Jump to content
Not connected, Your IP: 216.73.216.49

Search the Community

Showing results for 'china'.


Didn't find what you were looking for? Try searching for:


More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 487 results

  1. Hello! It could be sufficient and currently it is indeed sufficient from Russia and China, where you bypass blocks with the backward compatible H parameters. The H parameters could become in the future an additional weapon against evolving blocking techniques. Kind regards
  2. Hello! We're glad to inform you that AmneziaWG support has been implemented in Eddie Android edition 4.0.0 beta 1 and it will be progressively implemented in all the other AirVPN software. https://airvpn.org/forums/topic/77633-eddie-android-edition-400-preview-available/ Eddie Android edition public beta testing is going very well and the development team is optimistic about a near future release. This is only partially true. When you use CPS on your side and you connect to a WireGuard based server, demultiplexers will identify the traffic according to the CPS settings (QUIC, DNS...) only initially. They will soon be able to detect the traffic as WireGuard traffic. With DNS mimicking this happens just after the handshake, while with QUIC the inspection tools need much more time. We can confirm the above after several experimental tests we repeatedly performed with deep packet inspection. Anyway QUIC mimicking is effective and actually it can nowadays bypass in about 100% of the cases the blocks in both Russia and China. But we have planned to support Amnezia on the server side too, because the current method is anyway not so strong on the long run. When we have Amnezia on the server side too, no tool is able to ever identify the traffic as WireGuard traffic: it remains indefinitely identified as QUIC. Currently we are still at a testing phase, but the outcome so far is very promising. Stay tuned! Kind regards
  3. Hello! Not anymore, and even less in the near future. HTTP/3 is quickly spreading. Today, HTTP/3 is used by 36.5% of all the websites, including major web sites inside countries that enforce blocks against VPN. Furthemore, blocking UDP as such is no more realistic, not even in China, where UDP has become an instrumental protocol for many companies in any sector (video streaming, video conference, VoIP, marketing, social media marketing, regime propaganda and more), for regime aligned or regime owned activities. In China you have a near 100% success rate and no shaping (apart from the normal shaping for anything outside China) with the current Amnezia "weak obfuscation" (no CPS) implementation, i.e. at the moment you don't even need QUIC mimicking (which is anyway available and very effective). Currently, bypassing blocks via UDP than via TCP is more efficient in China. At the moment there is nothing more effective than mimicking QUIC with the signature / fingerprint of an existing web site that's not blocked, and you have this option right now. We see > 95% success rate, which is better than the success rates of SSH (not exceeding 75%), shadowsocks and XRay, V2Ray etc (but a lot faster!). The success rate is similar to any VPN protocol over HTTP/2, but, again, dramatically faster. We're glad to know it. It is also very flexible. Thanks to CPS, you may mimic any transport layer protocol built on UDP, for example DNS, QUIC, SIP. Kind regards
  4. With the AmneziaWG protocol, the obfuscation capability at the UDP layer is greatly improved, but what about at the TCP layer? Other countries may completely block the UDP protocol, making it impossible for AmneziaWG to connect. In that case, they can only connect via the TCP protocol. Currently, AirVPN only has early obfuscation solutions such as SSH and SSL for TCP obfuscation. In China's IPv4 environment, SSH and SSL are fully recognized, rate-limited, and blocked. This means that AirVPN's TCP-level obfuscation performance is relatively poor. I think the next step for AirVPN could be to focus on TCP obfuscation. X-ray, Shadowsocks, and V2Ray are all protocols with high levels of obfuscation. You could choose one of these protocols to make an outer proxy for OpenVPN TCP to enhance the obfuscation capabilities at the TCP layer. I know that AirVPN's strongest shield against TCP is the pluggable bridges developed by the Tor team. However, Tor is blocked in China at a much higher level than SSH and SSL (because the dark web is hidden within the Tor network). The newly developed WebTunnel is unlikely to survive more than three months in China. Blocking Tor isn't about identifying the bridge protocol; it's about blocking Tor-related domains, node IPs, and bridge IPs, making Tor unusable in China. AirVPN might be able to utilize the obfuscated bridge protocols developed by the Tor team without using Tor nodes, using bridge protocols like WebTunnel as an outer proxy for OpenVPN TCP, directly connecting to the AirVPN server network. AirVPN may still rely on Tor for TCP protocol obfuscation in the short term, which is understandable, given that adding a new protocol to all servers would require a significant amount of time and resources. The addition of the AmneziaWG protocol is sufficient for my needs; thank you, AirVPN. However, with increasing global internet censorship and the emergence of new obfuscation protocols, switching to more modern obfuscation protocols is definitely the future trend for VPN vendors, because there will always be people in the dark side of the internet. These are all my personal opinions, thanks.
  5. Over 500 GB of source code, work logs, and internal communication records were leaked, revealing details of the GFW’s research, development, and operations. https://gfw.report/blog/geedge_and_mesa_leak/en/
  6. Hello. It seems you are also living under the firewall. Your logs are the same as WireGuard's logs in China now, and they are identified and blocked by the firewall. Please try the advanced obfuscation options. AirVPN offers: OpenVPN over SSH, SSL, TOR and AmneziaWG. The AmneziaWG option is currently in the testing phase. For detailed usage instructions, please find tutorials on the AirVPN website. If you are using the eddie client on your computer, you can uncheck "Automatic" and select a specific obfuscated protocol in Settings - Protocols.
  7. Hey there, Taiwan is a provincial administrative region of China, an inalienable part of China’s territory. But when I checked my IP on ipleak.net, I saw Taiwan was shown with those outdated flags, which is totally wrong. These flags don’t reflect the fact that Taiwan belongs to China. Using them misrepresents Taiwan’s status and goes against the One - China principle. It’s really important to fix this mistake. Please correct the display and stop using such wrong flags. Let’s make sure the info about Taiwan is right, in line with the One - China principle. Thanks for handling this!
  8. Hello. Today I installed the eddie v4.0.0 beta version on my Android phone and connected to AmneziaWG to perform a speed test. The following file is the log report. I can sense that AmneziaWG seems to have been speed-limited recently; the speed isn't as fast as when I first started using it. With CPS disabled, AmneziaWG was the slowest, with the connection speed limited to about 10KB/s for a short while before rebounding to a maximum of 500KB/s. Enabling CPS and trying QUIC emulation resulted in the fastest speed, reaching approximately 2MB/s. However, the speed was sometimes throttled to 300KB/s and as low as 10KB/s. On my most frequently used servers in Belgium and the United States, Wireguard port 1637 was usually available, whereas previously it was always unavailable on the Belgian server. When attempting DNS emulation, the speed was roughly the same as without CPS enabled. The connection was briefly throttled to 10KB/s, but after waiting, it recovered to 200KB/s, with a maximum speed of about 800KB/s. However, most of the time the speed was slower than AmneziaWG without CPS enabled. The QUIC emulation is currently performing well, and the speed may be even faster once the WireGuard server fully supports AmneziaWG, since it is currently only a test version. I'm confused as to why AmneziaWG is still being throttled. According to AmneziaVPN's advertising, shouldn't the AmneziaWG protocol be unrecognized by DPI? I suspect it's due to ISP generally limiting UDP speeds. Even when I turn off my VPN software and browse websites allowed in China, some content still buffers. However, there is no doubt that the availability of the AmneziaWG protocol is the highest among the protocols currently offered by AirVPN. SSH, SSL and other standard protocols do not perform as well as AmneziaWG in my experience. Although AmneziaWG is speed-limited, I can still browse the web, although download tasks are sometimes fast and sometimes slow. So far, I have not found any issues with AmneziaWG being blocked after the connection is established. After all, this is just a test so far. I'll wait until AmneziaWG is added to the Eddie PC version and then use it for a longer period of time to see how it goes. May everything turn out in a positive direction. Eddie_日志已创建在_14_Dec_2025_07_03_23_UTC_上.txt Eddie_日志已创建在_14_Dec_2025_07_14_52_UTC_上.txt
  9. Really? It's good news to know that it's not a server issue.😂 It seems the only option left is to try AmneziaWG 1.5. 😡Damn the GFW! The latest GFW has incorporated AI, greatly enhancing its ability to block VPN protocols. Fortunately, China is vigorously promoting IPv6, which allows me to catch my breath for now. The future depends on full support from the AmneziaWG protocol.🙌
  10. Hello! It's available right now if you can edit the generated file. An integration with the configuration generator will require time so we suggest that you test by editing your own file (generated by the CG for WireGuard). Integration with Eddie Android edition is already available in the 4.0.0 beta version. ~100% success at the moment comes from reports from Russia and China. It would be good to have an additional report from Uzbekistan. 😋 Kind regards
  11. Hello! We have a report that makes us suspect that in Uzbekistan it's the IP addresses of various VPN servers (not only AirVPN, other VPN too), to be blocked "unconditionally". Anyway AmneziaWG is worth a test, with and without QUIC mimicking, toward all the wg ports of our servers. It has an incredibly high rate of success in Russia and China (higher than OpenVPN over SSH and shadowsocks) so it's definitely worth a test. Please keep us posted as we have literally three reports only from Uzbekistan including yours... If you need some parameters to test check here: https://airvpn.org/forums/topic/77633-eddie-android-edition-400-preview-available/?do=findComment&comment=258644 and here: https://airvpn.org/forums/topic/59479-block-vpn-in-russia/?do=findComment&comment=237288 If you need some suggestions for the parameters In in order to mimic QUIC connection to some specific web site known to be not blocked in countries controlled by VPN hostile regimes, please contact our support team in private by opening a ticket. Kind regards
  12. These are the AmneziaWG parameters I use in China. This set of parameters can reliably bypass the GFW. Staff can take a look. Jc = 20; Jmin = 50; Jmax = 1000; S1 = 0; S2 = 0; H1 = 3; H2 = 1; H3 = 4; H4 = 2;
  13. Great! Eddie finally supports AmneziaWG, and UDP finally has a masquerade protocol. Another protocol has been added to the list of protocols for bypassing China's Great Firewall.
