Jump to content
Not connected, Your IP: 44.192.20.240

Staff

Staff
  • Content Count

    10402
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1734

Reputation Activity

  1. Like
    Staff got a reaction from ScanFarer in New 10 Gbit/s server available (US)   ...
    Hello!
    Thank you very much.

    Sabik, Merope and Alkes IP addresses are already located in Los Angeles, in the IANA / ARIN databases, so any geo-location database which reports otherwise is poorly maintained. However, we have decided (breaking news 🙂 ) that those servers will be withdrawn in early 2024 and replaced by more powerful hardware in the LA area (please follow the "News" forum in the next weeks).

    Kind regards
     
  2. Like
    Staff got a reaction from S.O.A. in New 10 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 10 Gbit/s (full duplex) server located in Los Angeles (California, USA) is available: Saclateni.

    Saclateni supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Saclateni

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove

  3. Thanks
    Staff got a reaction from LeBlood in EDDIE can no longer connect.   ...
    Hello!

    The Kaspersky VPN interface causes a critical error to OpenVPN:
     

    To solve the problem please set Eddie to ignore any alien interface: Select from Eddie's main window Preferences > Networking, write eddie in the "VPN interface name" field click Save. You may also consider to switch to WireGuard to bypass the alien interface. You can do it in Preferences > Protocols window. Uncheck Automatic, select a WireGuard connection mode and click Save.

    Kind regards
     
  4. Like
    Staff got a reaction from andrut in Can we get a server in Poland? They seem to like freedom of speech.   ...
    @blueport26

    Hello!

    First and foremost we must say that we have not updated our knowledge on Poland data retention legal framework. Our old information tells us that it's NOT compliant with the latest decisions of the CJEU which forbid Member States to put any obligation on any provider of service in the information society for pre-emptive, blanket, indiscriminate data retention. All that follows is therefore based on our not up-to-date knowledge. Feel free to point us to the relevant laws if we base our decision on no more valid knowledge.

    Now, we can actually ignore the EU Member States legal frameworks on data retention where they clearly infringe the EU Court of Justice legally binding decisions, because in a casus belli we can challenge, or defend against, the rogue Member State with high likelihood of winning.

    At the same time, we must carefully decide which legal battle fronts we want to open, because legal costs for cases which must be brought up to the highest courts may easily become very high. We are already challenging Spain legal framework on Data Retention, and, given AirVPN size, it's not wise to challenge multiple Member States simultaneously. That's the main reason we do not operate VPN servers in France and Italy, other Member States whose data retention framework is in flagrant violation of the legally binding decisions of the CJEU.

    We're not like those marketing fluff based VPNs which lie to you and in reality perform Data Retention in the countries where  it is mandatory: you have plenty of examples from the press to prove what we claim here, when VPN customers identities and activities have been disclosed because of that very same data retention the VPN providers claimed not to perform. When we say we do not retain data and metadata of your traffic we really do it, that's why we must carefully evaluate the countries legal framework we plan to operate servers within.

    Kind regards

    P.S. Ukraine does not oblige dacenters and VPN providers to any data retention.
     
  5. Like
    Staff got a reaction from S.O.A. in New 10 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 10 Gbit/s (full duplex) server located in Los Angeles (California, USA) is available: Saclateni.

    Saclateni supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Saclateni

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove

  6. Thanks
    Staff got a reaction from Quallian in Linux: AirVPN Suite 2.0.0 preview available   ...
    Hello!

    Thank you for your tests!
    If the WireGuard kernel module is missing, the Suite will not work in WireGuard mode.

    Kind regards
     
  7. Like
    Staff got a reaction from pHxaq in AirVPN Servers blacklisted   ...
    Hello!

    Please see our previous reply in this thread and also the following one, where we explain more thoroughly our point of view and some facts:
    https://airvpn.org/forums/topic/50724-two-new-1-gbits-servers-available-us/?do=findComment&comment=216468

    Just a brief addition: your above quoted sentence imply that protecting privacy in an agnostic network means supporting net abusers, which is an inadmissible and shameful idea that we strongly reject. This concept is one  of the "moral" or "ethical" justifications to pervasive surveillance in virtually all countries controlled by human rights hostile regimes, and in a few "Western" countries too: since someone somewhere someday might commit  a crime via the Internet, let's enforce blanket data retention and pervasive packet inspection for everyone, so Internet will be a "safe place" for the "law abiding, conforming" citizen. Your consideration has been and is the founding argument for power groups having the hidden agenda to expunge the right to privacy from the list of fundamental rights. Consider that one of the strictly necessary conditions for any dictatorship to survive is the effective suppression of the right to privacy.

