Jump to content
Not connected, Your IP: 3.214.184.196

Recommended Posts

Hello,

Is there anyone here who uses openvpn over SSH with AirVPN?

I'm curious to know which AirVPN server works for you.

I've tried a couple of servers but none worked. SSH Client dies with errors:

debug2: channel 1: read failed
debug2: channel 1: send close
debug2: channel 1: rcvd close
debug2: channel 1: is dead


I'm working with support at the moment but want to know if any AirVPN active users use this feature and are able to connect successfully.


 

Share this post


Link to post

Can confirm there might be a problem.

. 2019.09.26 19:01:07 - Eddie version: 2.18.2beta / linux_x64, System: Linux, Name: Debian GNU/Linux bullseye/sid \n \l, Version: Linux desktop 5.2.0-2-amd64 #1 SMP Debian 5.2.9-2 (2019-08-21) x86_64 GNU/Linux, Mono/.Net: 6.4.0.198 (tarball Tue Sep 24 01:24:35 UTC 2019); Framework: v4.0.30319
. 2019.09.26 19:01:07 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui"
. 2019.09.26 19:01:07 - Profile path: /home/gigan3rd/.config/eddie/default.profile
. 2019.09.26 19:01:08 - Reading options from /home/gigan3rd/.config/eddie/default.profile
. 2019.09.26 19:01:08 - OpenVPN Driver - Found, /dev/net/tun
. 2019.09.26 19:01:08 - OpenVPN - Version: 2.4.7 - OpenSSL 1.0.2s  28 May 2019, LZO 2.10 (/sbin/openvpn)
. 2019.09.26 19:01:08 - SSH - Version: OpenSSH_8.0p1 Debian-6, OpenSSL 1.1.1c  28 May 2019 (/usr/bin/ssh)
. 2019.09.26 19:01:08 - SSL - Version: stunnel 5.55 (/usr/bin/stunnel4)
. 2019.09.26 19:01:08 - curl - Version: 7.66.0 (/usr/bin/curl)
. 2019.09.26 19:01:08 - Certification Authorities: /usr/share/eddie-ui/cacert.pem
I 2019.09.26 19:01:10 - Ready
. 2019.09.26 19:01:10 - Collect information about AirVPN completed
I 2019.09.26 19:03:05 - Session starting.
I 2019.09.26 19:03:05 - Checking authorization ...
! 2019.09.26 19:03:06 - Connecting to Kitalpha (Switzerland, Zurich)
. 2019.09.26 19:03:06 - Routes, added a new route, 91.214.169.68 for gateway 192.168.110.1
. 2019.09.26 19:03:06 - SSH > OpenSSH_8.0p1 Debian-6, OpenSSL 1.1.1c  28 May 2019
. 2019.09.26 19:03:06 - SSH > debug1: Reading configuration data /etc/ssh/ssh_config
. 2019.09.26 19:03:06 - SSH > debug1: /etc/ssh/ssh_config line 19: Applying options for *
. 2019.09.26 19:03:06 - SSH > debug1: Connecting to 91.214.169.68 [91.214.169.68] port 22.
. 2019.09.26 19:03:06 - SSH > debug1: Connection established.
. 2019.09.26 19:03:06 - SSH > debug1: identity file /home/gigan3rd/.config/eddie/f4e89b3c1258f6e342acd5e176015a6cfbce99218692c2cd143c8f4f7ffa9e5d.tmp.key type -1
. 2019.09.26 19:03:06 - SSH > debug1: identity file /home/gigan3rd/.config/eddie/f4e89b3c1258f6e342acd5e176015a6cfbce99218692c2cd143c8f4f7ffa9e5d.tmp.key-cert type -1
. 2019.09.26 19:03:06 - SSH > debug1: Local version string SSH-2.0-OpenSSH_8.0p1 Debian-6
. 2019.09.26 19:03:06 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_7.4p1 Debian-10+deb9u6
. 2019.09.26 19:03:06 - SSH > debug1: match: OpenSSH_7.4p1 Debian-10+deb9u6 pat OpenSSH_7.0*,OpenSSH_7.1*,OpenSSH_7.2*,OpenSSH_7.3*,OpenSSH_7.4*,OpenSSH_7.5*,OpenSSH_7.6*,OpenSSH_7.7* compat 0x04000002
. 2019.09.26 19:03:06 - SSH > debug1: Authenticating to 91.214.169.68:22 as 'sshtunnel'
. 2019.09.26 19:03:06 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2019.09.26 19:03:06 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2019.09.26 19:03:06 - SSH > debug1: kex: algorithm: curve25519-sha256
. 2019.09.26 19:03:06 - SSH > debug1: kex: host key algorithm: ecdsa-sha2-nistp256
. 2019.09.26 19:03:06 - SSH > debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
. 2019.09.26 19:03:06 - SSH > debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
. 2019.09.26 19:03:06 - SSH > debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
. 2019.09.26 19:03:06 - SSH > debug1: Server host key: ecdsa-sha2-nistp256 SHA256:l6EfIx2fGDhyWWrPd/8ShZsggPw2fbLLANOmqYdghPI
. 2019.09.26 19:03:06 - SSH > Warning: Permanently added '91.214.169.68' (ECDSA) to the list of known hosts.
. 2019.09.26 19:03:06 - SSH > debug1: rekey out after 134217728 blocks
. 2019.09.26 19:03:06 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2019.09.26 19:03:06 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2019.09.26 19:03:06 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2019.09.26 19:03:06 - SSH > debug1: rekey in after 134217728 blocks
. 2019.09.26 19:03:06 - SSH > debug1: Will attempt key: /home/gigan3rd/.config/eddie/f4e89b3c1258f6e342acd5e176015a6cfbce99218692c2cd143c8f4f7ffa9e5d.tmp.key  explicit
. 2019.09.26 19:03:06 - SSH > debug1: SSH2_MSG_EXT_INFO received
. 2019.09.26 19:03:06 - SSH > debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521>
. 2019.09.26 19:05:06 - SSH > Connection closed by 91.214.169.68 port 22
! 2019.09.26 19:05:06 - Disconnecting
. 2019.09.26 19:05:06 - Routes, removed a route previously added, 91.214.169.68 for gateway 192.168.110.1
. 2019.09.26 19:05:06 - Connection terminated.