  14. now that western countries are adopting china's vpn policies, sometimes going further than chinese. Michigan is gonna ban vpns soon, maybe most of usa will follow. i was wondering does airvpn have any tools in the arsenal to bypass these bans?? also will airvpn stop servers in effected countries?? source for michigan ban: https://www.webpronews.com/michigans-vpn-crackdown-the-remote-work-killer-hiding-in-plain-sight/
  15. Hi, AirVpn may want to consider an add-on service for dedicated / virtual private ip addresses. Although TorGuard Net apparently is from China does offer dedicated ip addresses option. (Edit Nov 14 2025: Florida my mistake. Perhaps Chinese owners) Easier to keep these IPs off of spam filter and blacklists. I know the cost will likely be alot more for obvious reasons.
  16. Well, it's the worst ISP in China.They shape everything.I suggest you should switch to other ISP such as China Telecom , China Unicom or China Mobile.You may find some cheap plans on the RedNote.But BE CAREFUL. If you switch your ISP to I mentioned above, you could try these servers. China Telecom: NL , DE , US SJC , US LAX China Unicom: nearly all european servers (except IE , NO , SE) (I recommend NL , DE) , US servers in the west coast. China Mobile: JP , SG servers I recommend using OpenVPN (IP Entry 3 & UDP & Port 443),since WireGuard is too easy to be identified (run a Wireshark and you know what I mean). If you have IPv6 connection,you should use them first (unless it's too slow for you).The GFW is less aggressive on IPv6 compared to IPv4
  17. The implementation tunnels WireGuard UDP traffic through HTTP/3 using the QUIC protocol, making encrypted VPN traffic look identical to regular web browsing.SQUIC started as Google's project to accelerate web traffic and became HTTP/3 in June 2022. The protocol uses UDP instead of TCP, eliminating handshake delays. Mullvad exploits the MASQUE tunneling spec (RFC 9298) to proxy UDP through HTTP servers. State censors (China etc.) see HTTPS web traffic while the VPN tunnel hides inside that envelopetate censors see HTTPS web traffic while the VPN tunnel hides inside that envelope. Can we get this? taken from:
  18. @MichelAIR too. Hello! It's the ISO 3166 string extracted by Eddie as usual for any country. You can ask ISO to include ROC on ISO 3166 as a sovereign country, but it will not happen. ISO builds the list according to those countries that are either UN members, parties of the statute of the ICJ or members of a UN agency, but Republic of China can't enter the UN because of the PRC veto. To make things worse, almost all the countries in the world, including the USA and the EU Member States, with the exception of 12 countries with lesser power in the UN such as Belize and Haiti, do not recognize the Republic of China as an independent country because, we guess, they fear too much the economic sanctions PRC will enforce against those countries that would do so. Our solution to list Taiwan as it was in ISO 3166 as a stand alone, recognized and independent country, with its own flag, its own place as a country in the servers list, its own country fully qualified domain name in the infrastructure, far from being funny should have told you everything. Building our own codes and strings by breaking ISO standard may become a bigger problem but we'll evaluate it (after all we already got out of ICANN for specific ICE-related "enforcement" more than a decade ago). The matter was already on the table as already announced in the "News" forum: https://airvpn.org/forums/topic/63201-new-1-gbits-server-available-new-country-tw/?do=findComment&comment=238819 and Eddie's next version will print "Taiwan, Republic of China". On one hand, by abiding to the ISO 3166 but moving ROC to an autonomous country as it has been in practice since decades we can keep using ISO standards (no technical complications, no exception handling and worse) but at the same time we show a clear political position and challenge PRC propaganda & mantra "there's only one China". The obvious strength of this position is the provocation to leave the ISO string and keeping ROC as an autonomous country, therefore claiming there there is NOT one China only and de-structuring the meaning of "Province of China". On the other hand, breaking ISO standards and UN decisions may be very questionable but somehow stronger. Also, to avoid losing the strength of the aforementioned provocation we can find alternative strings such as "Republic of China" directly (claiming Taipei in "Republic of China" can cause again adverse reactions by ignorant people). This is the picked modification for the next Eddie version, at the moment. No problems. The fight of elderly AirVPN members against PRC censorship, propaganda and more is a quarter of century old, so being accused to align with PRC against ROC is obscenely provocative, but the replies are (self or not) moderated. As far as it pertains to the initial reaction, it means that at least the provocation worked, although it was not fully understood in this case, and if it serves the purpose to push people to realize that it's the ISO (and the UN, secondarily) the one putting the string "Province of China" on the ISO 3166 doc, it's a good thing. Not to mention that it can also serve the purpose to make people question how come, how it's possible that one could become victim of PRC propaganda "there's only one China" when one is against PRC propaganda! Kind regards
  19. Hello! We confirm the problem and we could determine that both the domain name authoritative DNS and the web site block the Taiwan server. Packets get out regularly from the server and from Taiwan but they are black holed by the final destination datacenters. Furthermore the authoritative DNS does not answer to our DNS server in Taiwan (this is a lesser problem as you could resolve the name through some other public DNS or the hosts file). We don't know the reasons of this behavior. If you query Democracy Now and you receive a reply please let us know. In the meantime we can "micro-route" Democracy Now web site from Sulafat, we will examine how to do it soon. Yes, this is in the official ISO-3166 that Eddie uses to find areas names assigned by the United Nations. According to a previous administrative division, Taiwan is the biggest province of the Republic of China (ROC), not to be confused with People's Republic of China (PRC, mainland China). By using Taiwan as the country's name, "Province of China" is also a definition pushed by PRC at all levels (from UN to NGOs) to shape two ideas: that PRC must "re-unify" with Taiwan and that when you say "China" you don't talk about the Republic of China, but about the PRC (even PRC detractors fall prey of this propaganda as we can see from this thread). In this sense ISO-3166-2:TW entry could be seen as a concession to PRC narrative and the PRC can "play" over the ambiguity of the definition. In the next version we may either stay with this one, according to the United Nations status (but see here for some arguments against this), or censor the ISO document itself. A UN spokesperson’s statement in May 2024, reiterating that Taiwan is a province of China (referring to PRC and not ROC according to directly or indirectly PRC controlled media), guided by the General Assembly resolution of 1971 (Resolution 2758), is important to see how much energy PRC spends to affirm the notion that there is only one China and this only China is PRC and not ROC. On the other hand, we have been fighting and circumventing mainland China (PRC) censorship for 14 years, we recognize China (PRC) as a country enemy of the Internet, controlled by a regime hostile to various human rights, and in reality resolution 2758 interpretation may have been distorted by PRC.. Therefore ISO-3166-2:TW unilateral modification to delete "Province of China" is not unreasonable for us. The matter will be discussed. However, to insinuate that the normal software usage of an ISO document to translate or find a country/area name means that AirVPN endorses PRC (or PRC alleged wet dream to invade Taiwan) or that AirVPN fails its mission after all the sacrifices brought on to circumvent censorship in mainland China is offensive to say the least, or not in good faith in the worst case. The very fact that we list the server in Taiwan with Taiwan as a country tells a lot, as today Taiwan is recognized as a country only by 12 countries in the world. Kind regards
  20. I'm planning to go to China soon and am wondering how to use AirVPN in China (if possible at all). Thanks for any info given
  21. Hello! Taiwan is the main and biggest province of the Republic of China (ROC), not to be confused with People's Republic of China (PRC) aka mainland China. Taiwan is also the informal name of the Republic of China. Get informed here first: https://www.taiwan.gov.tw/ Although the Republic of China is officially recognized only by a few countries and not by the UN (due to the veto of the PRC) we list and we will list Republic of China as an independent country, as it is in practice, in real life of citizens and in spite of the imperialist goals of the PRC. Probably you should send your protests to ISO, not to us: please read the next message for more details and check what we have done so far to recognize the Republic of China as an autonomous country and affirm that there is NOT only one China. Anyway ISO compliance break is on the table. Currently, the decision is that the next Eddie Desktop version will print "Taiwan, Republic of China". Eddie Android edition doesn't need modifications. Kind regards
  22. We have kept the OP message to show the pervasiveness of the PRC's propaganda lackeys. We consider Taiwan (Republic of China) to be independent and autonomous from the PRC (People's Republic of China), as it is in fact. ipleak uses MaxMind and IANA databases to display results, and we are pleased that these are aligned with an anti-imperialist and democratic vision that is clearly unpalatable to the dictatorial regime of the PRC, which sees it as an obstacle to its expansionist ambitions.
