Jump to content
Not connected, Your IP: 3.145.186.173

Search the Community

Showing results for tags 'OpenVPN'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 198 results

  1. DD-WRT firmware with openvpn has been working perfectly for me for a long time. But today I decided to change the settings so that only a single (static) ip address on my subnet uses openvpn/airvpn. In my firewall rules I have the following line that I had to remove in order to get my new setup working. The rule is crucial to prevent a jump to my non/vpn connection in the even that a vpn server goes down. My question is how do I make an exception for a single IP that will allow me to keep this rule in place but still make an exception for my one static IP 192.168.2.160 that I want to connect to the vpn. Thanks for any help. iptables -I FORWARD -i br0 -o vlan2 -j DROP
  2. Hello. I give up trying to setup a router with DD-WRT. Each time I turn it on I have to configure a new server because it can't connect to the one already set (TLS handshake failed, Certificate is not valid, unreachable address, I get something different each time). I followed the instructions in the site (https://airvpn.org/ddwrt/), downloaded configuration for various servers, but either it takes a long to get one that connects, or can't connect to any US server at all. I'm not blaming anyone here, it's just that it's frustrating. This is the error I'm getting this time> I've connected to this server successfully before. Is there something I'm forgetting to setup on the router so once I can connect to a server and I turn the router off, the settings stay in it and next time it reconnects automatically? Any help or guidance is very much appreciated. Thank you very much in advance.
  3. I'd like to share the configuration which I use with VPN in order discuss and for others to use. The idea is to launch apps which should use VPN inside a separate network namespace. Other apps will run inside the default network namespace and use the default direct connection without VPN. Linux network namespaces enable you to configure a container with separate set of network interfaces with separate routing table, separate firewall rules and separate resolv.conf. Only processes which are inside the namespace will be able to access and use all that. You should compile network namespace support in your kernel and the support the "veth" network device. veth is a pair of virtual devices. They operate this way: data that comes into one, comes out from another and vice versa. We use them to link namespaces together because your eth0 can only exist in one namespace. I am running: OS: Gentoo init system: systemd network managent tool: netctl (from Arch Linux, available in Gentoo) You would have to adapt your configuration if you're using anything else. It should be easy. GENERAL OVERVIEW. Default namespace contains these interface: lo lan0 veth1 br0 Additional namespace contains: lo veth0 tun0 lan0 is my physical net interface (you could think of that as eth0). Kernel links veth0 to veth1. br0 bridges lan0 and veth1 together. tun0 is the VPN tunnel through veth0. I called my additional namespace "vpn". This way processes from both namespaces can communicate with my LAN. Processes from the default namespace communicate this way: (br0) -> lan0. Processes from "vpn" namespace communicate this way. In case of a LAN connection: veth0 -> veth1 -> (br0) -> lan0 In general case: tun0 -> veth0 -> veth1 -> (br0) -> lan0 STEP 1. Startup script. Create a startup script which takes care of creating veth0/veth1 pair for you. It also creates the vpn namespace. In my case it is a systemd unit which runs before netctl: [unit] Description=Custom network namespace Before=netctl@bridge.service network.target Wants=network.target [service] Type=oneshot RemainAfterExit=1 ExecStart=/bin/ip netns add vpn ExecStart=/bin/ip link add type veth ExecStart=/bin/ip link set veth0 address 16:7c:e1:06:53:dd ExecStart=/bin/ip link set veth1 address f6:7c:e1:06:53:dd ExecStart=/bin/ip link set veth0 netns vpn ExecStart=/bin/ip link set veth1 up ExecStop=/bin/ip netns delete vpn [install] WantedBy=multi-user.target You can see that I am assigning MAC addresses here manually. The point is how br0 gets its MAC address. I want lan0's MAC higher than veth1's MAC in order for br0 to use lan0's MAC and for MAC-based DHCP server not to misbehave on my router. If br0 gets veth1's MAC, the machine will get a different IP address in comparison to what it gets without a bridge. STEP 2. resolv.conf After you run the script or reboot, you have to setup resolv.conf for the namespace. Look for it in /etc/netns/vpn/resolv.conf. For airvpn it should contain "nameserver 10.4.0.1" line. For a shell running in "vpn" namespace, /etc/netns/vpn/resolv.conf will be automatically bound to /etc/resolv.conf. STEP 3. Bridge interface. Setup the bridge interface. In my case it is a netctl profile in /etc/netctl/bridge: Description="bridge connection" Interface=br0 Connection=bridge BindsToInterfaces=(lan0 veth1) IP=dhcp TimeoutDHCP=15 STEP 4. Running openvpn in the namespace. Reboot and check that br0 is up. Create a helper script /usr/local/bin/ns_enter: #!