Jump to content
Not connected, Your IP: 18.188.101.251

Staff

Staff
  • Content Count

    11066
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1871

Reputation Activity

  1. Like
    Staff got a reaction from ScanFarer in New 10 Gbit/s server available (CH)   ...
    Hello!

    We're very glad to inform you that a new 10 Gbit/s full duplex server located in Zurich, Switzerland, is available: Alpherg.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Alpherg supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the status as usual in our real time servers monitor by clicking the names of the servers.
     
    Do not hesitate to contact us for any information or issue.
     


    Kind regards & datalove
    AirVPN Staff
  2. Like
    Staff got a reaction from Andrew109 in Four new 10 Gbit/s servers available (US)   ...
    Hello!

    We're very glad to inform you that four new 10 Gbit/s full duplex servers located in New York City are available: Muliphein, Paikauhale, Terebellum, Unukalhai. They have replaced Haedus, Iklil and Lich with more powerful hardware and higher overall bandwidth.

    The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    The servers support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the status as usual in our real time servers monitor by clicking the names of the servers.
     
    Do not hesitate to contact us for any information or issue.


    Kind regards and datalove
    AirVPN Team
  3. Like
    Staff got a reaction from Andrew109 in Linux: AirVPN Suite 2.0.0 beta available   ...
    Hello!

    We're very glad to inform you that AirVPN Suite version 2.0.0 alpha 1  is now available.
    UPDATE 2023-11-24: version 2.0.0 alpha 2 is now available.
    UPDATE 2024-05-14: version 2.0.0 beta 1 is now available.

    AirVPN Suite 2.0.0 introduces AirVPN's exclusive per app traffic splitting system as well as some bug fixes, revised code in order to pave the way towards the final and stable release, WireGuard support, and the latest OpenVPN3-AirVPN 3.9 library. Please see the respective changelogs for a complete list of preliminary changes for each component of the suite. If you feel adventurous and you wish to test this beta version, please feel free to report any glitch, bug and problem in this very thread.

     
    The 2.0.0 Beta 1 Suite includes:
    Bluetit: lightweight, ultra-fast D-Bus controlled system daemon providing full connectivity and integration to AirVPN servers, or generic OpenVPN and WireGuard servers. Bluetit can also enforce Network Lock and/or connect the system to AirVPN during the bootstrap Goldcrest: Bluetit client, allowing full integration with AirVPN servers, users, keys, profiles as well as generic OpenVPN and WireGuard servers Hummingbird: lightweight and standalone binary for generic OpenVPN and WireGuard server connections Cuckoo: traffic split manager, granting full access and functionality to AirVPN's traffic split infrastructure
    WARNING: this is beta software in its development stage and may have bugs which may also cause critical and unstable conditions. This software is used at the whole risk of the user and it is strongly advised not to use it in production or critical systems or environments.
    WireGuard support
     
    WireGuard support is now available in Bluetit and Hummingbird. OpenVPN or WireGuard selection is controlled by Bluetit run control file option airvpntype or by Goldcrest option -f  (short for --air-vpn-type). Possible values: openvpn, wireguard. Default: openvpn. The option is documented in the 1.3.0 manual as well.

    Bluetit run control file (/etc/airvpn/bluetit.rc) option:
    airvpntype: (string) VPN type to be used for AirVPN connections. Possible values: wireguard, openvpn. Default: openvpn Goldcrest option:
    --air-vpn-type, -f : VPN type for AirVPN connection <wireguard|openvpn>  
    Suspend and resume services for systemd based systems

    For your comfort, the installation script can create suspend and resume services in systemd based systems, according to your preferences. allowing a more proper management of VPN connections when the system is suspended and resumed. The network connection detection code has also been rewritten to provide more appropriate behaviour.

      Asynchronous mode

    A new asynchronous mode (off by default) is supported by Bluetit and Goldcrest, allowing asynchronous connections. Network Lock can be used accordingly in asynchronous connections. Please consult the readme.md file included in every tarball for more information and details.
      Word completion on bash and zsh

    Auto completion is now available by pressing the TAB key when entering any Goldcrest or Hummingbird option and filename on a bash or zsh interpreter. Auto completion files are installed automatically by the installation script.

     
    AirVPN's VPN traffic splitting

    AirVPN Suite version 2.0.0 introduces traffic splitting by using a dedicated network namespace, therefore completely separating the VPN traffic from unencrypted and "out of the tunnel" traffic. The VPN traffic is carried out in the default (main) namespace, ensuring all system data and traffic to be encrypted and tunneled into the VPN by default. No clear and unencrypted data are allowed to pass through the default namespace.
    Any optional unencrypted data or clear network traffic must be explicitly requested by an authorized user with the right to run cuckoo, the AirVPN traffic split manager tool.