  23. I am guessing that China has blocked all AirVPN IPs. If you connect to any AirVPN server and try to access any China websites (such as baidu.com), you get connection timeouts. Can this be fixed?
  24. Hello, I use ArchLinux, and I try to build and install the eddie-ui-git 2.24.5 package from the AUR. I use the aurutils tools for the build process, and the build process is executed in a clean chroot (see logs below). When I try to lauch the built and installed package, I have the error message : "The file /usr/lib/mscorlib.dll is an invalid CIL image". I looked at the following thread, and it seems to be a mono dependency issue ? But I think I am using the latest version of each dependency. Thank you in advance for your support. The build logs : :: Synchronizing package databases... core downloading... extra downloading... multilib downloading... aur downloading... :: Starting full system upgrade... there is nothing to do ==> Making package: eddie-ui-git 2.24.5-1 (Fri Dec 13 14:24:16 2024) ==> Retrieving sources... -> Updating Eddie git repo... ==> Validating source files with sha1sums... Eddie ... Skipped ==> Making package: eddie-ui-git 2.24.5-1 (Fri Dec 13 14:24:19 2024) ==> Checking runtime dependencies... ==> Installing missing dependencies... resolving dependencies... looking for conflicting packages... warning: dependency cycle detected: warning: harfbuzz will be installed before its freetype2 dependency warning: dependency cycle detected: warning: mesa will be installed before its libglvnd dependency Package (97) New Version Net Change extra/adobe-source-code-pro-fonts 2.042u+1.062i+1.026vf-2 1.86 MiB extra/adwaita-cursors 47.0-1 10.02 MiB extra/adwaita-icon-theme 47.0-1 1.17 MiB extra/adwaita-icon-theme-legacy 46.2-3 2.23 MiB extra/at-spi2-core 2.54.0-2 3.92 MiB extra/avahi 1:0.8+r194+g3f79789-2 1.88 MiB extra/ayatana-ido 0.10.4-1 0.28 MiB extra/cairo 1.18.2-2 1.57 MiB extra/cantarell-fonts 1:0.303.1-2 0.19 MiB extra/dav1d 1.5.0-1 1.74 MiB extra/dconf 0.40.0-3 0.45 MiB extra/default-cursors 3-1 0.00 MiB extra/desktop-file-utils 0.28-1 0.18 MiB extra/duktape 2.7.0-7 0.78 MiB extra/fontconfig 2:2.15.0-2 1.10 MiB extra/freetype2 2.13.3-1 1.62 MiB extra/fribidi 1.0.16-1 0.24 MiB extra/gdk-pixbuf2 2.42.12-2 2.99 MiB extra/giflib 5.2.2-1 0.27 MiB extra/glib-networking 1:2.80.0-3 0.62 MiB extra/graphite 1:1.3.14-4 0.20 MiB extra/gsettings-desktop-schemas 47.1-1 5.34 MiB extra/gsettings-system-schemas 47.1-1 0.01 MiB extra/gtk-update-icon-cache 1:4.16.7-1 0.04 MiB extra/gtk3 1:3.24.43-4 52.14 MiB extra/harfbuzz 10.1.0-1 4.11 MiB extra/hicolor-icon-theme 0.18-1 0.05 MiB extra/iso-codes 4.17.0-1 20.25 MiB extra/jbigkit 2.1-8 0.16 MiB extra/json-glib 1.10.6-1 1.01 MiB extra/lcms2 2.16-1 0.67 MiB extra/libayatana-indicator 0.9.4-1 0.11 MiB extra/libcloudproviders 0.3.6-1 0.48 MiB extra/libcolord 1.4.7-2 1.24 MiB extra/libcups 2:2.4.11-1 0.77 MiB extra/libdaemon 0.14-6 0.06 MiB extra/libdatrie 0.2.13-4 0.48 MiB extra/libdbusmenu-glib 16.04.0.r498-2 0.68 MiB extra/libdbusmenu-gtk3 16.04.0.r498-2 0.23 MiB extra/libdrm 2.4.124-1 1.23 MiB core/libedit 20240517_3.1-1 0.27 MiB extra/libepoxy 1.5.10-3 2.64 MiB extra/libexif 0.6.24-3 2.64 MiB extra/libgdiplus 6.1-2 0.52 MiB extra/libglvnd 1.7.0-1 3.70 MiB extra/libjpeg-turbo 3.0.4-1 2.31 MiB core/libnl 3.11.0-1 2.08 MiB extra/libpciaccess 0.18.1-2 0.06 MiB extra/libpng 1.6.44-1 0.57 MiB extra/libproxy 0.5.9-1 0.10 MiB extra/librsvg 2:2.59.2-1 11.29 MiB extra/libsoup3 3.6.1-1 1.94 MiB extra/libstemmer 2.2.0-2 0.79 MiB extra/libthai 0.1.29-3 1.22 MiB extra/libtiff 4.7.0-1 1.78 MiB extra/libx11 1.8.10-1 9.78 MiB extra/libxau 1.0.11-3 0.02 MiB extra/libxcb 1.17.0-1 3.87 MiB extra/libxcomposite 0.4.6-2 0.02 MiB extra/libxcursor 1.2.3-1 0.07 MiB extra/libxdamage 1.1.6-2 0.02 MiB extra/libxdmcp 1.1.5-1 0.13 MiB extra/libxext 1.3.6-1 0.30 MiB extra/libxfixes 6.0.1-2 0.04 MiB extra/libxft 2.3.8-2 0.13 MiB extra/libxi 1.8.2-1 0.48 MiB extra/libxinerama 1.1.5-2 0.02 MiB extra/libxkbcommon 1.7.0-2 0.79 MiB extra/libxrandr 1.5.4-1 0.07 MiB extra/libxrender 0.9.11-2 0.09 MiB extra/libxshmfence 1.3.2-2 0.02 MiB extra/libxtst 1.2.5-1 0.11 MiB extra/libxxf86vm 1.1.5-2 0.03 MiB extra/llvm-libs 18.1.8-4 128.31 MiB extra/lm_sensors 1:3.6.0.r41.g31d1f125-3 0.46 MiB core/lzo 2.10-5 0.38 MiB extra/mesa 1:24.3.1-3 96.81 MiB core/mpdecimal 4.0.0-2 0.32 MiB core/nspr 4.36-1 0.71 MiB core/nss 3.107-1 5.10 MiB extra/pango 1:1.54.0-1 2.29 MiB extra/pixman 0.44.2-1 0.70 MiB extra/pkcs11-helper 1.30.0-1 0.31 MiB core/python 3.12.7-1 70.07 MiB extra/shared-mime-info 2.4-1 4.55 MiB extra/spirv-tools 2024.4.rc1-1 6.67 MiB extra/tinysparql 3.8.1-1 3.80 MiB extra/wayland 1.23.1-1 0.80 MiB extra/xcb-proto 1.17.0-2 1.02 MiB extra/xkeyboard-config 2.43-1 6.55 MiB extra/xorg-xprop 1.2.8-1 0.05 MiB extra/xorgproto 2024.1-2 1.46 MiB extra/libayatana-appindicator 0.5.93-1 0.32 MiB extra/libnotify 0.8.3-1 0.14 MiB extra/mono 6.12.0.206-1 252.29 MiB extra/openvpn 2.6.12-1 1.69 MiB extra/polkit 125-1 1.88 MiB Total Installed Size: 756.95 MiB :: Proceed with installation? [Y/n] checking keyring... checking package integrity... loading package files... checking for file conflicts... :: Processing package changes... installing libpng... installing graphite... Optional dependencies for graphite graphite-docs: Documentation installing harfbuzz... Optional dependencies for harfbuzz harfbuzz-utils: utilities installing freetype2... installing fontconfig... Creating fontconfig configuration... Rebuilding fontconfig cache... installing xcb-proto... installing xorgproto... installing libxdmcp... installing libxau... installing libxcb... installing libx11... installing libxext... installing libxrender... installing lzo... installing pixman... installing cairo... installing libexif... installing libjpeg-turbo... Optional dependencies for libjpeg-turbo java-runtime>11: for TurboJPEG Java wrapper installing jbigkit... installing libtiff... Optional dependencies for libtiff freeglut: for using tiffgt installing fribidi... installing libdatrie... installing libthai... installing libxft... installing pango... installing giflib... installing libgdiplus... installing mpdecimal... installing python... Optional dependencies for python python-setuptools: for building Python packages using tooling that is usually bundled with Python python-pip: for installing Python packages using tooling that is usually bundled with Python python-pipx: for installing Python software not packaged on Arch Linux sqlite: for a default database integration [installed] xz: for lzma [installed] tk: for tkinter installing mono... Mono Certificate Store Sync - version 6.12.0.0 Populate Mono certificate store from a concatenated list of certificates. Copyright 2002, 2003 Motus Technologies. Copyright 2004-2008 Novell. BSD licensed. Importing into legacy system store: I already trust 0, your new list has 149 Certificate added: CN=ACCVRAIZ1, OU=PKIACCV, O=ACCV, C=ES Certificate added: C=ES, O=FNMT-RCM, OU=AC RAIZ FNMT-RCM Certificate added: C=ES, O=FNMT-RCM, OU=Ceres, OID.2.5.4.97=VATES-Q2826004J, CN=AC RAIZ FNMT-RCM SERVIDORES SEGUROS Certificate added: SERIALNUMBER=G63287510, C=ES, O=ANF Autoridad de Certificacion, OU=ANF CA Raiz, CN=ANF Secure Server Root CA Certificate added: C=IT, L=Milan, O=Actalis S.p.A./03358520967, CN=Actalis Authentication Root CA Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Commercial Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Networking Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Premium Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Premium ECC Certificate added: C=US, O=Amazon, CN=Amazon Root CA 1 Certificate added: C=US, O=Amazon, CN=Amazon Root CA 2 Certificate added: C=US, O=Amazon, CN=Amazon Root CA 3 Certificate added: C=US, O=Amazon, CN=Amazon Root CA 4 Certificate added: CN=Atos TrustedRoot 2011, O=Atos, C=DE Certificate added: CN=Atos TrustedRoot Root CA