/bin/bash ifconfig lo up ifconfig veth0 up ip route flush table main ip add flush dev veth0 ip add add 192.168.1.100/24 dev veth0 ip route add default via 192.168.1.1 metric 10 iptables -F OUTPUT iptables -A OUTPUT -d 95.211.138.7 -j ACCEPT iptables -A OUTPUT -d 192.168.1.0/24 -j ACCEPT iptables -A OUTPUT -o tun0 -j ACCEPT iptables -P OUTPUT DROP Note that you have to specify the IP address and gateway for your LAN. Now you enter the namespace this way: sudo ip netns exec vpn /usr/local/bin/ns_enter sudo ip netns exec vpn su - <your_username> 95.211.138.7 is the VPN server. This rules allow all local traffic (192.168.1.0/24) and all traffic through VPN. Note that you cannot put hostname instead of 95.211.138.7 in your .ovpn file because openvpn wouldn't be able to resolve it. Check that the shell has access to exactly 2 interfaces: lo, veth0 (run ifconfig for that). Now launch openvpn: sudo openvpn --config /etc/openvpn/airvpn.ovpn --daemon You should see the 3rd interface (tun0) appear soon. Ready to roll. You can launch apps in background from the shell. The only serious problem I've encountered is that you can't runs apps which need dbus connections this way. I haven't figured out how to fix that yet. Setting the envitonment variable didn't help. Does anyone know why?
  4. I started using AirVPN just recently. I downloaded a .tar archive for OpenVPN from the website and there are 2 problems with it: 1. All files inside have rwxrwxrwx permissions (.ovpn, ca.crt, user.crt, user.key). Since I downloaded a tar, not zip, it should be possible to prevent that. 2. The instructions on the website do not tell you to change permissions, they only tell to unpack the archive and launch "sudo openvpn <filename.ovpn>". Many users might overlook the problem.
  5. Hi all, I've build a pfsense router myself because I found that speeds were dramatically dropping through my Linksys router (EA6500) or through my client. By building my own router I had more control over the hardware and firmware. I have a 200 Mb/s - 10 Mb/s ISP connection. My router build as follows: Shutlle DS61 V1.1 mini ITX barebone / socket 1155 / 2 x Gbit LAN2 x 4 GB SO DDR3 Kingston HyperXIntel XEON E3-1230 V2 3.10 GHz (has no graphic chip)Kingston 60 GB SSDIn order to get graphics (which I'll need for installation, since the mini ITX motherboard doesn't support an extra graphics card) I bought an old Celeron 2.70 GHz with graphic chip. Now pfsense is installed, I will be using the Celeron for a while in case something goes wrong in pfsense settings and I'll be needing graphics again. So after I'm done with installing packages, setting up everything, I will replace it with the XEON. Speedtest with the Celeron while connected to VPN I think that is pretty impressive since I had around 60 Mb/s - 9.5 Mb/s before I had this router. If you forget about the XEON and keep the Celeron (for 24/7 use, I'll take the XEON also because of it's 'AES NI' instruction within the chipset) it will cost you about 500 dollars or about 370 euro's. The XEON included adds an extra 250 dollars or 195 euro's. This is a better investment than buying any other consumer router with a 600 MHz Broadcom processor. This is a kick ass router! For a proper installation of pfsense I can recommend this video: (good packages: squid, havp, snort (get a paid oinkcode for 27 dollars/year, otherwise you'll have a 10 days delay in updates)) SET UP AIRVPN IN PFSENSE Configure an airvpn *.ovpn file (use a region, airvpn will connect to the best server automatically)From the pfSense interface, navigate to the dropdown menus: System ---> Cert Manager and stay in the first tab.Click the button as seen here to create a new certificate. Give it a description like: cert airvpn. Ensure that "Import an existing certificate authority" is selected. Open the *.ovpn file and copy/paste the first certificate (starting with: -----BEGIN CERTIFICATE----- and ending with: -----END CERTIFICATE-----) into the 1st fieldClick save (leave the orher