitting with the AirVPN Suite 2, on Windows with WireSock, on Android with Eddie Android edition.

    Kind regards
     
  20. Like
    Staff got a reaction from caffeine0030 in [ENDED] 2025 Black Friday Sale   ...
    Hello!

    We're very glad to inform you that the Black Friday weeks have started in AirVPN!

    Save up to 74%
    when compared to one month plan price
     
    Check all plans and discounts here: https://airvpn.org/buy
     
    If you're already our customer and you wish to jump aboard for a longer period, any additional subscription will be added on top of already existing subscriptions and you will not lose any day.

    AirVPN is one of the oldest and most experienced consumer VPN on the market, operating since 2010. It never changed ownership and it was never sold out to data harvesting or malware specialized companies as it regrettably happened to several competitors. Ever since 2010 AirVPN has been faithful to its mission.

    AirVPN does not inspect and/or log client traffic and offers:
    five simultaneous connections per account (additional connection slots available if needed) state of the art and flexible inbound remote port forwarding active daemons load balancing for unmatched high performance - current 'all time high' on client side is 730 Mbit/s with OpenVPN and 2000 Mbit/s with WireGuard flexible and customizable opt-in block lists protecting you from adware, trackers, spam and other malicious sources. You can customize answers or exceptions globally, at account level or even at single device level. powerful API IPv6 full support comfortable management of your client certificates and keys AES-GCM and ChaCha20 OpenVPN ciphers on all servers Perfect Forward Secrecy with unique per-server 4096 bit Diffie-Hellman keys internal DNS. Each server runs its own DNS server. DNS over HTTPS and DNS over TLS are also supported. free and open source software client side software support to traffic splitting on an application basis on Android and Linux and on a destination basis on Windows and macOS GPS spoofing on Android application
    AirVPN is the only VPN provider which is actively developing OpenVPN 3 library with a fork that's currently 330 commits ahead of OpenVPN master and adds key features and bug fixes for a much more comfortable and reliable experience:
    https://github.com/AirVPN/openvpn3-airvpn

    AirVPN, in accordance with its mission, develops only free and open source software for many platforms, including Android, Linux (both x86 and ARM based systems), macOS and Windows.
    Promotion due to end on 2025-12-03 (UTC).

    Kind regards & datalove
    AirVPN Staff
  21. Haha
    Staff got a reaction from ByteBuccaneer in Port Forwarding not working   ...
    Hello!

    Holy moly whack a moly, from you description the outcome seems correct and expected, apparently (again from your description) you missed entirely to configure and run any listening program, can you clarify?

    Kind regards
     
  22. Thanks
    Staff reacted to Jockel in [ENDED] 2025 Black Friday Sale   ...
    Ich hatte noch nicht mal Zeit, mich da voll reizufuchsen. Egal wird schon hinhauen😎 2 Jahre.
  23. Like
    Staff reacted to Oilers in [ENDED] 2025 Black Friday Sale   ...
    But you'd be supporting a good cause.
  24. Thanks
    Staff reacted to hedgehoq in [ENDED] 2025 Black Friday Sale   ...
    Renewed for another 3 years  
  25. Haha
    Staff reacted to cheeze in [ENDED] 2025 Black Friday Sale   ...
    At least add a few more months, just as a precaution. 
×
×
  • Create New...