Jump to content
Not connected, Your IP: 216.73.216.108

All Activity

This stream auto-updates     

  1. Past hour
  2. Today
  3. The I1 parameter when we use CPS and trying to mimic QUIC, shouldn't the packet be bigger (close to 1200 bytes) as per QUIC specification? Thanks.
  4. Thank you very much. For the readers: the key information here and other threads where the problem could be resolved swiftly is that it does not matter how you configure it, Plex will always listen to port 32400 of the VPN interface. Therefore, AirVPN's port "re-mapping" function comes handy. Once you choose a random port for your Plex server on your AirVPN account port panel, fill the "Local" field with "32400". Reach the Plex server from the Internet on the port remotely forwarded and the VPN server will take care to forward the packets to port 32400 of your local VPN interface. Kind regards
  5. Please note I figured out the issue on my own by reading further threw your forum I changed the public port number of the port i chose for my plex server to 32400 and made the custom port number that was assigned work and stay steady green. your port forwarding page also reports all 3 of my ports are opened 1 for plex 1 for qBitTorrent and 1 for nicotine+ they are all good to go now.
  6. Thank you for your great feedback! In the USA we have five different, independent from each other providers that guarantee a decent diversification. Servers are located into 11 different datacenters. Kind regards
  7. Glad to see another 10 Gbit/s server in the US! However, I am a bit worried that almost all of these new 10 Gbit/s servers in the US seem to be from tzulo. Is that a concern at all? I was wondering if there were any plans to diversify the providers. Thanks again for all these fast servers!
  8. I think this might be related to data centers. Some data centers offer excellent services, while others provide poor services. I believe as the AirVPN business expands, there will be more and more high-quality data centers providing services.🤔🤔🤔
  9. Yesterday
  10. Sending a heartfelt thank you from Florida! 😀🌴
  11. does anyone know how to correctly configure the plex media server so it recognizes the port i created and stays connected to it> i can get it to connect but only for a second then it drops or goes red i cant get the light to stay steady green i also have 2 other ports those both report as open when i click test and work with 2 other programs 1 separate program per port but when i tried to make a port for plex it won't stay connected i am on tmobile 5g cgnat home internet so if this can be fixed please tell me how. thankyou.
  12. Enable DNS checks again and close Eddie, reopen and connect, then provide a system report. .
  13. Enable IPv6 in the system, or:… Oh, wait, before even that: I 2025.12.29 14:52:39 - Eddie version: 2.13.6 / linux_x64, System: Linux, Name: PCLinuxOS release 2026 (PCLinuxOS) for x86_64Kernel 5.10.45-pclos1 on an 8-processor x86_64 / \l, Version: Linux magritte.localdomain 5.10.45-pclos1 #1 SMP Fri Jun 18 05:28:17 CDT 2021 x86_64 GNU/Linux, Mono/.Net Framework: v4.0.30319 . 2025.12.29 14:52:49 - OpenVPN > OpenVPN 2.4.3 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Aug 9 2017 . 2025.12.29 14:52:49 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 Eddie 2.13.6? Kernel 5.10? OpenVPN 2.4.3 and OpenSSL 1.0.2l? Please do a system update immediately! You're running a 2017 Eddie, OpenVPN and OpenSSL version on a 2020 kernel!
  14. Be advised that the servers started pushing IPv6 recently (in the PUSH_REPLY there now is redirect-gateway ipv6). The guide references v4 only, so if v6 is disabled in the system OpenVPN will fail to connect. You must explicitly filter out all pushed IPv6 options, see: Or adapt the guide to include v6.
  15. Not sure what you're asking. If you enable NetLock and don't connect, no traffic flows out, ever, except to any AirVPN server. So browsers won't connect anywhere.
  16. Got 2 machines with eddie win 10 and 7. And both got stuck on checking dns on any server. Started about dec 20th or so. If disable dns check in eddie settings, then it connects to server, but cqnt access any websites. any suggestuons how to resolve it?