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post
20 hours ago, giganerd said:

Can confirm there might be a problem.

Please retry now with the same server (Kitalpha), always SSH 22. Waiting for feedback. Thanks.

Share this post


Link to post
3 hours ago, Clodo said:

Please retry now with the same server (Kitalpha), always SSH 22. Waiting for feedback. Thanks.


Can confirm it working again.

. 2019.09.27 19:24:13 - Eddie version: 2.18.2beta / linux_x64, System: Linux, Name: Debian GNU/Linux bullseye/sid \n \l, Version: Linux desktop 5.2.0-2-amd64 #1 SMP Debian 5.2.9-2 (2019-08-21) x86_64 GNU/Linux, Mono/.Net: 6.4.0.198 (tarball Tue Sep 24 01:24:35 UTC 2019); Framework: v4.0.30319
. 2019.09.27 19:24:13 - Command line arguments (2): path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui"
. 2019.09.27 19:24:13 - Profile path: /home/gigan3rd/.config/eddie/default.profile
. 2019.09.27 19:24:14 - Reading options from /home/gigan3rd/.config/eddie/default.profile
. 2019.09.27 19:24:14 - OpenVPN Driver - Found, /dev/net/tun
. 2019.09.27 19:24:14 - OpenVPN - Version: 2.4.7 - OpenSSL 1.0.2s  28 May 2019, LZO 2.10 (/sbin/openvpn)
. 2019.09.27 19:24:14 - SSH - Version: OpenSSH_8.0p1 Debian-6, OpenSSL 1.1.1c  28 May 2019 (/usr/bin/ssh)
. 2019.09.27 19:24:14 - SSL - Version: stunnel 5.55 (/usr/bin/stunnel4)
. 2019.09.27 19:24:14 - curl - Version: 7.66.0 (/usr/bin/curl)
. 2019.09.27 19:24:14 - Certification Authorities: /usr/share/eddie-ui/cacert.pem
I 2019.09.27 19:24:14 - Ready
. 2019.09.27 19:24:14 - Collect information about AirVPN completed
I 2019.09.27 19:24:24 - Session starting.
I 2019.09.27 19:24:24 - Checking authorization ...
! 2019.09.27 19:24:24 - Connecting to Kitalpha (Switzerland, Zurich)
. 2019.09.27 19:24:24 - Routes, added a new route, 91.214.169.68 for gateway 192.168.110.1
. 2019.09.27 19:24:24 - SSH > OpenSSH_8.0p1 Debian-6, OpenSSL 1.1.1c  28 May 2019
. 2019.09.27 19:24:24 - SSH > debug1: Reading configuration data /etc/ssh/ssh_config
. 2019.09.27 19:24:24 - SSH > debug1: /etc/ssh/ssh_config line 19: Applying options for *
. 2019.09.27 19:24:24 - SSH > debug1: Connecting to 91.214.169.68 [91.214.169.68] port 22.
. 2019.09.27 19:24:24 - SSH > debug1: Connection established.
. 2019.09.27 19:24:24 - SSH > debug1: identity file /home/gigan3rd/.config/eddie/d6a45b75a5599dac7567ca5217ea9fcd1ee125c5ab3debac2adb07816c8d14ec.tmp.key type -1
. 2019.09.27 19:24:24 - SSH > debug1: identity file /home/gigan3rd/.config/eddie/d6a45b75a5599dac7567ca5217ea9fcd1ee125c5ab3debac2adb07816c8d14ec.tmp.key-cert type -1
. 2019.09.27 19:24:24 - SSH > debug1: Local version string SSH-2.0-OpenSSH_8.0p1 Debian-6
. 2019.09.27 19:24:24 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_7.4p1 Debian-10+deb9u6
. 2019.09.27 19:24:24 - SSH > debug1: match: OpenSSH_7.4p1 Debian-10+deb9u6 pat OpenSSH_7.0*,OpenSSH_7.1*,OpenSSH_7.2*,OpenSSH_7.3*,OpenSSH_7.4*,OpenSSH_7.5*,OpenSSH_7.6*,OpenSSH_7.7* compat 0x04000002
. 2019.09.27 19:24:24 - SSH > debug1: Authenticating to 91.214.169.68:22 as 'sshtunnel'
. 2019.09.27 19:24:24 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2019.09.27 19:24:24 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2019.09.27 19:24:24 - SSH > debug1: kex: algorithm: curve25519-sha256
. 2019.09.27 19:24:24 - SSH > debug1: kex: host key algorithm: ecdsa-sha2-nistp256
. 2019.09.27 19:24:24 - SSH > debug1: kex: server->client cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
. 2019.09.27 19:24:24 - SSH > debug1: kex: client->server cipher: chacha20-poly1305@openssh.com MAC: <implicit> compression: none
. 2019.09.27 19:24:24 - SSH > debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
. 2019.09.27 19:24:24 - SSH > debug1: Server host key: ecdsa-sha2-nistp256 SHA256:l6EfIx2fGDhyWWrPd/8ShZsggPw2fbLLANOmqYdghPI
. 2019.09.27 19:24:24 - SSH > Warning: Permanently added '91.214.169.68' (ECDSA) to the list of known hosts.
. 2019.09.27 19:24:24 - SSH > debug1: rekey out after 134217728 blocks
. 2019.09.27 19:24:24 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2019.09.27 19:24:24 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2019.09.27 19:24:24 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2019.09.27 19:24:24 - SSH > debug1: rekey in after 134217728 blocks
. 2019.09.27 19:24:24 - SSH > debug1: Will attempt key: /home/gigan3rd/.config/eddie/d6a45b75a5599dac7567ca5217ea9fcd1ee125c5ab3debac2adb07816c8d14ec.tmp.key  explicit
. 2019.09.27 19:24:24 - SSH > debug1: SSH2_MSG_EXT_INFO received
. 2019.09.27 19:24:24 - SSH > debug1: kex_input_ext_info: server-sig-algs=<ssh-ed25519,ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521>
. 2019.09.27 19:24:24 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2019.09.27 19:24:24 - SSH > debug1: Authentications that can continue: publickey
. 2019.09.27 19:24:24 - SSH > debug1: Next authentication method: publickey
. 2019.09.27 19:24:24 - SSH > debug1: Trying private key: /home/gigan3rd/.config/eddie/d6a45b75a5599dac7567ca5217ea9fcd1ee125c5ab3debac2adb07816c8d14ec.tmp.key
