lj2019 0 Posted ... Hello, I very recently started using AirVPN for my android phone by using the config generator to create a ovpn file for OpenVPN for Android. When I connect to AirVPN using wifi, my public IP address changes. However, when I connect using my phone's 4g connection, my public ip address does not change and sites like whatismyipaddress.com show my location and ISP. Is AirVPN not compatible with an android's wireless network? If it isn't, what can I do to ensure all my data is routed through AirVPN when I am using my phone's 4g connection? Thanks. Quote Share this post Link to post
OpenSourcerer 1416 Posted ... There was a similar topic about LTE connectivity, I can't find it anymore. Please provide a logfile of a failed connection, from line 1, into spoilers (how-to in signature). Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
lj2019 0 Posted ... Ok. Before I post though, I want to point out another observation I had. When I connect my laptop to the internet via my android phone's mobile hotspot, and I search for my IP using the laptop, I noticed that it still refers to my phone's real IP and even my phone's ISP. This is despite the fact that both my android phone and my laptop show that I am successfully connected to an AIRVPN server. I don't know if that's normal (If you haven't noticed, I'm a noob at this, so please take the explanations slow), but it's getting me very worried about my privacy. Anyway, here's my log from my android phone after I connected to an AIRVPN server. 2017-01-03 05:19:23 Used x 1 tries to get current version (4/4) of the profile2017-01-03 05:19:23 Building configuration…2017-01-03 05:19:23 started Socket Thread2017-01-03 05:19:23 Network Status: CONNECTED CDMA - eHRPD to MOBILE VZWINTERNET2017-01-03 05:19:23 P:WARNING: linker: /data/data/de.blinkt.openvpn/cache/c_pie_openvpn.arm64-v8a: unused DT entry: type 0x6ffffffe arg 0x5102017-01-03 05:19:23 P:WARNING: linker: /data/data/de.blinkt.openvpn/cache/c_pie_openvpn.arm64-v8a: unused DT entry: type 0x6fffffff arg 0x12017-01-03 05:19:23 P:WARNING: linker: libopenvpn.so: unused DT entry: type 0x6ffffffe arg 0x463902017-01-03 05:19:23 P:WARNING: linker: libopenvpn.so: unused DT entry: type 0x6fffffff arg 0x22017-01-03 05:19:23 P:Initializing Google Breakpad!2017-01-03 05:19:23 Current Parameter Settings:2017-01-03 05:19:23 config = '/data/data/de.blinkt.openvpn/cache/android.conf'2017-01-03 05:19:23 mode = 02017-01-03 05:19:23 show_ciphers = DISABLED2017-01-03 05:19:23 show_digests = DISABLED2017-01-03 05:19:23 show_engines = DISABLED2017-01-03 05:19:23 genkey = DISABLED2017-01-03 05:19:23 key_pass_file = '[uNDEF]'2017-01-03 05:19:23 show_tls_ciphers = DISABLED2017-01-03 05:19:23 connect_retry_max = 02017-01-03 05:19:23 Connection profiles [0]:2017-01-03 05:19:23 proto = udp2017-01-03 05:19:23 local = '[uNDEF]'2017-01-03 05:19:23 local_port = '[uNDEF]'2017-01-03 05:19:23 remote = 'america.vpn.airdns.org'2017-01-03 05:19:23 remote_port = '443'2017-01-03 05:19:23 remote_float = DISABLED2017-01-03 05:19:23 bind_defined = DISABLED2017-01-03 05:19:23 bind_local = DISABLED2017-01-03 05:19:23 bind_ipv6_only = DISABLED2017-01-03 05:19:23 connect_retry_seconds = 22017-01-03 05:19:23 connect_timeout = 1202017-01-03 05:19:23 socks_proxy_server = '[uNDEF]'2017-01-03 05:19:23 socks_proxy_port = '[uNDEF]'2017-01-03 05:19:23 tun_mtu = 15002017-01-03 05:19:23 tun_mtu_defined = ENABLED2017-01-03 05:19:23 link_mtu = 15002017-01-03 05:19:23 link_mtu_defined = DISABLED2017-01-03 05:19:23 tun_mtu_extra = 02017-01-03 05:19:23 tun_mtu_extra_defined = DISABLED2017-01-03 05:19:23 mtu_discover_type = -12017-01-03 05:19:23 fragment = 02017-01-03 05:19:23 mssfix = 14502017-01-03 