  17. Hi Not sure if this is the right arena for this but is it possible to have an additional server in Ireland? I think it's quite often at capacity for bandwidth in the evenings (GMT). Thanks
  18. That is yet to be determined. SIGTERM will do that, but it will also trigger the confirmation dialog about closing Eddie (set in Preferences > UI > Exit confirmation prompt). I wonder which of the other termination signals will trigger a normal termination, too. Maybe none of them. Not really clear from man signal.h, there's an interesting table there. T is a termination signal, A is termination with additional actions. SIGTERM and SIGKILL are both T, but one is a butler politely asking you to leave, the other is a guillotine. Our SIGABRT is A, and Mono is given time to create a crash report, so I carefully deduce that all A signals will cause a crash report to be generated, and Eddie will disconnect but leave NetLock on. The following signals shall be supported on all implementations (default actions are explained below the table): ┌───────────┬────────────────┬────────────────────────────────────────────────────┐ │ Signal │ Default Action │ Description │ ├───────────┼────────────────┼────────────────────────────────────────────────────┤ │ SIGABRT │ A │ Process abort signal. │ │ SIGALRM │ T │ Alarm clock. │ │ SIGBUS │ A │ Access to an undefined portion of a memory object. │ │ SIGCHLD │ I │ Child process terminated, stopped, │ │ │ │ or continued. │ │ SIGCONT │ C │ Continue executing, if stopped. │ │ SIGFPE │ A │ Erroneous arithmetic operation. │ │ SIGHUP │ T │ Hangup. │ │ SIGILL │ A │ Illegal instruction. │ │ SIGINT │ T │ Terminal interrupt signal. │ │ SIGKILL │ T │ Kill (cannot be caught or ignored). │ │ SIGPIPE │ T │ Write on a pipe with no one to read it. │ │ SIGQUIT │ A │ Terminal quit signal. │ │ SIGSEGV │ A │ Invalid memory reference. │ │ SIGSTOP │ S │ Stop executing (cannot be caught or ignored). │ │ SIGTERM │ T │ Termination signal. │ │ SIGTSTP │ S │ Terminal stop signal. │ │ SIGTTIN │ S │ Background process attempting read. │ │ SIGTTOU │ S │ Background process attempting write. │ │ SIGUSR1 │ T │ User-defined signal 1. │ │ SIGUSR2 │ T │ User-defined signal 2. │ │ SIGPOLL │ T │ Pollable event. │ │ SIGPROF │ T │ Profiling timer expired. │ │ SIGSYS │ A │ Bad system call. │ │ SIGTRAP │ A │ Trace/breakpoint trap. │ │ SIGURG │ I │ High bandwidth data is available at a socket. │ │ SIGVTALRM │ T │ Virtual timer expired. │ │ SIGXCPU │ A │ CPU time limit exceeded. │ │ SIGXFSZ │ A │ File size limit exceeded. │ │ │ │ │ └───────────┴────────────────┴────────────────────────────────────────────────────┘ .
  19. Kornephoros is airvpns better 10gb server in canada. it almost gives me full speeds on my home server(connected via wifi) funny enough their now decommissioned wurren was a pretty crappy in my experience. i was never able to get more than 80mbit on wurren even though it was also supposedly a 10gbit server... even regular 1gbit server outperformed wurren
  20. OK this is great. I think the key process is kworker/14:0-wg-crypt-Eddie whichis separate from the UI. So even if the UI crashes those process stay unaffected and do not disengage the lock. Only a clean end signal for Edie UI also disengage the lock, as it does when exiting Eddie UI cleanly. Am I correct here?
