Droopy 2 Posted ... I use peer block, according to it every time an IP connects to me they see my real IP what is going on, even your port forwarding page says the same, nothing has changed, PLEASE HELP 17/09/2012 - 12:18 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication 17/09/2012 - 12:18 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA 17/09/2012 - 1:18 PM TLS: tls_process: killed expiring key 17/09/2012 - 1:18 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org 17/09/2012 - 1:18 PM VERIFY OK: nsCertType=SERVER 17/09/2012 - 1:18 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org 17/09/2012 - 1:18 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key 17/09/2012 - 1:18 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication 17/09/2012 - 1:18 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key 17/09/2012 - 1:18 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication 17/09/2012 - 1:18 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA 17/09/2012 - 2:18 PM TLS: tls_process: killed expiring key 17/09/2012 - 2:18 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org 17/09/2012 - 2:18 PM VERIFY OK: nsCertType=SERVER 17/09/2012 - 2:18 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org 17/09/2012 - 2:19 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key 17/09/2012 - 2:19 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication 17/09/2012 - 2:19 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key 17/09/2012 - 2:19 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication 17/09/2012 - 2:19 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA 17/09/2012 - 3:18 PM TLS: tls_process: killed expiring key 17/09/2012 - 3:19 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org 17/09/2012 - 3:19 PM VERIFY OK: nsCertType=SERVER 17/09/2012 - 3:19 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org 17/09/2012 - 3:19 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key 17/09/2012 - 3:19 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication 17/09/2012 - 3:19 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key 17/09/2012 - 3:19 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication 17/09/2012 - 3:19 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA 17/09/2012 - 4:19 PM TLS: tls_process: killed expiring key 17/09/2012 - 4:19 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org 17/09/2012 - 4:19 PM VERIFY OK: nsCertType=SERVER 17/09/2012 - 4:19 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org 17/09/2012 - 4:19 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key 17/09/2012 - 4:19 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication 17/09/2012 - 4:19 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key 17/09/2012 - 4:19 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication 17/09/2012 - 4:19 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA 17/09/2012 - 5:03 PM Replay-window backtrack occurred [4] 17/09/2012 - 5:19 PM TLS: tls_process: killed expiring key 17/09/2012 - 5:19 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org 17/09/2012 - 5:19 PM VERIFY OK: nsCertType=SERVER 17/09/2012 - 5:19 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org 17/09/2012 - 5:19 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key 17/09/2012 - 5:19 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication 17/09/2012 - 5:19 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key 17/09/2012 - 5:19 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication 17/09/2012 - 5:19 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA 17/09/2012 - 6:19 PM TLS: tls_process: killed expiring key 17/09/2012 - 6:19 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org 17/09/2012 - 6:19 PM VERIFY OK: nsCertType=SERVER 17/09/2012 - 6:19 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org 17/09/2012 - 6:19 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key 17/09/2012 - 6:19 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication 17/09/2012 - 6:19 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key 17/09/2012 - 6:19 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication 17/09/2012 - 6:19 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA 17/09/2012 - 7:08 PM [server] Inactivity timeout (--ping-restart), restarting 17/09/2012 - 7:08 PM TCP/UDP: Closing socket 17/09/2012 - 7:08 PM Re-connecting... 17/09/2012 - 7:08 PM C:\WINDOWS\system32\route.exe DELETE 10.6.0.1 MASK 255.255.255.255 10.6.1.181 17/09/2012 - 7:08 PM Route deletion via IPAPI succeeded [adaptive] 17/09/2012 - 7:08 PM C:\WINDOWS\system32\route.exe DELETE 62.212.85.65 MASK 255.255.255.255 192.168.0.1 17/09/2012 - 7:08 PM Route deletion via IPAPI succeeded [adaptive] 17/09/2012 - 7:08 PM C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.6.1.181 17/09/2012 - 7:08 PM Route deletion via IPAPI succeeded [adaptive] 17/09/2012 - 7:08 PM C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.6.1.181 17/09/2012 - 7:08 PM Route deletion via IPAPI succeeded [adaptive] 17/09/2012 - 7:08 PM Closing TUN/TAP interface 17/09/2012 - 7:08 PM SIGUSR1[soft,ping-restart] received, process restarting 17/09/2012 - 7:08 PM Restart pause, 2 second(s) 17/09/2012 - 7:08 PM NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 17/09/2012 - 7:08 PM Cannot load certificate file 733f3605-10b8-4d0a-9ad8-dee6778bb278.tmp: error:02001002:system library:fopen:No such file or directory: error:20074002:BIO routines:FILE_CTRL:system lib: error:140AD002:SSL routines:SSL_CTX_use_certificate_file:system lib 17/09/2012 - 7:08 PM Exiting 17/09/2012 - 7:08 PM Failed to start. 