05:19:23 explicit_exit_notification = 52017-01-03 05:19:23 Connection profiles END2017-01-03 05:19:23 remote_random = DISABLED2017-01-03 05:19:23 ipchange = '[uNDEF]'2017-01-03 05:19:23 dev = 'tun'2017-01-03 05:19:23 dev_type = '[uNDEF]'2017-01-03 05:19:23 dev_node = '[uNDEF]'2017-01-03 05:19:23 lladdr = '[uNDEF]'2017-01-03 05:19:23 topology = 12017-01-03 05:19:23 ifconfig_local = '[uNDEF]'2017-01-03 05:19:23 ifconfig_remote_netmask = '[uNDEF]'2017-01-03 05:19:23 ifconfig_noexec = DISABLED2017-01-03 05:19:23 ifconfig_nowarn = ENABLED2017-01-03 05:19:23 ifconfig_ipv6_local = '[uNDEF]'2017-01-03 05:19:23 ifconfig_ipv6_netbits = 02017-01-03 05:19:23 ifconfig_ipv6_remote = '[uNDEF]'2017-01-03 05:19:23 shaper = 02017-01-03 05:19:23 mtu_test = 02017-01-03 05:19:23 mlock = DISABLED2017-01-03 05:19:23 keepalive_ping = 02017-01-03 05:19:23 keepalive_timeout = 02017-01-03 05:19:23 inactivity_timeout = 02017-01-03 05:19:23 ping_send_timeout = 02017-01-03 05:19:23 ping_rec_timeout = 02017-01-03 05:19:23 ping_rec_timeout_action = 02017-01-03 05:19:23 ping_timer_remote = DISABLED2017-01-03 05:19:23 remap_sigusr1 = 02017-01-03 05:19:23 persist_tun = ENABLED2017-01-03 05:19:23 persist_local_ip = DISABLED2017-01-03 05:19:23 persist_remote_ip = DISABLED2017-01-03 05:19:23 persist_key = DISABLED2017-01-03 05:19:23 passtos = DISABLED2017-01-03 05:19:23 resolve_retry_seconds = 10000000002017-01-03 05:19:23 resolve_in_advance = ENABLED2017-01-03 05:19:23 username = '[uNDEF]'2017-01-03 05:19:23 groupname = '[uNDEF]'2017-01-03 05:19:23 chroot_dir = '[uNDEF]'2017-01-03 05:19:23 cd_dir = '[uNDEF]'2017-01-03 05:19:23 writepid = '[uNDEF]'2017-01-03 05:19:23 up_script = '[uNDEF]'2017-01-03 05:19:23 down_script = '[uNDEF]'2017-01-03 05:19:23 down_pre = DISABLED2017-01-03 05:19:23 up_restart = DISABLED2017-01-03 05:19:23 up_delay = DISABLED2017-01-03 05:19:23 daemon = DISABLED2017-01-03 05:19:23 inetd = 02017-01-03 05:19:23 log = DISABLED2017-01-03 05:19:23 suppress_timestamps = DISABLED2017-01-03 05:19:23 machine_readable_output = ENABLED2017-01-03 05:19:23 nice = 02017-01-03 05:19:23 verbosity = 42017-01-03 05:19:23 mute = 02017-01-03 05:19:23 gremlin = 02017-01-03 05:19:23 status_file = '[uNDEF]'2017-01-03 05:19:23 status_file_version = 12017-01-03 05:19:23 status_file_update_freq = 602017-01-03 05:19:23 occ = ENABLED2017-01-03 05:19:23 rcvbuf = 02017-01-03 05:19:23 sndbuf = 02017-01-03 05:19:23 sockflags = 02017-01-03 05:19:23 fast_io = DISABLED2017-01-03 05:19:23 comp.alg = 22017-01-03 05:19:23 comp.flags = 12017-01-03 05:19:23 route_script = '[uNDEF]'2017-01-03 05:19:23 route_default_gateway = '[uNDEF]'2017-01-03 05:19:23 route_default_metric = 02017-01-03 05:19:23 route_noexec = DISABLED2017-01-03 05:19:23 route_delay = 02017-01-03 05:19:23 route_delay_window = 302017-01-03 05:19:23 route_delay_defined = DISABLED2017-01-03 05:19:23 route_nopull = DISABLED2017-01-03 05:19:23 route_gateway_via_dhcp = DISABLED2017-01-03 05:19:23 allow_pull_fqdn = DISABLED2017-01-03 05:19:23 management_addr = '/data/data/de.blinkt.openvpn/cache/mgmtsocket'2017-01-03 05:19:23 management_port = 'unix'2017-01-03 05:19:23 management_user_pass = '[uNDEF]'2017-01-03 05:19:23 management_log_history_cache = 2502017-01-03 05:19:23 management_echo_buffer_size = 1002017-01-03 05:19:23 management_write_peer_info_file = '[uNDEF]'2017-01-03 05:19:23 management_client_user = '[uNDEF]'2017-01-03 05:19:23 management_client_group = '[uNDEF]'2017-01-03 05:19:23 management_flags = 43902017-01-03 05:19:23 shared_secret_file = '[uNDEF]'2017-01-03 05:19:23 key_direction = 22017-01-03 05:19:23 ciphername = 'AES-256-CBC'2017-01-03 05:19:23 ncp_enabled = ENABLED2017-01-03 05:19:23 ncp_ciphers = 'AES-256-GCM:AES-128-GCM'2017-01-03 