    AirVPN's traffic splitting is enabled and controlled by Bluetit and by means of run control directives. The system has been created in order to minimize any tedious or extensive configuration, even to the minimal point of telling Bluetit to enable traffic splitting with no other setting.

    In order to enable and control AirVPN's traffic splitting, the below new run control directives for /etc/airvpn/bluetit.rc have been introduced: allowtrafficsplitting: (on/off) enable or disable traffic splitting (unencrypted and out of the tunnel traffic) Default: off trafficsplitnamespace: (string) name of Linux network namespace dedicated to traffic splitting. Default: aircuckoo trafficsplitinterface: (string) name of the physical network interface to be used for traffic splitting. All the unencrypted and out of the tunnel data will pass through the specified network device/interface. In case this directive is not used and unspecified, Bluetit will automatically use the main network interface of the system and connected to the default gateway. Default: unspecified trafficsplitnamespaceinterface: (string) name of the virtual network interface to be associated to the Linux network namespace dedicated to traffic splitting. Default: ckveth0 trafficsplitipv4: (IPv4 address|auto) IPv4 address of the virtual network interface used for traffic splitting. In case it is set to 'auto', Bluetit will try to automatically assign an unused IPv4 address belonging to the system's host sub-network (/24) Default: auto trafficsplitipv6: (IPv6 address|auto) IPv6 address of the virtual network interface used for traffic splitting. In case it is set to 'auto', Bluetit will try to automatically assign an unused IPv6 address belonging to the system's host sub-network (/64) Default: auto trafficsplitfirewall: (on/off) enable or disable the firewall in Linux network namespace dedicated to traffic splitting. The firewall is set up with a minimal rule set for a very basic security model. Default: off AirVPN's traffic splitting is designed in order to minimize any further configuration from the system administrator. To actually enable traffic splitting, it is just needed to set "allowtrafficsplitting" directive to "on" and Bluetit will configure the traffic split namespace with the default options as explained above. When needed, the system administrator can finely tune the traffic splitting service by using the above directives. At this early stage, it is advised not to change the network namespace name but leave it to its default value "aircuckoo" to let cuckoo tool properly work.  
      Power and limitations
     
    The adopted solution offers a remarkable security bonus in terms of isolation. For example, it gets rid of the dangerous DNS "leaks in" typical of cgroups based traffic splitting solutions. However, the dedicated namespace needs an exclusive IP address. If the system is behind a NAT (connected to a home router for example) this is not a problem, but if the system is not behind any NAT, i.e. it is assigned directly a public IP address, you will need another public IP address for the network namespace dedicated to traffic splitting. You will need to manually set the other public IP address on the trafficsplitipv4 or trafficsplitipv6 directive as the guessing abilities of Bluetit may work only within a private subnet. Please keep this limitation in mind especially if you want to run the Suite with per app traffic splitting on a dedicated or virtual server in some datacenter, as they are most of the times NOT behind any NAT.

     
    Introducing Cuckoo, the AirVPN traffic splitting manager tool

    Traffic splitting is implemented in AirVPN Suite by using a separate and independent network namespace, directly communicating with the system's default gateway through a virtual interface associated to a physical network interface available in the system. This ensures a true separation of traffic between tunneled and encrypted VPN data from the unencrypted and clear data to be channeled out of the VPN tunnel. The unencrypted traffic will never pass through the default namespace - which is under the VPN control - including, and most importantly, DNS requests.

    To generate unencrypted and out of the tunnel traffic, any software having this need must be run inside the traffic split namespace. In order to do so, AirVPN Suite 2.0.0 introduces a new tool meant to be specifically used for this purpose: Cuckoo.
    The tool can be used by users belonging to the airvpn group only. It cannot be used by root or any user belonging to the root group.

    Additionally, in order to fully use the cuckoo tool, the user must also have special capabilities enabled, notably CAP_SYS_ADMIN, CAP_NET_ADMIN and CAP_NET_RAW. The installation script will set these capabilities to the "airvpn" user only. In case you need to let other users of the airvpn group use the cuckoo tool, you can simply duplicate the corresponding line in /etc/security/capability.conf and adapt it to your needs.
    Note that in many distributions all of the above will not be necessary but keep it in mind if you find some issue and please feel free to report it.
    At this current stage cuckoo supports "aircuckoo" namespace only, that is the default namespace configured by Bluetit.

    This preliminary alpha version does not provide any option and it is meant to simply run an application inside the traffic split namespace only.
    The usage is straightforward: cuckoo program [program options]  
    The traffic split namespace uses its own routing, network channels and DNS. It will not interfere or communicate in any way with the default namespace where the VPN is running and using its own encrypted tunnel. As for DNS, the traffic split namespace will use default system DNS settings.

    Programs started with cuckoo are regular Linux processes and, as such, can be managed (that is stopped, interrupted, paused, terminated and killed) by using the usual process control tools. The programs started by cuckoo are assigned to the user who started cuckoo.