ECC TLS 2021, O=Atos, C=DE Certificate added: CN=Atos TrustedRoot Root CA RSA TLS 2021, O=Atos, C=DE Certificate added: C=ES, CN=Autoridad de Certificacion Firmaprofesional CIF A62634068 Certificate added: C=CN, O=BEIJING CERTIFICATE AUTHORITY, CN=BJCA Global Root CA1 Certificate added: C=CN, O=BEIJING CERTIFICATE AUTHORITY, CN=BJCA Global Root CA2 Certificate added: C=IE, O=Baltimore, OU=CyberTrust, CN=Baltimore CyberTrust Root Certificate added: C=NO, O=Buypass AS-983163327, CN=Buypass Class 2 Root CA Certificate added: C=NO, O=Buypass AS-983163327, CN=Buypass Class 3 Root CA Certificate added: C=SK, L=Bratislava, O=Disig a.s., CN=CA Disig Root R2 Certificate added: C=CN, O=China Financial Certification Authority, CN=CFCA EV ROOT Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO Certification Authority Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO ECC Certification Authority Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority Certificate added: C=US, O=Certainly, CN=Certainly Root E1 Certificate added: C=US, O=Certainly, CN=Certainly Root R1 Certificate added: C=FR, O=Dhimyotis, CN=Certigna Certificate added: C=FR, O=Dhimyotis, OU=0002 48146308100036, CN=Certigna Root CA Certificate added: C=PL, O=Asseco Data Systems S.A., OU=Certum Certification Authority, CN=Certum EC-384 CA Certificate added: C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA Certificate added: C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA 2 Certificate added: C=PL, O=Asseco Data Systems S.A., OU=Certum Certification Authority, CN=Certum Trusted Root CA Certificate added: C=US, O=CommScope, CN=CommScope Public Trust ECC Root-01 Certificate added: C=US, O=CommScope, CN=CommScope Public Trust ECC Root-02 Certificate added: C=US, O=CommScope, CN=CommScope Public Trust RSA Root-01 Certificate added: C=US, O=CommScope, CN=CommScope Public Trust RSA Root-02 Certificate added: C=GB, S=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=AAA Certificate Services Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST BR Root CA 1 2020 Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST EV Root CA 1 2020 Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST Root Class 3 CA 2 2009 Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST Root Class 3 CA 2 EV 2009 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root CA Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root G2 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root G3 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root CA Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G2 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G3 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert High Assurance EV Root CA Certificate added: C=US, O="DigiCert, Inc.", CN=DigiCert TLS ECC P384 Root G5 Certificate added: C=US, O="DigiCert, Inc.", CN=DigiCert TLS RSA4096 Root G5 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Trusted Root G4 Certificate added: O=Entrust.net, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), OU=(c) 1999 Entrust.net Limited, CN=Entrust.net Certification Authority (2048) Certificate added: C=US, O="Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, OU="(c) 2006 Entrust, Inc.", CN=Entrust Root Certification Authority Certificate added: C=US, O="Entrust, Inc.", OU=See www.entrust.net/legal-terms, OU="(c) 2012 Entrust, Inc. - for authorized use only", CN=Entrust Root Certification Authority - EC1 Certificate added: C=US, O="Entrust, Inc.", OU=See www.entrust.net/legal-terms, OU="(c) 2009 Entrust, Inc. - for authorized use only", CN=Entrust Root Certification Authority - G2 Certificate added: C=ES, O=Firmaprofesional SA, OID.2.5.4.97=VATES-A62634068, CN=FIRMAPROFESIONAL CA ROOT-A WEB Certificate added: C=CN, O="GUANG DONG CERTIFICATE AUTHORITY CO.,LTD.", CN=GDCA TrustAUTH R5 ROOT Certificate added: C=AT, O=e-commerce monitoring GmbH, CN=GLOBALTRUST 2020 Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R1 Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R2 Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R3 Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R4 Certificate added: OU=GlobalSign ECC Root CA - R4, O=GlobalSign, CN=GlobalSign Certificate added: OU=GlobalSign ECC Root CA - R5, O=GlobalSign, CN=GlobalSign Certificate added: C=BE, O=GlobalSign nv-sa, OU=Root CA, CN=GlobalSign Root CA Certificate added: OU=GlobalSign Root CA - R3, O=GlobalSign, CN=GlobalSign Certificate added: OU=GlobalSign Root CA - R6, O=GlobalSign, CN=GlobalSign Certificate added: C=BE, O=GlobalSign nv-sa, CN=GlobalSign Root E46 Certificate added: C=BE, O=GlobalSign nv-sa, CN=GlobalSign Root R46 Certificate added: C=US, O="The Go Daddy Group, Inc.", OU=Go Daddy Class 2 Certification Authority Certificate added: C=US, S=Arizona, L=Scottsdale, O="GoDaddy.com, Inc.", CN=Go Daddy Root Certificate Authority - G2 Certificate added: C=GR, O=Hellenic Academic and Research Institutions CA, CN=HARICA TLS ECC Root CA 2021 Certificate added: C=GR, O=Hellenic Academic and Research Institutions CA, CN=HARICA TLS RSA Root CA 2021 Certificate added: C=GR, L=Athens, O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic Academic and Research Institutions ECC RootCA 2015 Certificate added: C=GR, L=Athens, O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic Academic and Research Institutions RootCA 2015 Certificate added: C=TW, O="Chunghwa Telecom Co., Ltd.", CN=HiPKI Root CA - G1 Certificate added: C=HK, S=Hong Kong, L=Hong Kong, O=Hongkong Post, CN=Hongkong Post Root CA 3 Certificate added: C=US, O=Internet Security Research Group, CN=ISRG Root X1 Certificate added: C=US, O=Internet Security Research Group, CN=ISRG Root X2 Certificate added: C=US, O=IdenTrust, CN=IdenTrust Commercial Root CA 1 Certificate added: C=US, O=IdenTrust, CN=IdenTrust Public Sector Root CA 1 Certificate added: C=ES, O=IZENPE S.A., CN=Izenpe.com Certificate added: C=HU, L=Budapest, O=Microsec Ltd., CN=Microsec e-Szigno Root CA 2009, E=info@e-szigno.hu Certificate added: C=US, O=Microsoft Corporation, CN=Microsoft ECC Root Certificate Authority 2017 Certificate added: C=US, O=Microsoft Corporation, CN=Microsoft RSA Root Certificate Authority 2017 Certificate added: C=KR, O=NAVER BUSINESS PLATFORM Corp., CN=NAVER Global Root Certification Authority Certificate added: C=HU, L=Budapest, O=NetLock Kft., OU=Tanúsítványkiadók (Certification Services), CN=NetLock Arany (Class Gold) Főtanúsítvány Certificate added: C=CH, O=WISeKey, OU=OISTE Foundation Endorsed, CN=OISTE WISeKey Global Root GB CA Certificate added: C=CH, O=WISeKey, OU=OISTE Foundation Endorsed, CN=OISTE WISeKey Global Root GC CA Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 1 G3 Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2 Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2 G3 Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 3 Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 3 G3 Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com EV Root Certification Authority ECC Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com EV Root Certification Authority RSA R2 Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com Root Certification Authority ECC Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com Root Certification Authority RSA Certificate added: C=US, O=SSL Corporation, CN=SSL.com TLS ECC Root CA 2022 Certificate added: C=US, O=SSL Corporation, CN=SSL.com TLS RSA Root CA 2022 Certificate added: C=PL, O=Krajowa Izba Rozliczeniowa S.A., CN=SZAFIR ROOT CA2 Certificate added: C=GB, O=Sectigo Limited, CN=Sectigo Public Server Authentication Root E46 Certificate added: C=GB, O=Sectigo Limited, CN=Sectigo Public Server Authentication Root R46 Certificate added: C=JP, O="Cybertrust Japan Co., Ltd.", CN=SecureSign Root CA12 Certificate added: C=JP, O="Cybertrust Japan Co., Ltd.", CN=SecureSign Root CA14 Certificate added: