Jump to content
Not connected, Your IP: 18.191.202.72

Search the Community

Showing results for tags 'Help'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 61 results

  1. Hello! I ordered a gift voucher, received payment confirmation, but cannot find the actual gift voucher. I have the invoice. I did post a support ticket, but as this voucher will be an actual gift, the problem is quite urgent! So I am hoping that maybe someone from the community might guide me towards the right direction. Thank you! And I apologize for being impatient.
  2. Hi, Totally new to doing VPN over TOR. I'm just seeing what its like to set up. I'm using an iMac 27" macOS 10.13.3 & Eddie 2.12.4. I have Tor Browser installed and running fine, its connected to TOR. I followed the instructions on this page: https://airvpn.org/tor/ - In Preferences for Eddie Proxy/Tor>Type>Tor I clicked the test and Eddie indicates there is connectivity to Tor. Am I actually running the VPN through TOR as it is? See images. The Test indicates there is connectivity. But how do I know the VPN traffic is running through TOR? ipleak.net doesn't indicate any tor exit node. Any help or suggestion will be appreciated. Cheers.
  3. Hello, i used airvpn before the move to a new house. In this time i got with my old isp the full speed most of the time . But now with a much better connection and a different isp ( 400 cable ). I get only 1-3 MB/s max on every server i tested . And i purchased AirVPN for a year i think. This is just bad. I download most of the time over JDownloader 2 with a premium account.Windows 10 ProLAN connection 1GBUsally 35+ MB/s without Air VPNSSL port wont helpI try every suggestion. Please help me with my slow speeds.
  4. So i downloaded the config files from AirVPN, set it to Linux, tried both UDP and TCP, in the network connection i did import saved VPN configuration and i save that. Then i try to connect to it and nothing. "connection failed because VPN connection timed out" I tried this both in sys-net, AppVM, and in proxyVM based on fedora-23. not sure what i'm doing wrong?
  5. I have been using airvpn for over a year, infact i have two more years paid up till i have to renew. Since getting airvpn i have not had any trouble with copyright notices until today. I have airvpn set to network lock so nothing works unless its running. I got a notice for a tv show being downloaded with my correct ip! airvpn was running with network lock, all websites show the vpn address as mine. nothing is leaking out that i know of so, how is this possible??? Furthermore, how can i make sure it never happens again?
  6. Hello, So I installed AirVpn on my Mac in order to torrent and keep my ratios in tact while I am living at my College Campus. However after installing eddie and connecting, i realized the connection is less than 100kbit/s and wavering to zero every second! However, speed test on AirVPN shows a solid connection: Down: 11.096 Mbit/s Out, 16.619 Mbit/s In (149%), 20MB - Up: 25.655 Mbit/s Out, 23.472 Mbit/s In (91%), 20MB - Date: Sun, 17 Sep 2017 20:35:34 GMT - Buffers: 20MB/20MB - Laps: 3, Time: 64.50 secs Here are the results on my side (very slow, entirely unable to function) I've correctly forwarded the ports, as well as connected to SSL:443 protocol without further success. I'm really not sure what to do, as I'm a completely new to this.
  7. Okay, so basically, I want to host a server for a game, but the game requires port 53640 to be open. I tried to do this, however, it is tooken by another user. On another forum, Somebody said to leave the remote port blank and just fill in the local port. Will this open the port for me or not?
  8. So i've used AirVPN for about a week and the speeds have been really bad, i originally have a 100/100 connection but when connected to any server low or high load i get terrible speeds like 300kb or less. I've set my buffer size to 256 and 512 and both do pretty much nothing. Not trying to shit on air but imo that isn't acceptable speeds at all. I am currently using a netgear r7000 router (I am not very network knowing so try and explain it in the easiest way possible) thanks.
  9. I am new and not sure how to use this. I have paid for the service and have an account set up already. I am trying to set up the open vpn gui but whenever I click the generate button it only opens a notepad document and that is all. Is this correct? What am I supposed to do with this? Any help would be nice, thanks. -Dave
  10. I use whoer to check if my ip is hidden and it says that the server i am connected to (Alhena) is infected with a s_gozi i am worried that my infor is being logged or omething kinda new to vpns and it also says that the ip address is blacklisted
  11. Every time I try to sign into Eddie I get the error "Cannot login. (The request timed out)". I've even tried to reset my Mac by wiping the SSD and reinstalling macOS 10.12.2 (16C68). I've made sure my firewall is disabled and I've updated to the latest Eddie client 2.11.10 and I still get the above error. I have another Mac on the same wifi network running the same version of macOS and eddie and the other Mac always works. I've also verified that my password is correct. Here are my logs. I 2017.01.11 21:33:15 - Eddie client version: 2.11.10 / osx_x64, System: OSX, Name: 10.12.2, Mono/.Net Framework: v4.0.30319 . 2017.01.11 21:33:15 - Reading options from /Users/user/.airvpn/AirVPN.xml. 2017.01.11 21:33:15 - Profile options not found, using defaults.. 2017.01.11 21:33:16 - Data path: /Users/user/.airvpn. 2017.01.11 21:33:16 - Application path: /Applications/Eddie.app/Contents/MacOS. 2017.01.11 21:33:16 - Executable path: /Applications/Eddie.app/Contents/MacOS/Eddie. 2017.01.11 21:33:16 - Command line arguments (0):. 2017.01.11 21:33:16 - Operating System: Unix 16.3.0.0 - Darwin users-MacBook-Pro.local 16.3.0 Darwin Kernel Version 16.3.0: Thu Nov 17 20:23:58 PST 2016; root:xnu-3789.31.2~1/RELEASE_X86_64 x86_64I 2017.01.11 21:33:16 - OpenVPN Driver - ExpectedI 2017.01.11 21:33:16 - OpenVPN - Version: 2.4.0 - OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09 (/Applications/Eddie.app/Contents/MacOS/openvpn)I 2017.01.11 21:33:16 - SSH - Version: OpenSSH_7.3p1, LibreSSL 2.4.1 (/usr/bin/ssh)I 2017.01.11 21:33:16 - SSL - Version: stunnel 5.37 (/Applications/Eddie.app/Contents/MacOS/stunnel)! 2017.01.11 21:33:16 - Ready. 2017.01.11 21:33:16 - Updating systems & servers data .... 2017.01.11 21:33:17 - Systems & servers data update completedI 2017.01.11 21:33:34 - Checking login ...F 2017.01.11 21:34:14 - Cannot login. (The request timed out)I 2017.01.11 21:34:53 - Checking login ...F 2017.01.11 21:35:33 - Cannot login. (The request timed out)I 2017.01.11 21:39:52 - Checking login ...F 2017.01.11 21:40:32 - Cannot login. (The request timed out). 2017.01.11 21:43:30 - Updating systems & servers data .... 2017.01.11 21:44:10 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (The request timed out)I 2017.01.11 21:48:28 - Checking login ...
  12. Hey guys, Im new here as you might guess. Im having difficulties finding a beginner friendly manual on how to get started (Setting up VPN basically) Ive read a few step by step guides but cant seam to get this thing working. Any sources would be more than welcome Im on a macbook pro if that matters. Help!
  13. I've recently purchased AirVPN and set up the client for usage with two windows devices, however I'm having issues with one of my Linux systems. In the first instance, when trying to install the client via the package installer, I received the message: Error: Dependency is not satisfiable: "libmono-system-runtime2.0-cil" ... Since I couldn't use the installer, I downloaded the mobile client instead. Everything seemed to be running smoothly, except when I ran a check on ipleak.net, I found that my UK details were displayed along with the foreign IP from the VPN. My accurate location was also shown on the Google Maps image at the bottom of the screen. This is not the case with either of my windows devices. In the windows instances, the only addresses and locations shown are those coming from the VPN. Also, the ipleaks check reads: "AirVPN Exit Node: No." With both my windows devices, this section reads: "AirVPN Exit Node: Yes." Forgive me if I sound foolish, but I really am confused as to what the issue could be. Any help would be greatly appreciated.