field empty)Click on the tab Certificates and click on the plus button as seen here Give it a description like: certificate airvpn. Ensure that "Import an existing certificate authority" is selected.Open the *.ovpn file and copy/paste the second certificate (starting with: ---- CERTIFICATE:----- and ending with: -----END CERTIFICATE-----) into the 1st fieldSo in the file it looks like this: -----END CERTIFICATE----- (end of the first certificate we've just imported) </ca> <cert> Certificate: The second copy/paste should start at: Certificate: copy/paste the third certificate (starting with: -----BEGIN CERTIFICATE----- and ending with: -----END CERTIFICATE-----) into the 3d fieldClick saveNavigate to the system dropdown menus: VPN ---> OpenVPNClick the Client tab and click on the Plus buttonFollow below settings in the pictures where: 1. serverhost or host adres can be found in the *.ovpn file ending with probably airvpn.org, 2.The serverport can be found in the top of the *ovpn file as well. Navigate to the system dropdown menus Interfaces ----> (assign) and click on the Plus button -Note in the previous screenshot you will notice a StrongVPN interface. you will NOT have that on your box yet, so dont worry. After clicking on the plus button pfSense will tell you it has successfully added a new interface. the network port name will most likley be named "ovpnc1". Ensure that the new interface is selected as "ovpnc1" (it could be ovpnc2, ovpnc3, etc... depends if you have other ovpn interfaces or not)navigate to the system dropdown menus Interfaces ---> OPT1 (or whatever your new interface from the previous step is) and follow steps in below picture Click saveNavigate to the system dropdown menus System ---> Routing and click on the Plus button Follow the settings in the picture below -Note 1: The ip seen in the picture 208.67.222.222 is the ip of OpenDNS -Note 2: By selecting "Default Gateway", the connection to the internet drops if the VPN connection drops. You'll have to set the WAN as default manually in the case if you need an internet connection. navigate to the system dropdown menus Firewall ---> Rules and click on the LAN tabClick on the Plus button to create a new ruleFollow instructions in the picture below Action: PASS -- Interface: LAN Protocol: ANY Source: LAN Subnet Destination: ANY -- Description: LAN to Internet force through VPN **IMPORTANT**: scroll down to "Gateway" under the "Advanced features" of the rule. Set gateway to your VPN interface (see above picture). After Clicking save, you should see something like this navigate to the system dropdown menus Firewall ---> NAT and click on the Outbound tabenable "Manual Outbound NAT rule generation" and select save. Reboot the router and you're done... If you want to/need to start manually, go to Status -----> Services and click on the Play button next to the VPN interface status. Check Status ------> Dashboard for connections as seen in the picture below (in the WAN section you'll see your ISP's IP, which is connection you're coming from to Airvpn (Note from AirVPN: We inevitably know it. Any reference will be deleted when the connection is closed). Don't worry, you're visible with a different IP on the internet. The reason I choose a XEON is the 10% watt reduction and the AES NI instructions in the chip (AirVPN is 256 bit AES encrypted). This will lower my CPU usage and speed up the process. Below you find a picture with system loads while having 10 torrents running and downloading a large file at full speed from usenet (ssl encrypted)... See the CPU usage on the Celeron. That will change I think with a XEON. Good luck and don't forget to install Snort, HAVP and Squit on your pfsense. Good guides out there on Google... knicker
  6. Hi, Thanks for a great VPN service. I've been using the Windows client so far with no problems. However, I recently bought an Asus RT-N16 router for the purpose of bridging with the router upstairs, in order to get a wired Internet connection downstairs. This worked out well. I also wanted to use openVPN on the router downstairs using tomato (shibby), but I've run into a problem. In the howto article it says I have to change the DNS servers under basic/networking, but the problem is as the router is bridged to the router upstairs, the gateway and first DNS address is the LAN address to the router upstairs. I've tried setting up openVPN without changing the DNS settings, but it didn't seem to work very well (at all). Is it possible to use openVPN on a tomato router that is bridged to another router that it gets the internet access from?