    Kind regards
     
  8. Like
    Staff got a reaction from pHxaq in AirVPN Servers blacklisted   ...
    Hello!
     
    The main reason of complaints and black list presence of IP addresses are attacks via HTTP(S) and spam mails. A server with blocked outbound ports 80 and 443 blocked would be avoided by anyone, we think, while we might consider to block outbound ports 465 and 587 (outbound port 25 is already blocked on all servers) and renounce to our fight to defend net neutrality. This will require however a mission as well as Terms of Service modification, as noted by @OpenSourcerer , so it's not a viable solution for the current management administration and the contracts with our current users.
     
    Out there you can already find tons of VPNs which violate net neutrality by inspecting your traffic and blocking (or shaping) applications, protocols and ports. Or you can just use your own ISP. The peculiarity of AirVPN is that it doesn't enforce that rubbish.. If one asks for traffic inspection, ports blocking and so on and so forth to get a "cleaner" IP address, then he/she probably "deserves" a pervasive surveillance and must take into account that his/her personal information and his/her behavior will be sooner or later used against him/her, as it already happened to millions and millions of people around the world in the last years.
     
    Kind regards
  9. Like
    Staff got a reaction from andrut in Port forwarding availability change   ...
    No, if all peers were not reachable BitTorrent would not work at all. The reason is trivial, just study how the protocol works. Actually there are many "dead torrents" not because there are no peers with the complete file, but because those peers in the swarm are active but not reachable.

    You have the impression that torrenting works even if some peers in a swarm are unreachable only because there are peers which are reachable in that swarm, so unreachable nodes (leechers) can keep leeching. This is the essence of the claims "you can keep torrenting even without remote port forwarding": yes, provided that parasites in a swarm can leech thanks to the effort of others.
     
    Maybe you should study how the protocol works before insulting. We're momentarily locking this thread, too many off topics are making it confusing.

    Kind regards
     
  10. Like
    Staff got a reaction from andrut in Port forwarding availability change   ...
    @Undated8198


    Hello,

    we have no plans to remove port forwarding, quite the contrary: we are currently deploying resources to delay port exhaustion and find alternative, but comfortable, procedures to keep offering this service in anticipation of port exhaustion. As you can see we already limited to new customers the amount of bookable ports, in order to preserve advertised features to those who are already our customers. We are committed to avoid retro-active modifications of the service for pre-existing customers, when such modifications would be detrimental for the service or anyway betraying an advertised feature.

    Kind regards
     
  11. Like
    Staff got a reaction from Gloom in VPN repeat connecting, disconnecting and restarting...   ...
    @brianperplexis

    Hello!
     
    We noticed that you deleted the old key(s) and created a new one. When you do so, you need, from Eddie's main window, to log your account out and in again. That's the only way to force Eddie to re-download keys (Eddie will not do it automatically) and you must do it every time you renew your client key(s). Please uncheck "Remember me", log your account out, then log your account in again (you will need to re-enter your credentials) finally test again connections.

    Kind regards
     
  12. Like
    Staff got a reaction from CocoaJackson in AirVPN Servers blacklisted   ...
    Hello!

    It's indeed a dubious solution which we can bet wouldn't work. The other class of servers should monitor and log the traffic to promptly ban users (and report them to police, if strictly necessary under specific circumstances) at each complaint, and keep IP addresses "clean" . This is exactly what your ISP already does, so in this case why should anyone rely on a VPN instead of his/her own ISP or some other VPN service which already logs and monitors traffic? Furthermore, there are indeed black lists aimed at exclusively blocking VPN, Tor and anonymous proxy addresses. Logging and monitoring would not resolve the problem you report at all in all those cases (and they are many) for which a service wants to block VPN and Tor unconditionally, no matter how "clean" an IP address is.
     