  14. Hello, I run a small media server at home so I can listen to my music on the go. I've decided to try running it though the VPN, but I'm not sure exactly how to do it. These are the settings I currently have, and they don't seem to be working. Any help at all would be appreciated. The Emby server runs on two ports by default. 8096 for HTTP, and 8920 for HTTPS. My settings on Emby show the following. Local http port number: 8096 Local http port number: 8920 public http port number: 8098 public http port number: 8928 remote access http://my.airvpnserver.exitip :8098 local access 192.168.X.X:8096 There is also an option to specify the ip to bind to. If I bind it to the 10.X.X.X from AirVPN, only the local access ip changes. On my AirVPN settings, I have 8098 forwarded to local 8096. And 8928 forwarded to 8920. Neither of them have a green light. My router is set to forward ports 8096 and 8920 to my computers normal address 192.168.X.X Here are pictures in case they help any: https://i.gyazo.com/e64f7e207204a9f1e8e4f16f457f177d.png https://i.gyazo.com/9bc9c53feab3fe4f4324d99b8abc163c.png https://i.gyazo.com/bc494db4a4a9982879505be793c40008.png https://i.gyazo.com/27f6b3f63d3722f46b06df933295bcb6.png https://i.gyazo.com/2f9559e99660781275cd3b52245e86b5.png
  15. Hey, for a couple of weeks now I'm sharing an AirVPN account with a friend of mine (3 devices total, so not exceeding the allowed number). I personally want to use it mostly in conjunction with a torrent client and for web-browsing. However both the down- and upload speed I am getting is incredibly low, often even below 1 kb/sec. For him everything seems to be perfectly fine, and according to an independent and the AirVPN speedtest I should be getting over 1mb/sec download. My settings are the default ones with a few adjustments, connecting to the best out of a couple of servers in close proximity & network lock is on (there are very few disconnects tho, so I don't think its related to that). Now I am at best decent with tech stuff thought I have absolutely no idea of VPNs and networks in general. Read a bit around the forums and went through LZ1's Guide. While I think they are extremely helpful I wasn't able to help myself. Not sure which information you need, I'll just post what I think is relevant. OS: Windows 7 64-bit Connection 16.000 DSL, Telekom (usually around 1,4mb/sec down) Country: Germany Router: Fritzbox FON 7360 (works without error)
  16. Hello ! ​Some have asked me how they can help out. How To Help AirVPN Succeed​ So here's some ways I propose how: ​Help new people. It's very easy to feel intimidated, due to the high level of technical knowledge displayed. Especially by the l33t Staff account. ​But don't just help them. Make them feel welcome. A very complex solution to this, is to say "Welcome" when they post their first posts. How about posting your review of AirVPN; a nice good solid long review, telling others how AirVPN is so good you want to visit Italy, etc. etc. ​Post your "logs" in spoiler tags, when you need help with something. See my signature for how to do so. Some logs are super long, so it helps. Ask & discuss the features of other VPNs & help make us all smarter. Where did you come from? Where are you going? What is love? etc. ​Make a guide/how-to about something you care about. Heck, even if it's just a nice index of useful programs/software, for instance. Post comments on review sites & tell them why they're wrong! Lol no, just use facts instead;) . Be charming & factual, like Zorro! Video reviews are especially great, as the ones which are highest on the youtube lists I'm seeing, are like your kindergarten pics! ANCIENT! ​Go to your Client Area and use your "Referral" code to invite more friends to the service & profit from it yourself too. Can't let Air get lonely! ​Go to threads like this & see if you can contribute with a new language or spread the word about it. Got any Arabic-speaking friends hmm? ​Answer questions that you're able to answer, in all of the sub-forums. With time, you become more knowledgeable . ​Find projects that you think Air should support.This way, your Air sub helps many more projects! Make sure they are in-line with Airs "mission". Help AirVPN test out new versions of their software. ​Be creative and find positive ways to add to the service; I'll be the first to admit Air doesn't give many tips lol. So don't feel bad. ​​ ​​ How To Make Your Forum Posts More Appealing(Mini Styleguide) Why is presentation important? Because this is a technical forum. So we read a lot. It's easier to get help, solve a problem & share knowledge when things are presented well.​ All codes on this forum, usually at least, follow the same formula: there's a "start" tag and an "end" tag. End tags are showed by a slash: /. ​Remember to close things off correctly, or it can ruin your entire post, if you forget either a [ or a ] character. ​Note: When you want to make an index, you currently have to "Reserve" a spot, by posting blank posts to your own guide, so that you can link to these posts after you finish editing them. This way, you can eventually create an index. Very useful if your guide or post is very long.​ ​ Some useful codes: ​Links can be long, ugly, annoying & broken by linebreaks. So make it easy for everyone by making clickable words. Critical for a stylish guide & helpful posts. You can link directly to individual posts by clicking the # in the top right corner of the post you want to copy. Just click and then copy the link. [url=https://airvpn.org/]This can be clicked[/url] ​[url=https://airvpn.org/topic/18339-guide-to-getting-started-links-for-advanced-users/?p=43734]This links to my other guide[/url] ​Result: This can be clicked ​This links to my other guide ​ ​ ​ ​ ​ ​Style headings in your posts, for much-better-looking management of paragraphs. It doesn't go past h3. [h1=This Is The Biggest Heading][/h1] [h2=This Is The Second Biggest Heading][/h2] [h3=This Is The Third Biggest Heading][/h3] ​Result: ​ This Is The Biggest Heading This Is The Second Biggest Heading This Is The Third Biggest Heading​ ​ ​ ​These tags are the most flashy available on the forums and are naturally excellent at bringing attention to the most important things. ​[info]Did you know Eddie likes to read logs?[/info] ​[warning]Warning! If You mention Netflix One more time...[/warning] ​[error]Error! AirVPN can no longer handle "ICANN"s nonsense[/error] ​Result: ​ ​ Did you know Eddie likes to read logs?​ Warning! If You mention Netflix One more time...​ Error! AirVPN can no longer handle "ICANN"s nonsense​ ​​ ​ Spoiler Alert! This is the most holy of the holy tags in existence. The mighty spoiler tag! Used to not spoil your viewers mood both during guides & when you post a 3 page logfile. ​ ​[spoiler]This has been spoiled[/spoiler] Result: ​ ​ This has been spoiled. Omg spoilerception!​​ ​ ​ ​The rightbox is useful for adding information which perhaps isn't critical or which is perhaps especially interesting, info-box style. [rightbox]This box is right. You're not. [/rightbox] ​Result: ​ ​ This box is right. You're not. ​ ​ ​​ ​The hr, horizontal-rule, is a special tag which isn't closed. It's good for breaking things up, as I've been doing. It's also especially boring. [hr] Result: ​ ​ ​​ ​ ​Other Formatting & Posting Tips: ​Use lists like this one. Either bulleted or not. You click the button in the interface, under the "Font" and "Size" buttons. To the left of the smiley.​Right above the place you "Attach Files", you can click on "View Auto Saved Content", in case you need to reload something you lost.​In the top right corner, you can check a box that lets you Follow your own topic. But you can also make a poll.​Under the smiley in the interface, you can click the <> sign. Then in the biggest box, you can write code, so that others can see it while its inactive, like in this guide.​On the same line as the Smiley, in the inteface, there's a button next to "Font" on the left, called "Special BBcode", that you can refer to, for more codes.​If a piece of text is a part of a link, you can unlink it and make it normal text again, by clicking the "unlink" button, to the left of the <> code button, in the interface.​ ​ ​ I'll give a medal or something to the first person who can make the Staff account "lol" publicly. Quantum computing is possible, so this must be too! ​Do you have any other ideas? If so, please feel free to post them :]. ​ ​Questions are always welcome. Don't be afraid of asking! *^__^* ​ ​Thank you!
  17. Hello ! When a website is blocked or things aren't working so well somehow, that sucks. But posting a new topic will not automatically help. So before posting a new thread/topic, I recommend that you try these things first, to help yourself and everyone else out: Things To Try First Try check out the AirVPN Route Checking tool. Put the name of the website, such as www.netflix.com into the search field. Click search. Then refresh the page & look at the HTTP column.Try and change the server that you're using; especially to servers from other countries, rather than just servers from the same country you were first connected to, as sometimes the servers of 1 country are all having issues. Especially if the Route Checking tool shows a red color in the HTTP colum or codes like 403. The HTTP Codes mean different things.Try check out ipleak.net and make sure that the IP & DNS address fields only show 1 address each: those from AirVPN. Otherwise your ISP could be blocking you.For Windows, try going to your Control Panel>>Internet Connections>>Change Adapter Settings>>Right Click each adapter>>Properties>>Untick IPv6>>Click Ok. Similar steps for MacOS/Linux.Try use the AirVPN forum search field in the top right corner, to see if a similar thread exists already. It's better and easier if all the same posts are in the same thread.Try click the "Most Viewed" button, on the horizontal blue line, under the black "Start New Topic" button, in order to see the most viewed threads easily & quickly.Try and check that your ISP or country isn't listed here. Because these ISPs block various things.Try and check if the website is listed here. Sites listed here should be automatically unblocked, regardless of which server you use. (This is called "Micro-routing").Try and see if the content you want, is available via a torrent site, if you wish. You could then use qBittorent to download it using P2P technology, which AirVPN fully allows. (Not all VPNs do) Does AirVPN Care About Blocked Sites? Yes! AirVPN Staff routinely reply to all kinds of different threads on these forums. This includes replies to threads about Netflix. Moderators do too!However due to there being a lot of new threads, they don't always reply to each one. Especially if the thread already exists; such as the many threads about Netflix.This is why it's important to keep all posts about the same website, in the same threads, instead of just making a new thread, which won't get any attention.But the problem is, that AirVPN or even any other VPN provider, can't always do anything about blocks. That's the truth. Because sites like Netflix actively try to block VPNs.It's in AirVPNs Mission Statement to fight all kinds of blocks or attempts at censorship; so it's not because Air isn't trying to fix things. When You Post A Thread, Consider This If you absolutely have to post, then please include: a link to the blocked website, the AirVPN server you used, any error messages you got & any replies from support staff from the blocked site.You get bonus points if you also tell us that you already tried the route checking tool and other things listed in the first section. . Double the bonus if you post in an existing thread instead.Posting also doesn't guarantee that the problem will be fixed. But if you follow the suggestions here, then you will make fixing the problem both quicker and easier for Air & everyone else :]. If you have questions or suggestions, please do not be afraid of posting them here or sending me a PM. If you're new to VPNs, then please feel free to check out my New User guide. Please do provide feedback on this thread if it helped you or is missing something! Thank you for reading !
  18. Hello ! Introduction Welcome To AirVPN! This is a guide meant to help new people. Whether you're new to VPNs in general or just new to AirVPN. I've tried to keep it fairly short, by using bullet points & spoiler tags. This hopefully also makes it more readable and less scary. I think AirVPN is a FANTASTIC VPN and while I don't own or have any stake in AirVPN myself, I'm a huge supporter of it. However, it can be quite scary and confusing to use when you first get started, so hopefully my little guide willl help you! This guide also includes links to resources provided by Air and other users, but I don't mean to take credit for these things. So please feel free to scroll to the bottom of this guide! Index: Introduction First Questions Getting Started With AirVPN After Downloading The Eddie Client [includes Troubleshooting tips] AirVPN Guides Section [Look here to find guides about: Security/Torrenting/Port-forwarding/Plex/etc.] Other Noteworthy resources Credits Why I made this guide: AirVPN was said to be very technical and thus hard to use. But since it's such a quality VPN, I don't want that to always be the main bad side to this great service. Therefore, this guide is also a response to this problem, so that newcomers can hopefully feel less overwhelmed about the idea of the air to breathe the real Internet. The Air staff clearly put in a lot of work every day and are extremely knowledgeable people, from all that I've seen. It's just that for newcomers, it can be hard and overwhelming finding all the relevant pieces of information and it can easily be too technical, so I hope my little guide will also be useful in that regard. This is also why, I collect other people's guides and put them in this guide, so that they're easier to find. However, Thank you to AirVPN, Staff and the many knowledgeable members of this community who help out people like myself quite a lot, through their contributions to the site everyday :] Feel free to leave feedback on this guide, both good and bad, if you want to, because I'll happily read it ! First Questions Do I have to be really technical to use this VPN stuff? AirVPN is one of the more technical VPNs out there and this is pretty much its only major drawback, when it gets reviewed. However, it offers unmatched attention to security and privacy. Not all reviews are entirely accurate either, sadly. Which the AirVPN Staff haven't hesitated to remark on though. So in short: No. But if you're new to VPNs in general and not a tech-savvy user, you do have to accept that you might be confused in the start. But this forum is here to help :]. Due to all the marketing and sometimes paid reviews, it can be hard to find out which VPN to trust at all. This is without even getting to the technical features. Air tends to somewhat pride itself on not overselling things however and so on the face of it, AirVPN can seem like it's no match for other, apparently bigger VPNs, but AirVPN has a lot to offer if you take a look. Will I become totally anonymous or completely secure? Please be aware that when using AirVPN or any VPN, while signed in to things such as your e-mail or other online accounts, you might get incorrect notices of being hacked. You have not been hacked most likely, it's just that when services see you log in from several different IP addresses, they get suspicious. Simply keep calm and investigate the issue. No, definitely not. But in terms of steps you can take to reach very high levels of privacy and security, this is one of the best steps you can take. Privacy and security are hard things. To achieve even higher levels involves sorting out things like your operating system, browser, various habits and using networks like Tor, in addition to a VPN like this. Security is hard. It's rarely, if ever, just a one-off solution. Often, security is as much a process, as it is about a single good product, like this VPN. However. just because a VPN doesn't do everything, it doesn't mean it's useless. A lot depends on what you're trying to do/achieve and who your "enemies" are. Yet it should be said, that AirVPN is quite extreme about security. For Air, it's "all or nothing" in many ways. AirVPN