Jump to content
Not connected, Your IP: 44.192.20.240

Staff

Staff
  • Content Count

    10402
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1734

Reputation Activity

  1. Like
    Staff got a reaction from Nasheayahu in Unable to obtain elevated privileges.....   ...
    Hello!

    According to the message pkexec file is not found. You should be able to resolve the problem by installing pkexec and making sure it is in the command path. Eddie uses it to run the backend process needing root privileges, but pkexec pre-installation is not granted in some distributions.

    Please let us know whether the problem gets solved.

    Kind regards
     
  2. Like
    Staff got a reaction from go558a83nk in Pen register (connection logging) on AirVPN server Jan/Feb 2020   ...
    Hello!

    @cccthats3cs

    Thank you very much, those documents are interesting indeed.

    All the matter is indeed a risk which we warned our users about according to their threat model since AirVPN's birth. The described investigation techniques may be instrumental to bring to justice criminals without enforcing provider to blanket data retention, and therefore they show once again the correctness of the Court of Justice of the European Union which forbade repeatedly EU Member States to oblige any ISP to perform blanket data retention. We're also pleased to see that
    AirVPN made no technical mistake instrumental to the suspect's incrimination and that a "trap and trace" device had to be physically installed outside AirVPN servers Unfortunately the same methods might also be used by powerful crime organizations or agencies of regimes hostile to human rights to find out and suppress activists, "dissidents" and limit freedom of expression and information.

    For this reason we wrote extensively about how to defeat easily such powerful adversaries (provided of course that your system is pristine, not compromised, an essential pre-requisite). In 2012 we published this for example:
    https://airvpn.org/forums/topic/54-using-airvpn-over-tor/?tab=comments#comment-1745

    Multiple times we warned about the danger of "black boxes" and it's not incidental that "OpenVPN over Tor", for example, has been implemented in our mainstream software since 2011 or 2012 and it is advertised in the home page while Tor is also listed in the "Download" > "Other technologies" section.

    Kind regards
     
  3. Like
    Staff got a reaction from ScanFarer in USA: servers withdrawal and replacement announcement   ...
    Hello!
     
    We inform you that the following servers are being withdrawn:
     
    Servers: 1+1 Gbit/s Alkes, Merope, Sabik (Los Angeles, California)
    Reason: not meeting our requirements anymore for hardware and lines.
    Replacement: yes, two 3+3 Gbit/s servers in San Jose (California), planned for January the 14th 2024 or earlier, on top of the new (already active) 10 Gbit/s server in Los Angeles (Saclateni).
     
    Servers: 1+1 Gbit/s Pollux (Jacksonville, Florida)
    Reason: not meeting our requirements anymore for hardware and line.
    Replacement: yes, one 3+3 Gbit/s servers in Raleigh (North Carolina, planned for January the 16th 2024 or earlier) + expansion in Miami planned for the near future.
     
    Kind regards and datalove
    AirVPN Staff
     
  4. Like
    Staff got a reaction from dersik in Eddie client ui unable to start on Raspberry pi, stops on "Initialize UI"   ...
    @dersik

    Hello!

    Eddie doesn't support traffic splitting on an application basis, we're sorry. This feature is available in the AirVPN Suite 2 preview versions for x86-64 based Linux systems. A build for ARM 64 bit will be ready in the near future, please stay tuned:
    https://airvpn.org/forums/topic/56704-linux-airvpn-suite-200-preview-available/

    The Suite (which lacks a GUI that anyway you don't need) will let you use reverse traffic splitting. It's not what you aim for, because the Suite tunnels everything except what you run outside the tunnel, while you need the "complementary" thing (i.e. tunnel nothing but one application) but it might be useful anyway.

    Alternatively, containers can be considered, so that only a container traffic is tunneled.The torrent program would run in the container. Gluetun features native AirVPN support but we have never tried to build it on a Raspberry OS (did anybody tried this?) but it is possible according to documentation and some reports. Gluetun is based on Alpine for a Docker image with a very small RAM footprint.

    Kind regards
     
  5. Like
    Staff got a reaction from sub314xxl in Slow Speeds, even on wireguard.   ...
    @supermanvthanos

    Hello!

    Set the link MTU size identical to the size set by Mullvad and then increase at little steps. 20 bytes by 20 bytes. Consider that: Mullvad software forces the MTU size to 1280 bytes (at least some time ago, we don't know whether they changed it recently) Eddie 2.21.8 lets WireGuard set the MTU size and it does not offer an option to change it. If WireGuard makes a wrong choice Eddie 2.21 can't fix it Eddie 2.23.x sets MTU size to 1320 bytes but also lets you change it in Preferences > WireGuard window, a new feature. If you want to test it: https://airvpn.org/forums/topic/56428-eddie-desktop-223-beta-released/ if you run native WireGuard utilities you can change MTU size by entering the directive MTU = n, where n is in bytes, in the [Interface] section of the configuration file. You can edit it with any text editor each time you change MTU size you must re-start the connection to apply the change. Perform the speed tests to fine tune and find the optimal MTU size for your network. Rationale: too small and too big MTU sizes deeply impair performance. In the first case there's a waste of room in the frame, in the second case a whole packet must be re-sent for each packet too large for the frame.