    Why? With a clear a mission and terms of service we think that the whole service is more transparent and honest, so that anyone can make an informed decision. A real problem would be the opposite, i.e. stating a mission and a contractual agreement and then surreptitiously or not break them.

    Kind regards
     
  13. Like
    Staff got a reaction from S.O.A. in New 1 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 1 Gbit/s full duplex server located in Miami, FL (USA) is available: Minelauva.

    The AirVPN client will show automatically the new server. If you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The server accepts OpenVPN connections on ports 53, 80, 443, 1194, 2018 UDP and TCP, and WireGuard connections on ports 1637, 47107 and 51820.

    Just like every other Air server, Minelauva supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, tls-crypt and WireGuard.
    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the server status as usual in our real time servers monitor:
    https://airvpn.org/servers/Minelauva

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Team

  14. Like
    Staff got a reaction from S.O.A. in New 1 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 1 Gbit/s full duplex server located in Chicago, IL (USA) is available: Praecipua.

    The AirVPN client will show automatically the new server. If you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").

    The server accepts OpenVPN connections on ports 53, 80, 443, 1194, 2018 UDP and TCP, and WireGuard connections on ports 1637, 47107 and 51820.

    Just like every other Air server, Praecipua supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, tls-crypt and WireGuard.
    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.

    You can check the server status as usual in our real time servers monitor:
    https://airvpn.org/servers/Praecipua

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Team

  15. Like
    Staff got a reaction from S.O.A. in New 10 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 10 Gbit/s (full duplex) server located in Los Angeles (California, USA) is available: Saclateni.

    Saclateni supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Saclateni

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove

  16. Like
    Staff got a reaction from S.O.A. in New 3 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 3 Gbit/s (full duplex) server located in Denver, CO (USA) is available: Sadachbia.

    Sadachbia supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637 and 47107 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Sadachbia

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff
     
  17. Like
    Staff got a reaction from unpar in Google "Unaddressed Abuse Complaints"   ...
    Hello!

    Google Search should never be used for privacy reasons (Google profiling techniques are so advanced that you risk to create a correlation between your real identity and your VPN identity at the tiniest error) and ethical reasons, but you can rely on startpage.com if you really need Google Search. Startpage will proxy your queries to Google Search and serve you back Google reply, therefore an additional protection layer stands between your node and Google and you usually avoid captchas. A very good search engine offering privacy protection commitment is Brave Search:
    https://search.brave.com

    Kind regards
     
  18. Thanks
    Staff got a reaction from ertangela in New Computer, new problems   ...
    @happysatan13

    Hello!

    The following virtual network adapter:
    is causing a critical error to OpenVPN:
    To resolve the problem please tell Eddie to use exclusively a virtual network interface created by itself and ignore other "alien" interfaces: from Eddie's main window select Preferences > Networking in the "VPN interface name" field type eddie (or any other very short name you like) click "Save" Switching to WireGuard will also resolve the problem. You can switch to WireGuard and change connection mode in Eddie's Preferences > Protocols window.

    Kind regards
     
  19. Like
    Staff got a reaction from Snowsuit8087 in OpenVPN vs. Wireguard -fastest protocol on Mac?   ...
    Hello!

    Remember that you lose the Network Lock feature in this case. Hummingbird 2.0.0 preview for macOS is almost ready and it will let you run WireGuard through wg userspace tool in macOS with Network Lock, if you need it. Stay tuned on the "News" forum.

    Kind regards
     
  20. Like
    Staff got a reaction from ScanFarer in New 10 Gbit/s server available (US)   ...
    Hello!
    Thank you very much.

    Sabik, Merope and Alkes IP addresses are already located in Los Angeles, in the IANA / ARIN databases, so any geo-location database which reports otherwise is poorly maintained. However, we have decided (breaking news 🙂 ) that those servers will be withdrawn in early 2024 and replaced by more powerful hardware in the LA area (please follow the "News" forum in the next weeks).

    Kind regards
     
  21. Thanks
    Staff reacted to Nasdaq in [ENDED] Christmas Deal 2023   ...
    I missed november sales. Never too late to do right things.

    One more year today!

