Jump to content
Not connected, Your IP: 44.192.20.240

Staff

Staff
  • Content Count

    10402
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1734

Reputation Activity

  1. Like
    Staff got a reaction from Hypertext1071 in Six new 1 Gbit/s servers available (US)   ...
    Hello!

    We're very glad to inform you that 6 new 1 Gbit/s (full duplex) servers located in Miami, Florida (USA), are available: Aladfar, Ascella, Chertan, Elkurud, Giausar, Melef.

    The servers supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Aladfar
    https://airvpn.org/servers/Ascella
    https://airvpn.org/servers/Chertan
    https://airvpn.org/servers/Elkurud
    https://airvpn.org/servers/Giausar
    https://airvpn.org/servers/Meleph

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff

  2. Like
    Staff got a reaction from Hypertext1071 in Six new 1 Gbit/s servers available (US)   ...
    Hello!

    We're very glad to inform you that 6 new 1 Gbit/s (full duplex) servers located in Miami, Florida (USA), are available: Aladfar, Ascella, Chertan, Elkurud, Giausar, Melef.

    The servers supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Aladfar
    https://airvpn.org/servers/Ascella
    https://airvpn.org/servers/Chertan
    https://airvpn.org/servers/Elkurud
    https://airvpn.org/servers/Giausar
    https://airvpn.org/servers/Meleph

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff

  3. Like
    Staff got a reaction from Hypertext1071 in Six new 1 Gbit/s servers available (US)   ...
    Hello!

    We're very glad to inform you that 6 new 1 Gbit/s (full duplex) servers located in Miami, Florida (USA), are available: Aladfar, Ascella, Chertan, Elkurud, Giausar, Melef.

    The servers supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Aladfar
    https://airvpn.org/servers/Ascella
    https://airvpn.org/servers/Chertan
    https://airvpn.org/servers/Elkurud
    https://airvpn.org/servers/Giausar
    https://airvpn.org/servers/Meleph

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff

  4. Like
    Staff got a reaction from benfitita in VPN service disclosed user IP to French authorities   ...
    Hello!

    Sorry, but your message contains FUD and fantasy. The Swiss Federal law about the Surveillance of the Post and Telecommunications enforces 6 months of metadata and e-mail headers retention to ISPs with more than 100 M CHF of revenue per year for at least two years in a row or receiving more than 100 requests of information in a single year. All the exemptions and obligations here. Furthermore, your alleged retention obligation of encrypted transiting data in unencrypted form not only is not required, but it is also physically impossible when the ISPs don't have the decryption keys, i.e. always, for any practical purpose (impossible every time end-to-end encryption is used). In this case the law does not try to enforce something impossible, at least.

    Kind regards
     
  5. Like
    Staff got a reaction from discov in Severe internet speed reduction after disconnecting from VPN   ...
    @discov

    Hello!

    Please reset the TCP/IP stack of the Operating System of the device with the issue. If this and/or a device reboot resolves the problem, please make sure that the network interface driver is up to date. If the problem persists after the mentioned operations but is resolved only after the router has been rebooted, please upgrade the router firmware, if possible.

    Kind regards
     
  6. Like
    Staff got a reaction from amccombs in Router or British Telecom BT blocks - Connecting but fails to connect   ...
    @amccombs

    Hello!

    UDP or OpenVPN might be blocked. Please make sure that no packet filtering tools, either on your system or router, block UDP. On the router please check any "Quality of Service" or traffic management tool. If you find nothing potentially interfering, please try a connection through WireGuard, just in case your ISP has some block against OpenVPN or specific ports. In order to have Eddie switch to WireGuard: from Eddie's main window please select "Preferences" > "Protocols" uncheck "Automatic" select any line with WireGuard, for example WireGuard port 51820. The line will be highlighted. click "Save" and re-start a connection to apply the change please make sure to test a few servers in different locations around your node Kind regards
     
  7. Like
    Staff got a reaction from flat4 in USA: servers withdrawal and replacement announcement   ...
    Hello!

    We inform you that the all the servers in Miami, Florida (US), will be withdrawn and replaced by six different 1 Gbit/s servers. The replacement is part of our ongoing process to rationalise infrastructure and upgrade hardware in the US. New servers announcement will follow in the very near future.

    The servers which will be replaced are: Acamar, Cursa, Gudja, Kang, Minelauva, Yildun.

    Kind regards and datalove
    AirVPN Staff

     
  8. Like
    Staff got a reaction from flat4 in USA: servers withdrawal and replacement announcement   ...
    Hello!

    We inform you that the all the servers in Miami, Florida (US), will be withdrawn and replaced by six different 1 Gbit/s servers. The replacement is part of our ongoing process to rationalise infrastructure and upgrade hardware in the US. New servers announcement will follow in the very near future.

    The servers which will be replaced are: Acamar, Cursa, Gudja, Kang, Minelauva, Yildun.