  7. Hi, On windows 8, home computer, all is OK, airvpn good speed... but... On laptop linux (arch), sometime some websites display slowly (google), but most websites does not display. (Its the same line, internet box, ISP) I try with various protocols and various ports (udp 443, tcp 443 ...53) but nothing... My config file : client dev tun proto udp remote earth.vpn.airdns.org 53 resolv-retry infinite nobind ns-cert-type server cipher AES-256-CBC comp-lzo verb 3 explicit-exit-notify 5 ca "etc/openvpn/ca.crt" cert "etc/openvpn/user.crt" key "etc/openvpn/user.key" I lauched openvpn : # openvpn /etc/openvpn/airvpn_UDP_53.ovpn Tue Sep 24 09:59:14 2013 OpenVPN 2.3.2 x86_64-unknown-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [eurephia] [MH] [iPv6] built on Jun 9 2013 Tue Sep 24 09:59:14 2013 Socket Buffers: R=[212982->131062] S=[212982->131062] Tue Sep 24 09:59:14 2013 UDPv4 link local: [undef] Tue Sep 24 09:59:14 2013 UDPv4 link remote: [AF_INET]181.74.203.161:53 Tue Sep 24 09:59:14 2013 TLS: Initial packet from [AF_INET]181.74.203.161:53, sid=bd1c2aa8 deb44c102 Tue Sep 24 09:59:15 2013 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Tue Sep 24 09:59:15 2013 VERIFY OK: nsCertType=SERVER Tue Sep 24 09:59:15 2013 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@vpninfo.org Tue Sep 24 09:59:17 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Tue Sep 24 09:59:17 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Tue Sep 24 09:59:17 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Tue Sep 24 09:59:17 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Tue Sep 24 09:59:17 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA Tue Sep 24 09:59:17 2013 [server] Peer Connection Initiated with [AF_INET]181.74.203.161:53 Tue Sep 24 09:59:19 2013 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Tue Sep 24 09:59:19 2013 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.7.0.1,comp-lzo no,route 10.7.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.7.1.97 10.7.1.96 Tue Sep 24 09:59:19 2013 OPTIONS IMPORT: timers and/or timeouts modified Tue Sep 24 09:59:19 2013 OPTIONS IMPORT: LZO parms modified Tue Sep 24 09:59:19 2013 OPTIONS IMPORT: --ifconfig/up options modified Tue Sep 24 09:59:19 2013 OPTIONS IMPORT: route options modified Tue Sep 24 09:59:19 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Tue Sep 24 09:59:19 2013 ROUTE_GATEWAY 192.168.0.254/255.255.255.0 IFACE=enp3s0f2 HWADDR=b2:35:42:c1:a3:47 Tue Sep 24 09:59:19 2013 TUN/TAP device tun0 opened Tue Sep 24 09:59:19 2013 TUN/TAP TX queue length set to 100 Tue Sep 24 09:59:19 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 Tue Sep 24 09:59:19 2013 /usr/bin/ip link set dev tun0 up mtu 1500 Tue Sep 24 09:59:19 2013 /usr/bin/ip addr add dev tun0 local 10.7.1.97 peer 10.7.1.96 Tue Sep 24 09:59:19 2013 /usr/bin/ip route add 181.74.203.161/32 via 192.168.0.254 Tue Sep 24 09:59:19 2013 /usr/bin/ip route add 0.0.0.0/1 via 10.7.1.96 Tue Sep 24 09:59:19 2013 /usr/bin/ip route add 128.0.0.0/1 via 10.7.1.96 Tue Sep 24 09:59:19 2013 /usr/bin/ip route add 10.7.0.1/32 via 10.7.1.96 Tue Sep 24 09:59:19 2013 Initialization Sequence Completed Can you help me please ?