    As a final note, in order to work properly, the following permissions must be granted to cuckoo and they are always checked at each run.
    Owner: root
    Group: airvpn
    Permissions: -rwsr-xr-x (owner can read, write, execute and setuid; group can read and execute, others can read and execute)

     
    Note on Web Browsers
     
    Firefox and Chromium will not be able to resolve names in the aircuckoo namespace, not even when you run a unique instance of them inside the network namespace itself, in some Ubuntu systems. We are investigating this behavior. Brave, Opera and Konqueror are not affected by this problem, but please consider that due to how browser instances are tied to each other, you might get unexpected behavior if you run the same browser in both namespaces from the same user.
    For example, if the browser has been started in the default namespace while there is an active AirVPN connection, the traffic will flow to the connected AirVPN server and from the associated VPN IP address from any future apparent instance launched by the same user, and vice-versa. The second instance may detect the first, delegate the task to it and exit, so you will have a new window but not another instance.
    In order to circumvent the issue, at this stage you may tale care to run programs in the aircuckoo namespace via cuckoo only from airvpn account, and programs whose traffic must be tunneled from your ordinary account. In other words, to add security, do not add your ordinary account to the airvpn group if you plan to use traffic splitting, so your ordinary account will not be able to run cuckoo by accident.

    EDIT 2024-11-12 --- We aim at resolving most of the above limitations and caveats in the imminent beta 2 version.

     
    Download AirVPN Suite 2.0.0 beta 1:
    ARM 64 bit:
    https://eddie.website/repository/AirVPN-Suite/2.0-Beta1/AirVPN-Suite-aarch64-2.0.0-beta-1.tar.gz
    https://eddie.website/repository/AirVPN-Suite/2.0-Beta1/AirVPN-Suite-aarch64-2.0.0-beta-1.tar.gz.sha512

    ARM 64 bit legacy:
    https://eddie.website/repository/AirVPN-Suite/2.0-Beta1/AirVPN-Suite-aarch64-legacy-2.0.0-beta-1.tar.gz
    https://eddie.website/repository/AirVPN-Suite/2.0-Beta1/AirVPN-Suite-aarch64-legacy-2.0.0-beta-1.tar.gz.sha512

    ARM 32 bit:
    https://eddie.website/repository/AirVPN-Suite/2.0-Beta1/AirVPN-Suite-armv7l-2.0.0-beta-1.tar.gz
    https://eddie.website/repository/AirVPN-Suite/2.0-Beta1/AirVPN-Suite-armv7l-2.0.0-beta-1.tar.gz.sha512

    ARM 32 bit legacy:
    https://eddie.website/repository/AirVPN-Suite/2.0-Beta1/AirVPN-Suite-armv7l-legacy-2.0.0-beta-1.tar.gz
    https://eddie.website/repository/AirVPN-Suite/2.0-Beta1/AirVPN-Suite-armv7l-legacy-2.0.0-beta-1.tar.gz.sha512

    x86-64:
    https://eddie.website/repository/AirVPN-Suite/2.0-Beta1/AirVPN-Suite-x86_64-2.0.0-beta-1.tar.gz
    https://eddie.website/repository/AirVPN-Suite/2.0-Beta1/AirVPN-Suite-x86_64-2.0.0-beta-1.tar.gz.sha512

    x86-64 legacy:
    https://eddie.website/repository/AirVPN-Suite/2.0-Beta1/AirVPN-Suite-x86_64-legacy-2.0.0-beta-1.tar.gz
    https://eddie.website/repository/AirVPN-Suite/2.0-Beta1/AirVPN-Suite-x86_64-legacy-2.0.0-beta-1.tar.gz.sha512