C=JP, O="Cybertrust Japan Co., Ltd.", CN=SecureSign Root CA15 Certificate added: C=US, O=SecureTrust Corporation, CN=SecureTrust CA Certificate added: C=US, O=SecureTrust Corporation, CN=Secure Global CA Certificate added: C=JP, O="SECOM Trust Systems CO.,LTD.", CN=Security Communication ECC RootCA1 Certificate added: C=JP, O="SECOM Trust Systems CO.,LTD.", OU=Security Communication RootCA2 Certificate added: C=US, O="Starfield Technologies, Inc.", OU=Starfield Class 2 Certification Authority Certificate added: C=US, S=Arizona, L=Scottsdale, O="Starfield Technologies, Inc.", CN=Starfield Root Certificate Authority - G2 Certificate added: C=US, S=Arizona, L=Scottsdale, O="Starfield Technologies, Inc.", CN=Starfield Services Root Certificate Authority - G2 Certificate added: C=CH, O=SwissSign AG, CN=SwissSign Gold CA - G2 Certificate added: C=CH, O=SwissSign AG, CN=SwissSign Silver CA - G2 Certificate added: C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 2 Certificate added: C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 3 Certificate added: C=TR, L=Gebze - Kocaeli, O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK, OU=Kamu Sertifikasyon Merkezi - Kamu SM, CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1 Certificate added: C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA CYBER Root CA Certificate added: C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA Global Root CA Certificate added: C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA Root Certification Authority Certificate added: C=DE, O=Deutsche Telekom Security GmbH, CN=Telekom Security TLS ECC Root 2020 Certificate added: C=DE, O=Deutsche Telekom Security GmbH, CN=Telekom Security TLS RSA Root 2023 Certificate added: O=TeliaSonera, CN=TeliaSonera Root CA v1 Certificate added: C=FI, O=Telia Finland Oyj, CN=Telia Root CA v2 Certificate added: C=CN, O="TrustAsia Technologies, Inc.", CN=TrustAsia Global Root CA G3 Certificate added: C=CN, O="TrustAsia Technologies, Inc.", CN=TrustAsia Global Root CA G4 Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global Certification Authority Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global ECC P256 Certification Authority Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global ECC P384 Certification Authority Certificate added: C=TN, O=Agence Nationale de Certification Electronique, CN=TunTrust Root CA Certificate added: C=CN, O=UniTrust, CN=UCA Extended Validation Root Certificate added: C=CN, O=UniTrust, CN=UCA Global G2 Root Certificate added: C=US, S=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust ECC Certification Authority Certificate added: C=US, S=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority Certificate added: C=US, OU=www.xrampsecurity.com, O=XRamp Security Services Inc, CN=XRamp Global Certification Authority Certificate added: C=RO, O=certSIGN, OU=certSIGN ROOT CA Certificate added: C=RO, O=CERTSIGN SA, OU=certSIGN ROOT CA G2 Certificate added: C=HU, L=Budapest, O=Microsec Ltd., OID.2.5.4.97=VATHU-23584497, CN=e-Szigno Root CA 2017 Certificate added: C=TW, O="Chunghwa Telecom Co., Ltd.", OU=ePKI Root Certification Authority Certificate added: C=US, OU=emSign PKI, O=eMudhra Inc, CN=emSign ECC Root CA - C3 Certificate added: C=IN, OU=emSign PKI, O=eMudhra Technologies Limited, CN=emSign ECC Root CA - G3 Certificate added: C=US, OU=emSign PKI, O=eMudhra Inc, CN=emSign Root CA - C1 Certificate added: C=IN, OU=emSign PKI, O=eMudhra Technologies Limited, CN=emSign Root CA - G1 Certificate added: C=CN, O="iTrusChina Co.,Ltd.", CN=vTrus ECC Root CA Certificate added: C=CN, O="iTrusChina Co.,Ltd.", CN=vTrus Root CA 149 new root certificates were added to your trust store. Import process completed. Importing into BTLS system store: I already trust 0, your new list has 149 Certificate added: CN=ACCVRAIZ1, OU=PKIACCV, O=ACCV, C=ES Certificate added: C=ES, O=FNMT-RCM, OU=AC RAIZ FNMT-RCM Certificate added: C=ES, O=FNMT-RCM, OU=Ceres, OID.2.5.4.97=VATES-Q2826004J, CN=AC RAIZ FNMT-RCM SERVIDORES SEGUROS Certificate added: SERIALNUMBER=G63287510, C=ES, O=ANF Autoridad de Certificacion, OU=ANF CA Raiz, CN=ANF Secure Server Root CA Certificate added: C=IT, L=Milan, O=Actalis S.p.A./03358520967, CN=Actalis Authentication Root CA Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Commercial Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Networking Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Premium Certificate added: C=US, O=AffirmTrust, CN=AffirmTrust Premium ECC Certificate added: C=US, O=Amazon, CN=Amazon Root CA 1 Certificate added: C=US, O=Amazon, CN=Amazon Root CA 2 Certificate added: C=US, O=Amazon, CN=Amazon Root CA 3 Certificate added: C=US, O=Amazon, CN=Amazon Root CA 4 Certificate added: CN=Atos TrustedRoot 2011, O=Atos, C=DE Certificate added: CN=Atos TrustedRoot Root CA ECC TLS 2021, O=Atos, C=DE Certificate added: CN=Atos TrustedRoot Root CA RSA TLS 2021, O=Atos, C=DE Certificate added: C=ES, CN=Autoridad de Certificacion Firmaprofesional CIF A62634068 Certificate added: C=CN, O=BEIJING CERTIFICATE AUTHORITY, CN=BJCA Global Root CA1 Certificate added: C=CN, O=BEIJING CERTIFICATE AUTHORITY, CN=BJCA Global Root CA2 Certificate added: C=IE, O=Baltimore, OU=CyberTrust, CN=Baltimore CyberTrust Root Certificate added: C=NO, O=Buypass AS-983163327, CN=Buypass Class 2 Root CA Certificate added: C=NO, O=Buypass AS-983163327, CN=Buypass Class 3 Root CA Certificate added: C=SK, L=Bratislava, O=Disig a.s., CN=CA Disig Root R2 Certificate added: C=CN, O=China Financial Certification Authority, CN=CFCA EV ROOT Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO Certification Authority Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO ECC Certification Authority Certificate added: C=GB, S=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority Certificate added: C=US, O=Certainly, CN=Certainly Root E1 Certificate added: C=US, O=Certainly, CN=Certainly Root R1 Certificate added: C=FR, O=Dhimyotis, CN=Certigna Certificate added: C=FR, O=Dhimyotis, OU=0002 48146308100036, CN=Certigna Root CA Certificate added: C=PL, O=Asseco Data Systems S.A., OU=Certum Certification Authority, CN=Certum EC-384 CA Certificate added: C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA Certificate added: C=PL, O=Unizeto Technologies S.A., OU=Certum Certification Authority, CN=Certum Trusted Network CA 2 Certificate added: C=PL, O=Asseco Data Systems S.A., OU=Certum Certification Authority, CN=Certum Trusted Root CA Certificate added: C=US, O=CommScope, CN=CommScope Public Trust ECC Root-01 Certificate added: C=US, O=CommScope, CN=CommScope Public Trust ECC Root-02 Certificate added: C=US, O=CommScope, CN=CommScope Public Trust RSA Root-01 Certificate added: C=US, O=CommScope, CN=CommScope Public Trust RSA Root-02 Certificate added: C=GB, S=Greater Manchester, L=Salford, O=Comodo CA Limited, CN=AAA Certificate Services Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST BR Root CA 1 2020 Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST EV Root CA 1 2020 Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST Root Class 3 CA 2 2009 Certificate added: C=DE, O=D-Trust GmbH, CN=D-TRUST Root Class 3 CA 2 EV 2009 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root CA Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root G2 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Assured ID Root G3 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root CA Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G2 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Global Root G3 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert High Assurance EV Root CA Certificate added: C=US, O="DigiCert, Inc.", CN=DigiCert TLS ECC P384 Root G5 Certificate added: C=US, O="DigiCert, Inc.", CN=DigiCert TLS RSA4096 Root G5 Certificate added: C=US, O=DigiCert Inc, OU=www.digicert.com, CN=DigiCert Trusted