  8. Mon Sep 16 23:06:33 2013 Warning: cannot open --log file: C:\Program Files\OpenVPN\log\AirVPN_Singapore_TCP-443.log: Access is denied. (errno=5) Mon Sep 16 23:06:33 2013 OpenVPN 2.3.2 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [iPv6] built on Aug 22 2013 Mon Sep 16 23:06:33 2013 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340 Mon Sep 16 23:06:33 2013 Need hold release from management interface, waiting... Mon Sep 16 23:06:33 2013 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340 Mon Sep 16 23:06:33 2013 MANAGEMENT: CMD 'state on' Mon Sep 16 23:06:33 2013 MANAGEMENT: CMD 'log all on' Mon Sep 16 23:06:33 2013 MANAGEMENT: CMD 'hold off' Mon Sep 16 23:06:33 2013 MANAGEMENT: CMD 'hold release' Mon Sep 16 23:06:33 2013 Socket Buffers: R=[8192->8192] S=[8192->8192] Mon Sep 16 23:06:33 2013 Attempting to establish TCP connection with [AF_INET]127.0.0.1:9150 Mon Sep 16 23:06:33 2013 MANAGEMENT: >STATE:1379369193,TCP_CONNECT,,, Mon Sep 16 23:06:34 2013 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Mon Sep 16 23:06:39 2013 MANAGEMENT: >STATE:1379369199,TCP_CONNECT,,, Mon Sep 16 23:06:40 2013 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Mon Sep 16 23:06:45 2013 MANAGEMENT: >STATE:1379369205,TCP_CONNECT,,, Mon Sep 16 23:06:46 2013 TCP: connect to [AF_INET]127.0.0.1:9150 failed, will try again in 5 seconds: Connection refused (WSAECONNREFUSED) Why is this not working?
  9. Hi, sorry for being a noob, i am trying to connect mg phone with Android 4.2.2, i followed the instructions but when i try to import the ovpn file openvpn says "profile import failed: line too long" any help? Thanks
  10. Hi, I have just updated my OpenSSH version to version 6.2p2 - although this made me notice that (as far as I can tell), the AirVPN servers utilise version 5.5p1 (Debian-6+squeeze2). Are there any plans to update this soon, given the number of bug fixes and exploit patches that have been introduced since? Cheers!
  11. help !! i've set up pfsense to work with airvpn. my ip address shows as the desired location and it makes me think everything is set up correctly. but . . . when i do a dns test it shows my true ip address from the internet company. also, when i log on to this web site it indicates "not connected" and shows the same ip address. i have tried various combinations for the dns settings of general setup. for the dns server i have 10.0.5.1 and 10.0.4.1. i've tried various combinations of the "allow dns server list" box and the "do not use the dns forwarder" box. what am i missing? what settings do i need to mask my ip address with no dns leaks??? this noob appreciates any assistance.
  12. Asus RT-N16: DD-WRTBroadcom BCM4716 chip rev 1Clock = 500 MHz (slightly up from factory 480) My bottleneck is at the router while utilizing the DD-WRT OpenVPN Client function. I get a 40% decrease in bandwidth as apposed to using VPN straight from the computer. This is due to limintations of the onboard processor. I use the router because I have just the one VPN account so I have all the computers in the network going through it. I tested the bandwidth with just a single computer connected to assure that it wasn't a network sharing issue. Now I believe my options are: Overclock the hell out of the router. Running some kind of local OpenVPN Server. Purchase a better router. Purchase additional separate monthly VPN accounts I would like to go with 2 because its the cheapest and less risky. Also because I am already running a local tower as SFTP file server and Ubuntu+Debian package archive mirror. Now my knowledge of OpenVPN is limited as is my knowledge of DD-wrt routing functions. Ideally I would like to prevent any and all PlainText traffic. So I think my setup would look roughly like this. Current Configuration: [Computers & Devices] --P--> [Router] --E--> [iSP] --E--> [VPN Provider] --P--> [internet] Proposed Configuration: [Computers & Devices] --P--> [Router] --P--> [Local OpenVPN Server] --E--> [Router] --E--> [iSP] --E--> [VPN Provider] --P--> [internet] P = PlainText E = Encrypted VPN Tunnel
  13. Any one else working on an SSH Tunnelled OpenVPN connection on DD-WRT? I have the SSH Tunnel standing up correctly and the OpenVPN connection connecting correctly. HOWEVER, no port 80 traffic. Only pings, traceroute, etc. Ideas? Suggestions? Once I have it working I will write up a how to. If you are in China you need this info!
