Jump to content
Not connected, Your IP: 18.220.66.151

Staff

Staff
  • Content Count

    10613
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    1766

Reputation Activity

  1. Thanks
    Staff reacted to zsam288 in Eddie Desktop 2.24 beta released   ...
    When i boot my pc I have eddie set to start on logon, however I get attached errors.
    Seems this has to do with the service not being started yet?
    After I close the 2nd error nothing happens.
    When i then open eddie manually it starts fine

    this didn't happen on 2.23





    My settings:

     
  2. Thanks
    Staff reacted to MarkDubya in Eddie Desktop 2.24 beta released   ...
    I installed the Arch package and there is no tray icon. It seems the PNG icons are missing from /usr/share/eddie-ui/.

    EDIT: It seems the eddie-tray binary is missing from /usr/lib/eddie-ui/.
  3. Thanks
    Staff reacted to spinmaster in Eddie Desktop 2.24 beta released   ...
    Thanks for clarifying! I made a few tests on a few different servers with connection mode "Automatic" and for all them, the previous default protocol & port (OpenVPN 443) was chosen. In which cases uses the bootstrap server manifest file WireGuard over OpenVPN?

    I may leave it on WireGuard personally in Eddie as it feels a little faster than OpenVPN, but overall stability is more important for me than speed or a few extra MBit and as I said, OpenVPN worked also just fine so far.
  4. Thanks
    Staff reacted to BettyIsBoop in Eddie Desktop 2.24 beta released   ...
    Fixed with the workaround, and the systray icon appear too.

    Thank you.
     
  5. Like
    Staff got a reaction from BettyIsBoop in Eddie Desktop 2.24 beta released   ...
    @BettyIsBoop @mnzx and anyone with the error "System.TypeInitializationException"

    Confirmed, hopefully this will be fixed in the next release.

    As a workaround for now, please install mono-runtime-common:
    sudo apt install mono-runtime-common

    @svenmaninov : Hi, it's expected. There shouldn't be any Mono dependency theoretically as it's bundled now. However, there is an issue that is being investigated.
  6. Like
    Staff got a reaction from Hypertext1071 in Six new 1 Gbit/s servers available (US)   ...
    Hello!

    We're very glad to inform you that 6 new 1 Gbit/s (full duplex) servers located in Miami, Florida (USA), are available: Aladfar, Ascella, Chertan, Elkurud, Giausar, Meleph.

    The servers supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Aladfar
    https://airvpn.org/servers/Ascella
    https://airvpn.org/servers/Chertan
    https://airvpn.org/servers/Elkurud
    https://airvpn.org/servers/Giausar
    https://airvpn.org/servers/Meleph

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff

  7. Like
    Staff got a reaction from spinmaster in Eddie Desktop 2.24 beta released   ...
    Version 2.24.1 with some bugfixes released.

     

    In some packages, WireGuard was not the default, fixed in 2.24.1.
     

    As soon as possible.
     

    Tray icon should be fixed in 2.24.1
     

    Fixed in 2.24.1, same issue also for @drum
     

    Both under investigation, thank you for your tests and patience!
     

    Under investigation, thank you for your tests and patience!

    Kind regards

     
  8. Like
    Staff got a reaction from Valerian in Termination of service in Italy   ...
    Hello!

    We were easy prophets in this case. The catastrophic blackout referred to in the article is a concrete example of the risk we denounced, a violation of fundamental rights, a confirmation of the wisdom of our decision and a demonstration of the irresponsible and odious frivolity of decisions taken by private actors. Our infrastructure must not be polluted by repugnant decisions taken by private entities that seem to have little or no technical competence and that, so far, enjoy impunity for any mistake, no matter how serious.

    Kind regards
     
  9. Like
    Staff got a reaction from BettyIsBoop in eddie-ui broken after update to 2.24.0   ...
    @BettyIsBoop

    Can you please post your message in the following thread:
    https://airvpn.org/forums/topic/57401-eddie-desktop-224-beta-released/

    It's the thread followed by devs for bug reports on 2.24. Thank you in advance!