is so focused about security, that they even fix issues before they're published! However, VPNs and others technologies are becoming more and more important, as new spy laws like the UK Snoopers Charter & US Rule 41 Amendment crop up. Please check the question "What does AirVPN do to make it safe to use and does it log or track people?" further down, for more details. VPNs A & B have features X & Y, how does AirVPN compare? For this, check out the forum made specifically for that. It's often the case that features from other VPNs are either already included in AirVPN, aren't included because they're unsafe or just aren't as good as they sound. For instance, a rival VPN might say "We offer PPTP and many other secure protocols!", while Air doesn't, because Air knows PPTP is unsafe. Or they might say they offer a "multi-hop" VPN, which may or may not be useful, according to AirVPN Staff. Support for the protocol known as IKEv2 is another example of where Air doesn't support something, but has good reasons for not doing so. As a final example, you will sometimes see competitors speak of their super-secret "camouflage", "4Dstealth" or "hidden" protocols or servers. This is just marketing for gullible customers . But such aforementioned marketing can greatly confuse efforts to compare Airs product with the competitors. So if in doubt, ask the competitor who is offering "stealth"-something, what it is. If I use AirVPN, will I be able to use service XYZ with it? Please be aware that when using AirVPN or any VPN, while signed in to things such as your e-mail or other online accounts, you might get incorrect notices of being hacked. You have not been hacked most likely, it's just that when services see you log in from several different IP addresses, they get suspicious. Simply keep calm and investigate the issue. Please also be aware that it is NOT the main purpose of AirVPN to get access to geo-restricted content because it's a losing battle and Air cannot control how companies such as the BBC and Netflix act. Being able to get access to a site, generally depends on which service you want and which country it's in. AirVPN doesn't have servers in every country. In general, you can get access to everything. Although services like BBC iPlayer and Netflix actively try to block VPNs. Even services as normal as payment processors, such as PayPal don't always make things easy. This means it's not always possible for a VPN provider to do anything about it. But we do have forums to discuss and notify AirVPN on, so that AirVPN can try to solve it as best as it can. But before you post in that forum, make sure to Read This First, as it might help you & will make your posts more helpful to others. AirVPN has a very useful tool called the Route Checking tool. It allows you to test access to a website from ALL AirVPN servers. Just put in a full link in the search field and click the search button. Then press F5 or hit the refresh button in your browser. Green results usually mean there's access; red results mean the opposite. This is useful for seeing if it's only you who has a problem or only the server you're on. As well as which servers don't have a problem, so that you can switch to using those ones instead. It's most important that it's green in the "HTTP" column. There's many different HTTP Codes, so here's a list. VPNs generally slow down your connection a little. But AirVPN is so good that it's still possible to play Multiplayer games through it, without your connection slowing down too much, in my own experience. What does AirVPN do to make it safe to use and does it log or track people? AirVPN isn't just safe because it promises to be so in its marketing. Instead, it backs things up with hard technical specifications and high standards, that you can verify yourself. AirVPN is logless and can't be forced to log surreptitiously, fully supports P2P on all servers & as per #5 ignores all DMCA requests. Remotely-forwarded ports aren't logged either. Here's additional things Air does to increase its security and privacy: AirVPNs infrastructure conforms to a high degree of openness & transparency. This helps show that none of Airs locations are fake, but only bare-metal & lets users compare with one another. AirVPNs encryption standards are military grade and so for all intents and purposes unbreakable. It also only uses the most secure VPN protocol too: OpenVPN. No PPTP/SSTP/L2TP/IKEv2. AirVPN doesn't use any third party tracking on its website, such as Google Analytics or Social buttons, because they leak. Instead, it uses open-source analytics Matomo, which is closed loop. AirVPNs website meets the highest SSLabs security standards: A+. AirVPN takes its mission to fight censorship and manipulation of the Internet extremely seriously. This also means being highly willing to help out journalists and human-rights defenders. AirVPN only uses FOSS (Free and Open Source Software) in its Eddie client. Therefore the software running on your system is not a security "blackbox", but can be independently verified. AirVPNs Eddie client supports a wide selection of protocols. Including SSL and SSH. As well as anonymising services such as Tor; so that you can "partition trust" and need not trust AirVPN. AirVPN fully accepts crypto-currencies. Including to the point where it accepts Bitcoin directly. No middlemen. So if done right, you can use AirVPN with Air knowing nothing about you. AirVPN explains how it doesn't need to inspect or monitor traffic in order to check for breaches of ToS. AirVPN is against security through obscurity, including in its client software Eddie and so shows all the information it can; which leads some users to erroneously think there's logging going on. AirVPN has since then expanded on this point. AirVPN uses in-house support technicians and not outsourced third-party technicians and external packages such as Zendesk. So as with #3, it's closed-loop. No leakage. AirVPN has a strict location policy, so that it doesn't just set up servers in a new, potentially unsafe or questionable, location. One which can't supply the performance required, either. AirVPN has its own DNS servers and "killswitch" feature. With Network Lock on, any accidental loss of connection from Airs servers won't leak anything about you; including WebRTC. AirVPN is run by extremely knowledgeable technical people and not just businessmen. So they're easily able to both explain, defend and attack subjects on a purely technical level. AirVPN supports the auditing of some of the crucial security software that underlies different systems and also supports other projects/groups/services such as Tor, Edri and OpenNIC. AirVPN runs this forum, which can seem like a small thing, but it's actually really important, as it allows for the open sharing of knowledge, providing of technical support and mythbusting. AirVPN already acts as a "multi-hop" VPN and takes many other measures to increase security, such as separate entry & exit IPs, Perfect Forward Secrecy and HMAC SHA1. AirVPN has a strong focus on avoiding marketing fluff and overselling. Which means you know exactly what you're getting and don't need to deal with deceptive use of technical details. AirVPN is highly consistent with staying constantly on top of any security issue. AirVPN is based in Italy and is therefore within the EU. This has a range of other benefits too. That's 20+ ways in which Air has extremely high security "by default". All made nice and easy for you to use. If you want more, there's a simple 3 step guide for that. But seriously, there's always more you can do yourself. When will AirVPN add country or server XYZ? AirVPN Staff do not usually tell the community when a new country or server will be added. They simply add them. So it's easy to miss. The Eddie client will automatically show them. AirVPN frequently adds new countries/locations. This can be seen in the announcement forum, so please try to check this and the Eddie client (if you use it) before asking. Thank you. Requests for a specific location or addition to an existing one, are fine. But demands to know when something will happen, are futile, since AirVPN follows a strict location policy. The technical specifications regarding security/encryption for the Air servers that are used, can be found here. Further, those technologies and standards allows Air to pursue its Mission. Please remember that even if a country you want hasn't been added, you may still be able to get access to the web-content of that country, thanks to Airs micro-routing feature. Here's some old posts regarding different locations, so that you may not need to ask. Please note that some, such as Japan as of 2018 & Austria, were already added: Italian Servers? Japan/Korea Servers? [staff Comment] Russian Servers? Danish Servers? Middle-East/North African Servers? Indian Servers? Panama Servers? Australian/New Zealand Servers? Latvian Servers? French & Belgian Servers?[uPDATE: French Servers Momentarily Withdrawn] Austrian Servers? Central/South American Servers? AirVPN now allows 5 connections per account instead of 3, but is it possible to buy more connections? AirVPN has increased the limit from 3 to 5 connections. Thus it's unlikely to be possible to buy more connections at any point. But you can use a modified router if you still need more than 5. If you change your router firmware(software) to something like DD-WRT or Tomato for instance, you can make all devices on your Wi-Fi/Router go through AirVPN. However running a VPN on a router is quite hardwork for most routers. So you either need high-grade commercial ones or computers like the ZBOX Nano, converted into routers. That ZBOX Nano PC would be excellent for a VPN to run on, as the hardware is very good; even more than the commercial routers. Only savvy users should consider this. Who runs AirVPN & moderates the forums? The Staff account is the Official voice of AirVPN. Private messages cannot be sent to them. Clodo & pj are the most visible AirVPN employees. Clodo is the developer of AirVPNs "Eddie" client software, while pj is a co-founder of AirVPN. Community moderators: zhang888, giganerd and LZ1. Note that we are NOT AirVPN employees, have no access to Air infrastructure and do NOT speak for Air in an official way. Instead, zhang888, giganerd and LZ1 are a part of what the Air Staff call the Air "forum Staff". Note that member profiles can't be accessed by others by default, unless you add them as friends or they made their profile public. Air itself is based in Italy and so that's where their staff will be sourced from. What are some of the "Status" page functions for & how do I use AirVPNs "Micro-routing" feature? The first page you see when you go to the Status page, is an overview of Airs servers & service. Useful for seeing if any server is down or very busy, downloads and how many users there are. The Ping Matrix shows the latency between Air servers and if there's any (severe) packet loss somewhere. No packets = no connection. The Top Users page can help you verify if others are still getting good or bad performance, compared to yourself. The Checking Route page is for seeing if Air servers can or can't connect to a website you select. Unlike the Ping Matrix. There's also the special AirVPN "Micro-routing" service. To use it, simply make sure you connect to Airs servers & DNS. (Automatic when you use Airs Eddie client). Without the micro-routing, if you want to watch French TV for example, you would have to connect to a French server. But with micro-routing, you can connect to ANY Air server and still watch French TV, as long as the TV's website is on the "Website support" list. It's possible to make requests to get sites added to these lists. Anyway, this micro-routing is very very useful ! Because it means that EVEN IF Air takes all French servers offline for some reason, you will still be able to access French content! Is it free and if not, why should I pay for it? AirVPN is not free, but you can get a short trial if you ask nicely. The Trial has unlimited data and full speed. But you can only get a refund if you have used less than 5GB. Free services don't offer many of the very nice features which let you get around website/service blocks. But it can be hard to market these features to non-technical people, because they're not always easy to explain. Yet once you try them, you will appreciate them. AirVPN has quality servers & connections, as well as guarantees a certain speed, with no limits. So it's possible to play multiplayer games through it. Free services often have to exploit their users in order to survive. This is normally done by tracking you, possibly undermining your security and selling your data to 3rd parties. If a free service is leaking your data due to poor practices and technology by accident or selling it on purpose, what's the point in using it then? VPN means Virtual Private Network. Even if a free service doesn't exploit you, you still don't have the same level of security or assurances, because how would a free service pay for that? Real security is hard and costly. Would you rather go through 5 bad free services, risking your security and privacy or would you rather take your privacy and security seriously the first time, for a small fee? If you only need a VPN 1 time, then it's probably not worth it to use a paid service. But if you know you'll need it often, it's worth the investment. Air has a very cheap 3 day plan too though. Free services often have many limits. But AirVPN is logless, allows 5 devices per account, allows P2P and other protocols, has no data/bandwidth limits & very high security. So basically, you need to be able to Trust your provider, yet why would a free service be trustworthy? They don't owe you anything. But a paid one at least does - not that all paid services are great either though. Not all services on the web offer the same level of protection either, whether free or not. Many services, paid & unpaid, lie to you about where they have servers. Fake GeoIP addresses. Since AirVPN isn't free, is it possible to buy a Lifetime subscription, as with other VPNs? Does AirVPN hold sales at all? This question has received its own dedicated topic, so please click the link below All sales related questions are answered in this dedicated thread. Getting Started With AirVPN If you run into a problem with Airs software for some reason, then please make sure to check if there's an experimental version of the Eddie client you can download. Experimental versions aren't always available. How do I start using AirVPN? There's 3 simple steps: Create Account Choose a Plan Choose your setup Creating an account: You don't need a valid e-mail address. The site software, called IPB, just needs the field to be filled with something. Remember that password recovery will NOT work without a valid address. If you can, don't use something which uniquely identifies you. So even if you name your account ninja10834, that's still better than something about your real name, location or even interests. With this account, you can also post on the forums. However in the beginning, you won't be able to post on these forums immediately. This is because a moderator has to make sure that whatever you post, is both genuine and from a person. So when you click the "post" button, your own post will NOT show up immediately; so just be patient, when asking a question. After around 5-10 posts being accepted, your account will increase in level and you will be able to post things immediately, without any supervision. There's 2 names associated with your account. The first is your login name, which cannot be changed and can't be seen by others. You would need to make a new account, to change it. The second name is your forum display name. In my case, it's LZ1. This can be changed by you at any time, but only matters in the forum. NOTE: it's your login name you use for logging into the Eddie software, together with your login password. Choose a plan: At this stage, you pick both how you wish to pay and how much. It's possible to pay in currencies known as "cryptocurrencies". These cryptocurrencies, most famously Bitcoin, have a range of benefits when it comes to things like security and privacy, if used correctly. If you want to pay using a cryptocurrency, there's some guidance on what to do, further down, in the