    Changelogs

    Changelog for Bluetit

    Version 2.0.0 beta 1 - 13 May 2024

    - [ProMIND] WireGuard is now the default VPN for AirVPN connection
    - [ProMIND] added client option --mtu
    - [ProMIND] added run control directive wireguardmtu
    - [ProMIND] added mode to client options
    - [ProMIND] removed options for unsupported profiles with credentials
    - [ProMIND] function check_if_root() renamed to is_root()
    - [ProMIND] added is_hummingbird_running() function
    - [ProMIND] D-Bus connection methods now check whether hummingbird is running
    - [ProMIND] Added server D-Bus keys vpn_status to connection_stats
    - [ProMIND] Added D-Bus command "remove_wireguard_device"
    - [ProMIND] Added BLUETIT_STATUS_WIREGUARD_DEVICE_EXISTS macro in btcommon.h
    - [ProMIND] Added wireguard_device_exists() function
    - [ProMIND} bluetit_status(): added check for existing WireGuard devices
    - [ProMIND] Added command line option "remove-wireguard-device" to be used in case a crash or unexpected exit and there is a WireGuard device still active
    - [ProMIND] Added remove_wireguard_device() function
    - [ProMIND] airvpn_server_save(): added check for south and north america continents
    - [ProMIND] airvpn_create_profile(): added use_country_fqdn argument
    - [ProMIND] Added air-sort and air-rsort options
    - [ProMIND] Added air-limit option
    - [ProMIND] btcommon.h renamed to btmacro.h
    - [ProMIND] Added server D-Bus key load to airvpn_country_info and airvpn_country_list datasets
    - [ProMIND] Manifest update interval is now set according to Manifest "next_update" element
    - [ProMIND] Added server D-Bus key continent_code and continent_name to airvpn_server_info and airvpn_server_list datasets
    - [ProMIND] Fixed bug in formal check for "country" and "aircountry" rc directives
    - [ProMIND] Added --async option for asynchronous connections
    - [ProMIND] Options --air-info and --air-list can now be used regardless of Bluetit connection status
    - [ProMIND] Added function vpn_connection_mode()
    - [ProMIND] Added macros VPN_MODE_BOOT, VPN_MODE_SYNCHRONOUS, VPN_MODE_ASYNCHRONOUS and VPN_MODE_DISCONNECTED
    - [ProMIND] Added server D-Bus keys airvpn_user_name, airvpn_user_key and vpn_connection_mode to connection_stats dataset

    *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
    Version 2.0.0 alpha 2 - 24 November 2023

    - [ProMIND] implemented WireGuard connection
    - [ProMIND] replaced all OPENVPN_LOG call with Logger::log
    - [ProMIND] added function is_country_allowed
    - [ProMIND] function start_openvpn_connection renamed to start_vpn_connection()
    - [ProMIND] added WireGuard support to start_vpn_connection
    - [ProMIND] function stop_openvpn_connection renamed to stop_vpn_connection()
    - [ProMIND] added WireGuard support to stop_vpn_connection()
    - [ProMIND] D-Bus command set_openvpn_profile renamed to set_vpn_profile in order to support both OpenVPN and WireGuard connections
    - [ProMIND] added set_wireguard_profile() function
    - [ProMIND] added establish_wireguard_connection() and reconnect_wireguard() functions
    - [ProMIND] function reconnect_openvpn() renamed to reconnect_vpn()
    - [ProMIND] added WireGuard support to reconnect_vpn()


    *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
    Version 2.0.0 alpha 1 - 15 September 2023

    - [ProMIND] updated to OpenVPN3 AirVPN 3.9
    - [ProMIND] create_daemon(): replaced sprintf with snprintf
    - [ProMIND] create_daemon(): replaced sprintf with snprintf
    - [ProMIND] airvpn_server_save(): added generator tag
    - [ProMIND] airvpn_key_save(): added generator tag
    - [ProMIND] added run control directives allowtrafficsplitting, trafficsplitnamespace, trafficsplitinterface, trafficsplitnamespaceinterface, trafficsplitipv4, trafficsplitipv6 and trafficsplitfirewall
    - [ProMIND] start_openvpn_connection(): added log display of local interfaces/addresses
    - [ProMIND] recover_network(): delete traffic split namespace, in case it does exist.


    *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
    Changelog for Cuckoo
    Version 2.0.0 beta 1 - 13 May 2024
    *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
    Version 2.0.0 alpha 2 - 24 November 2023
    - [ProMIND] Minor development maintenance release
    *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
    Version 2.0.0 alpha 1 - 15 September 2023
    - [ProMIND] Initial alpha development release

    Changelog for Goldcrest

    Version 2.0.0 beta 1 - 13 May 2024
    - [ProMIND] normalization of run control file options with Bluetit's client option macros
    - [ProMIND] removed options for unsupported profiles with credentials
    - [ProMIND] added auto completion scripts for bash and zsh
    - [ProMIND] added support for Bluetit's "remove-wireguard-device" option
    - [ProMIND] added support for Bluetit's "air-sort" and "air-limit" options
    - [ProMIND] added support for Bluetit's new D-Bus datasets fields
    - [ProMIND] added support for Bluetit async option
    - [ProMIND] show_connection_stats(): added support for vpn_connection_mode, airvpn_user_name and airvpn_user_key
    - [ProMIND] added Bluetit async option in run control file
    - [ProMIND] --network-lock option can now be used in async mode (set network lock on and off)
    *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
    Version 2.0.0 alpha 2 - 24 November 2023
    - [ProMIND] show_connection_stats(): added WireGuard support
    - [ProMIND] show_connection_stats(): added new 2.0 stat fields
    *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
    Version 2.0.0 alpha 1 - 15 September 2023
    *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*