    Feel free to open a ticket if you need support directly from the AirVPN support team.

     
    This is the community forum so it's not the proper place as the community can't do anything about it obviously. If you decide for a refund you will need to open a ticket (click "Contact us" on the web site or write to support@airvpn.org).

    Kind regards
     
  6. Like
    Staff got a reaction from VPNuser-01 in Eddie-cli manual   ...
    Hello!

    Please type on any terminal:
    man eddie-ui Please see also: https://eddie.website/support/cli/

    Kind regards
     
  7. Like
    Staff got a reaction from Hypertext1071 in New 3 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 3 Gbit/s (full duplex) server located in Denver, CO (USA) is available: Sadachbia.

    Sadachbia supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637 and 47107 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Sadachbia

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff
     
  8. Thanks
    Staff got a reaction from Flx in Google Authenticator   ...
    Hello!

    Definitely, that reference to Google Authenticator was an old remnant of board's scrambled text. Please verify that everything has been fixed properly now. Thank you for the head-up.

    Kind regards
     
  9. Like
    Staff got a reaction from Hypertext1071 in New 3 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 3 Gbit/s (full duplex) server located in Raleigh, NC (USA) is available: Polis.

    Polis supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Polis

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff
     
  10. Like
    Staff got a reaction from Hypertext1071 in Two new 3 Gbit/s servers available (US)   ...
    Hello!

    We're very glad to inform you that two new 3 Gbit/s (full duplex) server located in San José, CA (USA) are available: Bunda and Imai.

    They support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status in our real time servers monitor:
    https://airvpn.org/servers/Bunda
    https://airvpn.org/servers/Imai

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff

     
     
  11. Like
    Staff got a reaction from LightlySalted in Google Authenticator   ...
    In your fantasy world only. In AirVPN 2FA is based on TOTP https://en.wikipedia.org/wiki/Time-based_one-time_password which does not require any Google app and does not require any phone number. TOTP is an open protocol described by IETF in RFC 6238
  12. Like
    Staff got a reaction from zman3000 in Oceania - More servers/bandwidth for the region   ...
    Hello!

    A new server in Auckland has just been added.
    https://airvpn.org/forums/topic/56975-new-1-gbits-server-available-nz/

    Kind regards
     
  13. Like
    Staff got a reaction from Hypertext1071 in New 3 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 3 Gbit/s (full duplex) server located in Raleigh, NC (USA) is available: Polis.

    Polis supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Polis

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff
     
  14. Like
    Staff got a reaction from Hypertext1071 in Two new 3 Gbit/s servers available (US)   ...
    Hello!

    We're very glad to inform you that two new 3 Gbit/s (full duplex) server located in San José, CA (USA) are available: Bunda and Imai.

    They support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status in our real time servers monitor:
    https://airvpn.org/servers/Bunda
    https://airvpn.org/servers/Imai

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff

     
     
  15. Like
    Staff got a reaction from Hypertext1071 in New 3 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 3 Gbit/s (full duplex) server located in Raleigh, NC (USA) is available: Polis.

    Polis supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Polis

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff
     
  16. Thanks
    Staff reacted to irxhnfdptv in Linux: AirVPN Suite 2.0.0 preview available   ...
    hello. yea it works natively if i use "wg-quick up wg0"
  17. Thanks
    Staff reacted to Hypertext1071 in New 3 Gbit/s server available (US)   ...
    Just wanted to say that I'm impressed by the performance of this server. Thanks again for adding new servers!
  18. Like
    Staff got a reaction from ScanFarer in USA: servers withdrawal and replacement announcement   ...
    Hello!
     
    We inform you that the following servers are being withdrawn:
     
    Servers: 1+1 Gbit/s Alkes, Merope, Sabik (Los Angeles, California)
    Reason: not meeting our requirements anymore for hardware and lines.
    Replacement: yes, two 3+3 Gbit/s servers in San Jose (California), planned for January the 14th 2024 or earlier, on top of the new (already active) 10 Gbit/s server in Los Angeles (Saclateni).
     
    Servers: 1+1 Gbit/s Pollux (Jacksonville, Florida)
    Reason: not meeting our requirements anymore for hardware and line.
    Replacement: yes, one 3+3 Gbit/s servers in Raleigh (North Carolina, planned for January the 16th 2024 or earlier) + expansion in Miami planned for the near future.
     
    Kind regards and datalove
    AirVPN Staff
     
  19. Like
    Staff got a reaction from go558a83nk in Pen register (connection logging) on AirVPN server Jan/Feb 2020   ...
    Hello!

    @cccthats3cs

    Thank you very much, those documents are interesting indeed.

    All the matter is indeed a risk which we warned our users about according to their threat model since AirVPN's birth. The described investigation techniques may be instrumental to bring to justice criminals without enforcing provider to blanket data retention, and therefore they show once again the correctness of the Court of Justice of the European Union which forbade repeatedly EU Member States to oblige any ISP to perform blanket data retention. We're also pleased to see that
    AirVPN made no technical mistake instrumental to the suspect's incrimination and that a "trap and trace" device had to be physically installed outside AirVPN servers Unfortunately the same methods might also be used by powerful crime organizations or agencies of regimes hostile to human rights to find out and suppress activists, "dissidents" and limit freedom of expression and information.