    Kind regards
     
  10. Thanks
    Staff got a reaction from Moneytinker in Stuck in a broken route, never connects   ...
    Hello!

    The Express VPN interface causes a critical error to OpenVPN:

    Tell Eddie to ignore any alien interface: Select from Eddie's main window Preferences > Networking, write eddie in the "VPN interface name" field click Save.
    You may also consider to switch to WireGuard to bypass the alien interface. You can do it in Preferences > Protocols window. Uncheck Automatic, select a WireGuard connection mode and click Save.

    Kind regards
     
  11. Like
    Staff got a reaction from Valerian in Termination of service in Italy   ...
    Hello!

    We were easy prophets in this case. The catastrophic blackout referred to in the article is a concrete example of the risk we denounced, a violation of fundamental rights, a confirmation of the wisdom of our decision and a demonstration of the irresponsible and odious frivolity of decisions taken by private actors. Our infrastructure must not be polluted by repugnant decisions taken by private entities that seem to have little or no technical competence and that, so far, enjoy impunity for any mistake, no matter how serious.

    Kind regards
     
  12. Like
    Staff got a reaction from xmartymcflyx in Can the 10G Full-Duplex Servers Operate at Nearly or Full Bandwidth/Capacity?   ...
    Hello!

    Yes, it's strictly mandatory to support OpenVPN on every and each existing server, otherwise we would break compatibility with a relevant portion of customers who rely on OpenVPN support for their devices (or even because WireGuard is blocked in their network) on specific server(s). Stopping OpenVPN on existing server(s) would be a huge and serious problem, even without considering the contractual breaches.

    Kind regards
     
  13. Like
    Staff got a reaction from zsam288 in Eddie Desktop 2.24 beta released   ...
    Hello!
     
    We're very glad to inform you that a new Eddie Air client version has been released: 2.24 beta. It is ready for public beta testing.
     
    How to test our experimental release:
    Go to download page of your OS Click the button Switch to EXPERIMENTAL Download and install
    This is a new version of Eddie Desktop (Windows / Linux / MacOS).
    We know there is still 2.21.8 as stable, and 2.22.x and 2.23.x series never reached the stable version.
    We hope that this version 2.24.x will be tested and reach a stable release.

    Internally (in terms of development and code) it represents a significant step forward for us: the CLI editions are compiled with dotnet 7, without Mono, Xamarin and any dependency on NetFramework (Windows) or Mono (Linux, MacOS). 
    All CLI projects can be opened in Visual Studio Code and debugged on any OS (macOS, Linux, Windows) without the need to use Xamarin, Visual Studio or Visual Studio for Mac. 
    A new UI is in the works that will finally remove the dependency on Mono and Xamarin, but we don't have a release date to announce yet. 
    The MacOS CLI is new (previously there was only the UI, or the UI with "-cli"), and it's also native for arm64. 
    Overall, there has been a significant effort to clean up and modernise the code, and to prepare our build/deploy scripts for the new UI as well. 

    We understand that there are still tickets or posts that we haven't responded to yet, but we preferred to complete this step first.

    Main changelog: [new] WireGuard is now the default communication protocol [new] All CLI editions can be compiled and debugged with VSCode and .NET7 [new] [macOS] CLI-only edition, built with .NET7, without Xamarin [new] New commandline only option "elevated.method" [change] OpenVPN 2.6.9 [change] [linux] CLI edition, built with .NET7, without Mono [change] [linux] .deb and .rpm, removed Mono dependency [change] [linux] .deb package tries to initialize elevated service at install/uninstall, .rpm package still missing this feature. [change] [windows] CLI edition, built with .NET7 [change] [all] Better management of SIGTERM signal [change] [all] Don't check if app dir is writable for portable-mode, now managed by presence of "portable.txt". [bugfix] [linux] terminal issue with sudo elevation [deprecation] [all] -cli mode for UI. Use CLI edition directly, now available in all supported platform. [deprecation] [windows] Vista builds [deprecation] [windows] Windows Firewall Network Lock mode [deprecation] [linux] x86 builds [deprecation] [linux] Portable Mono builds
     
  14. Like
    Staff got a reaction from zsam288 in Eddie Desktop 2.24 beta released   ...
    Hello!
     
    We're very glad to inform you that a new Eddie Air client version has been released: 2.24 beta. It is ready for public beta testing.
     
    How to test our experimental release:
    Go to download page of your OS Click the button Switch to EXPERIMENTAL Download and install
    This is a new version of Eddie Desktop (Windows / Linux / MacOS).
    We know there is still 2.21.8 as stable, and 2.22.x and 2.23.x series never reached the stable version.
    We hope that this version 2.24.x will be tested and reach a stable release.