Root G4 Certificate added: O=Entrust.net, OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.), OU=(c) 1999 Entrust.net Limited, CN=Entrust.net Certification Authority (2048) Certificate added: C=US, O="Entrust, Inc.", OU=www.entrust.net/CPS is incorporated by reference, OU="(c) 2006 Entrust, Inc.", CN=Entrust Root Certification Authority Certificate added: C=US, O="Entrust, Inc.", OU=See www.entrust.net/legal-terms, OU="(c) 2012 Entrust, Inc. - for authorized use only", CN=Entrust Root Certification Authority - EC1 Certificate added: C=US, O="Entrust, Inc.", OU=See www.entrust.net/legal-terms, OU="(c) 2009 Entrust, Inc. - for authorized use only", CN=Entrust Root Certification Authority - G2 Certificate added: C=ES, O=Firmaprofesional SA, OID.2.5.4.97=VATES-A62634068, CN=FIRMAPROFESIONAL CA ROOT-A WEB Certificate added: C=CN, O="GUANG DONG CERTIFICATE AUTHORITY CO.,LTD.", CN=GDCA TrustAUTH R5 ROOT Certificate added: C=AT, O=e-commerce monitoring GmbH, CN=GLOBALTRUST 2020 Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R1 Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R2 Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R3 Certificate added: C=US, O=Google Trust Services LLC, CN=GTS Root R4 Certificate added: OU=GlobalSign ECC Root CA - R4, O=GlobalSign, CN=GlobalSign Certificate added: OU=GlobalSign ECC Root CA - R5, O=GlobalSign, CN=GlobalSign Certificate added: C=BE, O=GlobalSign nv-sa, OU=Root CA, CN=GlobalSign Root CA Certificate added: OU=GlobalSign Root CA - R3, O=GlobalSign, CN=GlobalSign Certificate added: OU=GlobalSign Root CA - R6, O=GlobalSign, CN=GlobalSign Certificate added: C=BE, O=GlobalSign nv-sa, CN=GlobalSign Root E46 Certificate added: C=BE, O=GlobalSign nv-sa, CN=GlobalSign Root R46 Certificate added: C=US, O="The Go Daddy Group, Inc.", OU=Go Daddy Class 2 Certification Authority Certificate added: C=US, S=Arizona, L=Scottsdale, O="GoDaddy.com, Inc.", CN=Go Daddy Root Certificate Authority - G2 Certificate added: C=GR, O=Hellenic Academic and Research Institutions CA, CN=HARICA TLS ECC Root CA 2021 Certificate added: C=GR, O=Hellenic Academic and Research Institutions CA, CN=HARICA TLS RSA Root CA 2021 Certificate added: C=GR, L=Athens, O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic Academic and Research Institutions ECC RootCA 2015 Certificate added: C=GR, L=Athens, O=Hellenic Academic and Research Institutions Cert. Authority, CN=Hellenic Academic and Research Institutions RootCA 2015 Certificate added: C=TW, O="Chunghwa Telecom Co., Ltd.", CN=HiPKI Root CA - G1 Certificate added: C=HK, S=Hong Kong, L=Hong Kong, O=Hongkong Post, CN=Hongkong Post Root CA 3 Certificate added: C=US, O=Internet Security Research Group, CN=ISRG Root X1 Certificate added: C=US, O=Internet Security Research Group, CN=ISRG Root X2 Certificate added: C=US, O=IdenTrust, CN=IdenTrust Commercial Root CA 1 Certificate added: C=US, O=IdenTrust, CN=IdenTrust Public Sector Root CA 1 Certificate added: C=ES, O=IZENPE S.A., CN=Izenpe.com Certificate added: C=HU, L=Budapest, O=Microsec Ltd., CN=Microsec e-Szigno Root CA 2009, E=info@e-szigno.hu Certificate added: C=US, O=Microsoft Corporation, CN=Microsoft ECC Root Certificate Authority 2017 Certificate added: C=US, O=Microsoft Corporation, CN=Microsoft RSA Root Certificate Authority 2017 Certificate added: C=KR, O=NAVER BUSINESS PLATFORM Corp., CN=NAVER Global Root Certification Authority Certificate added: C=HU, L=Budapest, O=NetLock Kft., OU=Tanúsítványkiadók (Certification Services), CN=NetLock Arany (Class Gold) Főtanúsítvány Certificate added: C=CH, O=WISeKey, OU=OISTE Foundation Endorsed, CN=OISTE WISeKey Global Root GB CA Certificate added: C=CH, O=WISeKey, OU=OISTE Foundation Endorsed, CN=OISTE WISeKey Global Root GC CA Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 1 G3 Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2 Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 2 G3 Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 3 Certificate added: C=BM, O=QuoVadis Limited, CN=QuoVadis Root CA 3 G3 Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com EV Root Certification Authority ECC Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com EV Root Certification Authority RSA R2 Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com Root Certification Authority ECC Certificate added: C=US, S=Texas, L=Houston, O=SSL Corporation, CN=SSL.com Root Certification Authority RSA Certificate added: C=US, O=SSL Corporation, CN=SSL.com TLS ECC Root CA 2022 Certificate added: C=US, O=SSL Corporation, CN=SSL.com TLS RSA Root CA 2022 Certificate added: C=PL, O=Krajowa Izba Rozliczeniowa S.A., CN=SZAFIR ROOT CA2 Certificate added: C=GB, O=Sectigo Limited, CN=Sectigo Public Server Authentication Root E46 Certificate added: C=GB, O=Sectigo Limited, CN=Sectigo Public Server Authentication Root R46 Certificate added: C=JP, O="Cybertrust Japan Co., Ltd.", CN=SecureSign Root CA12 Certificate added: C=JP, O="Cybertrust Japan Co., Ltd.", CN=SecureSign Root CA14 Certificate added: C=JP, O="Cybertrust Japan Co., Ltd.", CN=SecureSign Root CA15 Certificate added: C=US, O=SecureTrust Corporation, CN=SecureTrust CA Certificate added: C=US, O=SecureTrust Corporation, CN=Secure Global CA Certificate added: C=JP, O="SECOM Trust Systems CO.,LTD.", CN=Security Communication ECC RootCA1 Certificate added: C=JP, O="SECOM Trust Systems CO.,LTD.", OU=Security Communication RootCA2 Certificate added: C=US, O="Starfield Technologies, Inc.", OU=Starfield Class 2 Certification Authority Certificate added: C=US, S=Arizona, L=Scottsdale, O="Starfield Technologies, Inc.", CN=Starfield Root Certificate Authority - G2 Certificate added: C=US, S=Arizona, L=Scottsdale, O="Starfield Technologies, Inc.", CN=Starfield Services Root Certificate Authority - G2 Certificate added: C=CH, O=SwissSign AG, CN=SwissSign Gold CA - G2 Certificate added: C=CH, O=SwissSign AG, CN=SwissSign Silver CA - G2 Certificate added: C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 2 Certificate added: C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 3 Certificate added: C=TR, L=Gebze - Kocaeli, O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK, OU=Kamu Sertifikasyon Merkezi - Kamu SM, CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1 Certificate added: C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA CYBER Root CA Certificate added: C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA Global Root CA Certificate added: C=TW, O=TAIWAN-CA, OU=Root CA, CN=TWCA Root Certification Authority Certificate added: C=DE, O=Deutsche Telekom Security GmbH, CN=Telekom Security TLS ECC Root 2020 Certificate added: C=DE, O=Deutsche Telekom Security GmbH, CN=Telekom Security TLS RSA Root 2023 Certificate added: O=TeliaSonera, CN=TeliaSonera Root CA v1 Certificate added: C=FI, O=Telia Finland Oyj, CN=Telia Root CA v2 Certificate added: C=CN, O="TrustAsia Technologies, Inc.", CN=TrustAsia Global Root CA G3 Certificate added: C=CN, O="TrustAsia Technologies, Inc.", CN=TrustAsia Global Root CA G4 Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global Certification Authority Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global ECC P256 Certification Authority Certificate added: C=US, S=Illinois, L=Chicago, O="Trustwave Holdings, Inc.", CN=Trustwave Global ECC P384 Certification Authority Certificate added: C=TN, O=Agence Nationale de Certification Electronique, CN=TunTrust Root CA Certificate added: C=CN, O=UniTrust, CN=UCA Extended Validation Root Certificate added: C=CN, O=UniTrust, CN=UCA Global G2 Root Certificate added: C=US, S=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust ECC Certification Authority Certificate added: C=US, S=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority Certificate added: C=US, OU=www.xrampsecurity.com, O=XRamp Security Services Inc, CN=XRamp Global Certification Authority