05:19:23 authname = 'SHA1'2017-01-03 05:19:23 prng_hash = 'SHA1'2017-01-03 05:19:23 prng_nonce_secret_len = 162017-01-03 05:19:23 keysize = 02017-01-03 05:19:23 engine = DISABLED2017-01-03 05:19:23 replay = ENABLED2017-01-03 05:19:23 mute_replay_warnings = DISABLED2017-01-03 05:19:23 replay_window = 642017-01-03 05:19:23 replay_time = 152017-01-03 05:19:23 packet_id_file = '[uNDEF]'2017-01-03 05:19:23 use_iv = ENABLED2017-01-03 05:19:23 test_crypto = DISABLED2017-01-03 05:19:23 tls_server = DISABLED2017-01-03 05:19:23 tls_client = ENABLED2017-01-03 05:19:23 key_method = 22017-01-03 05:19:23 ca_file = '[[iNLINE]]'2017-01-03 05:19:23 ca_path = '[uNDEF]'2017-01-03 05:19:23 dh_file = '[uNDEF]'2017-01-03 05:19:23 cert_file = '[[iNLINE]]'2017-01-03 05:19:23 extra_certs_file = '[uNDEF]'2017-01-03 05:19:23 priv_key_file = '[[iNLINE]]'2017-01-03 05:19:23 pkcs12_file = '[uNDEF]'2017-01-03 05:19:23 cipher_list = '[uNDEF]'2017-01-03 05:19:23 tls_verify = '[uNDEF]'2017-01-03 05:19:23 tls_export_cert = '[uNDEF]'2017-01-03 05:19:23 verify_x509_type = 02017-01-03 05:19:23 verify_x509_name = '[uNDEF]'2017-01-03 05:19:23 crl_file = '[uNDEF]'2017-01-03 05:19:23 ns_cert_type = 02017-01-03 05:19:23 remote_cert_ku = 1602017-01-03 05:19:23 remote_cert_ku = 1362017-01-03 05:19:23 remote_cert_ku = 02017-01-03 05:19:23 remote_cert_ku = 02017-01-03 05:19:23 remote_cert_ku = 02017-01-03 05:19:23 remote_cert_ku = 02017-01-03 05:19:23 remote_cert_ku = 02017-01-03 05:19:23 remote_cert_ku = 02017-01-03 05:19:23 remote_cert_ku = 02017-01-03 05:19:23 remote_cert_ku = 02017-01-03 05:19:23 remote_cert_ku = 02017-01-03 05:19:23 remote_cert_ku = 02017-01-03 05:19:23 remote_cert_ku = 02017-01-03 05:19:23 remote_cert_ku = 02017-01-03 05:19:23 remote_cert_ku = 02017-01-03 05:19:23 remote_cert_ku = 02017-01-03 05:19:23 remote_cert_eku = 'TLS Web Server Authentication'2017-01-03 05:19:23 ssl_flags = 02017-01-03 05:19:23 tls_timeout = 22017-01-03 05:19:23 renegotiate_bytes = -12017-01-03 05:19:23 renegotiate_packets = 02017-01-03 05:19:23 renegotiate_seconds = 36002017-01-03 05:19:23 handshake_window = 602017-01-03 05:19:23 transition_window = 36002017-01-03 05:19:23 single_session = DISABLED2017-01-03 05:19:23 push_peer_info = DISABLED2017-01-03 05:19:23 tls_exit = DISABLED2017-01-03 05:19:23 tls_auth_file = '[[iNLINE]]'2017-01-03 05:19:23 tls_crypt_file = '[uNDEF]'2017-01-03 05:19:23 client = ENABLED2017-01-03 05:19:23 pull = ENABLED2017-01-03 05:19:23 auth_user_pass_file = '[uNDEF]'2017-01-03 05:19:23 OpenVPN 2.5-icsopenvpn [git:icsopenvpn-d0314998c474c182+] android-21-arm64-v8a [sSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 26 20162017-01-03 05:19:23 library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.092017-01-03 05:19:23 MANAGEMENT: Connected to management server at /data/data/de.blinkt.openvpn/cache/mgmtsocket2017-01-03 05:19:23 MANAGEMENT: CMD 'hold release'2017-01-03 05:19:24 MANAGEMENT: CMD 'bytecount 2'2017-01-03 05:19:24 MANAGEMENT: CMD 'proxy NONE'2017-01-03 05:19:24 MANAGEMENT: CMD 'state on'2017-01-03 05:19:25 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication2017-01-03 05:19:25 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication2017-01-03 05:19:25 LZO compression initializing2017-01-03 05:19:25 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]2017-01-03 05:19:25 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]2017-01-03 05:19:25 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'2017-01-03 05:19:25 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'2017-01-03 05:19:25 TCP/UDP: Preserving recently used remote address: [AF_INET]137.63.71.50:4432017-01-03 05:19:25 Socket Buffers: R=[229376->229376] S=[229376->229376]2017-01-03 