Jump to content
Not connected, Your IP: 44.192.20.240

Staff

Staff
  • Content Count

    10402
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1734

Reputation Activity

  1. Like
    Staff got a reaction from itsmefloraluca in [ENDED] Christmas Deal 2023   ...
    Hello!
     
    We're very glad to announce a special promotion on our long terms Premium plans.
     
    You can get prices as low as 2.20 €/month with a three years plan, which is a 68% discount when compared to monthly plan price of 7 €.

    You can also send an AirVPN plan as a gift: you have the option to print or send a colorful, dedicated picture with the code to activate the plan. You can do it in your account Client Area -> Your membership: Purchase and credit -> Print X-Mas after you have bought a coupon.
     
     

    If you're already our customer and you wish to stay aboard for a longer period, any additional subscription will be added on top of already existing subscriptions and you will not lose any day.

    Please check plans special prices on https://airvpn.org and https://airvpn.org/buy

    Promotion will end on January the 8th, 2024 (UTC).
     
    Kind regards & datalove
    AirVPN Staff
  2. Like
    Staff got a reaction from go558a83nk in New 10 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 10 Gbit/s (full duplex) server located in Los Angeles (California, USA) is available: Saclateni.

    Saclateni supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Saclateni

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove

  3. Like
    Staff got a reaction from go558a83nk in New 3 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 3 Gbit/s (full duplex) server located in Denver, CO (USA) is available: Sadachbia.

    Sadachbia supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637 and 47107 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Sadachbia

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff
     
  4. Like
    Staff got a reaction from itsmefloraluca in [ENDED] Christmas Deal 2023   ...
    Hello!
     
    We're very glad to announce a special promotion on our long terms Premium plans.
     
    You can get prices as low as 2.20 €/month with a three years plan, which is a 68% discount when compared to monthly plan price of 7 €.

    You can also send an AirVPN plan as a gift: you have the option to print or send a colorful, dedicated picture with the code to activate the plan. You can do it in your account Client Area -> Your membership: Purchase and credit -> Print X-Mas after you have bought a coupon.
     
     

    If you're already our customer and you wish to stay aboard for a longer period, any additional subscription will be added on top of already existing subscriptions and you will not lose any day.

    Please check plans special prices on https://airvpn.org and https://airvpn.org/buy

    Promotion will end on January the 8th, 2024 (UTC).
     
    Kind regards & datalove
    AirVPN Staff
  5. Like
    Staff got a reaction from OpenSourcerer in New 3 Gbit/s server available (US)   ...
    Hello!

    The server features a 10 Gbit/s NIC connected to a 10 Gbit/s port. 3 Gbit/s (full duplex) are guaranteed and unmetered. Fully burstable to 10 Gbit/s best effort, 3 Gbit/s (full duplex) commitment 100% guaranteed.

    Kind regards
     
  6. Like
    Staff got a reaction from go558a83nk in New 10 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 10 Gbit/s (full duplex) server located in Los Angeles (California, USA) is available: Saclateni.

    Saclateni supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Saclateni

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove

  7. Like
    Staff got a reaction from Wolf666 in Terrapin attack/CVE-2023-46445   ...
    @88incher

    Hello and thank you!

    Yes, we recommend a prompt update of OpenSSH, of course. If you need OpenVPN over SSH to our servers, we assure you that updates are performed frequently so the update will be applied soon, when it is available in the official repository. Remember that the update must be applied even client side.

    Anyway, remember that the OpenVPN client, at a first analysis, can't be fooled by this method: if you have connected via SSH, by running a vulnerable SSH client and library, to some entity in the middle which pretends to be us by exploiting the vulnerability, that entity will fail to mimic an OpenVPN connection to one of our servers, because it lacks the proper certificates and keys. On the client side you will be able to establish an SSH connection to the attacker machine (provided that you run a vulnerable ssh), but then OpenVPN will fail to connect.

    Kind regards
     
  8. Like
    Staff got a reaction from go558a83nk in New 3 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 3 Gbit/s (full duplex) server located in Denver, CO (USA) is available: Sadachbia.

    Sadachbia supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637 and 47107 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Sadachbia

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff
     
  9. Like
    Staff got a reaction from PWolverine in What is the boundary of free speech?   ...
    Hello!

    Totally correct. AirVPN forums ("News", "How-To" and "Databases") are technical and service forums where a new thread can be started only by AirVPN staff. "News" is restricted to announcements and news regarding AirVPN and its infrastructure, "How-To" is restricted to guides for the customers, and "Databases" pertains to geo-routing db as well as residential ISPs around the world, to report their behavior and blocks against VPN or Tor. So they are totally inappropriate for any "free speech" purpose.