Certificate added: C=RO, O=certSIGN, OU=certSIGN ROOT CA Certificate added: C=RO, O=CERTSIGN SA, OU=certSIGN ROOT CA G2 Certificate added: C=HU, L=Budapest, O=Microsec Ltd., OID.2.5.4.97=VATHU-23584497, CN=e-Szigno Root CA 2017 Certificate added: C=TW, O="Chunghwa Telecom Co., Ltd.", OU=ePKI Root Certification Authority Certificate added: C=US, OU=emSign PKI, O=eMudhra Inc, CN=emSign ECC Root CA - C3 Certificate added: C=IN, OU=emSign PKI, O=eMudhra Technologies Limited, CN=emSign ECC Root CA - G3 Certificate added: C=US, OU=emSign PKI, O=eMudhra Inc, CN=emSign Root CA - C1 Certificate added: C=IN, OU=emSign PKI, O=eMudhra Technologies Limited, CN=emSign Root CA - G1 Certificate added: C=CN, O="iTrusChina Co.,Ltd.", CN=vTrus ECC Root CA Certificate added: C=CN, O="iTrusChina Co.,Ltd.", CN=vTrus Root CA 149 new root certificates were added to your trust store. Import process completed. installing libnl... installing nspr... installing nss... installing pkcs11-helper... installing openvpn... Optional dependencies for openvpn easy-rsa: easy CA and certificate handling pam: authenticate via PAM [installed] installing duktape... installing polkit... installing shared-mime-info... installing gdk-pixbuf2... Optional dependencies for gdk-pixbuf2 libwmf: Load .wmf and .apm libopenraw: Load .dng, .cr2, .crw, .nef, .orf, .pef, .arw, .erf, .mrw, and .raf libavif: Load .avif libheif: Load .heif, .heic, and .avif libjxl: Load .jxl librsvg: Load .svg, .svgz, and .svg.gz [pending] webp-pixbuf-loader: Load .webp installing libnotify... installing hicolor-icon-theme... installing adwaita-icon-theme-legacy... installing adwaita-cursors... installing adwaita-icon-theme... installing dconf... installing gsettings-system-schemas... installing adobe-source-code-pro-fonts... installing cantarell-fonts... installing gsettings-desktop-schemas... installing libxfixes... installing libxi... installing libxtst... installing xorg-xprop... installing at-spi2-core... installing desktop-file-utils... installing iso-codes... installing libcloudproviders... installing lcms2... installing libcolord... installing libdaemon... installing avahi... Optional dependencies for avahi gtk3: avahi-discover, avahi-discover-standalone, bshell, bssh, bvnc [pending] libevent: libevent bindings [installed] nss-mdns: NSS support for mDNS python-dbus: avahi-bookmarks, avahi-discover python-gobject: avahi-bookmarks, avahi-discover python-twisted: avahi-bookmarks qt5-base: qt5 bindings installing libcups... installing libpciaccess... installing libdrm... Optional dependencies for libdrm cairo: needed for modetest tool [installed] installing libxshmfence... installing libxxf86vm... installing libedit... installing llvm-libs... installing lm_sensors... Optional dependencies for lm_sensors rrdtool: for logging with sensord perl: for sensor detection and configuration convert [installed] installing spirv-tools... installing default-cursors... Optional dependencies for default-cursors adwaita-cursors: default cursor theme [installed] installing wayland... installing mesa... Optional dependencies for mesa opengl-man-pages: for the OpenGL API man pages installing libglvnd... installing libepoxy... installing dav1d... Optional dependencies for dav1d dav1d-doc: HTML documentation installing librsvg... installing libxcomposite... installing libxcursor... installing libxdamage... installing libxinerama... installing xkeyboard-config... installing libxkbcommon... Optional dependencies for libxkbcommon libxkbcommon-x11: xkbcli interactive-x11 wayland: xkbcli interactive-wayland [installed] installing libxrandr... installing json-glib... installing libproxy... installing glib-networking... installing libsoup3... Optional dependencies for libsoup3 samba: Windows Domain SSO installing libstemmer... installing tinysparql... installing gtk-update-icon-cache... installing gtk3... Optional dependencies for gtk3 evince: Default print preview command installing ayatana-ido... installing libayatana-indicator... installing libdbusmenu-glib... installing libdbusmenu-gtk3... installing libayatana-appindicator... :: Running post-transaction hooks... ( 1/16) Creating system user accounts... Creating group 'avahi' with GID 972. Creating user 'avahi' (Avahi mDNS/DNS-SD daemon) with UID 972 and GID 972. Creating group 'openvpn' with GID 971. Creating user 'openvpn' (OpenVPN) with UID 971 and GID 971. Creating group 'polkitd' with GID 102. Creating user 'polkitd' (User for polkitd) with UID 102 and GID 102. ( 2/16) Registering binary formats... Skipped: Current root is not booted. ( 3/16) Reloading system manager configuration... Skipped: Current root is not booted. ( 4/16) Reloading user manager configuration... Skipped: Current root is not booted. ( 5/16) Creating temporary files... ( 6/16) Arming ConditionNeedsUpdate... ( 7/16) Updating the MIME type database... ( 8/16) Updating fontconfig configuration... ( 9/16) Reloading system bus configuration... Skipped: Current root is not booted. (10/16) Updating fontconfig cache... (11/16) Probing GDK-Pixbuf loader modules... (12/16) Updating GIO module cache... (13/16) Compiling GSettings XML schema files... (14/16) Probing GTK3 input method modules... (15/16) Updating icon theme caches... (16/16) Updating the desktop file MIME type cache... ==> Checking buildtime dependencies... ==> Installing missing dependencies... resolving dependencies... looking for conflicting packages... Package (17) New Version Net Change extra/cppdap 1.58.0-2 1.55 MiB extra/dotnet-host 8.0.10.sdk110-1 0.44 MiB extra/dotnet-runtime 8.0.10.sdk110-1 66.28 MiB extra/dotnet-targeting-pack 8.0.10.sdk110-1 45.49 MiB extra/jsoncpp 1.9.6-3 0.77 MiB extra/libunwind 1.8.1-3 0.29 MiB extra/libuv 1.49.2-1 0.61 MiB extra/netstandard-targeting-pack 8.0.10.sdk110-1 17.87 MiB extra/perl-error 0.17029-7 0.04 MiB extra/perl-mailtools 2.21-9 0.10 MiB extra/perl-timedate 2.33-7 0.08 MiB extra/rhash 1.4.4-1 0.32 MiB extra/cmake 3.31.2-1 77.90 MiB extra/dotnet-sdk 8.0.10.sdk110-1 299.56 MiB extra/git 2.47.1-1 28.29 MiB extra/mono-msbuild 16.10.1.xamarinxplat.2021.05.26.14.00-5 44.41 MiB extra/patchelf 0.18.0-3 0.24 MiB Total Installed Size: 584.24 MiB :: Proceed with installation? [Y/n] checking keyring... checking package integrity... loading package files... checking for file conflicts... :: Processing package changes... installing perl-error... installing perl-timedate... installing perl-mailtools... installing git... Optional dependencies for git tk: gitk and git gui openssh: ssh transport and crypto perl-libwww: git svn perl-term-readkey: git svn and interactive.singlekey setting perl-io-socket-ssl: git send-email TLS support perl-authen-sasl: git send-email TLS support perl-mediawiki-api: git mediawiki support perl-datetime-format-iso8601: git mediawiki support perl-lwp-protocol-https: git mediawiki https support perl-cgi: gitweb (web interface) support python: git svn & git p4 [installed] subversion: git svn org.freedesktop.secrets: keyring credential helper libsecret: libsecret credential helper [installed] installing cppdap... installing jsoncpp... Optional dependencies for jsoncpp jsoncpp-doc: documentation installing libuv... installing rhash... installing cmake... Optional dependencies for cmake make: for unix Makefile generator [installed] ninja: for ninja generator qt6-base: cmake-gui installing patchelf... installing dotnet-host... Optional dependencies for dotnet-host bash-completion: Bash completion support installing libunwind... installing dotnet-runtime... Optional dependencies for dotnet-runtime lttng-ust2.12: CoreCLR tracing installing netstandard-targeting-pack... Optional dependencies for netstandard-targeting-pack bash-completion: Bash completion support installing dotnet-targeting-pack... Optional dependencies for dotnet-targeting-pack bash-completion: Bash completion support installing dotnet-sdk... Optional dependencies for dotnet-sdk