    Changelog for Hummingbird

    Version 2.0.0 beta 1 - 13 May 2024

    - [ProMIND] function read_profile() renamed to read_openvpn_profile()
    - [ProMIND] function worker_thread() renamed to openvpn_worker_thread()
    - [ProMIND] function start_connection_thread() renamed to start_openvpn_connection_thread()
    - [ProMIND] added function wireguard_client()
    - [ProMIND] added function finalize_connection()
    - [ProMIND] added option mode
    - [ProMIND] normalized log activity. Added function hblog()
    - [ProMIND] function clean_up() renamed to clean_up_and_exit()
    - [ProMIND] added function parse_options()
    - [ProMIND] added function bluetit_lock_file_exist()
    - [ProMIND] init_check(): improved check for Bluetit connection
    - [ProMIND] clean_up_and_exit() renamed to cleanup_and_exit()
    - [ProMIND] added auto completion scripts for bash and zsh
    - [ProMIND] added "remove-wireguard-device" option
    - [ProMIND] Added wireguard_device_exists() function


    *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*


    Version 2.0.0 alpha 2 - 24 November 2023

    - [ProMIND] initial compliance to 2.0 classes and architecture


    *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*


    Version 2.0.0 alpha 1 - 15 September 2023

    - [ProMIND] updated to OpenVPN3 AirVPN 3.9
    - [ProMIND] --eval option prints ClientAPI::EvalConfig.reouteList data


    *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*

    Changelog for AirVPN Suite

    Version 2.0.0 beta 1 - 13 May 2024

    - [ProMIND] updated install.sh and uninstall.sh scripts for suspend and resume services

    airvpnmanifest

    - [ProMIND] searchServer(): pattern is now searched in continent code and name as well


    airvpnserver

    - [ProMIND] method getContinent() renamed to getContinentCode()
    - [ProMIND] method setContinent() renamed to setContinentCode()
    - [ProMIND] added method getContinentName()
    - [ProMIND] implemented boolean comparison methods for std::sort


    airvpnserverprovider

    - [ProMIND] getFilteredServerList(): added handling for continents in country white and black lists
    - [ProMIND] method compareServerScore() moved to AirVPNServer class


    airvpntools

    - [ProMIND] added method directoryExists()
    - [ProMIND] added method startsWith()
    - [ProMIND] method getLoad() renamed to getTrafficLoad()
    - [ProMIND] split() fixed bug in case string does not contain delimiter
    - [ProMIND] SERVER_READ_TIMEOUT is now set to 15 seconds
    - [ProMIND] requestAirVPNDocument(): vector bootServerList is now shuffled before starting the document request


    countrycontinent

    - [ProMIND] Added method realCountryName()
    - [ProMIND] Added constants EARTH, AFRICA, AMERICA, NORTH_AMERICA, SOUTH_AMERICA, ASIA, EUROPE and OCEANIA


    dnsmanager

    - [ProMIND] All binary paths are now searched at construction time
    - [ProMIND] Added DNSManagerException class


    execproc.c

    - [ProMIND] Added function exec_error_description()
    - [ProMIND] Added function exec_cmd_error_description()
    - [ProMIND] Added function exec_cmd_args_error_description()


    loadmod.c

    - [ProMIND] Added function is_module_loaded()


    netfilter

    - [ProMIND] All binary paths are now searched at construction time
    - [ProMIND] Added method isNftUsingIptables()
    - [ProMIND] Added iptables-nft support to iptablesSave() and iptablesRestore() methods
    - [ProMIND] Added method isPfEnabled()
    - [ProMIND] Added methods allowPrivateNetwork() and isPrivateNetworkAllowed()
    - [ProMIND] Added local and service IPv6 network classes to the default initialization of netfilter
    - [ProMIND] setup(): added optional argument for private network management


    network

    - [ProMIND] struct Gateway: added isDefault field
    - [ProMIND] method scanDefaultGateway() renamed to scanGateway()
    - [ProMIND] added method getGatewayFromRouteTable()
    - [ProMIND] added method getGateway()
    - [ProMIND] removed member defaultGateway
    - [ProMIND] added members IPv4Gateway and IPv6Gateway


    openvpnclient

    - [ProMIND] implemented OpenVpnClient::acc_event() in order to comply to new master specifications. Event is ignored.
    - [ProMIND] Added private network option for constructors using a private NetFilter


    optionparser

    - [ProMIND] added mode to OptionConfig and Option structures
    - [ProMIND] added function getOptionsForMode()
    - [ProMIND] added function getInvalidOptionsForMode()


    trafficsplit

    - [ProMIND] added methods removeNamespaceDirectory(), namespaceConfigurationExists(), isDirty() and recover()
    - [ProMIND] removed methods removeDefaultNamespaceDirectory(), defaultNamespaceConfigurationExists()
    - [ProMIND] added methods getIPv4Gateway(), setIPv4Gateway(), getIPv6Gateway() and setIPv6Gateway()


    wireguardclient

    - [ProMIND] added method setEndPointPort()
    - [ProMIND] added method removeDevice()
    - [ProMIND] added methods createInterfaceDevice(), setDeviceConfiguration(), getDeviceList(), changeWgFilesOwnership() ands restoreWgFilesOwnership() (macOS support)
    - [ProMIND] Added private network option for constructors using a private NetFilter
    - [ProMIND] Implemented event management
    - [ProMIND] Improved handshake timeout management


    vpnclient

    - [ProMIND] Added private network option for constructors using a private NetFilter