  14. Hello, I saw that when I am connecting through air over shh, in the Client Area it is not shown my real ip. Why is that?
  15. I really love the ability tunnel all the openvpn traffic through ssl or ssh. I'm not sure which is more secure or faster. I normally use ssl tunnelling and do most of my daily browsing and I've no problem other than a bit of latency sometimes. Thank you for your thoughtful and very important service.
  16. I have successfully followed the AirVPN instructions on setting up the Asus RT-N66U's (Merlin firmware) openvpn client. My concern now is protecting privacy in the event the VPN drops & traffic continues through the ISP. I would like to route all client traffic through the VPN & in the event it drops, no access to the internet is available to the clients. Does anyone know of a solution for this ? A workable solution exists for the for DD-WRT routers & I'm guessing similar one can be done for the RT-N66U as it runs a variant of DD-WRT (AsusWRT). I'm not technical enough to implement it so would appreciate any help. https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=4287&Itemid=142#4287
  17. Hi, I'm using AirVPN successfully on my Mac (10.8.2) with Tunnelblick. However I want to get VPN over SSH working too. I have got the SSH key, openvpn binary, and .sh and .ovpn through the config generator, and the SSH tunnel successfully connects; $ ./AirVPN_United\ Kingdom_SSH-22.sh AirVPN SSH Tunnel OpenSSH_5.9p1, OpenSSL 0.9.8r 8 Feb 2011 debug1: Reading configuration data /etc/ssh_config debug1: /etc/ssh_config line 20: Applying options for * debug1: /etc/ssh_config line 53: Applying options for * debug1: Connecting to 31.193.12.98 [31.193.12.98] port 22. [...] debug1: Connection to port 1412 forwarding to 127.0.0.1 port 2018 requested. debug1: channel 2: new [direct-tcpip] debug1: channel 2: free: direct-tcpip: listening port 1412 for 127.0.0.1 port 2018, connect from 127.0.0.1 port 56739, nchannels 3 debug1: Connection to port 1412 forwarding to 127.0.0.1 port 2018 requested. debug1: channel 2: new [direct-tcpip] debug1: channel 2: free: direct-tcpip: listening port 1412 for 127.0.0.1 port 2018, connect from 127.0.0.1 port 56754, nchannels 3 When I launch the openvpn though, I get an error - "Cannot allocate TUN/TAP dev dynamically" $ sudo ./openvpn AirVPN_United\ Kingdom_SSH-22.ovpn Mon Jul 8 18:12:09 2013 OpenVPN 2.3.1 x86_64-apple-darwin11.1.0 [sSL (OpenSSL)] [LZO] [eurephia] [MH] [iPv6] built on Apr 26 2013 Mon Jul 8 18:12:09 2013 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables Mon Jul 8 18:12:09 2013 Socket Buffers: R=[131072->65536] S=[131072->65536] Mon Jul 8 18:12:09 2013 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1412 [nonblock] Mon Jul 8 18:12:10 2013 TCP connection established with [AF_INET]127.0.0.1:1412 Mon Jul 8 18:12:10 2013 TCPv4_CLIENT link local: [undef] Mon Jul 8 18:12:10 2013 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:1412 Mon Jul 8 18:12:11 2013 TLS: Initial packet from [AF_INET]127.0.0.1:1412, sid=22ba3002 6e01312b Mon Jul 8 18:12:21 2013 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mon Jul 8 18:12:21 2013 VERIFY OK: nsCertType=SERVER Mon Jul 8 18:12:21 2013 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org Mon Jul 8 18:12:47 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Mon Jul 8 18:12:47 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Mon Jul 8 18:12:47 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Mon Jul 8 18:12:47 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Mon Jul 8 18:12:47 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA Mon Jul 8 18:12:47 2013 [server] Peer Connection Initiated with [AF_INET]127.0.0.1:1412 Mon Jul 8 18:12:49 2013 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Mon Jul 8 18:12:51 2013 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.50.0.1,comp-lzo no,route 10.50.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.50.0.58 10.50.0.57' Mon Jul 8 18:12:51 2013 OPTIONS IMPORT: timers and/or timeouts modified Mon Jul 8 18:12:51 2013 OPTIONS IMPORT: LZO parms modified Mon Jul 8 18:12:51 2013 OPTIONS IMPORT: --ifconfig/up options modified Mon Jul 8 18:12:51 2013 OPTIONS IMPORT: route options modified Mon Jul 8 18:12:51 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mon Jul 8 18:12:51 2013 ROUTE_GATEWAY 10.101.0.1/255.255.128.0 IFACE=en1 HWADDR=b8::12:3b:d1:36 Mon Jul 8 18:12:51 2013 Cannot allocate TUN/TAP dev dynamically Mon Jul 8 18:12:51 2013 Exiting due to fatal error The Google hits I've found have all been related to Tunnelblick on the Mac, but for me Tunnelblick is working absolutely fine. Any suggestions on resolving this please?