aspnet-targeting-pack: Build ASP.NET Core applications installing mono-msbuild... :: Running post-transaction hooks... (1/7) Creating system user accounts... Creating group 'git' with GID 970. Creating user 'git' (git daemon user) with UID 970 and GID 970. (2/7) Reloading system manager configuration... Skipped: Current root is not booted. (3/7) Arming ConditionNeedsUpdate... (4/7) Updating the MIME type database... (5/7) Warn about old perl modules (6/7) Updating icon theme caches... (7/7) Updating the desktop file MIME type cache... ==> Retrieving sources... ==> WARNING: Skipping all source file integrity checks. ==> Extracting sources... -> Creating working copy of Eddie git repo... Cloning into 'Eddie'... done. ==> Starting build()... Welcome to .NET 8.0! --------------------- SDK Version: 8.0.110 ---------------- Installed an ASP.NET Core HTTPS development certificate. To trust the certificate, view the instructions: https://aka.ms/dotnet-https-linux ---------------- Write your first app: https://aka.ms/dotnet-hello-world Find out what's new: https://aka.ms/dotnet-whats-new Explore documentation: https://aka.ms/dotnet-docs Report issues and find source on GitHub: https://github.com/dotnet/core Use 'dotnet --help' to see available commands or visit: https://aka.ms/dotnet-cli -------------------------------------------------------------------------------------- An issue was encountered verifying workloads. For more information, run "dotnet workload update". MSBuild version 17.8.5+b5265ef37 for .NET Determining projects to restore... Restored /build/eddie-ui-git/src/Eddie/src/App.CLI.Linux/App.CLI.Linux.net8.csproj (in 3.13 sec). Restored /build/eddie-ui-git/src/Eddie/src/Lib.Platform.Linux/Lib.Platform.Linux.net8.csproj (in 3.13 sec). Restored /build/eddie-ui-git/src/Eddie/src/Lib.Core/Lib.Core.net8.csproj (in 3.13 sec). Lib.Core.net8 -> /build/eddie-ui-git/src/Eddie/src/Lib.Core/bin/Release/net8.0/Lib.Core.dll Lib.Platform.Linux.net8 -> /build/eddie-ui-git/src/Eddie/src/Lib.Platform.Linux/bin/Release/net8.0/Lib.Platform.Linux.dll App.CLI.Linux.net8 -> /build/eddie-ui-git/src/Eddie/src/App.CLI.Linux/bin/Release/net8.0/linux-x64/eddie-cli.dll BasePath: /build/eddie-ui-git/src/Eddie/src/App.CLI.Linux TargetDir: /build/eddie-ui-git/src/Eddie/src/App.CLI.Linux/bin/Release/net8.0/linux-x64/ Arch: x64 Config: Release Building eddie-cli-elevated - Config: Release, Shared: yes Building eddie-cli-elevated - Done Building eddie-cli-elevated-service - Config: Release Building eddie-cli-elevated-service - Done Building libLib.Platform.Linux.Native.so - Config: Release Building libLib.Platform.Linux.Native.so - Done Optimizing assemblies for size. This process might take a while. App.CLI.Linux.net8 -> /build/eddie-ui-git/src/Eddie/src/App.CLI.Linux/bin/Release/net8.0/linux-x64/publish/ Microsoft (R) Build Engine version 16.10.1 for Mono Copyright (C) Microsoft Corporation. All rights reserved. Lib.Core -> /build/eddie-ui-git/src/Eddie/src/Lib.Core/bin/x64/Release/Lib.Core.dll Lib.Forms.Skin -> /build/eddie-ui-git/src/Eddie/src/Lib.Forms.Skin/bin/x64/Release/Lib.Forms.Skin.dll Lib.Forms -> /build/eddie-ui-git/src/Eddie/src/Lib.Forms/bin/x64/Release/Lib.Forms.dll Lib.Platform.Linux -> /build/eddie-ui-git/src/Eddie/src/Lib.Platform.Linux/bin/x64/Release/Lib.Platform.Linux.dll App.Forms.Linux -> /build/eddie-ui-git/src/Eddie/src/App.Forms.Linux/bin/x64/Release/App.Forms.Linux.exe BasePath: /build/eddie-ui-git/src/Eddie/src/App.Forms.Linux TargetDir: src/App.Forms.Linux/bin/x64/Release/ Arch: x64 Config: Release Building eddie-cli-elevated - Config: Release, Shared: yes Building eddie-cli-elevated - Done Building eddie-cli-elevated-service - Config: Release Building eddie-cli-elevated-service - Done Building libLib.Platform.Linux.Native.so - Config: Release Building libLib.Platform.Linux.Native.so - Done Building eddie-tray - Config: Release Building eddie-tray - If compilation errors occur, remember libayatana-appindicator3-dev package is required. Building eddie-tray - Done Download mkbundle target. If break here, check with mkbundle --list-targets and fix build.sh MKBUNDLECROSSTARGET From: /build/.mono/targets/mono-6.8.0-debian-10-x64 Using runtime: /build/.mono/targets/mono-6.8.0-debian-10-x64/bin/mono Assembly: /build/eddie-ui-git/src/Eddie/src/App.Forms.Linux/bin/x64/Release/App.Forms.Linux.exe Config: /build/eddie-ui-git/src/Eddie/src/App.Forms.Linux/bin/x64/Release/App.Forms.Linux.exe.config Assembly: /build/eddie-ui-git/src/Eddie/src/App.Forms.Linux/bin/x64/Release/mscorlib.dll Assembly: /build/eddie-ui-git/src/Eddie/src/App.Forms.Linux/bin/x64/Release/Lib.Forms.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.Drawing.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/Mono.Security.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.Configuration.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.Xml.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.Security.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.Core.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.Numerics.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.Windows.Forms.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.Runtime.Serialization.Formatters.Soap.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/Accessibility.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/Mono.WebBrowser.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/Mono.Posix.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.Data.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.Transactions.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/System.EnterpriseServices.dll Assembly: /build/eddie-ui-git/src/Eddie/src/App.Forms.Linux/bin/x64/Release/Lib.Core.dll Assembly: /build/eddie-ui-git/src/Eddie/src/App.Forms.Linux/bin/x64/Release/Lib.Forms.Skin.dll Assembly: /build/eddie-ui-git/src/Eddie/src/App.Forms.Linux/bin/x64/Release/Lib.Platform.Linux.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/I18N.CJK.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/I18N.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/I18N.MidEast.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/I18N.Other.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/I18N.Rare.dll Assembly: /build/.mono/targets/mono-6.8.0-debian-10-x64/lib/mono/4.5/I18N.West.dll systemconfig: mkbundle.config machineconfig: /build/.mono/targets/mono-6.8.0-debian-10-x64/etc/mono/4.5/machine.config Library: ../../../../../repository/linux_portable/mkbundle/x64/libMonoPosixHelper.so Library: ../../../../../repository/linux_portable/mkbundle/x64/libgdiplus.so.0 Library: /usr/lib/libmono-native.so Generated eddie-ui % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 61556 0 61556 0 0 103k 0 --:--:-- --:--:-- --:--:-- 103k ==> Entering fakeroot environment... ==> Starting package()... -> Installing desktop file... ==> Tidying install... -> Removing libtool files... -> Purging unwanted files... -> Removing static library files... -> Copying source files needed for debug symbols... -> Compressing man and info pages... ==> Checking for packaging issues... ==> WARNING: Package contains reference to $srcdir usr/lib/eddie-ui/eddie-cli usr/lib/eddie-ui/libLib.Platform.Linux.Native.so usr/lib/eddie-ui/eddie-ui usr/lib/eddie-ui/eddie-cli-elevated usr/lib/eddie-ui/eddie-cli-elevated-service ==> Creating package "eddie-ui-git"... -> Generating .PKGINFO file... -> Generating .BUILDINFO file... -> Adding install file... -> Generating .MTREE file... -> Compressing package... ==> Leaving fakeroot environment. ==> Finished making: eddie-ui-git 2.24.5-1 (Fri Dec 13 14:25:25 2024)
  25. I am also in China and I can confirm that OpenVPN (IP Entry 3 & UDP & Port 443) works perfectly in China with great speed (over 200Mbps on some DE servers).BTW could you tell me which ISP you are using?And which server you are connected to?
×
×
  • Create New...