. 2019.09.27 19:24:24 - SSH > debug1: Authentication succeeded (publickey).
. 2019.09.27 19:24:24 - SSH > Authenticated to 91.214.169.68 ([91.214.169.68]:22).
. 2019.09.27 19:24:24 - SSH > debug1: Local connections to LOCALHOST:58151 forwarded to remote address 127.0.0.1:2018
. 2019.09.27 19:24:24 - SSH > debug1: Local forwarding listening on ::1 port 58151.
. 2019.09.27 19:24:24 - SSH > debug1: channel 0: new [port listener]
. 2019.09.27 19:24:24 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 58151.
. 2019.09.27 19:24:24 - SSH > debug1: channel 1: new [port listener]
. 2019.09.27 19:24:24 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2019.09.27 19:24:24 - SSH > debug1: Entering interactive session.
. 2019.09.27 19:24:24 - SSH > debug1: pledge: network
. 2019.09.27 19:24:24 - SSH > debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0
. 2019.09.27 19:24:24 - SSH > debug1: Remote: PTY allocation disabled.
. 2019.09.27 19:24:24 - SSH > debug1: Remote: X11 forwarding disabled.
. 2019.09.27 19:24:24 - SSH > debug1: Remote: Forced command.
. 2019.09.27 19:24:24 - SSH > debug1: Connection to port 58151 forwarding to 127.0.0.1 port 2018 requested.
. 2019.09.27 19:24:24 - SSH > debug1: channel 2: new [direct-tcpip]
. 2019.09.27 19:24:24 - OpenVPN > OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 19 2019
. 2019.09.27 19:24:24 - OpenVPN > library versions: OpenSSL 1.0.2s  28 May 2019, LZO 2.10
. 2019.09.27 19:24:24 - Connection to OpenVPN Management Interface
. 2019.09.27 19:24:24 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.09.27 19:24:24 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.09.27 19:24:24 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2019.09.27 19:24:24 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:58151
. 2019.09.27 19:24:24 - OpenVPN > Socket Buffers: R=[131072->131072] S=[16384->16384]
. 2019.09.27 19:24:24 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:58151 [nonblock]
. 2019.09.27 19:24:24 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:58151
. 2019.09.27 19:24:24 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2019.09.27 19:24:24 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:58151
. 2019.09.27 19:24:24 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:58151, sid=6f3505ff 0845ca19
. 2019.09.27 19:24:25 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.09.27 19:24:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.09.27 19:24:25 - OpenVPN > VERIFY KU OK
. 2019.09.27 19:24:25 - OpenVPN > Validating certificate extended key usage
. 2019.09.27 19:24:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.09.27 19:24:25 - OpenVPN > VERIFY EKU OK
. 2019.09.27 19:24:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kitalpha, emailAddress=info@airvpn.org
. 2019.09.27 19:24:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.09.27 19:24:25 - OpenVPN > [Kitalpha] Peer Connection Initiated with [AF_INET]127.0.0.1:58151
. 2019.09.27 19:24:26 - OpenVPN > SENT CONTROL [Kitalpha]: 'PUSH_REQUEST' (status=1)
. 2019.09.27 19:24:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.20.9.1,route-gateway 10.20.9.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.20.9.213 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2019.09.27 19:24:26 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2019.09.27 19:24:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.09.27 19:24:26 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2019.09.27 19:24:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.09.27 19:24:26 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.09.27 19:24:26 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.09.27 19:24:26 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.09.27 19:24:26 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627
. 2019.09.27 19:24:26 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2019.09.27 19:24:26 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2019.09.27 19:24:26 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.09.27 19:24:26 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.09.27 19:24:26 - OpenVPN > ROUTE_GATEWAY 192.168.110.1/255.255.255.0 IFACE=enp25s0 HWADDR=30:9c:23:69:5e:4e
. 2019.09.27 19:24:26 - OpenVPN > TUN/TAP device tun0 opened
. 2019.09.27 19:24:26 - OpenVPN > TUN/TAP TX queue length set to 100
. 2019.09.27 19:24:26 - OpenVPN > /sbin/ip link set dev tun0 up mtu 1500
. 2019.09.27 19:24:26 - OpenVPN > /sbin/ip addr add dev tun0 10.20.9.213/24 broadcast 10.20.9.255
. 2019.09.27 19:24:31 - OpenVPN > /sbin/ip route add 127.0.0.1/32 via 192.168.110.1
. 2019.09.27 19:24:31 - OpenVPN > /sbin/ip route add 0.0.0.0/1 via 10.20.9.1
. 2019.09.27 19:24:31 - OpenVPN > /sbin/ip route add 128.0.0.0/1 via 10.20.9.1
. 2019.09.27 19:24:31 - Routes, added a new route, 91.214.169.69 for gateway 10.20.9.1
. 2019.09.27 19:24:31 - Flushing DNS
I 2019.09.27 19:24:31 - Checking route IPv4
! 2019.09.27 19:24:32 - Connected.
. 2019.09.27 19:24:32 - OpenVPN > Initialization Sequence Completed

