Jump to content
Not connected, Your IP: 18.118.140.108
Sign in to follow this  
Droopy

Real IP visible when connection made from outside.

Recommended Posts

I use peer block, according to it every time an IP connects to me they see my real IP what is going on, even your port forwarding page says the same, nothing has changed, PLEASE HELP

17/09/2012 - 12:18 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

17/09/2012 - 12:18 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

17/09/2012 - 1:18 PM TLS: tls_process: killed expiring key

17/09/2012 - 1:18 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

17/09/2012 - 1:18 PM VERIFY OK: nsCertType=SERVER

17/09/2012 - 1:18 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

17/09/2012 - 1:18 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

17/09/2012 - 1:18 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

17/09/2012 - 1:18 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

17/09/2012 - 1:18 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

17/09/2012 - 1:18 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

17/09/2012 - 2:18 PM TLS: tls_process: killed expiring key

17/09/2012 - 2:18 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

17/09/2012 - 2:18 PM VERIFY OK: nsCertType=SERVER

17/09/2012 - 2:18 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

17/09/2012 - 2:19 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

17/09/2012 - 2:19 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

17/09/2012 - 2:19 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

17/09/2012 - 2:19 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

17/09/2012 - 2:19 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

17/09/2012 - 3:18 PM TLS: tls_process: killed expiring key

17/09/2012 - 3:19 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

17/09/2012 - 3:19 PM VERIFY OK: nsCertType=SERVER

17/09/2012 - 3:19 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

17/09/2012 - 3:19 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

17/09/2012 - 3:19 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

17/09/2012 - 3:19 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

17/09/2012 - 3:19 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

17/09/2012 - 3:19 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

17/09/2012 - 4:19 PM TLS: tls_process: killed expiring key

17/09/2012 - 4:19 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

17/09/2012 - 4:19 PM VERIFY OK: nsCertType=SERVER

17/09/2012 - 4:19 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

17/09/2012 - 4:19 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

17/09/2012 - 4:19 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

17/09/2012 - 4:19 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

17/09/2012 - 4:19 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

17/09/2012 - 4:19 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

17/09/2012 - 5:03 PM Replay-window backtrack occurred [4]

17/09/2012 - 5:19 PM TLS: tls_process: killed expiring key

17/09/2012 - 5:19 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

17/09/2012 - 5:19 PM VERIFY OK: nsCertType=SERVER

17/09/2012 - 5:19 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

17/09/2012 - 5:19 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

17/09/2012 - 5:19 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

17/09/2012 - 5:19 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

17/09/2012 - 5:19 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

17/09/2012 - 5:19 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

17/09/2012 - 6:19 PM TLS: tls_process: killed expiring key

17/09/2012 - 6:19 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

17/09/2012 - 6:19 PM VERIFY OK: nsCertType=SERVER

17/09/2012 - 6:19 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

17/09/2012 - 6:19 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

17/09/2012 - 6:19 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

17/09/2012 - 6:19 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

17/09/2012 - 6:19 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

17/09/2012 - 6:19 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

17/09/2012 - 7:08 PM [server] Inactivity timeout (--ping-restart), restarting

17/09/2012 - 7:08 PM TCP/UDP: Closing socket

17/09/2012 - 7:08 PM Re-connecting...

17/09/2012 - 7:08 PM C:\WINDOWS\system32\route.exe DELETE 10.6.0.1 MASK 255.255.255.255 10.6.1.181

17/09/2012 - 7:08 PM Route deletion via IPAPI succeeded [adaptive]

17/09/2012 - 7:08 PM C:\WINDOWS\system32\route.exe DELETE 62.212.85.65 MASK 255.255.255.255 192.168.0.1

17/09/2012 - 7:08 PM Route deletion via IPAPI succeeded [adaptive]

17/09/2012 - 7:08 PM C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.6.1.181

17/09/2012 - 7:08 PM Route deletion via IPAPI succeeded [adaptive]

17/09/2012 - 7:08 PM C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.6.1.181

17/09/2012 - 7:08 PM Route deletion via IPAPI succeeded [adaptive]

17/09/2012 - 7:08 PM Closing TUN/TAP interface

17/09/2012 - 7:08 PM SIGUSR1[soft,ping-restart] received, process restarting

17/09/2012 - 7:08 PM Restart pause, 2 second(s)

17/09/2012 - 7:08 PM NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

17/09/2012 - 7:08 PM Cannot load certificate file 733f3605-10b8-4d0a-9ad8-dee6778bb278.tmp: error:02001002:system library:fopen:No such file or directory: error:20074002:BIO routines:FILE_CTRL:system lib: error:140AD002:SSL routines:SSL_CTX_use_certificate_file:system lib

17/09/2012 - 7:08 PM Exiting

17/09/2012 - 7:08 PM Failed to start.

17/09/2012 - 9:52 PM Login...

17/09/2012 - 9:52 PM Login success.

17/09/2012 - 9:52 PM Contacting service...

17/09/2012 - 9:52 PM Connecting...