  21. I am quite new, so Im ready to be roasted for my setup. But the short story is that I have Tailscale installed on both my servers, and my private machine so I can configure and watch media while I am at work some times. The problem is that when I enable the Network lock feature, Tailscale shits itself and Im unable to connect from my private machine to my services. These services are running on example 8080, 9443, 5055 and so on. But as RDP and SSH works fine with this, I found out that the server itself can use the tailscale ip (100.70.***) to connect to those services. So Im a bit lost here and looking for some advice. My allow list is the following at the moment for both incoming and outgoing: 127.0.0.0/8 192.168.0.0/16 10.0.0.0/8 100.68.****/32 172.17.0.0/16 172.18.0.0/16 172.19.0.0/16 100.64.0.0/10 Thank you ! 😀
  22. Hello! We're very glad to inform you that a new 10 Gbit/s full duplex server located in Los Angeles, California, is available: Revati. The AirVPN client will show automatically the new server; if you use any other OpenVPN or WireGuard client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator"). The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP for OpenVPN and ports 1637, 47107 and 51820 UDP for WireGuard. Revati supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.3, OpenVPN tls-crypt and WireGuard. Full IPv6 support is included as well. As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses. You can check the status as usual in our real time servers monitor , by clicking the server name. Direct link: https://airvpn.org/servers/Revati Do not hesitate to contact us for any information or issue. Kind regards & datalove AirVPN Staff
  23. Last week
  24. Ah, I forgot to check that. Apologies. Retested. Confirmed that Network Lock is not disengaged when Eddie is SIGABRTed. All nf_tables rules were still present. While the VPN connection is terminated more or less normally, Eddie does not disengage NetLock, so people are probably safe when it comes to crashes.
  25. Hi to all! Those 2 boxes are Linux. On my Shield, Eddie for Android can't connect to Canadian server but connect easily to American. I include 2 logs because the messages are a bit different. TIA! I 2025.12.29 14:52:39 - Eddie version: 2.13.6 / linux_x64, System: Linux, Name: PCLinuxOS release 2026 (PCLinuxOS) for x86_64Kernel 5.10.45-pclos1 on an 8-processor x86_64 / \l, Version: Linux magritte.localdomain 5.10.45-pclos1 #1 SMP Fri Jun 18 05:28:17 CDT 2021 x86_64 GNU/Linux, Mono/.Net Framework: v4.0.30319 . 2025.12.29 14:52:39 - Reading options from /home/pierre/Eddie/AirVPN.xml . 2025.12.29 14:52:40 - Command line arguments (1): console.mode="none" I 2025.12.29 14:52:41 - OpenVPN Driver - Found, /dev/net/tun I 2025.12.29 14:52:41 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (/home/pierre/Eddie/openvpn) I 2025.12.29 14:52:41 - SSH - Version: OpenSSH_9.8p1, OpenSSL 3.1.8 11 Feb 2025 (/usr/bin/ssh) I 2025.12.29 14:52:41 - SSL - Version: stunnel 5.40 (/home/pierre/Eddie/stunnel) I 2025.12.29 14:52:41 - curl - Version: 8.10.1 (/usr/bin/curl) I 2025.12.29 14:52:41 - Certification Authorities: /home/pierre/Eddie/cacert.pem . 2025.12.29 14:52:41 - Updating systems & servers data ... W 2025.12.29 14:52:41 - Special Christmas deal: save up to 68% W 2025.12.29 14:52:41 - send a gift to a friend or give yourself the gift of privacy ! 2025.12.29 14:52:41 - Ready . 2025.12.29 14:52:41 - Systems & servers data update completed I 2025.12.29 14:52:45 - Checking login ... ! 2025.12.29 14:52:45 - Logged in. I 2025.12.29 14:52:49 - Session starting. I 2025.12.29 14:52:49 - Checking authorization ... ! 2025.12.29 14:52:49 - Connecting to Kornephoros (Canada, Toronto, Ontario) . 2025.12.29 14:52:49 - OpenVPN > OpenVPN 2.4.3 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Aug 9 2017 . 2025.12.29 14:52:49 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2025.12.29 14:52:49 - Connection to OpenVPN Management Interface . 