    Kind regards and datalove
    AirVPN Staff

     
  9. Like
    Staff got a reaction from flat4 in Wireguard privacy FAQ clarification   ...
    @matmat

    Hello!

    WireGuard doesn't ever remove the public IP address of the peer. It must be done by a specific non-WireGuard task which does it for each session who had no handshake in any given 180 s timeframe. Therefore, this important WireGuard problem is greatly mitigated because the public IP addresses of the peers will not remain forever on the VPN servers (which is a grave privacy concern), but only for 3 minutes after a disconnection. "Reapplied" is just a glitch in the description, you can ignore it. Just use OpenVPN if this mitigation is not enough for your needs or threat model.

    Kind regards
     
  10. Like
    Staff got a reaction from flat4 in New 3 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 3 Gbit/s (full duplex) server located in Denver, CO (USA) is available: Sadachbia.

    Sadachbia supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637 and 47107 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Sadachbia

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff
     
  11. Like
    Staff got a reaction from flat4 in Two new 3 Gbit/s servers available (US)   ...
    Hello!

    We're very glad to inform you that two new 3 Gbit/s (full duplex) server located in San José, CA (USA) are available: Bunda and Imai.

    They support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status in our real time servers monitor:
    https://airvpn.org/servers/Bunda
    https://airvpn.org/servers/Imai

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff

     
     
  12. Like
    Staff got a reaction from flat4 in USA: servers withdrawal and replacement announcement   ...
    Hello!
     
    We inform you that the following servers are being withdrawn:
     
    Servers: 1+1 Gbit/s Alkes, Merope, Sabik (Los Angeles, California)
    Reason: not meeting our requirements anymore for hardware and lines.
    Replacement: yes, two 3+3 Gbit/s servers in San Jose (California), planned for January the 14th 2024 or earlier, on top of the new (already active) 10 Gbit/s server in Los Angeles (Saclateni).
     
    Servers: 1+1 Gbit/s Pollux (Jacksonville, Florida)
    Reason: not meeting our requirements anymore for hardware and line.
    Replacement: yes, one 3+3 Gbit/s servers in Raleigh (North Carolina, planned for January the 16th 2024 or earlier) + expansion in Miami planned for the near future.
     
    Kind regards and datalove
    AirVPN Staff
     
  13. Like
    Staff got a reaction from flat4 in New 3 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 3 Gbit/s (full duplex) server located in Raleigh, NC (USA) is available: Polis.

    Polis supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Polis

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff
     
  14. Like
    Staff got a reaction from flat4 in New 10 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 10 Gbit/s (full duplex) server located in Los Angeles (California, USA) is available: Saclateni.

    Saclateni supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Saclateni

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove

  15. Sad
    Staff got a reaction from foDkc4UySz in New 1 Gbit/s server available (UA)   ...
    Hello!

    We're very glad to inform you that a new 1 Gbit/s (full duplex) server located in Kyiv, Ukraine, is available: Altais.

    Altais supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Altais will replace Alcor in the same location.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Altais

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff

  16. Sad
    Staff got a reaction from foDkc4UySz in New 1 Gbit/s server available (UA)   ...
    Hello!

    We're very glad to inform you that a new 1 Gbit/s (full duplex) server located in Kyiv, Ukraine, is available: Altais.

    Altais supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Altais will replace Alcor in the same location.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Altais

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff

  17. Like
    Staff got a reaction from ScanFarer in Server Name / Cities List Fails Check   ...
    @air92186

    Hello!

    We fear that Gluetun's server list is hard coded here: https://raw.githubusercontent.com/qdm12/gluetun/master/internal/storage/servers.json
    Saclateni is not included in that list, maybe the list must be updated manually?

    To avoid hard coded lists a developer could parse the AirVPN manifest. How to download and how to parse the manifest must be seen on Eddie Android (Java) or AirVPN Suite (C++) source code, which is (in our opinion) very readable and well commented. A developer could also use the Bluetit daemon (developer's reference manual available here) for all the needed operations for a full integration with AirVPN (Bluetit exposes a D-Bus interface), although the integration requires that the target functions and/or classes are developed according to the AirVPN–SUITE classes marshaling mechanism (thoroughly documented anyway).

    However, there is no official document describing the manifest format and the procedure to download it from the bootstrap servers, we're sorry. We might plan a fully documented API for third party developers so they don't need hard coded lists of servers and IP addresses, or we might document the manifest download procedure and its format... we'll think about it.