    *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*


    Version 2.0.0 alpha 2 - 24 November 2023

    execproc.c

    - [ProMIND] added macros EXEC_MODE_VECTOR, EXEC_MODE_VECTOR_PATH, EXEC_MODE_VECTOR_PATH_ENV and EXEC_MODE_DEFAULT
    - [ProMIND] added functions exec_set_mode(), exec_set_environ() and exec_reset()
    - [ProMIND] do_execute(): added mode and environment handling
    - [ProMIND] execute_process(), execute_process_args(): call exec_reset() before returning
    - [ProMIND] get_exec_path(): renamed to exec_get_path() and added an extra argument to specify a colon separated search path

    airvpntools

    - [ProMIND] method architecture() now uses GCC macros only
    - [ProMIND] added method platform()


    dnsmanager

    - [ProMIND] addAddressToResolvDotConf() now requires IPAddress type


    logger

    - [ProMIND] added overloaded log metoths for std::ostringstream


    network

    - [ProMIND] added methods setupInterface(), enableInterface() and setInterfaceMtu()
    - [ProMIND] added method setIPAddress() to Interface class
    - [ProMIND] scanLocalIpAddresses() renamed to scanLocalInterfaces()
    - [ProMIND] Interface: added method getAddressCount()


    openvpnclient

    - [ProMIND] added inheritance from vpnclient class
    - [ProMIND] get_connection_stats(): added timestamp item
    - [ProMIND] function openVPNInfo() renamed to getInfo()
    - [ProMIND] function openVPNCopyright() renamed to getCopyright()


    wireguardclient

    - [ProMIND] added inheritance from vpnclient class
    - [ProMIND] implemented connection management methods


    vpnclient

    - [ProMIND] new class


    *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*


    Version 2.0.0 alpha 1 - 15 September 2023

    - [ProMIND] updated to OpenVPN3 AirVPN 3.9
    - [ProMIND] updated install.sh and uninstall.sh scripts
    - [ProMIND] updated bluetit.rc template
    - [ProMIND] updated nsswitch.conf template
    - [ProMIND] added cuckoo tool to the project


    airvpntools

    - [ProMIND] formatTransferRate(): replaced sprintf with snprintf
    - [ProMIND] formatDataVolume(): replaced sprintf with snprintf
    - [ProMIND] formatTime(): replaced sprintf with snprintf


    execproc.c

    - [ProMIND] execute_process(): added stderr redirection to char *error argument
    - [ProMIND] do_execute(): renamed parent_pipe and child_pipe to stdin_pipe and stdout_pipe respectively
    - [ProMIND] do_execute(): added stderr_pipe array
    - [ProMIND] do_execute(): added stderr redirection to char *error argument


    localnetwork

    - [ProMIND] Class renamed to Network


    netfilter

    - [ProMIND] translateItemToNFTables(): added dormant flag to table creation
    - [ProMIND] added method getSystemFirewallBackend()
    - [ProMIND] added TARGET_IPTABLES_LEGACY and TARGET_UNKNOWN members
    - [ProMIND] added method itemToCommandRule()


    network

    - [ProMIND] added method interfaceExists()
    - [ProMIND] added overloaded method incrementIpAddress()
    - [ProMIND] added new public class Interface
    - [ProMIND] removed old interface and IP address collection in favor of class Interface
    - [ProMIND] removed methods scanIpAddresses() and scanInterfaces()
    - [ProMIND] default gateway is now evaluated at object construction and stored in member defaultGateway
    - [ProMIND] struct Gateway member address is now defined as IPAddress
    - [ProMIND] added excludeIpAddresses() and worker methods to compute a route by excluding an IP address range
    - [ProMIND] added getIpAddressNetmask(), getIpAddressHostmask() and getIpAddressNetwork() methods
    - [ProMIND] added internetChecksum() method
    - [ProMIND] added getNextUnusedIpAddress() method and worker methods
    - [ProMIND] added LocalNetworkException class


    openvpnclient

    - [ProMIND] profileNeedsResolution(): added check for ClientAPI::EvalConfig.reouteList
    - [ProMIND] resolveProfile(): added resolution for ClientAPI::EvalConfig.reouteList
    - [ProMIND] onResolveEvent(): removed log display of local interfaces/addresses
    - [ProMIND] saveSystemDNS(): replaced deprecated inet_ntoa() with inet_ntop()
    - [ProMIND] added new method getSystemDnsTable()


    trafficsplit

    - [ProMIND] new class


    *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*





    Kind regards & Datalove AirVPN Staff
  4. Like
    Staff got a reaction from Andrew109 in Three new 10 Gbit/s servers available (US)   ...
    Hello!