2025.12.29 14:52:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2025.12.29 14:52:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2025.12.29 14:52:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2025.12.29 14:52:49 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.157.11:443 . 2025.12.29 14:52:49 - OpenVPN > Socket Buffers: R=[212992->425984] S=[212992->425984] . 2025.12.29 14:52:49 - OpenVPN > UDP link local: (not bound) . 2025.12.29 14:52:49 - OpenVPN > UDP link remote: [AF_INET]198.44.157.11:443 . 2025.12.29 14:52:49 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.157.11:443, sid=8ffc4ccd 9a2c9e06 . 2025.12.29 14:52:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2025.12.29 14:52:49 - OpenVPN > VERIFY KU OK . 2025.12.29 14:52:49 - OpenVPN > Validating certificate extended key usage . 2025.12.29 14:52:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2025.12.29 14:52:49 - OpenVPN > VERIFY EKU OK . 2025.12.29 14:52:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kornephoros, emailAddress=info@airvpn.org . 2025.12.29 14:52:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2025.12.29 14:52:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2025.12.29 14:52:50 - OpenVPN > [Kornephoros] Peer Connection Initiated with [AF_INET]198.44.157.11:443 ! 2025.12.29 14:52:51 - Disconnecting . 2025.12.29 14:52:51 - Connection terminated. I 2025.12.29 14:52:54 - Checking authorization ... ! 2025.12.29 14:52:54 - Connecting to Paikauhale (United States, New York City) . 2025.12.29 14:52:54 - OpenVPN > OpenVPN 2.4.3 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Aug 9 2017 . 2025.12.29 14:52:54 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2025.12.29 14:52:54 - Connection to OpenVPN Management Interface . 2025.12.29 14:52:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2025.12.29 14:52:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2025.12.29 14:52:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2025.12.29 14:52:54 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.136.251:443 . 2025.12.29 14:52:54 - OpenVPN > Socket Buffers: R=[212992->425984] S=[212992->425984] . 2025.12.29 14:52:54 - OpenVPN > UDP link local: (not bound) . 2025.12.29 14:52:54 - OpenVPN > UDP link remote: [AF_INET]198.44.136.251:443 . 2025.12.29 14:52:54 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.136.251:443, sid=f2f5462a 4c274693 . 2025.12.29 14:52:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2025.12.29 14:52:54 - OpenVPN > VERIFY KU OK . 2025.12.29 14:52:54 - OpenVPN > Validating certificate extended key usage . 2025.12.29 14:52:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2025.12.29 14:52:54 - OpenVPN > VERIFY EKU OK . 2025.12.29 14:52:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Paikauhale, emailAddress=info@airvpn.org . 2025.12.29 14:52:54 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2025.12.29 14:52:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2025.12.29 14:52:54 - OpenVPN > [Paikauhale] Peer Connection Initiated with [AF_INET]198.44.136.251:443 . 2025.12.29 14:52:55 - OpenVPN > SENT CONTROL [Paikauhale]: 'PUSH_REQUEST' (status=1) . 2025.12.29 14:52:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.71.0.1,dhcp-option DNS6 fde6:7a:7d20:4300::1,tun-ipv6,route-gateway 10.71.0.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:4300::1006/64 fde6:7a:7d20:4300::1,ifconfig 10.71.0.8 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2025.12.29 14:52:55 - OpenVPN > Note: option tun-ipv6 is ignored because modern operating systems do not need special IPv6 tun handling anymore. . 2025.12.29 14:52:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2025.12.29 14:52:55 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2025.12.29 14:52:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2025.12.29 14:52:55 - OpenVPN > OPTIONS IMPORT: route options modified . 2025.12.29 14:52:55 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2025.12.29 14:52:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2025.12.29 14:52:55 - OpenVPN > OPTIONS IMPORT: peer-id set . 