    The community forums are a gift of AirVPN to the community, mainly managed by the community itself with self-proposed, voluntary moderation. AirVPN basically provides the infrastructure and cover its expenses. Ads are forbidden, netiquette is enforced, but we do not monitor these forums closely, except for "Troubleshooting", dedicated to technical problems and their resolutions, where we can intervene (if we have the time) before the professional support team is involved through a ticket. However most problems are resolved by the community itself without our intervention. Of course you can't abuse the community forums for generic "freedom of speech" as they would lose their purpose: community member support by other community members. They could also become unreadable if all topics were allowed!

    In the community forums you also find the "Off-Topic" forum where you can post various arguments, even not specifically related to AirVPN. Ads prohibition and netiquette enforcement stay even in "Off-Topic" of course.

    More in general, we provide you with an infrastructure to aid free speech trough a layer of privacy and even anonymity, as anonymity as been recognized both by the UN and by the USA Supreme Court as an essential tool in order to exercise freedom of expression and information. We also support or supported monetarily other tools which aid directly freedom of speech, such as PeerTube, Mastodon, Tor, and organizations which support freedom of speech (for example EDRi and EFF).

    All of the above is in accordance with our mission https://airvpn.org/mission : it's not in our mission to maintain and deliver directly tools to exercise freedom of expression, but it's in our mission to "Deliver a service capable of providing a strong anonymity layer in order to exercise the Right to Remain Anonymous (*), which has been widely recognized as a key to freedom of speech". Specialization is essential in this case given our resources: do one thing and do it well. If we dispersed our resources in more and more projects with too many purposes, we might end up being ineffective in all areas.

    Kind regards
     
  10. Like
    Staff reacted to kbps in New 3 Gbit/s server available (US)   ...
    3 Gbit/s ???  Interesting.  Loving the pictures of the cities. 😀
  11. Like
    Staff reacted to cabbage_fork in New 10 Gbit/s server available (US)   ...
    Been wanting a 10 Gbps server that's close to me for the longest time. This feels like an early Christmas present. Thank you AirVPN staff - this is amazing!
  12. Like
    Staff got a reaction from Wolf666 in OpenVPN 3 fork – merge to upstream?   ...
    Hello!

    In 2019 we pushed a commit with a major new feature for OpenVPN3 library but it was refused by the maintainer (Arne Schwabe) for stylistic reasons. In the opinion of some of us it's their (OpenVPN3 maintainers) style to be ugly, but OK it's a matter of personal tastes so the text format and spacing was changed accordingly and a new commit was ready.

    The new commit was again refused, this time because the source code included tags mentioning the source code author "ProMIND". We couldn't fully understand why the author should not be mentioned in the source code itself, moreover the tags were useful for another purpose, but fine, all tags were removed and a new commit was ready.

    The new commit was again refused, this time because the identity of the source code author ProMIND was not certified. In general we do not disclose the identity of our employees and collaborators, much less force them to certify it with any third party, and leave to them the choice to disclose real identity and certify it. The request was strange and we asked for some clarification. It came out, even from other OpenVPN community members, that the requirement was related to a specific contractual agreement mentioned here: https://github.com/OpenVPN/openvpn3/blob/master/CLA.rst

    At that point we did not like the situation: please note that a new problem was mentioned only after each new commit was proposed, while it would have been fair that all problems were mentioned at the same time, obviously, since the very beginning. And we did not like anymore to allow OpenVPN Inc. to re-license under any new license our or ProMIND's code, which is under GPLv3, according to the mentioned contributor's agreement, specifically part II, (e) clause:
    "(e) I understand that OpenVPN Inc. may relicense this project, this contribution, and any modification to it under any license. [...]".

    Therefore we did not waste additional time on the matter and we went on with our fork without further ado. At this very moment we have no merging/commit plans.

    On a lighter tone, this thread dated 2019 is funny in the last part:
    https://airvpn.org/forums/topic/43850-openvpn-3-development/
    because one of the AirVPN community moderators defended OpenVPN style and Schwabe refusals, and wrote: "If you had contributed to the Linux kernel like that, Linus would tear you to tiny bits." Ironically, after that message was written, Linus Torvalds examined OpenVPN code and he was horrified.