    We're very glad to inform you that three new 10 Gbit/s full duplex servers located in Phoenix, Arizona, are available: Gunibuu, Kambalia, Sheratan. They have replaced Chalawan, Indus, Phoenix and Virgo with more powerful hardware and higher overall bandwidth.

    The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    The servers support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the status as usual in our real time servers monitor by clicking the names of the servers.
     
    Do not hesitate to contact us for any information or issue.
     


    Kind regards & datalove
    AirVPN Team
     
  5. Like
    Staff got a reaction from Andrew109 in Three new 10 Gbit/s servers available (US)   ...
    Hello!

    We're very glad to inform you that three new 10 Gbit/s full duplex servers located in Los Angeles, California, are available: Maia, Sarin, Xamidimura. They have replaced Groombridge, Saclateni and Teegarden with more powerful hardware and higher overall bandwidth.

    The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    The new servers support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the status as usual in our real time servers monitor by clicking the names of the servers.
     
    Do not hesitate to contact us for any information or issue.
     


    Kind regards & datalove
    AirVPN Team
     
  6. Like
    Staff got a reaction from Andrew109 in [CH] Server replacement   ...
    Hello!

    We inform you that due to a few problems we are forced to replace the server Kitalpha in Switzerland. A much more powerful server will replace Kitalpha in the next days and it will be connected to a 10 Gbit/s full duplex port and line. As usual, the new server will be announced in this "News" forum in due time. The new server will not only replace Kitalpha but will also provide the additional bandwidth that several users require in Switzerland. We roughly estimate that the server will be available to you by November the 25th.

    Kind regards & datalove
    AirVPN Staff
     
  7. Like
    Staff got a reaction from ScanFarer in New 10 Gbit/s server available (CH)   ...
    Hello!

    We're very glad to inform you that a new 10 Gbit/s full duplex server located in Zurich, Switzerland, is available: Alpherg.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Alpherg supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the status as usual in our real time servers monitor by clicking the names of the servers.
     
    Do not hesitate to contact us for any information or issue.
     


    Kind regards & datalove
    AirVPN Staff
  8. Like
    Staff got a reaction from Andrew109 in Road to OpenVPN 2.6 and DCO   ...
    Hello!

    We're glad to inform you that we have just released:
    "Road To OpenVPN 2.6" migration plan - https://airvpn.org/road_to_openvpn26/ A new version of Config Generator with options related to OpenVPN 2.6 A new Eddie Desktop beta release (2.23.0) related to the road above, feature-locked to reach stable release https://airvpn.org/forums/topic/56428-eddie-desktop-223-beta-released/ A new server (Marsic), the first running OpenVPN 2.6 powered by DCO (server-side) and ready for client-side DCO.
    Kind regards & datalove
    AirVPN Staff
     
  9. Like
    Staff got a reaction from Andrew109 in New 1 Gbit/s server available. New country: TW   ...
    Hello!

    We're very glad to inform you that a new 1 Gbit/s (full duplex) server located in Taipei (Taiwan), is available: Sulafat.

    The server supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    This is our first server in Taiwan; the tests we have performed during the last week have been encouraging but not totally perfect for our quality standards. Your feedback is welcome and it will be crucial to determine whether this server's datacenter can meet your expectations and requirements.

    You can check the status in our real time servers monitor:
    https://airvpn.org/servers/Sulafat/

    Kind regards & datalove
    AirVPN Staff
  10. Like
    Staff got a reaction from Andrew109 in New 1 Gbit/s server available (ES)   ...
    Hello!

    We're very glad to inform you that a new 1 Gbit/s full duplex server located in Madrid (Spain) is available: Jishui.

    The AirVPN client will show automatically the new server. If you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The server accepts OpenVPN connections on ports 53, 80, 443, 1194, 2018 UDP and TCP, and WireGuard connections on ports 1637, 47107 and 51820.

    Just like every other Air server, Jishui supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, tls-crypt and WireGuard.
    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the server status as usual in our real time servers monitor:
    https://airvpn.org/servers/Jishui

    Do not hesitate to contact us for any information or issue.


    Kind regards and datalove
    AirVPN Team
     
  11. Like
    Staff got a reaction from bierce17 in It doesn't connect to any   ...
    Hello!

    The previous problem is resolved. When the connection attempt fails your network is unreachable according to OpenVPN:
    . 2024.07.01 15:57:48 - OpenVPN > write UDP: Network is unreachable (code=51) . 2024.07.01 15:57:48 - OpenVPN > Network unreachable, restarting The error message hints at various options: your network is down your physical interface is down the network is up but UDP is blocked directly in the machine (check firewall etc.) Please test a connection over WireGuard to see whether WireGuard can't reach the network too. Switch to WireGuard in Preferences > Protocols window (uncheck Automatic, select any WireGuard line and click Save).