2025.12.29 14:52:55 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2025.12.29 14:52:55 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2025.12.29 14:52:55 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2025.12.29 14:52:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2025.12.29 14:52:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key . 2025.12.29 14:52:55 - OpenVPN > ROUTE_GATEWAY 192.168.2.1/255.255.255.0 IFACE=wlan2 HWADDR=80:3f:5d:21:2e:a4 . 2025.12.29 14:52:55 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2025.12.29 14:52:55 - OpenVPN > GDG6: NLSMG_ERROR: error -101 . 2025.12.29 14:52:55 - OpenVPN > ROUTE6: default_gateway=UNDEF . 2025.12.29 14:52:55 - OpenVPN > TUN/TAP device tun0 opened . 2025.12.29 14:52:55 - OpenVPN > TUN/TAP TX queue length set to 100 . 2025.12.29 14:52:55 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1 . 2025.12.29 14:52:55 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500 . 2025.12.29 14:52:55 - OpenVPN > /sbin/ip addr add dev tun0 10.71.0.8/24 broadcast 10.71.0.255 . 2025.12.29 14:52:55 - OpenVPN > /sbin/ip -6 addr add fde6:7a:7d20:4300::1006/64 dev tun0 . 2025.12.29 14:52:55 - OpenVPN > RTNETLINK answers: Permission denied . 2025.12.29 14:52:55 - OpenVPN > MANAGEMENT: Client disconnected . 2025.12.29 14:52:55 - OpenVPN > Linux ip -6 addr add failed: external program exited with error status: 2 . 2025.12.29 14:52:55 - OpenVPN > Exiting due to fatal error ! 2025.12.29 14:52:55 - Disconnecting . 2025.12.29 14:52:55 - Connection terminated. I 2025.12.29 14:52:58 - Checking authorization ... ! 2025.12.29 14:52:59 - Connecting to Muliphein (United States, New York City) . 2025.12.29 14:52:59 - OpenVPN > OpenVPN 2.4.3 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Aug 9 2017 . 2025.12.29 14:52:59 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 . 2025.12.29 14:52:59 - Connection to OpenVPN Management Interface . 2025.12.29 14:52:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2025.12.29 14:52:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2025.12.29 14:52:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2025.12.29 14:52:59 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.44.136.235:443 . 2025.12.29 14:52:59 - OpenVPN > Socket Buffers: R=[212992->425984] S=[212992->425984] . 2025.12.29 14:52:59 - OpenVPN > UDP link local: (not bound) . 2025.12.29 14:52:59 - OpenVPN > UDP link remote: [AF_INET]198.44.136.235:443 . 2025.12.29 14:52:59 - OpenVPN > TLS: Initial packet from [AF_INET]198.44.136.235:443, sid=3936b9c7 04622536 . 2025.12.29 14:52:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2025.12.29 14:52:59 - OpenVPN > VERIFY KU OK . 2025.12.29 14:52:59 - OpenVPN > Validating certificate extended key usage . 2025.12.29 14:52:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2025.12.29 14:52:59 - OpenVPN > VERIFY EKU OK . 2025.12.29 14:52:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Muliphein, emailAddress=info@airvpn.org . 2025.12.29 14:52:59 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2025.12.29 14:52:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2025.12.29 14:52:59 - OpenVPN > [Muliphein] Peer Connection Initiated with [AF_INET]198.44.136.235:443 ! 2025.12.29 14:53:00 - Disconnecting . 2025.12.29 14:53:00 - Sending management termination signal . 2025.12.29 14:53:00 - Management - Send 'signal SIGTERM' . 2025.12.29 14:53:00 - Connection terminated. I 2025.12.29 14:53:00 - Cancel requested. ! 2025.12.29 14:53:00 - Session terminated.
  26. December 23 2025 this "Re-connecting..." dance started on tomato routers. Now I see it also affected dd-wrt. Dec 23 18:51:30 unknown daemon.notice openvpn[9066]: TCP/UDP: Closing socket Dec 23 18:51:30 unknown daemon.notice openvpn[9066]: SIGUSR1[soft,tls-error] received, process restarting Dec 23 18:51:30 unknown daemon.notice openvpn[9066]: Restart pause, 2 second(s)
  27. Thank you for the detailed report. Do you mean the Lock was lost and then it was routing in clear over the internet?
  28. There needs to be a solution and system to force every single rapidgator.net server to release the files requested by the blocked VPNs... Are you working on this? It looks interesting...
  1. Load more activity
×
×
  • Create New...