    For this reason we wrote extensively about how to defeat easily such powerful adversaries (provided of course that your system is pristine, not compromised, an essential pre-requisite). In 2012 we published this for example:
    https://airvpn.org/forums/topic/54-using-airvpn-over-tor/?tab=comments#comment-1745

    Multiple times we warned about the danger of "black boxes" and it's not incidental that "OpenVPN over Tor", for example, has been implemented in our mainstream software since 2011 or 2012 and it is advertised in the home page while Tor is also listed in the "Download" > "Other technologies" section.

    Kind regards
     
  20. Like
    Staff got a reaction from mazurka7 in Why are all the SG Leaseweb servers down?   ...
    Hello!

    In Singapore complaints against the servers are sometimes treated blindly without giving us enough time to reply and therefore IP addresses are null routed. When this happens the unblocking procedure may take time. Additional problems have included IPv6 network and line problems. Such problems may occur now and then even in any good datacenter. If the servers keep failing the expectations, as your complaints suggest, we will dismiss them and search for an alternative. It's not so easy in Singapore for the high volume traffic we require, so the matter is not trivial. Anyway, we already operate both on Leaseweb and M247 datacenters in Singapore, so we already offer redundancy.

    Kind regards
     
  21. Thanks
    Staff got a reaction from go558a83nk in "Best" is determined by absolute or relative usage?   ...
    Hello!

    For the purpose of domain name resolutions, VPN server scores are computed on the following variables: average ping (between VPN servers themselves); average load; average users; known issues; ISP reliability. In the case of Xuange, currently it does not achieve the "best" score in Europe or in Switzerland because the amount of connected users is sufficiently high to outweigh the amount of free bandwidth.

    Kind regards
     
  22. Like
    Staff got a reaction from Tubular in AirVPN Servers blacklisted   ...
    Hello!
     
    The main reason of complaints and black list presence of IP addresses are attacks via HTTP(S) and spam mails. A server with blocked outbound ports 80 and 443 blocked would be avoided by anyone, we think, while we might consider to block outbound ports 465 and 587 (outbound port 25 is already blocked on all servers) and renounce to our fight to defend net neutrality. This will require however a mission as well as Terms of Service modification, as noted by @OpenSourcerer , so it's not a viable solution for the current management administration and the contracts with our current users.
     
    Out there you can already find tons of VPNs which violate net neutrality by inspecting your traffic and blocking (or shaping) applications, protocols and ports. Or you can just use your own ISP. The peculiarity of AirVPN is that it doesn't enforce that rubbish.. If one asks for traffic inspection, ports blocking and so on and so forth to get a "cleaner" IP address, then he/she probably "deserves" a pervasive surveillance and must take into account that his/her personal information and his/her behavior will be sooner or later used against him/her, as it already happened to millions and millions of people around the world in the last years.
     
    Kind regards
  23. Thanks
    Staff reacted to n8chavez in AirVPN Servers blacklisted   ...
    Reaaly?  Yeah no.  Mullvad currently has all western US IPs blacklisted in on form or another.  A lot of sites have been recently refusing them, like reddit.
  24. Like
    Staff got a reaction from Tubular in AirVPN Servers blacklisted   ...
    Hello!

    It's indeed a dubious solution which we can bet wouldn't work. The other class of servers should monitor and log the traffic to promptly ban users (and report them to police, if strictly necessary under specific circumstances) at each complaint, and keep IP addresses "clean" . This is exactly what your ISP already does, so in this case why should anyone rely on a VPN instead of his/her own ISP or some other VPN service which already logs and monitors traffic? Furthermore, there are indeed black lists aimed at exclusively blocking VPN, Tor and anonymous proxy addresses. Logging and monitoring would not resolve the problem you report at all in all those cases (and they are many) for which a service wants to block VPN and Tor unconditionally, no matter how "clean" an IP address is.
     
    Why? With a clear a mission and terms of service we think that the whole service is more transparent and honest, so that anyone can make an informed decision. A real problem would be the opposite, i.e. stating a mission and a contractual agreement and then surreptitiously or not break them.

    Kind regards
     
  25. Like
    Staff got a reaction from Tubular in New 10 Gbit/s server available (US)   ...
    Hello,

    we're glad to inform you that we will be launching a 3 Gbit/s full duplex guaranteed (on a 10 Gbit/s port, burstable) server in North Carolina around mid-January, please stay tuned. Additional expansions in Florida and Georgia will be under discussion later on, as usual according to bandwidth demand. Meanwhile, expansion on the other side of the USA (California) is ongoing: after the recent 10 Gbit/s addition in Los Angeles, two more 3 Gbit/s servers (burstable to 10 Gbit/s) are expected in San Jose for mid-January. They will replace the current three 1 Gbit/s servers in California marked with "Imminent withdrawal".

    Kind regards
     
×
×
  • Create New...