guides section. However if you're just starting out, it's fine if you just use your credit card or whatever method which suits you. It's also possible to ask for a short trial. You can also scroll back up to the "First Questions" section and look for the information on Air's sales, if you want to wait for a discount. After paying, you will be a "Premium User" and will be able to see how many days you have left of your subscription, at the top of the screen, when you're logged into your account. Choose your setup: AirVPN provides a mobile version of its Eddie app for Android. An iOS version is NOT available due to Apple's restrictive policies. This stage is pretty straightforward. Just make sure you select the right versions and hit Download. Your OS: Find out which Windows Operating System you're running or which GNU/Linux you're running. Mac users must use either Mavericks or something newer. Your Architecture: Most will be locked into 64-bit here, as 32-bit is outdated. Your Format: Windows users should select "Installer" & MacOS users select "PKG Package Installer". Ubuntu/Linux users pick according to distro; adding a PPA will enable auto-updates of Eddie. Your User Interface: Most people should pick Graphical UI. Unless you want to run some kind of headless install, as some technical users do. Then click the big blue Download button and follow regular installation procedures. Now you will be downloading the AirVPN software. DONE. No further reading is required from here. Just open Eddie and click "Connect to Recommended Server". Unless you need a guide for something or want to know some of the finer details. This software is called a "client". This "client" is called "Eddie", because that's what AirVPN calls it. So when you hear talk of "Eddie", it's referring to the software you downloaded. If you don't want to use Eddie for some reason, there's ways of getting around it. But for new and casual users, it's recommended that you use it. If normal Installer Formats create problems, you can sometimes fix them by using the portable formats. A portable download is also useful if you want to store Eddie on a USB stick. If the latest Stable or Experimental release doesn't work for you, then you can download an earlier version, by clicking the "Other versions" link under the blue download button. How and where do I manage my AirVPN settings? You do that in the Client Area Some of the most important things in this area include: Configuration Generator Ports Referrals Number 1 is where you automatically generate the files that your VPN needs to work (if you don't use the Eddie Client, such as if you use Android), after you tick some boxes. Number 2 allows you to tell the VPN which "ports" or "virtual doors" to open, which can speed up things such as your Bittorent client (qBittorent, uTorrent, Vuze, Transmission, etc.) Even though it looks confusing, the only thing you actually need to change, is putting the right number in the "Local Port" field. So if your torrent program uses port 7634 for instance, then you put 7634 into the "Local Port" field and simply click the green add button. Then a number will automatically be generated and put into the big white box at the top. All done. Number 3 shows you the link you can share with other people. If they buy an AirVPN plan, you get 20% of what they pay. Then you can use this money to pay for your own plan. What if I need help during the process? If you need help from Air, you can easily contact them. If you're wondering why AirVPN doesn't have "Livechat" or might take a little longer to reply than other providers, then this is why. However you can also just come to these forums. If you can't post yet, then you can read the various guides which exist. In the AirVPN program called Eddie, there's a tab called "logs", which lists various information about what's happening. You can copy this and post it on the forums so we can help. But when you post your logs, MAKE SURE you post them inside "spoiler tags". If you don't use spoiler tags, you will annoy and make things more difficult for everyone, including yourself. I've used untold numbers of spoilers in this guide, as an example. What are logs, where are they and how do I use spoiler tags? When the AirVPN Eddie software is running, it creates a list of what it is doing. What's connecting, when, where, if something went wrong and so on. A log of events. So when you ask for help on these forums, we will often ask about your logs, because without logs, we do NOT know what is happening, in your specific situation . If you open the AirVPN "Eddie" client software, you will see a "Logs" tab. On the top right-hand side of the window, the 2nd button from the top, lets you copy your logs quickly. After copying the logs from Eddie, paste them into your posts when you need help. Do so by typing the short codes necessary; which we call using "Spoiler tags". This makes it much more convenient for everyone; just like this question and answer, is inside a spoiler . Please try to do it, thank you! Is there anything in my AirVPN account I should change? Go to the top-right corner of the screen and click your account username. Then click "My Settngs" in the drop-down box. Under "Profile Privacy", you might wish to un-check the checkbox, if you want others to be able to view your profile when clicking your name. Under the "Notification Options" tab and then under the header "Topics & Posts", check the box which lets you auto-follow things you reply to. This is very useful. Because then you'll get a little notification in the top-right corner, every time someone replies to a thread you made. This makes getting help more convenient. It's also good for following what's happening in threads that you post in. Remember to check the boxes on the right-hand side, so that you can choose if you want to be notified via the forum or via E-mail . You can also enable notifications for when people "like" your posts, since that can be quite encouraging! Under "Profile Settings", you might be curious about who visited your profile. So you can make it show the last 5 visitors. Everything else such as signatures, allowing others to add you as a friend and so on, are up to you. Enjoy! Is there an Experimental or Beta version of the AirVPN Eddie Client I can try? If so, where is it and why would I want to try it? Note that whenever you download the Beta/Experimental Client, you'll always receive the latest one. You can check your version number after you open Eddie and go to its "About" page. There aren't always any Experimental clients to download and new clients are continuously released. So keep an eye on the announcement section, for Beta/Experimental clients. Just because a release is called the "Stable" version, it doesn't mean the Beta/Experimental client is "Unstable". However don't be surprised if you run into issues . You can find the Beta versions [if one is available] on the download page of your OS, under "Other versions": If for some reason an Eddie client doesn't work, try downloading a "portable" version on the OS download page, under "Format". Being Beta/Experimental, you might run into some bugs. However I use the latest all the time, with no problems really. For more information on what features are added and bugs taken away, go straight to the changelog The Beta/Experimental client often includes fixes for bugs which the "Stable" version of Eddie has, as well as various extra features and changes. This helps all platforms. For example, for Windows, a prior Beta release used WFP (Windows Filtering Platform), instead of Windows Firewall, which meant it became easier to use 3rd party security software. 3rd party security software, are things such as Comodo firewall or Avast anti-virus. Things which you install yourself. In addition, it also comes with the latest software updates "out-of-the-box", such as the latest TAP drivers and OpenVPN patches, so you don't have to update them yourself. It may enable some things by default, which a current Stable version requires you to change yourself (as explained in the next section of this guide). By using the Beta, you can also help AirVPN by providing feedback, which means Air can then make things even better . Each Beta release has its own feedback thread. Just remember to describe the problem, tell us which system you use (Linux/Windows/MacOS/etc.), the client version (Go to Eddie client "About" page) and some logs in spoilers! : D. Thanks! After Downloading The Eddie Client Please remember to share your Eddie logs and use spoiler tags, when you need help from the community. How to do so, is answered in the previous section, thank you! What's "Network Lock" & should I use it? Please be aware that using Network Lock with Tor can be contradictory to try. It's not currently planned for. Please also note that it's expected that Eddie turns off Network Lock, when Eddie is shut down. Network Lock in AirVPN, is what many other VPN providers normally call a "killswitch". So this is Airs own "killswitch". Network Lock (NL) is a way for the AirVPN software to force all of your computers network communications through the AirVPN service, so that nothing "leaks out" about your identity. For new users, I don't recommend using it too soon. I recommend waiting a few days and just getting comfortable with the day-to-day running of the software and then using it later. With NL on, your internet connection will stop entirely, if you lose connection to the Air servers. This is great for preventing information from leaking & is a feature, not a bug. Why is this important? Well, I don't want to name & shame other providers, but one poster showed that his last provider leaked his real IP address during server changes. This shouldn't happen. But with NL on, this won't happen to you, because changing servers in Eddie will mean disconnecting from server A to go to server B. Thus the connection is stopped first & then resumed. No leaks. But if you want maximum security right away and aren't afraid of small technical issues, you can start using it right away. It can always be changed back.. How can I test that AirVPN is hiding my IP and DNS addresses correctly? Turning on Network Lock in the Eddie client will protect you from WebRTC leaks. You can use AirVPNs own service called ipleak.net. Make sure it's .net and NOT .com. Since ipleak.net is run by Air, it has now received its own sub-forum, where you can ask questions, give suggestions and receive information on any changes made to ipleak. Un-configured, browsers like Mozilla Firefox and Google Chrome will "leak" (show) your real IP address through a technology called "WebRTC". To stop WebRTC, scroll to the bottom of the ipleak page and read the very short and simple instructions on how to fix it. It's not overly technical, don't worry. If you torrent files, there's also a torrent on the same website, which you can download in order to test which IP other torrenters would see if you torrented a real file. It's recommended you use Free & Open Source Software(FOSS). With this client, you can make it bind itself to whichever network adapter is using the VPN, which is convenient, so that it only torrents when using a VPN. I can recommend setting ipleak.net as your browser start page, so that every time you start your browser, you'll quickly be able to see if everything is working as intended. Eddie can't connect or is very slow, what can I do? If none of the below solutions work, then it's time to ask the forums or Air support. In BOTH cases, please supply your logs, as detailed before. Otherwise no one can help you. First, please make sure your client is updated to the latest Stable or Beta release. You can see your version number in Eddie>Top Left Corner Menu>About. Head to download page if not. Please try different protocols, at Eddie>Menu>Preferences>Protocols>Uncheck "Automatic">Select a protocol, such as SSL or TCP 443> Save>re-connect to an Air server. Please try connecting to not just different servers, but different countries too. Proximity to your location does not automatically mean better connections; due to routing technicalities. If you're an online gamer, you may benefit from changing the buffer sizes, as mentioned by Staff. If you're a Linux, MacOS or Windows user and webpages aren't loading fully or there's less than optimum speed, you can try the so-called "mssfix". If it's simply a problem with connecting to airvpn.org, then please try the alternate entry: airvpn.info - note that sometimes Air comes under attack from within and so you get an error page. If Eddie, such as in its Logs, says there's problems with route checking, please refer here for a solution. Note: disabling Preferences>DNS>Check Air DNS can be tried at the same time too. If you enabled Network Lock and can't connect to the web without Eddie turned on, then please disable Network Lock or reset your firewall and/or DNS, as shown in the two posts here. If torrenting speeds are slow, then please remember to port-forward and configure your torrent client correctly. For detailed guides on this, please go to the Guides Section below. For some ISPs, such as Virgin Media, please check the Guides Section below, for specific tutorials on how to optimize speeds. In some cases, especially if you run Air directly on your router, it's possible that your computer hardware isn't new enough to handle the encryption quickly enough. For Windows users, updating or downgrading the TAP adapter may work. But this shouldn't be tried as the first thing, as it's often not necessary now. For Windows users, you can try downloading a program called TCPOptimizer. Which other steps can I take to increase my privacy and security? Using AirVPN with Tor is a strong answer, among many other good ones. Here's a further explanation of how AirVPN & Tor work, when together. There's also many other ways to handle privacy and security on multiple fronts. If you're looking for a technical challenge, you can install pfSense on a very powerful computer, to make it act like a router, so that all devices connected to your Wi-Fi will be covered by the VPN. Why not just use an expensive commercial router? Because even expensive ones struggle to handle the protocol known as "OpenVPN" efficiently enough to give excellent performance. You can change the software & hardware you use & support the organisations which try to make things better; such as the FSF/EFF. If you're a geek or networking enthusiast, you can also check out things such as the Turris Omnia router, which offers very powerful hardware & software. AirVPN Guides Section Make sure to check the date of the posts you read below. Hope you like it ! Guides, How To's & Troubleshooting Amazon devices like the Fire Stick, Fire TV Cube and others can be used with Android Eddie without sideloading, according to Staff. Mini-guide by Staff on how to test if your connection is being shaped/throttled [How-To] Use AirVPN with Network Manager on Ubuntu/Mint [How-To] AirVPN via SSL/stunnel on Android 6/7/8 [How-To] fix Virgin Media Connection Drops/Bandwidth Issues Plex Server Guidance (Until someone makes an actual Plex guide) Paying with Bitcoin/Cryptocurrency Guidance. (Until someone makes an actual Cryptocurrency guide) Mini-guides On How To Improve Torrent Speeds Mini-guide On Torrenting With Tixati Client How To Autostart AirVPN As Root With No Password (Linux) Note: security risk & What Staff Says(OSX/MacOS) How To Setup The Eddie Client On Raspberry Pi 3 How To Port-Forward & Use A Torrent Client Guide To pfSense 2.3 For AirVPN Guide to pfSense 2.1 For AirVPN Firefox Extensions Guide Guide To Setting Up VPN For Torrenting On Windows Guide - What To Do When A Site Is Blocked AirVPN Forum Styleguide How To Improve Smartphone Security How To Block Non-VPN Traffic With Windows Firewall How To Connect To AirVPN With Your Fritz!box Router Using AirVPN Through Stunnel On Android Using AirVPN Over Tor Using AirVPN on iOS Check Your TAP Driver Version Explaining The Use Of AirVPN With Tor How To Configure A Synology Device For AirVPN AirVPN & iOS Other Noteworthy Resources Links Please be aware that AirVPN, unlike most, does NOT buy or otherwise use paid-for reviews. An alternative VPN client to Eddie, for Linux. Best VPNs 2016 & AirVPNs results Advanced Networking & Computing How To Break The Internet (Cory Doctorow) (Recommended Watch) Why the OpenVPN protocol that Air uses is good Guide to all things privacy Five Eyes Countries Schneier on Encryption CGP Grey explaining Encryption 10 Myths About VPNs (Ignore the self-advertising) (Recommended Read) The Eternal Value Of Privacy (Recommended Read) Credits Thank you to: AirVPN & Staff for their excellent service and explanations. inradius for his guide on how to use Air with Network Manager on Ubuntu/Mint Omninegro for his pertinent guide on extensions. The always crazily knowledgeable and helpful zhang888, whom I owe a lot to for all his work here. Thanks man. Omniferums excellent guide on securing Windows. pfSense_fans guide on how to use the excellent pfSense firewall software. The always very friendly and helpful giganerd! NaDre for his excellent torrenting guide. neolefort for his Synology guide. sheivoko's guide on using AirVPN through stunnel on Android bigbrosbitch for starting a guide on mobile security Zensen for his guide on how to autostart Eddie on Linux with Root sagarbehere for his nice guide on how to set up Eddie on a Raspberry Pi 3 rainmakerraw for his mini-guides on improving torrent speeds and how to torrent. lewisisonfire for his guide to fixing out Virgina Media-related issues and with nice pictures too. Khariz, giganerd and ~Daniel~ for their helpful posts. I hope the guide was of use! If you find any inaccuracies, feel free to tell me. I worked hours on this tiny guide, so I want it to be perfect haha. I hope your experience with AirVPN will be a good one! Mine certainly has been. If you have any questions, feel free to ask. Thank you for reading :] P.S. I consider myself pretty savvy, but I remember being confused when I got here. So I can only imagine how it is for less savvy individuals. P.P.S. I know it lacks images, but images do evil things to my spoilers, lol.