17/09/2012 - 9:52 PM OpenVPN 2.2.2 Win32-MSVC++ [sSL] [LZO2] [PKCS11] built on Dec 15 2011

17/09/2012 - 9:52 PM NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

17/09/2012 - 9:52 PM LZO compression initialized

17/09/2012 - 9:52 PM Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ]

17/09/2012 - 9:52 PM Socket Buffers: R=[8192->8192] S=[8192->8192]

17/09/2012 - 9:52 PM Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]

17/09/2012 - 9:52 PM Local Options hash (VER=V4): '22188c5b'

17/09/2012 - 9:52 PM Expected Remote Options hash (VER=V4): 'a8f55717'

17/09/2012 - 9:52 PM UDPv4 link local: [undef]

17/09/2012 - 9:52 PM UDPv4 link remote: 62.212.85.65:443

17/09/2012 - 9:52 PM TLS: Initial packet from 62.212.85.65:443, sid=b4e95248 d70d457a

17/09/2012 - 9:52 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

17/09/2012 - 9:52 PM VERIFY OK: nsCertType=SERVER

17/09/2012 - 9:52 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

17/09/2012 - 9:52 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

17/09/2012 - 9:52 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

17/09/2012 - 9:52 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

17/09/2012 - 9:52 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

17/09/2012 - 9:52 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

17/09/2012 - 9:52 PM [server] Peer Connection Initiated with 62.212.85.65:443

17/09/2012 - 9:52 PM SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

17/09/2012 - 9:52 PM PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.4.10.214 10.4.10.213'

17/09/2012 - 9:52 PM OPTIONS IMPORT: timers and/or timeouts modified

17/09/2012 - 9:52 PM OPTIONS IMPORT: LZO parms modified

17/09/2012 - 9:52 PM OPTIONS IMPORT: --ifconfig/up options modified

17/09/2012 - 9:52 PM OPTIONS IMPORT: route options modified

17/09/2012 - 9:52 PM OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

17/09/2012 - 9:52 PM ROUTE default_gateway=192.168.0.1

17/09/2012 - 9:52 PM TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{C8035BAC-AB73-4A3B-8A8A-F57372C7C969}.tap

17/09/2012 - 9:52 PM TAP-Win32 Driver Version 9.9

17/09/2012 - 9:52 PM TAP-Win32 MTU=1500

17/09/2012 - 9:52 PM Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.4.10.214/255.255.255.252 on interface {C8035BAC-AB73-4A3B-8A8A-F57372C7C969} [DHCP-serv: 10.4.10.213, lease-time: 31536000]

17/09/2012 - 9:52 PM Successful ARP Flush on interface [13] {C8035BAC-AB73-4A3B-8A8A-F57372C7C969}

17/09/2012 - 9:52 PM TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

17/09/2012 - 9:52 PM C:\WINDOWS\system32\route.exe ADD 62.212.85.65 MASK 255.255.255.255 192.168.0.1

17/09/2012 - 9:52 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

17/09/2012 - 9:52 PM Route addition via IPAPI succeeded [adaptive]

17/09/2012 - 9:52 PM C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.10.213

17/09/2012 - 9:52 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

17/09/2012 - 9:52 PM Route addition via IPAPI succeeded [adaptive]

17/09/2012 - 9:52 PM C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.10.213

17/09/2012 - 9:52 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

17/09/2012 - 9:52 PM Route addition via IPAPI succeeded [adaptive]

17/09/2012 - 9:52 PM C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.10.213

17/09/2012 - 9:52 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

17/09/2012 - 9:52 PM Route addition via IPAPI succeeded [adaptive]

17/09/2012 - 9:52 PM Initialization Sequence Completed

17/09/2012 - 9:52 PM Starting Management Interface...

17/09/2012 - 9:52 PM Checking...

17/09/2012 - 9:53 PM Retrieve statistics...

17/09/2012 - 9:53 PM Connected.

17/09/2012 - 10:28 PM Disconnecting...

17/09/2012 - 10:28 PM SIGTERM received, sending exit notification to peer

17/09/2012 - 10:28 PM TCP/UDP: Closing socket

17/09/2012 - 10:28 PM Disconnected.

17/09/2012 - 10:28 PM C:\WINDOWS\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.10.213

17/09/2012 - 10:28 PM Route deletion via IPAPI succeeded [adaptive]

17/09/2012 - 10:28 PM C:\WINDOWS\system32\route.exe DELETE 62.212.85.65 MASK 255.255.255.255 192.168.0.1

17/09/2012 - 10:28 PM Route deletion via IPAPI succeeded [adaptive]

17/09/2012 - 10:28 PM C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.10.213

17/09/2012 - 10:28 PM Route deletion via IPAPI succeeded [adaptive]

17/09/2012 - 10:28 PM C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.10.213

17/09/2012 - 10:28 PM Route deletion via IPAPI succeeded [adaptive]

17/09/2012 - 10:28 PM Closing TUN/TAP interface

17/09/2012 - 10:28 PM SIGTERM[hard,] received, process exiting

17/09/2012 - 10:28 PM Login...

17/09/2012 - 10:28 PM Login success.

17/09/2012 - 10:28 PM Contacting service...

17/09/2012 - 10:29 PM Connecting...