    Internally (in terms of development and code) it represents a significant step forward for us: the CLI editions are compiled with dotnet 7, without Mono, Xamarin and any dependency on NetFramework (Windows) or Mono (Linux, MacOS). 
    All CLI projects can be opened in Visual Studio Code and debugged on any OS (macOS, Linux, Windows) without the need to use Xamarin, Visual Studio or Visual Studio for Mac. 
    A new UI is in the works that will finally remove the dependency on Mono and Xamarin, but we don't have a release date to announce yet. 
    The MacOS CLI is new (previously there was only the UI, or the UI with "-cli"), and it's also native for arm64. 
    Overall, there has been a significant effort to clean up and modernise the code, and to prepare our build/deploy scripts for the new UI as well. 

    We understand that there are still tickets or posts that we haven't responded to yet, but we preferred to complete this step first.

    Main changelog: [new] WireGuard is now the default communication protocol [new] All CLI editions can be compiled and debugged with VSCode and .NET7 [new] [macOS] CLI-only edition, built with .NET7, without Xamarin [new] New commandline only option "elevated.method" [change] OpenVPN 2.6.9 [change] [linux] CLI edition, built with .NET7, without Mono [change] [linux] .deb and .rpm, removed Mono dependency [change] [linux] .deb package tries to initialize elevated service at install/uninstall, .rpm package still missing this feature. [change] [windows] CLI edition, built with .NET7 [change] [all] Better management of SIGTERM signal [change] [all] Don't check if app dir is writable for portable-mode, now managed by presence of "portable.txt". [bugfix] [linux] terminal issue with sudo elevation [deprecation] [all] -cli mode for UI. Use CLI edition directly, now available in all supported platform. [deprecation] [windows] Vista builds [deprecation] [windows] Windows Firewall Network Lock mode [deprecation] [linux] x86 builds [deprecation] [linux] Portable Mono builds
     
  15. Like
    Staff got a reaction from Hypertext1071 in Six new 1 Gbit/s servers available (US)   ...
    Hello!

    We're very glad to inform you that 6 new 1 Gbit/s (full duplex) servers located in Miami, Florida (USA), are available: Aladfar, Ascella, Chertan, Elkurud, Giausar, Meleph.

    The servers supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Aladfar
    https://airvpn.org/servers/Ascella
    https://airvpn.org/servers/Chertan
    https://airvpn.org/servers/Elkurud
    https://airvpn.org/servers/Giausar
    https://airvpn.org/servers/Meleph

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff

  16. Like
    Staff got a reaction from Hypertext1071 in Six new 1 Gbit/s servers available (US)   ...
    Hello!

    We're very glad to inform you that 6 new 1 Gbit/s (full duplex) servers located in Miami, Florida (USA), are available: Aladfar, Ascella, Chertan, Elkurud, Giausar, Meleph.

    The servers supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Aladfar
    https://airvpn.org/servers/Ascella
    https://airvpn.org/servers/Chertan
    https://airvpn.org/servers/Elkurud
    https://airvpn.org/servers/Giausar
    https://airvpn.org/servers/Meleph

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff

  17. Like
    Staff got a reaction from Hypertext1071 in Six new 1 Gbit/s servers available (US)   ...
    Hello!

    We're very glad to inform you that 6 new 1 Gbit/s (full duplex) servers located in Miami, Florida (USA), are available: Aladfar, Ascella, Chertan, Elkurud, Giausar, Meleph.

    The servers supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Aladfar
    https://airvpn.org/servers/Ascella
    https://airvpn.org/servers/Chertan
    https://airvpn.org/servers/Elkurud
    https://airvpn.org/servers/Giausar
    https://airvpn.org/servers/Meleph

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff

  18. Like
    Staff got a reaction from benfitita in VPN service disclosed user IP to French authorities   ...
    Hello!

    Sorry, but your message contains FUD and fantasy. The Swiss Federal law about the Surveillance of the Post and Telecommunications enforces 6 months of metadata and e-mail headers retention to ISPs with more than 100 M CHF of revenue per year for at least two years in a row or receiving more than 100 requests of information in a single year. All the exemptions and obligations here. Furthermore, your alleged retention obligation of encrypted transiting data in unencrypted form not only is not required, but it is also physically impossible when the ISPs don't have the decryption keys, i.e. always, for any practical purpose (impossible every time end-to-end encryption is used). In this case the law does not try to enforce something impossible, at least.