  18. It repeats this over and over but I haven't had any problems using your service up to now. Sun Jun 23 17:00:18 2013 OpenVPN 2.2.1 x86_64-linux-gnu [sSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [iPv6 payload 20110424-2 (2.2RC2)] built on Feb 13 2013 Sun Jun 23 17:00:18 2013 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables Sun Jun 23 17:00:18 2013 LZO compression initialized Sun Jun 23 17:00:18 2013 Control Channel MTU parms [ L:1560 D:140 EF:40 EB:0 ET:0 EL:0 ] Sun Jun 23 17:00:18 2013 Socket Buffers: R=[87380->131072] S=[16384->131072] Sun Jun 23 17:00:18 2013 Data Channel MTU parms [ L:1560 D:1450 EF:60 EB:135 ET:0 EL:0 AF:3/1 ] Sun Jun 23 17:00:18 2013 Local Options hash (VER=V4): '958c5492' Sun Jun 23 17:00:18 2013 Expected Remote Options hash (VER=V4): '79ef4284' Sun Jun 23 17:00:18 2013 Attempting to establish TCP connection with [AF_INET]127.0.0.1:1413 [nonblock] Sun Jun 23 17:00:18 2013 TCP connection established with [AF_INET]127.0.0.1:1413 Sun Jun 23 17:00:18 2013 TCPv4_CLIENT link local: [undef] Sun Jun 23 17:00:18 2013 TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:1413 2013.06.23 17:00:18 LOG5[2676:140584081340160]: Service [openvpn] accepted connection from 127.0.0.1:57934 2013.06.23 17:00:18 LOG6[2676:140584081340160]: connect_blocking: connecting 31.193.12.100:443 2013.06.23 17:00:20 LOG3[2676:140584081340160]: connect_blocking: connect 31.193.12.100:443: Connection refused (111) 2013.06.23 17:00:20 LOG5[2676:140584081340160]: Connection reset: 0 byte(s) sent to SSL, 0 byte(s) sent to socket Sun Jun 23 17:00:20 2013 Connection reset, restarting [-1] Sun Jun 23 17:00:20 2013 TCP/UDP: Closing socket Sun Jun 23 17:00:20 2013 SIGUSR1[soft,connection-reset] received, process restarting
  19. Hi, I'm currently on the 3 day trial to determine if AirVPN will suit my needs. I'm having some problems with it disconnecting on me though. It will stay connected for 15-20 seconds and then silently fail. Then after a minute or two it will reconnect again. This cycle will then just continue on. Here is the log from 3 cycles of this occuring. I'm using the newest version of Kubuntu (13.04). If you need any other information please let me know. $ sudo openvpn AirVPN_US-Andromedae_UDP-443.ovpn [sudo] password for REMOVED: Wed May 29 02:47:09 2013 OpenVPN 2.2.1 x86_64-linux-gnu [sSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [iPv6 payload 20110424-2 (2.2RC2)] built on Feb 13 2013 Wed May 29 02:47:09 2013 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables Wed May 29 02:47:09 2013 WARNING: file 'user.key' is group or others accessible Wed May 29 02:47:09 2013 LZO compression initialized Wed May 29 02:47:09 2013 Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ] Wed May 29 02:47:09 2013 Socket Buffers: R=[212992->131072] S=[212992->131072] Wed May 29 02:47:09 2013 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ] Wed May 29 02:47:09 2013 Local Options hash (VER=V4): '22188c5b' Wed May 29 02:47:09 2013 Expected Remote Options hash (VER=V4): 'a8f55717' Wed May 29 02:47:09 2013 UDPv4 link local: [undef] Wed May 29 02:47:09 2013 UDPv4 link remote: [AF_INET]108.59.8.142:443 Wed May 29 02:47:09 2013 TLS: Initial packet from [AF_INET]108.59.8.142:443, sid=1ea35428 d0b27fcf Wed May 29 02:47:09 2013 