05:19:25 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'2017-01-03 05:19:25 UDP link local: (not bound)2017-01-03 05:19:25 UDP link remote: [AF_INET]137.63.71.50:4432017-01-03 05:19:25 MANAGEMENT: >STATE:1483438765,WAIT,,,,,,2017-01-03 05:19:25 MANAGEMENT: >STATE:1483438765,AUTH,,,,,,2017-01-03 05:19:25 TLS: Initial packet from [AF_INET]137.63.71.50:443, sid=049cc28b e47e89782017-01-03 05:19:25 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org2017-01-03 05:19:25 Validating certificate key usage2017-01-03 05:19:25 ++ Certificate has key usage 00a0, expects 00a02017-01-03 05:19:25 VERIFY KU OK2017-01-03 05:19:25 Validating certificate extended key usage2017-01-03 05:19:25 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication2017-01-03 05:19:25 VERIFY EKU OK2017-01-03 05:19:25 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org2017-01-03 05:19:30 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA2017-01-03 05:19:30 [server] Peer Connection Initiated with [AF_INET]137.63.71.50:4432017-01-03 05:19:31 MANAGEMENT: >STATE:1483438771,GET_CONFIG,,,,,,2017-01-03 05:19:31 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)2017-01-03 05:19:32 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.13.40 255.255.0.0'2017-01-03 05:19:32 OPTIONS IMPORT: timers and/or timeouts modified2017-01-03 05:19:32 OPTIONS IMPORT: compression parms modified2017-01-03 05:19:32 OPTIONS IMPORT: --ifconfig/up options modified2017-01-03 05:19:32 OPTIONS IMPORT: route options modified2017-01-03 05:19:32 OPTIONS IMPORT: route-related options modified2017-01-03 05:19:32 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified2017-01-03 05:19:32 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:406 ET:0 EL:3 ]2017-01-03 05:19:32 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key2017-01-03 05:19:32 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication2017-01-03 05:19:32 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key2017-01-03 05:19:32 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication2017-01-03 05:19:32 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo HWADDR=00:00:00:00:00:002017-01-03 05:19:32 do_ifconfig, tt->did_ifconfig_ipv6_setup=02017-01-03 05:19:32 MANAGEMENT: >STATE:1483438772,ASSIGN_IP,,10.4.13.40,,,,2017-01-03 05:19:32 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'2017-01-03 05:19:32 MANAGEMENT: CMD 'needok 'ROUTE' ok'2017-01-03 05:19:32 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'2017-01-03 05:19:32 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'2017-01-03 05:19:32 Opening tun interface:2017-01-03 05:19:32 Local IPv4: 10.4.13.40/16 IPv6: null MTU: 15002017-01-03 05:19:32 DNS Server: 10.4.0.1, Domain: null2017-01-03 05:19:32 Routes: 0.0.0.0/0, 10.4.0.0/16 2017-01-03 05:19:32 Routes excluded: 2017-01-03 05:19:32 VpnService routes installed: 0.0.0.0/0 2017-01-03 05:19:32 Disallowed VPN apps: 2017-01-03 05:19:32 MANAGEMENT: CMD 'needok 'OPENTUN' ok'2017-01-03 05:19:32 Initialization Sequence Completed2017-01-03 05:19:32 MANAGEMENT: >STATE:1483438772,CONNECTED,SUCCESS,10.4.13.40,137.63.71.50,443,, Quote Share this post Link to post
OpenSourcerer 1416 Posted ... This is despite the fact that both my android phone and my laptop show that I am successfully connected to an AIRVPN server. Tethering does not work with the VPNService API on Android, it will get routed through conventional interfaces (wlan0 for example) and not through tun0. On Windows, the tethering NIC should have a lower metric than the primary physical interface (routing works by using the interface with the lowest metric first), apparently it's even lower than TAP-Windows.You request your IP with Windows, Windows routes it to Android, Android routes it through WLAN or 2G/3G/4G whichever is available. Ergo, you see the phone's provider Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