  19. I need help creating a vpn profile so that I can use vpn always on, on iOS. I read this article but still am having problems connecting. Please help http://simonguest.com/2013/03/22/on-demand-vpn-using-openvpn-for-ios/
  20. I'm on a mac. ! 2016.04.01 16:01:50 - Disconnecting. 2016.04.01 16:01:50 - Connection terminated.I 2016.04.01 16:01:51 - Cancel requested.I 2016.04.01 16:01:51 - IPv6 restored on network adapter (Bluetooth DUN)I 2016.04.01 16:01:51 - IPv6 restored on network adapter (Ethernet)I 2016.04.01 16:01:51 - IPv6 restored on network adapter (Wi-Fi)I 2016.04.01 16:01:51 - IPv6 restored on network adapter (Bluetooth PAN)I 2016.04.01 16:01:51 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2016.04.01 16:01:51 - Session terminated.I 2016.04.01 16:03:02 - Session starting.I 2016.04.01 16:03:02 - IPv6 disabled on network adapter (Bluetooth DUN)I 2016.04.01 16:03:02 - IPv6 disabled on network adapter (Ethernet)I 2016.04.01 16:03:02 - IPv6 disabled on network adapter (Wi-Fi)I 2016.04.01 16:03:02 - IPv6 disabled on network adapter (Bluetooth PAN)I 2016.04.01 16:03:02 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2016.04.01 16:03:02 - Checking authorization ...! 2016.04.01 16:03:03 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:03:03 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:03:03 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:03:03 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:03:03 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:03:03 - SSH > debug1: Connection established.. 2016.04.01 16:03:03 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:03:03 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/6125d6b5e47c182d2043edae1a7442d032fd67e8940e2124a0a2305dd1fac750.tmp.key type -1. 2016.04.01 16:03:03 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/6125d6b5e47c182d2043edae1a7442d032fd67e8940e2124a0a2305dd1fac750.tmp.key-cert type -1. 2016.04.01 16:03:03 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:03:03 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:03:03 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:03:03 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:03:03 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:03:03 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:03:03 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:03:03 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:03:03 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:03:03 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:03:04 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:03:04 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:03:04 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:03:04 - SSH > debug1: checking without port identifier. 2016.04.01 16:03:04 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:03:04 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:03:04 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:03:04 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:03:04 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:03:04 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:03:04 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:03:04 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:03:06 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:03:06 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:03:06 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/6125d6b5e47c182d2043edae1a7442d032fd67e8940e2124a0a2305dd1fac750.tmp.key. 2016.04.01 16:03:06 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:03:06 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:03:06 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:03:06 - SSH > debug1: Local connections to LOCALHOST:15677 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:03:06 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:03:06 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:03:06 - SSH > debug1: Local forwarding listening on ::1 port 15677.. 2016.04.01 16:03:06 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:03:06 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 15677.. 2016.04.01 16:03:06 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:03:06 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:03:06 - SSH > debug1: Entering interactive session.. 2016.04.01 16:03:06 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:03:06 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:03:06 - Disconnecting. 2016.04.01 16:03:06 - Connection terminated.I 2016.04.01 16:03:09 - Checking authorization ...! 2016.04.01 16:03:10 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:03:10 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:03:10 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:03:10 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:03:10 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:03:10 - SSH > debug1: Connection established.. 2016.04.01 16:03:10 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:03:10 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/ff257ddfb0051a52e3ea1fa8e78d182b5933560d2b19c3b8962786d8db481218.tmp.key type -1. 2016.04.01 16:03:10 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/ff257ddfb0051a52e3ea1fa8e78d182b5933560d2b19c3b8962786d8db481218.tmp.key-cert type -1. 2016.04.01 16:03:10 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:03:10 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:03:10 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:03:10 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:03:10 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:03:10 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:03:10 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:03:10 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:03:10 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:03:10 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:03:10 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:03:10 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:03:11 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:03:11 - SSH > debug1: checking without port identifier. 2016.04.01 16:03:11 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:03:11 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:03:11 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:03:11 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:03:11 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:03:11 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:03:11 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:03:11 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:03:12 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:03:12 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:03:12 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/ff257ddfb0051a52e3ea1fa8e78d182b5933560d2b19c3b8962786d8db481218.tmp.key. 2016.04.01 16:03:12 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:03:12 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:03:12 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:03:12 - SSH > debug1: Local connections to LOCALHOST:56237 forwarded to remote address 127.0.0.1:2018! 2016.04.01 16:03:12 - Disconnecting. 2016.04.01 16:03:12 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:03:12 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:03:12 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:03:12 - OpenVPN > Exiting due to fatal error. 2016.04.01 16:03:12 - SSH > debug1: Local forwarding listening on ::1 port 56237.. 2016.04.01 16:03:12 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:03:12 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 56237.. 2016.04.01 16:03:12 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:03:12 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:03:12 - SSH > debug1: Entering interactive session.. 2016.04.01 16:03:12 - Connection terminated.I 2016.04.01 16:03:15 - Checking authorization ...! 2016.04.01 16:03:16 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:03:16 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:03:16 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:03:16 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:03:16 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:03:16 - SSH > debug1: Connection established.. 2016.04.01 16:03:16 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:03:16 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/2b329403dc0f355f493c0601e7980efe72514e21fc04b7a8725a173f839da82b.tmp.key type -1. 2016.04.01 16:03:16 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/2b329403dc0f355f493c0601e7980efe72514e21fc04b7a8725a173f839da82b.tmp.key-cert type -1. 2016.04.01 16:03:16 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:03:16 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:03:16 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:03:16 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:03:16 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:03:16 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:03:16 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:03:16 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:03:16 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:03:16 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:03:16 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:03:16 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:03:17 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:03:17 - SSH > debug1: checking without port identifier. 2016.04.01 16:03:17 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:03:17 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:03:17 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:03:17 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:03:17 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:03:17 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:03:17 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:03:17 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:03:17 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:03:17 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:03:17 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/2b329403dc0f355f493c0601e7980efe72514e21fc04b7a8725a173f839da82b.tmp.key. 2016.04.01 16:03:17 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:03:18 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:03:18 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:03:18 - SSH > debug1: Local connections to LOCALHOST:7656 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:03:18 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:03:18 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:03:18 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:03:18 - OpenVPN > Exiting due to fatal error. 2016.04.01 16:03:18 - SSH > debug1: Local forwarding listening on ::1 port 7656.! 2016.04.01 16:03:18 - Disconnecting. 2016.04.01 16:03:18 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:03:18 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 7656.. 2016.04.01 16:03:18 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:03:18 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:03:18 - SSH > debug1: Entering interactive session.. 2016.04.01 16:03:18 - Connection terminated.I 2016.04.01 16:03:20 - Cancel requested.I 2016.04.01 16:03:20 - IPv6 restored on network adapter (Bluetooth DUN)I 2016.04.01 16:03:20 - IPv6 restored on network adapter (Ethernet)I 2016.04.01 16:03:20 - IPv6 restored on network adapter (Wi-Fi)I 2016.04.01 16:03:20 - IPv6 restored on network adapter (Bluetooth PAN)I 2016.04.01 16:03:20 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2016.04.01 16:03:20 - Session terminated.I 2016.04.01 16:03:57 - Session starting.I 2016.04.01 16:03:57 - IPv6 disabled on network adapter (Bluetooth DUN)I 2016.04.01 16:03:57 - IPv6 disabled on network adapter (Ethernet)I 2016.04.01 16:03:57 - IPv6 disabled on network adapter (Wi-Fi)I 2016.04.01 16:03:57 - IPv6 disabled on network adapter (Bluetooth PAN)I 2016.04.01 16:03:57 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2016.04.01 16:03:57 - Checking authorization ...! 2016.04.01 16:03:57 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:03:58 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:03:58 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:03:58 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:03:58 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:03:58 - Disconnecting. 2016.04.01 16:03:58 - Connection terminated.I 2016.04.01 16:04:01 - Cancel requested.I 2016.04.01 16:04:01 - IPv6 restored on network adapter (Bluetooth DUN)I 2016.04.01 16:04:01 - IPv6 restored on network adapter (Ethernet)I 2016.04.01 16:04:01 - IPv6 restored on network adapter (Wi-Fi)I 2016.04.01 16:04:01 - IPv6 restored on network adapter (Bluetooth PAN)I 2016.04.01 16:04:01 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2016.04.01 16:04:01 - Session terminated.I 2016.04.01 16:05:43 - Session starting.I 2016.04.01 16:05:43 - IPv6 disabled on network adapter (Bluetooth DUN)I 2016.04.01 16:05:43 - IPv6 disabled on network adapter (Ethernet)I 2016.04.01 16:05:43 - IPv6 disabled on network adapter (Wi-Fi)I 2016.04.01 16:05:43 - IPv6 disabled on network adapter (Bluetooth PAN)I 2016.04.01 16:05:43 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2016.04.01 16:05:44 - Checking authorization ...! 2016.04.01 16:05:44 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:05:44 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:05:44 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:05:44 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:05:44 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:05:44 - Disconnecting. 2016.04.01 16:05:44 - Connection terminated.I 2016.04.01 16:05:47 - Checking authorization ...! 2016.04.01 16:05:47 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:05:47 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:05:47 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:05:47 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:05:47 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:05:48 - Disconnecting. 2016.04.01 16:05:48 - Connection terminated.I 2016.04.01 16:05:51 - Checking authorization ...! 2016.04.01 16:05:51 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:05:51 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:05:51 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:05:51 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:05:51 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:05:51 - Disconnecting. 