AirVPN
#17
AirVPN announces the availability of Eddie Android edition 4.0.0 Beta 1


UPDATE 2026-01-14: Eddie Android edition 4.0.0 Beta 2 is now available

This is a major update: for the first time Eddie Android edition features AmneziaWG complete support.

Eddie Android edition is a fully integrated with AirVPN, free and open source client allowing comfortable connections to AirVPN servers and generic VPN servers offering compatible protocols. Eddie 4.0.0 aims primarily at adding, besides the already available OpenVPN and WireGuard, a thorough and comfortable AmneziaWG support. 

AmneziaWG is a free and open source fork of WireGuard by Amnezia inheriting the architectural simplicity and high performance of the original implementation, but eliminating the identifiable network signatures that make WireGuard easily detectable by Deep Packet Inspection (DPI) systems. It can operate in several different ways, including a fallback, "compatibility mode" with WireGuard featuring anyway various obfuscation techniques.
 

What's new in Eddie 4.0.0
 
  • AmneziaWG support
  • Amnezia WireGuard API

    - stronger anti-blocking behavior:
    ability to log in to the service and download AirVPN infrastructure and user data while connected through a profile with a specific option on the left pane
    - ability to read and use local user data when bootstrap servers are unreachable

  • new "Open with..." option on top of the usual "Share" option to manage and export comfortably generated profiles on any Android version with any suitable application
  • updated AmneziaWG parameters allowed ranges 
  • updated OpenSSL, OpenVPN3-AirVPN and WireGuard libraries
  • bug fixes
  • see the complete changelog below


AmneziaWG overview
 
From the official documentation: https://docs.amnezia.org/documentation/amnezia-wg AmneziaWG offers:
 
  • Dynamic Headers for All Packet Types (compatibility with WireGuard: YES)

    During tunnel initialization, the library generates a set of random constants applied to each of the four WireGuard packet formats: Init, Response, Data, Under‑Load. These constants:

  • Replace predictable WireGuard packet identifiers;
  • Shift offsets of Version/Type fields;
  • Modify reserved bits.

    As a result, no two clients have identical headers, making it impossible to write a universal DPI rule.
     

  • Handshake Length Randomization (compatibility with WireGuard: NO)

    In WireGuard, the Init packet is exactly 148 bytes, and the Response packet is exactly 92 bytes. AmneziaWG adds pseudorandom prefixes S1 and S2 (0-64 bytes by default):
    Quote:len(init) = 148 + S1
    len(resp) = 92  + S2 


    Offsets of the remaining fields are automatically adjusted, and MAC tags are recalculated accordingly. In order to keep backward compatibility with WireGuard, S1 and S2 must be set to 0.

  • Obfuscation Packets I1-I5 (Signature Chain) & CPS (Custom Protocol Signature) (compatibility with WireGuard: partial, with fallback)

    Before initiating a "special" handshake (every 120 seconds), the client may send up to five different UDP packets fully described by the user in the CPS format. In this way AmneziaWG can mimic perfectly QUIC, DNS and other protocols adding powerful methods to circumvent blocks. QUIC is particularly interesting as HTTP/3 is built on it and currently, from Chrome and other compatible browsers, 50% of traffic to/from Google is QUIC traffic. Therefore, blocking QUIC may have major disruptions for any ISP.
     

  • Junk‑train (Jc) (compatibility with WireGuard: YES)

    Immediately following the sequence of I-packets, a series Jc of pseudorandom packets with lengths varying between Jmin and Jmax is sent. These packets blur the timing and size profile of the session start, significantly complicating handshake detection.
     

  • Under‑Load Packet (compatibility with WireGuard: YES)

    In WireGuard, a special keep-alive packet (“Under-Load”) is used to bypass NAT timeouts. AmneziaWG replaces its fixed header with a randomized one, the value of which can be set manually. This prevents DPI from filtering short ping packets, ensuring stable tunnel connections, especially on mobile networks.
    More Information HERE
    •  

[-] The following 1 user says Thank You to jasonX for this post:
  • harlan4096
Reply


Messages In This Thread
AirVPN - by jasonX - 15 October 24, 10:41
RE: AirVPN - by jasonX - 15 October 24, 10:46
RE: AirVPN - by jasonX - 28 January 25, 02:25
RE: AirVPN - by jasonX - 28 January 25, 02:29
RE: AirVPN - by jasonX - 18 May 25, 10:56
RE: AirVPN - by jasonX - 17 July 25, 09:15
RE: AirVPN - by jasonX - 08 September 25, 07:32
RE: AirVPN - by jasonX - 19 October 25, 04:19
RE: AirVPN - by jasonX - 23 October 25, 03:39
RE: AirVPN - by jasonX - 07 November 25, 09:24
RE: AirVPN - by jasonX - 11 November 25, 10:53
RE: AirVPN - by jasonX - 15 November 25, 09:55
RE: AirVPN - by jasonX - 16 November 25, 13:11
RE: AirVPN - by jasonX - 20 November 25, 00:01
RE: AirVPN - by jasonX - 09 December 25, 04:24
RE: AirVPN - by jasonX - 11 January 26, 04:24
RE: AirVPN - by jasonX - 15 January 26, 02:30
RE: AirVPN - by jasonX - 24 February 26, 20:29
RE: AirVPN - by jasonX - 06 March 26, 09:03

Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Paint.NET 5.1.12
Changes in 5.1.12:...harlan4096 — 08:16
Master PDF Editor Updates Thread
Latest build is Mast...jasonX — 05:14
K-Lite Codec Pack 19.5.5 / 19.5.7 Update
Changes in 19.5.5:...harlan4096 — 17:24
NanaZip 6.0 Update 2 (6.0.1650.0)
NanaZip 6.0 Update...harlan4096 — 17:18
PrivaZer 4.0.119
PrivaZer 4.0.119 ...harlan4096 — 17:16

[-]
Birthdays
Today's Birthdays
avatar (40)ebenofit
Upcoming Birthdays
avatar (44)gapedDow
avatar (38)snorydar
avatar (43)Hectorvot
avatar (51)knowhanPluts
avatar (39)Williamengiz
avatar (46)qaqapeti
avatar (44)battsourIonix
avatar (43)CedricSek
avatar (39)chasRex
avatar (45)walllMIZ
avatar (41)oconyho
avatar (33)uteluxix
avatar (47)piafcflene
avatar (39)Matthewkah
avatar (51)tersfargum
avatar (50)alfreExept
avatar (38)Charlesfibre
avatar (42)napasvem
avatar (44)diploJeoca
avatar (38)francisnj3
avatar (43)artmaGoork
avatar (41)RichardCisee
avatar (38)ykazawu

[-]
Online Staff
There are no staff members currently online.

>