17/09/2012 - 10:29 PM OpenVPN 2.2.2 Win32-MSVC++ [sSL] [LZO2] [PKCS11] built on Dec 15 2011

17/09/2012 - 10:29 PM NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables

17/09/2012 - 10:29 PM LZO compression initialized

17/09/2012 - 10:29 PM Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ]

17/09/2012 - 10:29 PM Socket Buffers: R=[8192->8192] S=[8192->8192]

17/09/2012 - 10:29 PM Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]

17/09/2012 - 10:29 PM Local Options hash (VER=V4): '22188c5b'

17/09/2012 - 10:29 PM Expected Remote Options hash (VER=V4): 'a8f55717'

17/09/2012 - 10:29 PM UDPv4 link local: [undef]

17/09/2012 - 10:29 PM UDPv4 link remote: 95.211.169.3:443

17/09/2012 - 10:29 PM TLS: Initial packet from 95.211.169.3:443, sid=41bc0af6 7adc6601

17/09/2012 - 10:29 PM VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org

17/09/2012 - 10:29 PM VERIFY OK: nsCertType=SERVER

17/09/2012 - 10:29 PM VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org

17/09/2012 - 10:29 PM Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

17/09/2012 - 10:29 PM Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

17/09/2012 - 10:29 PM Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

17/09/2012 - 10:29 PM Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

17/09/2012 - 10:29 PM Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA

17/09/2012 - 10:29 PM [server] Peer Connection Initiated with 95.211.169.3:443

17/09/2012 - 10:29 PM SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

17/09/2012 - 10:29 PM PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.4.0.18 10.4.0.17'

17/09/2012 - 10:29 PM OPTIONS IMPORT: timers and/or timeouts modified

17/09/2012 - 10:29 PM OPTIONS IMPORT: LZO parms modified

17/09/2012 - 10:29 PM OPTIONS IMPORT: --ifconfig/up options modified

17/09/2012 - 10:29 PM OPTIONS IMPORT: route options modified

17/09/2012 - 10:29 PM OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

17/09/2012 - 10:29 PM ROUTE default_gateway=192.168.0.1

17/09/2012 - 10:29 PM TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{C8035BAC-AB73-4A3B-8A8A-F57372C7C969}.tap

17/09/2012 - 10:29 PM TAP-Win32 Driver Version 9.9

17/09/2012 - 10:29 PM TAP-Win32 MTU=1500

17/09/2012 - 10:29 PM Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.4.0.18/255.255.255.252 on interface {C8035BAC-AB73-4A3B-8A8A-F57372C7C969} [DHCP-serv: 10.4.0.17, lease-time: 31536000]

17/09/2012 - 10:29 PM Successful ARP Flush on interface [13] {C8035BAC-AB73-4A3B-8A8A-F57372C7C969}

17/09/2012 - 10:29 PM TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

17/09/2012 - 10:29 PM C:\WINDOWS\system32\route.exe ADD 95.211.169.3 MASK 255.255.255.255 192.168.0.1

17/09/2012 - 10:29 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

17/09/2012 - 10:29 PM Route addition via IPAPI succeeded [adaptive]

17/09/2012 - 10:29 PM C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.17

17/09/2012 - 10:29 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

17/09/2012 - 10:29 PM Route addition via IPAPI succeeded [adaptive]

17/09/2012 - 10:29 PM C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.17

17/09/2012 - 10:29 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

17/09/2012 - 10:29 PM Route addition via IPAPI succeeded [adaptive]

17/09/2012 - 10:29 PM C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.0.17

17/09/2012 - 10:29 PM ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

17/09/2012 - 10:29 PM Route addition via IPAPI succeeded [adaptive]

17/09/2012 - 10:29 PM Initialization Sequence Completed

17/09/2012 - 10:29 PM Starting Management Interface...

17/09/2012 - 10:29 PM Checking...

17/09/2012 - 10:29 PM Retrieve statistics...

17/09/2012 - 10:29 PM Connected.

Share this post


Link to post

I use peer block, according to it every time an IP connects to me they see my real IP what is going on, even your port forwarding page says the same, nothing has changed, PLEASE HELP

Hello!

Your system has been unable to load the certificate:

17/09/2012 - 7:08 PM Cannot load certificate file 733f3605-10b8-4d0a-9ad8-dee6778bb278.tmp: error:02001002:system library:fopen:No such file or directory: error:20074002:BIO routines:FILE_CTRL:system lib: error:140AD002:SSL routines:SSL_CTX_use_certificate_file:system lib

which caused lack of connection since 7.08 PM till 9.52 PM. Determining why your system had this problem is impossible from the logs: the subsequent connections are just fine, except for a minor, inessential packet loss. Please make sure that you give the Air client administrator privileges when you run it.

PeerBlock should have nothing to do with this problem, anyway its usage is not necessary when you're connected to the VPN.

On the contrary, we would strongly recommend you to install Comodo personal firewall (free edition) and secure your connection, in order to prevent any leak and IP exposure in case of unexpected VPN disconnection and in case your system routines fail again to load files or in any other unexpected failed connection.

Please see here:

https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=3405&Itemid=142

Kind regards

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...