 
23 hours ago, gnrvwp said:

Giga vs Huge: which one is bigger? Haha...


From a most technical, nerdy point of view: None, as they're incomparable. Giga is a SI-defined metric prefix. Huge is a synonym of big. :D So technically Tera is bigger than Giga.

Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

So... Tera thanks from me, GigaNerd, for introducing me a new word today. :D

Also kudos to Clodo for addressing this issue so quickly. I guess openvpn over SSH is a rarely used feature so not much attention was paid to it.

Share this post


Link to post

Hello,

Just a follow up on this openvpn over SSH issue:

Kitalpha entry-IP address 1 works great as expected. Thanks again Clodo.

Kitalpha entry-IP address 2 works fine, too.

But Kitalpha entry-IP address 3 and Kitalpha entry-IP address 4 do not work with openvpn over SSH.  The SSH Client just dies.
 

debug2: channel 1: obuf empty
debug2: channel 1: read failed
debug2: channel 1: ibuf empty
debug2: channel 1: rcvd close
debug2: channel 1: is dead


I tried a few more IPs in the entry 1, 3, and 4 groups and none worked with openvpn over SSH.

So my conclusion is: AirVPN only supports openvpn over SSH for the entry-IP address 2 group.

Entry-IP address 1, 3 and 4 groups are not officially supported and may or may not work.

Is this statement correct?

Please advise.

 

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...