17/09/2012 - 9:52 PM Login... 17/09/2012 - 9:52 PM Login success. 17/09/2012 - 9:52 PM Contacting service... 17/09/2012 - 9:52 PM Connecting... 17/09/2012 - 9:52 PM OpenVPN 2.2.2 Win32-MSVC++ [sSL] [LZO2] [PKCS11] built on Dec 15 2011 17/09/2012 - 9:52 PM NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 17/09/2012 - 9:52 PM LZO compression initialized 17/09/2012 - 9:52 PM Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ] 17/09/2012 - 9:52 PM Socket Buffers: R=[8192->8192] S=[8192->8192] 17/09/2012 - 9:52 PM Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ] 17/09/2012 - 9:52 PM Local Options hash (VER=V4): '22188c5b' 17/09/2012 - 9:52 PM Expected Remote Options hash (VER=V4): 'a8f55717' 17/09/2012 - 9:52 PM UDPv4 link local: [undef] 17/09/2012 - 9:52 PM UDPv4 link remote: 62.212.85.65:443 17/09/2012 - 9:52 PM TLS: Initial packet from 62.212.85.65:443, sid=b4e95248 d70d457a 17/09/2012 - 9:52 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org 17/09/2012 - 9:52 PM VERIFY OK: nsCertType=SERVER 17/09/2012 - 9:52 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org 17/09/2012 - 9:52 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key 17/09/2012 - 9:52 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication 17/09/2012 - 9:52 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key 17/09/2012 - 9:52 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication 17/09/2012 - 9:52 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA 17/09/2012 - 9:52 PM [server] Peer Connection Initiated with 62.212.85.65:443 17/09/2012 - 9:52 PM SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) 17/09/2012 - 9:52 PM PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.4.10.214 10.4.10.213' 17/09/2012 - 9:52 PM OPTIONS IMPORT: timers and/or timeouts modified 17/09/2012 - 9:52 PM OPTIONS IMPORT: LZO parms modified 17/09/2012 - 9:52 PM OPTIONS IMPORT: --ifconfig/up options modified 17/09/2012 - 9:52 PM OPTIONS IMPORT: route options modified 17/09/2012 - 9:52 PM OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified 17/09/2012 - 9:52 PM ROUTE default_gateway=192.168.0.1 17/09/2012 - 9:52 PM TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{C8035BAC-AB73-4A3B-8A8A-F57372C7C969}.tap 17/09/2012 - 9:52 PM TAP-Win32 Driver Version 9.9 17/09/2012 - 9:52 PM TAP-Win32 MTU=1500 17/09/2012 - 9:52 PM Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.4.10.214/255.255.255.252 on interface {C8035BAC-AB73-4A3B-8A8A-F57372C7C969} [DHCP-serv: 10.4.10.213, lease-time: 31536000] 17/09/2012 - 9:52 PM Successful ARP Flush on interface [13] {C8035BAC-AB73-4A3B-8A8A-F57372C7C969} 17/09/2012 - 9:52 PM TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up 17/09/2012 - 9:52 PM C:\WINDOWS\system32\route.exe ADD 62.212.85.65 MASK 255.255.255.255 192.168.0.1 17/09/2012 - 9:52 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 17/09/2012 - 9:52 PM Route addition via IPAPI succeeded [adaptive] 17/09/2012 - 9:52 PM C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.10.213 17/09/2012 - 9:52 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 17/09/2012 - 9:52 PM Route addition via IPAPI succeeded [adaptive] 17/09/2012 - 9:52 PM C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.10.213 17/09/2012 - 9:52 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 17/09/2012 - 9:52 PM Route addition via IPAPI succeeded [adaptive] 17/09/2012 - 9:52 PM C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.10.213 17/09/2012 - 9:52 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 17/09/2012 - 9:52 PM Route addition via IPAPI succeeded [adaptive] 17/09/2012 - 9:52 PM Initialization Sequence Completed 17/09/2012 - 9:52 PM Starting Management Interface... 17/09/2012 - 9:52 PM Checking... 17/09/2012 - 9:53 PM Retrieve statistics... 17/09/2012 - 9:53 PM Connected. 17/09/2012 - 10:28 PM Disconnecting... 17/09/2012 - 10:28 PM SIGTERM received, sending exit notification to peer 17/09/2012 - 10:28 PM TCP/UDP: Closing socket 17/09/2012 - 10:28 PM Disconnected. 17/09/2012 - 10:28 PM C:\WINDOWS\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.10.213 17/09/2012 - 10:28 PM Route deletion via IPAPI succeeded [adaptive] 17/09/2012 - 10:28 PM C:\WINDOWS\system32\route.exe DELETE 62.212.85.65 MASK 255.255.255.255 192.168.0.1 17/09/2012 - 10:28 PM Route deletion via IPAPI succeeded [adaptive] 17/09/2012 - 10:28 PM C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.10.213 17/09/2012 - 10:28 PM Route deletion via IPAPI succeeded [adaptive] 17/09/2012 - 10:28 PM C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.10.213 17/09/2012 - 10:28 PM Route deletion via IPAPI succeeded [adaptive] 17/09/2012 - 10:28 PM Closing TUN/TAP interface 17/09/2012 - 10:28 PM SIGTERM[hard,] received, process exiting 17/09/2012 - 10:28 PM Login... 17/09/2012 - 10:28 PM Login success. 