Jump to content
Not connected, Your IP: 34.238.143.70

Search the Community

Showing results for tags 'JSON'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 3 results

  1. Hello, I'm one of the Mullvad refugees. While I tried it for a few weeks now, using a peer-to-peer protocol without a forwarded port was just too slow and often it was even impossible to establish connections to peers. And although I'm very happy with your service and the general scope of the API, there are some things that are broken or that I'm missing: Setting device names and descriptions via the API. Assigning ports to devices via the API (preferable by ID and name, but most importantly by ID), maybe also claiming ports via the API. In my tests calls to the configuration generator API with "resolve=on" would only work for IPv4 endpoints, not for IPv6 endpoints. It would be great if this also worked for IPv6 addresses. It seems a bit strange to me that adding a device returns a longer ID, while the other parts of the API which use the ID seem to truncate it to 50 characters. Why isn't the truncated ID returned uniformly? It would be nice for my use-case to also have the configuration generator optionally return JSON. The current configurations are to be consumed by wg-quick and while using wg-quick (either to load them or to transform them to wg rules) or parsing them and using them with wg is easy enough, it would just be nice to have the additional option. Maybe with some nice clean key names like "public_key". Example request for the mentioned IP resolution problem: curl -H "Api-Key: <REDACTED>" "https://airvpn.org/api/generator/?protocols=wireguard_1_udp_1637&servers=europe&device=default&resolve=on&iplayer_entry=ipv6" -o AirVPN_Europe_UDP-1637.conf This will properly resolve the hostname to an IP when "iplayer_entry=ipv4" (or the empty default) is set, but just pass the hostname through when "iplayer_entry=ipv6" is specified.
  2. For anyone who likes programming with Python, I started a project called AirPy on Github, https://github.com/Delphae/AirVPN AirPy is a Python wrapper around the AirVPN API which everybody can use, which some of you already heard of. The API is very useful to determine your connection, your server connected to and your user info Take a look at https://airvpn.org/api/ to learn more about the free to use API of AirVPN. But the output is in JSON, XML and so on. To use the output in a Python program, in a Python console or in Jupyter I have created the AirPy module. I started it, just for fun. And to get familiar with Python and Object Oriented Programming (I learned programming the old school way: procedures and functions :-)) On Github you will find the AirPy code as well as an example, in Python, how to use the AirPy module. Import the AirPy module with your personal API key and set the default country from AirPy import Airvpn APIKEY = "7de2aa122b7a42b9882d2f5b1e8ff30168ca6468" air = Airvpn(APIKEY,'nl') # when you are located in the Netherlands air = Airvpn(APIKEY,'gb') # when you are located in the UK, and so on Examples print (air.user) print (air.user.connected) print (air.user.login) print (air.connection) print (air.connection.server_name) print (air.sessions[0]) servers = air.servers() for server in servers: print (server) print (air.best()) print (air.rand()) So, if you think it is useful, use it. If you want to contribute, please do. If you have suggestions and improvements, do not hesitate to write them in this post.
  3. Hi all, Does anyone know the security quality of masked data in JSON Payloads? Obviously no substitue for HTTPS or a VPN but whats the general thoughts on it? Cheers
×
×
  • Create New...