2016.04.01 16:05:51 - Connection terminated.I 2016.04.01 16:05:54 - Checking authorization ...! 2016.04.01 16:05:54 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:05:54 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:05:54 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:05:54 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:05:54 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:05:54 - Disconnecting. 2016.04.01 16:05:54 - Connection terminated.I 2016.04.01 16:05:57 - Checking authorization ...! 2016.04.01 16:05:58 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:05:58 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:05:58 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:05:58 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:05:58 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:05:58 - Disconnecting. 2016.04.01 16:05:58 - Connection terminated.I 2016.04.01 16:06:01 - Checking authorization ...! 2016.04.01 16:06:01 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:01 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:01 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:01 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:01 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:01 - Disconnecting. 2016.04.01 16:06:01 - Connection terminated.I 2016.04.01 16:06:04 - Checking authorization ...! 2016.04.01 16:06:05 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:05 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:05 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:05 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:05 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:05 - Disconnecting. 2016.04.01 16:06:05 - Connection terminated.I 2016.04.01 16:06:08 - Checking authorization ...! 2016.04.01 16:06:08 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:08 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:08 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:08 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:08 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:08 - Disconnecting. 2016.04.01 16:06:08 - Connection terminated.I 2016.04.01 16:06:11 - Checking authorization ...! 2016.04.01 16:06:12 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:12 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:12 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:12 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:12 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:12 - Disconnecting. 2016.04.01 16:06:12 - Connection terminated.I 2016.04.01 16:06:15 - Checking authorization ...! 2016.04.01 16:06:15 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:15 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:15 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:15 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:15 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:15 - Disconnecting. 2016.04.01 16:06:15 - Connection terminated.I 2016.04.01 16:06:18 - Checking authorization ...! 2016.04.01 16:06:19 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:19 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:19 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:19 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:19 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:19 - Disconnecting. 2016.04.01 16:06:19 - Connection terminated.I 2016.04.01 16:06:22 - Checking authorization ...! 2016.04.01 16:06:22 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:22 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:22 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:22 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:22 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:22 - Disconnecting. 2016.04.01 16:06:22 - Connection terminated.I 2016.04.01 16:06:25 - Checking authorization ...I 2016.04.01 16:06:26 - Cancel requested.I 2016.04.01 16:06:26 - IPv6 restored on network adapter (Bluetooth DUN)I 2016.04.01 16:06:26 - IPv6 restored on network adapter (Ethernet)I 2016.04.01 16:06:26 - IPv6 restored on network adapter (Wi-Fi)I 2016.04.01 16:06:26 - IPv6 restored on network adapter (Bluetooth PAN)I 2016.04.01 16:06:26 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2016.04.01 16:06:26 - Session terminated.I 2016.04.01 16:06:27 - Session starting.I 2016.04.01 16:06:27 - IPv6 disabled on network adapter (Bluetooth DUN)I 2016.04.01 16:06:27 - IPv6 disabled on network adapter (Ethernet)I 2016.04.01 16:06:27 - IPv6 disabled on network adapter (Wi-Fi)I 2016.04.01 16:06:27 - IPv6 disabled on network adapter (Bluetooth PAN)I 2016.04.01 16:06:27 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2016.04.01 16:06:27 - Checking authorization ...! 2016.04.01 16:06:28 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:28 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:28 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:28 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:28 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:28 - Disconnecting. 2016.04.01 16:06:28 - Connection terminated.I 2016.04.01 16:06:31 - Checking authorization ...! 2016.04.01 16:06:32 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:32 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:32 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:32 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:32 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:32 - Disconnecting. 2016.04.01 16:06:32 - Connection terminated.I 2016.04.01 16:06:35 - Checking authorization ...! 2016.04.01 16:06:35 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:35 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:35 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:35 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:35 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:35 - Disconnecting. 2016.04.01 16:06:35 - Connection terminated.I 2016.04.01 16:06:38 - Checking authorization ...! 2016.04.01 16:06:38 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:38 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:38 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:38 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:38 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:38 - Disconnecting. 2016.04.01 16:06:38 - Connection terminated.I 2016.04.01 16:06:41 - Checking authorization ...! 2016.04.01 16:06:42 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:42 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:42 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:42 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:42 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:42 - Disconnecting. 2016.04.01 16:06:42 - Connection terminated.I 2016.04.01 16:06:45 - Checking authorization ...! 2016.04.01 16:06:45 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:06:45 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:06:45 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:06:45 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:06:45 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:06:45 - Disconnecting. 2016.04.01 16:06:45 - Connection terminated.I 2016.04.01 16:06:47 - Cancel requested.I 2016.04.01 16:06:47 - IPv6 restored on network adapter (Bluetooth DUN)I 2016.04.01 16:06:47 - IPv6 restored on network adapter (Ethernet)I 2016.04.01 16:06:47 - IPv6 restored on network adapter (Wi-Fi)I 2016.04.01 16:06:47 - IPv6 restored on network adapter (Bluetooth PAN)I 2016.04.01 16:06:47 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2016.04.01 16:06:48 - Session terminated.I 2016.04.01 16:07:10 - Session starting.I 2016.04.01 16:07:10 - IPv6 disabled on network adapter (Bluetooth DUN)I 2016.04.01 16:07:10 - IPv6 disabled on network adapter (Ethernet)I 2016.04.01 16:07:10 - IPv6 disabled on network adapter (Wi-Fi)I 2016.04.01 16:07:10 - IPv6 disabled on network adapter (Bluetooth PAN)I 2016.04.01 16:07:11 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2016.04.01 16:07:11 - Checking authorization ...! 2016.04.01 16:07:11 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:11 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:11 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:11 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:11 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:11 - SSH > debug1: Connection established.. 2016.04.01 16:07:11 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:11 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/d7b93b18e6b30e7f735758c99ecf2a45ca70a176197fe39324be0aef18391dac.tmp.key type -1. 2016.04.01 16:07:11 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/d7b93b18e6b30e7f735758c99ecf2a45ca70a176197fe39324be0aef18391dac.tmp.key-cert type -1. 2016.04.01 16:07:11 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:11 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:11 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:11 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:11 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:12 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:12 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:12 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:12 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:12 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:12 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:12 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:12 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:12 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:12 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:12 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:13 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:13 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:13 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:13 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/d7b93b18e6b30e7f735758c99ecf2a45ca70a176197fe39324be0aef18391dac.tmp.key. 2016.04.01 16:07:13 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:13 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:13 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:13 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:13 - SSH > debug1: Local connections to LOCALHOST:24160 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:13 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:13 - SSH > debug1: Local forwarding listening on ::1 port 24160.. 2016.04.01 16:07:13 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:13 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:13 - OpenVPN > Exiting due to fatal error. 2016.04.01 16:07:13 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 24160.. 2016.04.01 16:07:13 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:13 - SSH > debug1: Requesting no-more-sessions@openssh.com! 2016.04.01 16:07:13 - Disconnecting. 2016.04.01 16:07:13 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:13 - Connection terminated.I 2016.04.01 16:07:16 - Checking authorization ...! 2016.04.01 16:07:17 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:17 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:17 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:17 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:17 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:17 - SSH > debug1: Connection established.. 2016.04.01 16:07:17 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:17 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/8977e59d086e1d4378dab1c18d169215846a3ac8c9a0e76f2780ceea885f488a.tmp.key type -1. 2016.04.01 16:07:17 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/8977e59d086e1d4378dab1c18d169215846a3ac8c9a0e76f2780ceea885f488a.tmp.key-cert type -1. 2016.04.01 16:07:17 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:17 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:18 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:18 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:18 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:18 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:18 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:18 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:18 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:18 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:18 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:18 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:18 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:18 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:18 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:19 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:19 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:19 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:19 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/8977e59d086e1d4378dab1c18d169215846a3ac8c9a0e76f2780ceea885f488a.tmp.key. 2016.04.01 16:07:19 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:19 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:19 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:19 - SSH > debug1: Local connections to LOCALHOST:2570 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:19 - SSH > debug1: Local forwarding listening on ::1 port 2570.. 2016.04.01 16:07:19 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:19 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 2570.. 2016.04.01 16:07:19 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:19 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:19 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:19 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:19 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:19 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:19 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:19 - Disconnecting. 2016.04.01 16:07:19 - Connection terminated.I 2016.04.01 16:07:22 - Checking authorization ...! 2016.04.01 16:07:23 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:23 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:23 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:23 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:23 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:23 - SSH > debug1: Connection established.. 2016.04.01 16:07:23 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:23 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/b0f218fd4d12056feb3b27b70a4b3954834f4f851a5a30c14f153bb22acb6b5a.tmp.key type -1. 2016.04.01 16:07:23 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/b0f218fd4d12056feb3b27b70a4b3954834f4f851a5a30c14f153bb22acb6b5a.tmp.key-cert type -1. 2016.04.01 16:07:23 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:23 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:23 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:23 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:23 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:23 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:23 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:23 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:23 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:23 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:24 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:24 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:24 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:24 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:24 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:24 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:24 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:24 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:24 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:24 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:24 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:24 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:25 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:25 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:25 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/b0f218fd4d12056feb3b27b70a4b3954834f4f851a5a30c14f153bb22acb6b5a.tmp.key. 2016.04.01 16:07:25 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:25 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:25 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:25 - SSH > debug1: Local connections to LOCALHOST:22654 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:25 - SSH > debug1: Local forwarding listening on ::1 port 22654.. 