    Kind regards
     
  19. Like
    Staff got a reaction from discov in Severe internet speed reduction after disconnecting from VPN   ...
    @discov

    Hello!

    Please reset the TCP/IP stack of the Operating System of the device with the issue. If this and/or a device reboot resolves the problem, please make sure that the network interface driver is up to date. If the problem persists after the mentioned operations but is resolved only after the router has been rebooted, please upgrade the router firmware, if possible.

    Kind regards
     
  20. Like
    Staff got a reaction from amccombs in Router or British Telecom BT blocks - Connecting but fails to connect   ...
    @amccombs

    Hello!

    UDP or OpenVPN might be blocked. Please make sure that no packet filtering tools, either on your system or router, block UDP. On the router please check any "Quality of Service" or traffic management tool. If you find nothing potentially interfering, please try a connection through WireGuard, just in case your ISP has some block against OpenVPN or specific ports. In order to have Eddie switch to WireGuard: from Eddie's main window please select "Preferences" > "Protocols" uncheck "Automatic" select any line with WireGuard, for example WireGuard port 51820. The line will be highlighted. click "Save" and re-start a connection to apply the change please make sure to test a few servers in different locations around your node Kind regards
     
  21. Like
    Staff got a reaction from flat4 in USA: servers withdrawal and replacement announcement   ...
    Hello!

    We inform you that the all the servers in Miami, Florida (US), will be withdrawn and replaced by six different 1 Gbit/s servers. The replacement is part of our ongoing process to rationalise infrastructure and upgrade hardware in the US. New servers announcement will follow in the very near future.

    The servers which will be replaced are: Acamar, Cursa, Gudja, Kang, Minelauva, Yildun.

    Kind regards and datalove
    AirVPN Staff

     
  22. Like
    Staff got a reaction from flat4 in USA: servers withdrawal and replacement announcement   ...
    Hello!

    We inform you that the all the servers in Miami, Florida (US), will be withdrawn and replaced by six different 1 Gbit/s servers. The replacement is part of our ongoing process to rationalise infrastructure and upgrade hardware in the US. New servers announcement will follow in the very near future.

    The servers which will be replaced are: Acamar, Cursa, Gudja, Kang, Minelauva, Yildun.

    Kind regards and datalove
    AirVPN Staff

     
  23. Like
    Staff got a reaction from flat4 in Wireguard privacy FAQ clarification   ...
    @matmat

    Hello!

    WireGuard doesn't ever remove the public IP address of the peer. It must be done by a specific non-WireGuard task which does it for each session who had no handshake in any given 180 s timeframe. Therefore, this important WireGuard problem is greatly mitigated because the public IP addresses of the peers will not remain forever on the VPN servers (which is a grave privacy concern), but only for 3 minutes after a disconnection. "Reapplied" is just a glitch in the description, you can ignore it. Just use OpenVPN if this mitigation is not enough for your needs or threat model.

    Kind regards
     
  24. Like
    Staff got a reaction from flat4 in New 3 Gbit/s server available (US)   ...
    Hello!

    We're very glad to inform you that a new 3 Gbit/s (full duplex) server located in Denver, CO (USA) is available: Sadachbia.

    Sadachbia supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637 and 47107 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status as usual in our real time servers monitor:
    https://airvpn.org/servers/Sadachbia

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff
     
  25. Like
    Staff got a reaction from flat4 in Two new 3 Gbit/s servers available (US)   ...
    Hello!

    We're very glad to inform you that two new 3 Gbit/s (full duplex) server located in San José, CA (USA) are available: Bunda and Imai.

    They support OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard.

    The AirVPN client will show automatically the new servers; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard.

    Full IPv6 support is included as well.

    As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses and 4096 bit DH key not shared with any other VPN server.

    You can check the status in our real time servers monitor:
    https://airvpn.org/servers/Bunda
    https://airvpn.org/servers/Imai

    Do not hesitate to contact us for any information or issue.

    Kind regards and datalove
    AirVPN Staff

     
     
×
×
  • Create New...