17/09/2012 - 10:28 PM Contacting service... 17/09/2012 - 10:29 PM Connecting... 17/09/2012 - 10:29 PM OpenVPN 2.2.2 Win32-MSVC++ [sSL] [LZO2] [PKCS11] built on Dec 15 2011 17/09/2012 - 10:29 PM NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables 17/09/2012 - 10:29 PM LZO compression initialized 17/09/2012 - 10:29 PM Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ] 17/09/2012 - 10:29 PM Socket Buffers: R=[8192->8192] S=[8192->8192] 17/09/2012 - 10:29 PM Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ] 17/09/2012 - 10:29 PM Local Options hash (VER=V4): '22188c5b' 17/09/2012 - 10:29 PM Expected Remote Options hash (VER=V4): 'a8f55717' 17/09/2012 - 10:29 PM UDPv4 link local: [undef] 17/09/2012 - 10:29 PM UDPv4 link remote: 95.211.169.3:443 17/09/2012 - 10:29 PM TLS: Initial packet from 95.211.169.3:443, sid=41bc0af6 7adc6601 17/09/2012 - 10:29 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org 17/09/2012 - 10:29 PM VERIFY OK: nsCertType=SERVER 17/09/2012 - 10:29 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org 17/09/2012 - 10:29 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key 17/09/2012 - 10:29 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication 17/09/2012 - 10:29 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key 17/09/2012 - 10:29 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication 17/09/2012 - 10:29 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA 17/09/2012 - 10:29 PM [server] Peer Connection Initiated with 95.211.169.3:443 17/09/2012 - 10:29 PM SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) 17/09/2012 - 10:29 PM PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.4.0.18 10.4.0.17' 17/09/2012 - 10:29 PM OPTIONS IMPORT: timers and/or timeouts modified 17/09/2012 - 10:29 PM OPTIONS IMPORT: LZO parms modified 17/09/2012 - 10:29 PM OPTIONS IMPORT: --ifconfig/up options modified 17/09/2012 - 10:29 PM OPTIONS IMPORT: route options modified 17/09/2012 - 10:29 PM OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified 17/09/2012 - 10:29 PM ROUTE default_gateway=192.168.0.1 17/09/2012 - 10:29 PM TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{C8035BAC-AB73-4A3B-8A8A-F57372C7C969}.tap 17/09/2012 - 10:29 PM TAP-Win32 Driver Version 9.9 17/09/2012 - 10:29 PM TAP-Win32 MTU=1500 17/09/2012 - 10:29 PM Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.4.0.18/255.255.255.252 on interface {C8035BAC-AB73-4A3B-8A8A-F57372C7C969} [DHCP-serv: 10.4.0.17, lease-time: 31536000] 17/09/2012 - 10:29 PM Successful ARP Flush on interface [13] {C8035BAC-AB73-4A3B-8A8A-F57372C7C969} 17/09/2012 - 10:29 PM TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up 17/09/2012 - 10:29 PM C:\WINDOWS\system32\route.exe ADD 95.211.169.3 MASK 255.255.255.255 192.168.0.1 17/09/2012 - 10:29 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 17/09/2012 - 10:29 PM Route addition via IPAPI succeeded [adaptive] 17/09/2012 - 10:29 PM C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.17 17/09/2012 - 10:29 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 17/09/2012 - 10:29 PM Route addition via IPAPI succeeded [adaptive] 17/09/2012 - 10:29 PM C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.17 17/09/2012 - 10:29 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 17/09/2012 - 10:29 PM Route addition via IPAPI succeeded [adaptive] 17/09/2012 - 10:29 PM C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.0.17 17/09/2012 - 10:29 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 17/09/2012 - 10:29 PM Route addition via IPAPI succeeded [adaptive] 17/09/2012 - 10:29 PM Initialization Sequence Completed 17/09/2012 - 10:29 PM Starting Management Interface... 17/09/2012 - 10:29 PM Checking... 17/09/2012 - 10:29 PM Retrieve statistics... 17/09/2012 - 10:29 PM Connected. Quote Share this post Link to post
Staff 10334 Posted ... I use peer block, according to it every time an IP connects to me they see my real IP what is going on, even your port forwarding page says the same, nothing has changed, PLEASE HELPHello!Your system has been unable to load the certificate:17/09/2012 - 7:08 PM Cannot load certificate file 733f3605-10b8-4d0a-9ad8-dee6778bb278.tmp: error:02001002:system library:fopen:No such file or directory: error:20074002:BIO routines:FILE_CTRL:system lib: error:140AD002:SSL routines:SSL_CTX_use_certificate_file:system libwhich caused lack of connection since 7.08 PM till 9.52 PM. Determining why your system had this problem is impossible from the logs: the subsequent connections are just fine, except for a minor, inessential packet loss. Please make sure that you give the Air client administrator privileges when you run it.PeerBlock should have nothing to do with this problem, anyway its usage is not necessary when you're connected to the VPN.On the contrary, we would strongly recommend you to install Comodo personal firewall (free edition) and secure your connection, in order to prevent any leak and IP exposure in case of unexpected VPN disconnection and in case your system routines fail again to load files or in any other unexpected failed connection.Please see here:https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=3405&Itemid=142Kind regards Quote Share this post Link to post