2016.04.01 16:07:25 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:25 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 22654.. 2016.04.01 16:07:25 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:25 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:25 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:25 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:25 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:25 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:25 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:25 - Disconnecting. 2016.04.01 16:07:25 - Connection terminated.I 2016.04.01 16:07:28 - Checking authorization ...! 2016.04.01 16:07:28 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:28 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:28 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:28 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:28 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:28 - SSH > debug1: Connection established.. 2016.04.01 16:07:28 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:28 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/f56053be4ca7585faec6078d37aea8d6ff00d8e509985c5556731a4117e6d9ef.tmp.key type -1. 2016.04.01 16:07:28 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/f56053be4ca7585faec6078d37aea8d6ff00d8e509985c5556731a4117e6d9ef.tmp.key-cert type -1. 2016.04.01 16:07:28 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:28 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:29 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:29 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:29 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:29 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:29 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:29 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:29 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:29 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:29 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:29 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:29 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:29 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:29 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:30 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:30 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:30 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:30 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/f56053be4ca7585faec6078d37aea8d6ff00d8e509985c5556731a4117e6d9ef.tmp.key. 2016.04.01 16:07:30 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:30 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:30 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:30 - SSH > debug1: Local connections to LOCALHOST:2708 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:30 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:30 - SSH > debug1: Local forwarding listening on ::1 port 2708.. 2016.04.01 16:07:30 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:30 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:30 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 2708.. 2016.04.01 16:07:30 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:30 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:30 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:30 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:30 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:30 - Disconnecting. 2016.04.01 16:07:30 - Connection terminated.I 2016.04.01 16:07:34 - Checking authorization ...! 2016.04.01 16:07:34 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:34 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:34 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:34 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:34 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:34 - SSH > debug1: Connection established.. 2016.04.01 16:07:34 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:34 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/80cd1307e781b54c5cc7bbebe142e0705a69ba6c509ec05dad93acc88c4659e5.tmp.key type -1. 2016.04.01 16:07:34 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/80cd1307e781b54c5cc7bbebe142e0705a69ba6c509ec05dad93acc88c4659e5.tmp.key-cert type -1. 2016.04.01 16:07:34 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:34 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:34 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:34 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:34 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:34 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:34 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:34 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:34 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:34 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:35 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:35 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:35 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:35 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:35 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:35 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:35 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:35 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:35 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:35 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:35 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:35 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:35 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:35 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:35 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/80cd1307e781b54c5cc7bbebe142e0705a69ba6c509ec05dad93acc88c4659e5.tmp.key. 2016.04.01 16:07:35 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:36 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:36 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:36 - SSH > debug1: Local connections to LOCALHOST:28938 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:36 - SSH > debug1: Local forwarding listening on ::1 port 28938.. 2016.04.01 16:07:36 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:36 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 28938.. 2016.04.01 16:07:36 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:36 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:36 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:36 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:36 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:36 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:36 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:36 - Disconnecting. 2016.04.01 16:07:36 - Connection terminated.I 2016.04.01 16:07:39 - Checking authorization ...! 2016.04.01 16:07:39 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:39 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:39 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:39 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:39 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:39 - SSH > debug1: Connection established.. 2016.04.01 16:07:39 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:39 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/76266c8877b04f98cd0eddc9a5fe505159531774e1bdab7af968ee047b056632.tmp.key type -1. 2016.04.01 16:07:39 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/76266c8877b04f98cd0eddc9a5fe505159531774e1bdab7af968ee047b056632.tmp.key-cert type -1. 2016.04.01 16:07:39 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:39 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:39 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:39 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:39 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:40 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:40 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:40 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:40 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:40 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:40 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:40 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:40 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:40 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:40 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:40 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:41 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:41 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:41 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:41 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/76266c8877b04f98cd0eddc9a5fe505159531774e1bdab7af968ee047b056632.tmp.key. 2016.04.01 16:07:41 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:41 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:41 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:41 - SSH > debug1: Local connections to LOCALHOST:13284 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:41 - SSH > debug1: Local forwarding listening on ::1 port 13284.. 2016.04.01 16:07:41 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:41 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 13284.. 2016.04.01 16:07:41 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:41 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:41 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:41 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:41 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:41 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:41 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:41 - Disconnecting. 2016.04.01 16:07:41 - Connection terminated.I 2016.04.01 16:07:44 - Checking authorization ...! 2016.04.01 16:07:44 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:45 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:45 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:45 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:45 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:45 - SSH > debug1: Connection established.. 2016.04.01 16:07:45 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:45 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/fcc5b525d6d0d41d9706e2f1fb994d5fcd46d52338d74a36fbb56967d3ee4485.tmp.key type -1. 2016.04.01 16:07:45 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/fcc5b525d6d0d41d9706e2f1fb994d5fcd46d52338d74a36fbb56967d3ee4485.tmp.key-cert type -1. 2016.04.01 16:07:45 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:45 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:45 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:45 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:45 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:45 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:45 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:45 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:45 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:45 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:45 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:45 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:46 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:46 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:46 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:46 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:46 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:46 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:46 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:46 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:46 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:46 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:46 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:46 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:46 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/fcc5b525d6d0d41d9706e2f1fb994d5fcd46d52338d74a36fbb56967d3ee4485.tmp.key. 2016.04.01 16:07:46 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:46 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:46 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:46 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:46 - SSH > debug1: Local connections to LOCALHOST:17898 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:46 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:46 - SSH > debug1: Local forwarding listening on ::1 port 17898.. 2016.04.01 16:07:46 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:46 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 17898.. 2016.04.01 16:07:46 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:46 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:46 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:46 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:46 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:46 - Disconnecting. 2016.04.01 16:07:47 - Connection terminated.I 2016.04.01 16:07:50 - Checking authorization ...! 2016.04.01 16:07:50 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:50 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:50 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:50 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:50 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:50 - SSH > debug1: Connection established.. 2016.04.01 16:07:50 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:50 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/3b46c116c920d7c5a74192dddbbd551a939866d8a37d11296c4f78093df529ff.tmp.key type -1. 2016.04.01 16:07:50 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/3b46c116c920d7c5a74192dddbbd551a939866d8a37d11296c4f78093df529ff.tmp.key-cert type -1. 2016.04.01 16:07:50 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:50 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:50 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:50 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:50 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:51 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:51 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:51 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:51 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:51 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:51 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:51 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:51 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:51 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:51 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:51 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:52 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:52 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:52 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/3b46c116c920d7c5a74192dddbbd551a939866d8a37d11296c4f78093df529ff.tmp.key. 2016.04.01 16:07:52 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:52 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:52 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:52 - SSH > debug1: Local connections to LOCALHOST:56837 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:52 - SSH > debug1: Local forwarding listening on ::1 port 56837.. 2016.04.01 16:07:52 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:52 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 56837.. 2016.04.01 16:07:52 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:52 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:52 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:52 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:52 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:52 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:52 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:52 - Disconnecting. 2016.04.01 16:07:52 - Connection terminated.I 2016.04.01 16:07:55 - Checking authorization ...! 