    Kind regards
     
  13. Like
    Staff got a reaction from Wolf666 in Google blacklist   ...
    Hello!

    The screenshot you published shows that it's not a block but a verification that the user is human through the usual Public Turing test. It may happen when there are numerous, concurrent connections from the same IP address, it's not a case of a black listed IP address. Google should never be used, VPN or not, anyway you can also rely on https://startpage.com which will act as a proxy to Google Search, therefore adding some additional privacy layer between you and Google Search.

    Kind regards
     
  14. Like
    Staff got a reaction from Wolf666 in Google "Unaddressed Abuse Complaints"   ...
    @p9974839

    Google Search should never be used, but if you really want it, why not just use https://startpage.com ?

    Kind regards
     
  15. Like
    Staff got a reaction from Wolf666 in Google "Unaddressed Abuse Complaints"   ...
    Hello!

    Google Search should never be used for privacy reasons (Google profiling techniques are so advanced that you risk to create a correlation between your real identity and your VPN identity at the tiniest error) and ethical reasons, but you can rely on startpage.com if you really need Google Search. Startpage will proxy your queries to Google Search and serve you back Google reply, therefore an additional protection layer stands between your node and Google and you usually avoid captchas. A very good search engine offering privacy protection commitment is Brave Search:
    https://search.brave.com

    Kind regards
     
  16. Like
    Staff got a reaction from Wolf666 in Future of US AirVPN servers after Restrict ACT bill S. 686   ...
    Not only TikTok. For example the Bitcoin network can not be controlled so a transaction from an American citizen could potentially go to a citizen of a country that's "a menace" for the USA (definition of enemy and menace is discretionary, the used language seems fine tuned to allow scope enlargement at will without judiciary supervision). Since that's not controllable, we find it potentially possible that operators might be required to block "the Bitcoin network".

    What's worse, according to a preliminary interpretation of the text, if in some way (difficult but personal and house search, pre-selected through the usual monitoring performed by USA ISPs, can help...) it can be proved that a USA citizen has used some tool like Tor or VPN to access any of the blocked network / services etc., that citizen will be prosecuted: civil liability up to a million of dollars, and criminal behavior subjected to up to 20 years in jail - which, if we're not mistaken, is worse than in China, Russia, and various countries controlled by human rights hostile regimes.

    Kind regards
     
  17. Like
    Staff got a reaction from PWolverine in Will there be a christmas 2023 sale?   ...
    Hello!

    Yes, stay tuned!

    Kind regards
     
  18. Like
    Staff got a reaction from ScanFarer in Can the 10G Full-Duplex Servers Operate at Nearly or Full Bandwidth/Capacity?   ...
    @ScanFarer

    Hello!

    New 10 Gbit/s full duplex server has been added in Los Angeles. Another server with high bandwidth has been added in Denver (Colorado) with a 10 Gbit/s interface and port and 3 Gbit/s bandwidth (full duplex) guaranteed, burstable to 10 Gbit/s.
    https://airvpn.org/status

    Kind regards
     
  19. Like
    Staff got a reaction from go558a83nk in New 10 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 10 Gbit/s (full duplex) server located in Los Angeles (California, USA) is available: Saclateni.

    Saclateni supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Saclateni

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove

  20. Like
    Staff reacted to Firebolt059 in New 10 Gbit/s server available (US)   ...
    This is great! Keep up the good work!
  21. Like
    Staff got a reaction from go558a83nk in New 3 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 3 Gbit/s (full duplex) server located in Denver, CO (USA) is available: Sadachbia.

    Sadachbia supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637 and 47107 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Sadachbia

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff
     
  22. Like
    Staff got a reaction from go558a83nk in New 10 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 10 Gbit/s (full duplex) server located in Los Angeles (California, USA) is available: Saclateni.

    Saclateni supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Saclateni

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove

  23. Like
    Staff got a reaction from go558a83nk in New 10 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 10 Gbit/s (full duplex) server located in Los Angeles (California, USA) is available: Saclateni.

    Saclateni supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Saclateni

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove

  24. Like
    Staff reacted to OpenSourcerer in Port Forwarding Connection Timeout Error (110)   ...
    So much for "I've got the same issue". They weren't the same at all, just causing similar symptoms.
    Open your own threads, people!
  25. Like
    Staff reacted to OpenSourcerer in Fake subreddit r/AirVPN?   ...
    Reproduced with anonymous access. Went into the spam messages and it actually was there. Removed, should no longer be visible now.

    Thank you for the report.
×
×
  • Create New...