    Thanks AirVPN😀

    And Merry Christmas Everybody! 🎅
  22. Like
    Staff got a reaction from nexsteppe in What is the boundary of free speech?   ...
    Hello!

    Totally correct. AirVPN forums ("News", "How-To" and "Databases") are technical and service forums where a new thread can be started only by AirVPN staff. "News" is restricted to announcements and news regarding AirVPN and its infrastructure, "How-To" is restricted to guides for the customers, and "Databases" pertains to geo-routing db as well as residential ISPs around the world, to report their behavior and blocks against VPN or Tor. So they are totally inappropriate for any "free speech" purpose.

    The community forums are a gift of AirVPN to the community, mainly managed by the community itself with self-proposed, voluntary moderation. AirVPN basically provides the infrastructure and cover its expenses. Ads are forbidden, netiquette is enforced, but we do not monitor these forums closely, except for "Troubleshooting", dedicated to technical problems and their resolutions, where we can intervene (if we have the time) before the professional support team is involved through a ticket. However most problems are resolved by the community itself without our intervention. Of course you can't abuse the community forums for generic "freedom of speech" as they would lose their purpose: community member support by other community members. They could also become unreadable if all topics were allowed!

    In the community forums you also find the "Off-Topic" forum where you can post various arguments, even not specifically related to AirVPN. Ads prohibition and netiquette enforcement stay even in "Off-Topic" of course.

    More in general, we provide you with an infrastructure to aid free speech trough a layer of privacy and even anonymity, as anonymity as been recognized both by the UN and by the USA Supreme Court as an essential tool in order to exercise freedom of expression and information. We also support or supported monetarily other tools which aid directly freedom of speech, such as PeerTube, Mastodon, Tor, and organizations which support freedom of speech (for example EDRi and EFF).

    All of the above is in accordance with our mission https://airvpn.org/mission : it's not in our mission to maintain and deliver directly tools to exercise freedom of expression, but it's in our mission to "Deliver a service capable of providing a strong anonymity layer in order to exercise the Right to Remain Anonymous (*), which has been widely recognized as a key to freedom of speech". Specialization is essential in this case given our resources: do one thing and do it well. If we dispersed our resources in more and more projects with too many purposes, we might end up being ineffective in all areas.

    Kind regards
     
  23. Like
    Staff got a reaction from ss11 in Terrapin attack/CVE-2023-46445   ...
    @88incher

    Hello and thank you!

    Yes, we recommend a prompt update of OpenSSH, of course. If you need OpenVPN over SSH to our servers, we assure you that updates are performed frequently so the update will be applied soon, when it is available in the official repository. Remember that the update must be applied even client side.

    Anyway, remember that the OpenVPN client, at a first analysis, can't be fooled by this method: if you have connected via SSH, by running a vulnerable SSH client and library, to some entity in the middle which pretends to be us by exploiting the vulnerability, that entity will fail to mimic an OpenVPN connection to one of our servers, because it lacks the proper certificates and keys. On the client side you will be able to establish an SSH connection to the attacker machine (provided that you run a vulnerable ssh), but then OpenVPN will fail to connect.

    Kind regards
     
  24. Like
    Staff got a reaction from ScanFarer in New 10 Gbit/s server available (US)   ...
    Hello!
    Thank you very much.

    Sabik, Merope and Alkes IP addresses are already located in Los Angeles, in the IANA / ARIN databases, so any geo-location database which reports otherwise is poorly maintained. However, we have decided (breaking news 🙂 ) that those servers will be withdrawn in early 2024 and replaced by more powerful hardware in the LA area (please follow the "News" forum in the next weeks).

    Kind regards
     
  25. Thanks
    Staff got a reaction from noooodlz in Stuck in a broken route, never connects   ...
    Hello!

    The Express VPN interface causes a critical error to OpenVPN:

    Tell Eddie to ignore any alien interface: Select from Eddie's main window Preferences > Networking, write eddie in the "VPN interface name" field click Save.
    You may also consider to switch to WireGuard to bypass the alien interface. You can do it in Preferences > Protocols window. Uncheck Automatic, select a WireGuard connection mode and click Save.

    Kind regards
     
×
×
  • Create New...