    Kind regards
     
  12. Like
    Staff got a reaction from cyberslav in Eddie keeps disconnecting   ...
    @cyberslav

    Hello!

    For an explanation and a quick solution please see here:
    https://airvpn.org/forums/topic/56657-cant-connect-to-anything/?do=findComment&comment=225418

    Kind regards
     
  13. Thanks
    Staff got a reaction from Quokka in OpenWrt: default gateway vs. policy based routing   ...
    Hello!

    We post the reply to your ticket by the support team for the reader's comfort.
     
    ====
    Hello and thank you for your choice!

    We do not think that the problem can be approached and resolved through OpenVPN configuration files. We would consider policy based routing on the router. In this way you can configure each specific device behind the router to have its traffic routed through the proper tun interface or even through the WAN (outside the VPN, therefore). Please check the documentation.
    An overview of the Policy Based Routing (PBR) utility:
    https://openwrt.org/docs/guide-user/network/routing/pbr
     
    A specific approach to achieve the setup:
    https://search.brave.com/search?q=openwrt+policy+routing+for+multiple+OpenVPN+client+connections&summary=1&conversation=f943dbcf532434cd689c65

    Kind regards
    AirVPN Support Team
    ====

    Kind regards
     
  14. Thanks
    Staff got a reaction from tranquivox69 in Android TV - VPN connection at startup. Why OpenVPN for Android can do it and Eddie not?   ...
    Hello!

    Of course. We will study the matter carefully and we will update this thread.

    Kind regards
     
  15. Thanks
    Staff reacted to NIK284 in 2024 Black Friday Sale   ...
    I'm in for two more years. Thank you for excellent service.
  16. Like
    Staff got a reaction from ScanFarer in New 10 Gbit/s server available (CH)   ...
    Hello!

    We're very glad to inform you that a new 10 Gbit/s full duplex server located in Zurich, Switzerland, is available: Alpherg.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Alpherg supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the status as usual in our real time servers monitor by clicking the names of the servers.
     
    Do not hesitate to contact us for any information or issue.
     


    Kind regards & datalove
    AirVPN Staff
  17. Like
    Staff got a reaction from ScanFarer in New 10 Gbit/s server available (CH)   ...
    Hello!

    We're very glad to inform you that a new 10 Gbit/s full duplex server located in Zurich, Switzerland, is available: Alpherg.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Alpherg supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the status as usual in our real time servers monitor by clicking the names of the servers.
     
    Do not hesitate to contact us for any information or issue.
     


    Kind regards & datalove
    AirVPN Staff
  18. Like
    Staff got a reaction from ScanFarer in New 10 Gbit/s server available (CH)   ...
    Hello!

    We're very glad to inform you that a new 10 Gbit/s full duplex server located in Zurich, Switzerland, is available: Alpherg.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Alpherg supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the status as usual in our real time servers monitor by clicking the names of the servers.
     
    Do not hesitate to contact us for any information or issue.
     


    Kind regards & datalove
    AirVPN Staff
  19. Thanks
    Staff reacted to greendragon in 2024 Black Friday Sale   ...
    Thanks. Added another 3 years. Hope that will help to keep the light on.
  20. Thanks
    Staff reacted to blueice in 2024 Black Friday Sale   ...
    Thanks for the deal! Have been trying AirVPN out for the last 3 months, that deal just confirmed I will be switching for good
  21. Thanks
    Staff reacted to olom88 in 2024 Black Friday Sale   ...
    I am just learning about all the available settings and I like AIR VPN already.
    Most probably I will extend my subscription.
     
  22. Like
    Staff got a reaction from MyIntertnetSafety in Eddie fails to connect to any server   ...
    @MyIntertnetSafety

    Hello!

    Two potential problems are probably overlapping. For an explanation and a quick solution of the 1st problem please see here:
    https://airvpn.org/forums/topic/56657-cant-connect-to-anything/?do=findComment&comment=225418

    After you have implemented the above fix, please log your account out and then in again from Eddie's main window. This step is strictly necessary every time you renew, delete or add keys for your account. Finally, test again a connection.

    Kind regards
     
  23. Like
    Staff reacted to hedgehoq in 2024 Black Friday Sale   ...
    I still have 2 more years but tempted to get this one... hm... someone stop me
  24. Like
    Staff reacted to Valm_Valeria in 2024 Black Friday Sale   ...
    Thank you 👍
  25. Thanks
    Staff reacted to Nasdaq in 2024 Black Friday Sale   ...
    An other year! Thanks for your excellent service. 😀
×
×
  • Create New...