lj2019 0 Posted ... Ah.. i'm gonna be honest. I only partially understood the first part of your post - although im glad you did provide that cause thats how im learning - but i understood perfectly the part where you broke it down neatly. Tethering does not work with AirVPN. Got it. Thx. But that still doesnt solve my original problem. Why is my Android's LTE connection not being routed through an AirVPN server even though OpenVPN says im successfully connected? Am i doomed to being able to use AirVPN only through wi-fi? Quote Share this post Link to post
greenclaydog 6 Posted ... Hello, I very recently started using AirVPN for my android phone by using the config generator to create a ovpn file for OpenVPN for Android. When I connect to AirVPN using wifi, my public IP address changes. However, when I connect using my phone's 4g connection, my public ip address does not change and sites like whatismyipaddress.com show my location and ISP. Is AirVPN not compatible with an android's wireless network? If it isn't, what can I do to ensure all my data is routed through AirVPN when I am using my phone's 4g connection? Thanks. Do you have Android 7.0 (Nougat)? Quote Share this post Link to post
OpenSourcerer 1416 Posted ... Tethering does not work with AirVPN. Tethering does not work with any VPN client you use on Android which does not need root access. Would you mind trying a TCP connection? Do you have Android 7.0 (Nougat)? It's in the logs. 2017-01-03 05:19:23 OpenVPN 2.5-icsopenvpn [git:icsopenvpn-d0314998c474c182+] android-21-arm64-v8a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 26 2016 API level 21 is Lollipop 5.0. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
lj2019 0 Posted ... Tethering does not work with AirVPN. Tethering does not work with any VPN client you use on Android which does not need root access. Would you mind trying a TCP connection? Do you have Android 7.0 (Nougat)? It's in the logs.2017-01-03 05:19:23 OpenVPN 2.5-icsopenvpn [git:icsopenvpn-d0314998c474c182+] android-21-arm64-v8a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 26 2016 API level 21 is Lollipop 5.0.I tried that, but it didnt work. I think i figured out what's going on though, but I don't know how to fix it. When my phone uses LTE and connects to AirVPN, it turns out that it's generating both an IPv4 and an IPv6 address. When I search for specifically my IPv4 public address, it does indeed show an airvpn server. However, and correct me if im wrong, AirVPN does not support IPv6. This is why sites like whatismyipaddress.com show my location and ISP - theyre reading my IPv6 address. When i connect to AirVPN through wifi, as far as I can tell, my phone does not produce an IPv6. Assuming all those assumptions I just made are correct, my question is now this: Is there a way to prevent my phone from producing an IPv6 address when I use its LTE? I briefly googled this, and the only solution i found needed a rooted android, which is something I dont want to do. I also dont want to prevent my phone from permanently producing an IPv6 address... just when it connects to AirVPN Quote Share this post Link to post
OpenSourcerer 1416 Posted ... Go into the settings of your preferred connection profile, then Routing tab > Deleselct "Bypass VPN for local networks". I found a few threads on GitHub though they're all a bit old. But one of them references Android 5.0 and deselecting this apparently disabled IPv6, too. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post