2016.04.01 16:07:55 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:07:55 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:07:55 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:07:55 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:07:55 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:07:55 - SSH > debug1: Connection established.. 2016.04.01 16:07:55 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:07:55 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/61cf820ad16108e2a9b1ad508e4cc0e69136516adbbe3c0aa9daca3fb532e537.tmp.key type -1. 2016.04.01 16:07:55 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/61cf820ad16108e2a9b1ad508e4cc0e69136516adbbe3c0aa9daca3fb532e537.tmp.key-cert type -1. 2016.04.01 16:07:55 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:07:55 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:07:56 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:07:56 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:07:56 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:56 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:07:56 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:07:56 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:07:56 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:07:56 - SSH > debug1: checking without port identifier. 2016.04.01 16:07:56 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:07:56 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:07:56 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:07:56 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:07:56 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:07:57 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:07:57 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:07:57 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:07:57 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/61cf820ad16108e2a9b1ad508e4cc0e69136516adbbe3c0aa9daca3fb532e537.tmp.key. 2016.04.01 16:07:57 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:07:57 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:07:57 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:07:57 - SSH > debug1: Local connections to LOCALHOST:25992 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:07:57 - SSH > debug1: Local forwarding listening on ::1 port 25992.. 2016.04.01 16:07:57 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:07:57 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 25992.. 2016.04.01 16:07:57 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:07:57 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:07:57 - SSH > debug1: Entering interactive session.. 2016.04.01 16:07:57 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:07:57 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:07:57 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:07:57 - OpenVPN > Exiting due to fatal error! 2016.04.01 16:07:57 - Disconnecting. 2016.04.01 16:07:57 - Connection terminated.I 2016.04.01 16:08:00 - Checking authorization ...! 2016.04.01 16:08:01 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:08:01 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:08:01 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:08:01 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:08:01 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:09:08 - SSH > debug1: Connection established.. 2016.04.01 16:09:08 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:09:08 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/75dab3aac74540ba63e6dc73b793762efa4fa88102c92f39d0beeeeef714cd56.tmp.key type -1. 2016.04.01 16:09:08 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/75dab3aac74540ba63e6dc73b793762efa4fa88102c92f39d0beeeeef714cd56.tmp.key-cert type -1. 2016.04.01 16:09:08 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:09:08 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:09:08 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:09:08 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:09:08 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:09:08 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:09:08 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:09:08 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:09:08 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:09:08 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:09:08 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:09:08 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:09:09 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:09:09 - SSH > debug1: checking without port identifier. 2016.04.01 16:09:09 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:09:09 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:09:09 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:09:09 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:09:09 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:09:09 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:09:09 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:09:09 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:09:09 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:09:09 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:09:09 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/75dab3aac74540ba63e6dc73b793762efa4fa88102c92f39d0beeeeef714cd56.tmp.key. 2016.04.01 16:09:09 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:09:09 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:09:10 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:09:10 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:09:10 - SSH > debug1: Local connections to LOCALHOST:9956 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:09:10 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:09:10 - SSH > debug1: Local forwarding listening on ::1 port 9956.. 2016.04.01 16:09:10 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:09:10 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:09:10 - OpenVPN > Exiting due to fatal error. 2016.04.01 16:09:10 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 9956.. 2016.04.01 16:09:10 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:09:10 - SSH > debug1: Requesting no-more-sessions@openssh.com! 2016.04.01 16:09:10 - Disconnecting. 2016.04.01 16:09:10 - SSH > debug1: Entering interactive session.. 2016.04.01 16:09:10 - Connection terminated.I 2016.04.01 16:09:13 - Checking authorization ...! 2016.04.01 16:09:13 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:09:13 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:09:13 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:09:13 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:09:13 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:09:13 - SSH > debug1: Connection established.. 2016.04.01 16:09:13 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:09:13 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/7e6ecbae305d6e5832f6e61f05a1fad687f0febb93d2dee2e3116d72d07641e1.tmp.key type -1. 2016.04.01 16:09:13 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/7e6ecbae305d6e5832f6e61f05a1fad687f0febb93d2dee2e3116d72d07641e1.tmp.key-cert type -1. 2016.04.01 16:09:13 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:09:13 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:09:13 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:09:13 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:09:14 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:09:14 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:09:14 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:09:14 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:09:14 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:09:14 - SSH > debug1: checking without port identifier. 2016.04.01 16:09:14 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:09:14 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:09:14 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:09:14 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:09:14 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:09:15 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:09:15 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:09:15 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:09:15 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/7e6ecbae305d6e5832f6e61f05a1fad687f0febb93d2dee2e3116d72d07641e1.tmp.key. 2016.04.01 16:09:15 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:09:15 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:09:15 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:09:15 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:09:15 - SSH > debug1: Local connections to LOCALHOST:34435 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:09:15 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:09:15 - SSH > debug1: Local forwarding listening on ::1 port 34435.. 2016.04.01 16:09:15 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:09:15 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:09:15 - OpenVPN > Exiting due to fatal error. 2016.04.01 16:09:15 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 34435.. 2016.04.01 16:09:15 - SSH > debug1: channel 1: new [port listener]! 2016.04.01 16:09:15 - Disconnecting. 2016.04.01 16:09:15 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:09:15 - SSH > debug1: Entering interactive session.. 2016.04.01 16:09:15 - Connection terminated.I 2016.04.01 16:09:18 - Checking authorization ...I 2016.04.01 16:09:19 - Cancel requested.I 2016.04.01 16:09:19 - IPv6 restored on network adapter (Bluetooth DUN)I 2016.04.01 16:09:19 - IPv6 restored on network adapter (Ethernet)I 2016.04.01 16:09:19 - IPv6 restored on network adapter (Wi-Fi)I 2016.04.01 16:09:19 - IPv6 restored on network adapter (Bluetooth PAN)I 2016.04.01 16:09:19 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2016.04.01 16:09:19 - Session terminated.I 2016.04.01 16:09:21 - Session starting.I 2016.04.01 16:09:22 - IPv6 disabled on network adapter (Bluetooth DUN)I 2016.04.01 16:09:22 - IPv6 disabled on network adapter (Ethernet)I 2016.04.01 16:09:22 - IPv6 disabled on network adapter (Wi-Fi)I 2016.04.01 16:09:22 - IPv6 disabled on network adapter (Bluetooth PAN)I 2016.04.01 16:09:22 - IPv6 disabled on network adapter (Thunderbolt Bridge)I 2016.04.01 16:09:22 - Checking authorization ...! 2016.04.01 16:09:22 - Connecting to Kleeia (Canada, Vancouver). 2016.04.01 16:09:22 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011. 2016.04.01 16:09:22 - SSH > debug1: Reading configuration data /etc/ssh_config. 2016.04.01 16:09:22 - SSH > debug1: /etc/ssh_config line 20: Applying options for *. 2016.04.01 16:09:22 - SSH > debug1: Connecting to 71.19.252.33 [71.19.252.33] port 80.. 2016.04.01 16:09:22 - SSH > debug1: Connection established.. 2016.04.01 16:09:22 - SSH > debug1: permanently_set_uid: 501/20. 2016.04.01 16:09:22 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/3b1eb2ac1f43b1753adc080e618eef6620570bac1f98097cc993bcb915e86f00.tmp.key type -1. 2016.04.01 16:09:22 - SSH > debug1: identity file /Users/ruairiphillips/.airvpn/3b1eb2ac1f43b1753adc080e618eef6620570bac1f98097cc993bcb915e86f00.tmp.key-cert type -1. 2016.04.01 16:09:22 - SSH > debug1: Enabling compatibility mode for protocol 2.0. 2016.04.01 16:09:22 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2. 2016.04.01 16:09:23 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.7p1 Debian-5+deb8u1. 2016.04.01 16:09:23 - SSH > debug1: match: OpenSSH_6.7p1 Debian-5+deb8u1 pat OpenSSH*. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_KEXINIT sent. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_KEXINIT received. 2016.04.01 16:09:23 - SSH > debug1: kex: server->client aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:09:23 - SSH > debug1: kex: client->server aes128-ctr hmac-sha1-etm@openssh.com none. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<2048<8192) sent. 2016.04.01 16:09:23 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent. 2016.04.01 16:09:23 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY. 2016.04.01 16:09:23 - SSH > debug1: Server host key: RSA 51:3f:2a:63:dd:7d:fb:ef:88:48:1c:df:ee:9e:99:34. 2016.04.01 16:09:23 - SSH > debug1: checking without port identifier. 2016.04.01 16:09:23 - SSH > Warning: Permanently added '[71.19.252.33]:80' (RSA) to the list of known hosts.. 2016.04.01 16:09:23 - SSH > debug1: ssh_rsa_verify: signature correct. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_NEWKEYS sent. 2016.04.01 16:09:23 - SSH > debug1: expecting SSH2_MSG_NEWKEYS. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_NEWKEYS received. 2016.04.01 16:09:23 - SSH > debug1: Roaming not allowed by server. 2016.04.01 16:09:23 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent. 2016.04.01 16:09:24 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received. 2016.04.01 16:09:24 - SSH > debug1: Authentications that can continue: publickey,password. 2016.04.01 16:09:24 - SSH > debug1: Next authentication method: publickey. 2016.04.01 16:09:24 - SSH > debug1: Trying private key: /Users/ruairiphillips/.airvpn/3b1eb2ac1f43b1753adc080e618eef6620570bac1f98097cc993bcb915e86f00.tmp.key. 2016.04.01 16:09:24 - SSH > debug1: read PEM private key done: type RSA. 2016.04.01 16:09:24 - SSH > debug1: Authentication succeeded (publickey).. 2016.04.01 16:09:24 - SSH > Authenticated to 71.19.252.33 ([71.19.252.33]:80).. 2016.04.01 16:09:24 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.04.01 16:09:24 - SSH > debug1: Local connections to LOCALHOST:40961 forwarded to remote address 127.0.0.1:2018. 2016.04.01 16:09:24 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.04.01 16:09:24 - SSH > debug1: Local forwarding listening on ::1 port 40961.. 2016.04.01 16:09:24 - OpenVPN > RESOLVE: Cannot resolve host address: localhost: nodename nor servname provided, or not known. 2016.04.01 16:09:24 - SSH > debug1: channel 0: new [port listener]. 2016.04.01 16:09:24 - OpenVPN > Exiting due to fatal error. 2016.04.01 16:09:24 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 40961.. 2016.04.01 16:09:24 - SSH > debug1: channel 1: new [port listener]. 2016.04.01 16:09:24 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2016.04.01 16:09:24 - SSH > debug1: Entering interactive session.! 2016.04.01 16:09:24 - Disconnecting. 2016.04.01 16:09:24 - Connection terminated.
  21. I'm attempting to exclude the a certain IP range in the client (so that the IP's specified will go outside the VPN) but it will not let my use the range I specified, I cannot enter more than 0/32 (it will say that the IP is invalid if I do more than 32). Just in case it helps the IP's I'm exuding are as follows. 208.78.164.0-208.78.164.255, 208.78.165.0-208.78.165.255, 208.78.166.0-208.78.166.255any help would REALLY be appreciated, I'm desperate to get this problem fixed.
  22. Hello! So I have been having some major issues with Port forwarding. I keep getting the "error 110 Connection Timeout" and I've tried using the Airvpn listening service to no avail. i have tried with windows firewall and without. Any help is appreciated, after 2 and a half hours of trying I am at a lost. Thanks
  23. Does anyone know the easiest way to get AIR VPN on a Raspberry Pi 2? With one method using the network manager i got as far as getting the VPN connected but none of the traffic from my Pi was going through the VPN. A fix for that would be great if anyone has one or an easier method would be even better.
  24. I've been using AirVPN happily on two Windows 10 devices for a few weeks. In the last week or so, I've started to see an issue where, when connected to an AirVPN server, I'll intermittently lose all internet access. This seems to happen every 10 minutes or so. What's weird is that the AirVPN client still shows as green and even shows some network activity, but all website traffic (in any browser), Twitter, etc. are completely down. Eventually it will just start working like nothing ever happened. There are no log entries during this period in AirVPN. When it's not working, troubleshooting the Windows network connection shows an error that "Windows cannot automatically detect proxy settings." I don't have any proxy set up either in Windows or in the browsers. Any thoughts on what might be happening here?
  25. Hi guys, So I tried to buy a subscription for €15 with bitcoin but it did not get trough even tough it had 1 confirmation well before the timer went. Is there by any chance to still get the plan? Thanks!
×
×
  • Create New...