    Kind regards
     
  18. Like
    Staff got a reaction from xmartymcflyx in General questions   ...
    Hello!

    The other questions are answered in the ToS, specification page and Privacy Notice, therefore we invite you to read those documents, further clarifications may come from the community or from us if necessary:
    https://airvpn.org/tos The Terms of Service
    https://airvpn.org/privacy The privacy notice and terms, scroll down for additional safety measures according to best practices as well as GDPR prescriptions
    https://airvpn.org/specs Specs overview

    In AirVPN, the problem you mention is not related to USB specifically, because USB support is disabled on the kernel of our servers and any reboot to make the server re-start to run a different kernel in order to plug secretly USB devices will cause the server to be rejected by the infrastructure, but adversaries don't need to plug in USB peripherals. A more effective attack comes from outside the server and a defense against this attack is not possible on the server itself (simply because the adversary does not interfere with or touch the server), it must come from a pro-active action by the user. Please see here:
    https://airvpn.org/forums/topic/57163-pen-register-connection-logging-on-airvpn-server-janfeb-2020/

    Kind regards
     
  19. Thanks
    Staff got a reaction from billybobjobthob in Compromised config file   ...
    Hello!

    The cracker wouldn't be able to decrypt it (interception can be performed with or without your configuration file), but he/she would be able to connect to VPN servers with your account key. You may delete or renew keys anytime:
    https://airvpn.org/forums/topic/26209-how-to-manage-client-certificatekey-pairs/

    Kind regards
     
  20. Like
    Staff got a reaction from SeUbHS in Eddie Network Lock and gufw   ...
    Hello!

    Here a serious complication might have entered into play. UFW does not support nftables, while all modern distributions are based on nftables for the packet filtering system. Eddie does support nftables and correctly uses it. UFW must rely on translations back and forth performed, for example, by iptables-nft. However the translation tools do what they can, but if you start mixing iptables with nftables syntax rules, by experience we know that "bad things will happen".  If you have an nftables based distribution and you want to use Eddie's Network Lock (or the AirVPN Suite) you have two options:

    1. avoid UFW, which after all is a frontend of a frontend of a frontend, by disabling it, and operate on the firewall rules directly with nft. To disable UFW the following command should be sufficient and permanent:
    sudo ufw disable

    2. Alternatively, force Eddie to use the iptables-legacy system. Open the "Preferences" > "Network Lock" window and select "iptables-legacy" on the "Mode" combo box. By forcing consistency of rules' syntax by all the programs operating on firewall rules the translator tools should work properly.

    However, if your system is still entirely based on iptables (no nftables at all) then the above can not be the cause of the problem and it's necessary to look elsewhere to find the problem roots.

    Kind regards
     
  21. Thanks
    Staff got a reaction from billybobjobthob in Compromised config file   ...
    Hello!

    The cracker wouldn't be able to decrypt it (interception can be performed with or without your configuration file), but he/she would be able to connect to VPN servers with your account key. You may delete or renew keys anytime:
    https://airvpn.org/forums/topic/26209-how-to-manage-client-certificatekey-pairs/

    Kind regards
     
  22. Thanks
    Staff got a reaction from 63IZhfuW9e in Eddie's connection problem   ...
    Hello!

    Thank you very much, you are a long time customer!

    Some Eddie Linux edition versions, including 2.21.8, have a bug which causes a race condition in some cases when the round trip times tests are performed. The bug was fixed in Eddie 2.22 and the whole round trip time checks procedure was significantly improved in 2.23. From your description, we suspect that your problem is caused by the mentioned bug. Please test Eddie 2.23.2 beta and check whether the problem gets solved. Please see here to download Eddie 2.23.2 beta version:
    https://airvpn.org/forums/topic/56428-eddie-desktop-223-beta-released/

    If you are already running Eddie 2.23.2 then the problem must have a different cause, let us know.

    Kind regards
     
  23. Like
    Staff got a reaction from Tubular in Termination of service in Italy   ...
    Hello!
     

    Customers who are not residents of Italy and purchased the service from outside Italy should not suffer any unintended suspension, even if they are transiting through Italy (for example for tourism). Should any problem arise please contact the support team.
     
    We will carefully explore different, feasible options when necessary, and this is one of them.
     
    This is because the authority will seek to enforce blocks on any company offering services to residents of Italy, regardless of whether the service is offered from another country and jurisdiction. See, for example, the request for DNS poisoning filed to Quad9, a non-Italian company that operates DNS servers outside Italy but accessible to residents of Italy. It is remarkable to note that Quad9 challenged a similar request from Sony in court, and won.

    Kind regards


     
  24. Like
    Staff reacted to DrunkenDesperado in where is the speed?   ...
    worked like a charm, got 465/440 on latest speed test! Thank you.
     
  25. Like
    Staff got a reaction from Lee47 in How to fix connection drops and bandwidth issues with Virgin Media while using AirVPN   ...
    UPDATE 2023-AUG-28

    A customer with Virgin Hub 5 reported very poor performance. The problem could be resolved by running WireGuard (or Eddie in WireGuard mode) and forcing a 1280 bytes MTU size. In this way the customer could almost saturate the peak bandwidth offered by Virgin.
    WireGuard's MTU size can be customized on Eddie 2.23.1 and higher versions, on "Preferences" > "WireGuard" window.

    Kind regards
     
×
×
  • Create New...