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org Wed May 29 02:47:09 2013 VERIFY OK: nsCertType=SERVER Wed May 29 02:47:09 2013 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org Wed May 29 02:47:16 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Wed May 29 02:47:16 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Wed May 29 02:47:16 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Wed May 29 02:47:16 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Wed May 29 02:47:16 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA Wed May 29 02:47:16 2013 [server] Peer Connection Initiated with [AF_INET]108.59.8.142:443 Wed May 29 02:47:19 2013 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Wed May 29 02:47:19 2013 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.42.174 10.4.42.173' Wed May 29 02:47:19 2013 OPTIONS IMPORT: timers and/or timeouts modified Wed May 29 02:47:19 2013 OPTIONS IMPORT: LZO parms modified Wed May 29 02:47:19 2013 OPTIONS IMPORT: --ifconfig/up options modified Wed May 29 02:47:19 2013 OPTIONS IMPORT: route options modified Wed May 29 02:47:19 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Wed May 29 02:47:19 2013 ROUTE default_gateway=192.168.1.1 Wed May 29 02:47:19 2013 TUN/TAP device tun0 opened Wed May 29 02:47:19 2013 TUN/TAP TX queue length set to 100 Wed May 29 02:47:19 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 Wed May 29 02:47:19 2013 /sbin/ifconfig tun0 10.4.42.174 pointopoint 10.4.42.173 mtu 1500 Wed May 29 02:47:19 2013 /sbin/route add -net 108.59.8.142 netmask 255.255.255.255 gw 192.168.1.1 Wed May 29 02:47:19 2013 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.4.42.173 Wed May 29 02:47:19 2013 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.4.42.173 Wed May 29 02:47:19 2013 /sbin/route add -net 10.4.0.1 netmask 255.255.255.255 gw 10.4.42.173 Wed May 29 02:47:19 2013 Initialization Sequence Completed Wed May 29 02:49:19 2013 [server] Inactivity timeout (--ping-restart), restarting Wed May 29 02:49:19 2013 TCP/UDP: Closing socket Wed May 29 02:49:19 2013 /sbin/route del -net 10.4.0.1 netmask 255.255.255.255 Wed May 29 02:49:19 2013 /sbin/route del -net 108.59.8.142 netmask 255.255.255.255 Wed May 29 02:49:19 2013 /sbin/route del -net 0.0.0.0 netmask 128.0.0.0 Wed May 29 02:49:19 2013 /sbin/route del -net 128.0.0.0 netmask 128.0.0.0 Wed May 29 02:49:19 2013 Closing TUN/TAP interface Wed May 29 02:49:19 2013 /sbin/ifconfig tun0 0.0.0.0 Wed May 29 02:49:19 2013 SIGUSR1[soft,ping-restart] received, process restarting Wed May 29 02:49:19 2013 Restart pause, 2 second(s) Wed May 29 02:49:21 2013 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables Wed May 29 02:49:21 2013 WARNING: file 'user.key' is group or others accessible Wed May 29 02:49:21 2013 LZO compression initialized Wed May 29 02:49:21 2013 Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ] Wed May 29 02:49:21 2013 Socket Buffers: R=[212992->131072] S=[212992->131072] Wed May 29 02:49:21 2013 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ] Wed May 29 02:49:21 2013 Local Options hash (VER=V4): '22188c5b' Wed May 29 02:49:21 2013 Expected Remote Options hash (VER=V4): 'a8f55717' Wed May 29 02:49:21 2013 UDPv4 link local: [undef] Wed May 29 02:49:21 2013 UDPv4 link remote: [AF_INET]108.59.8.142:443 Wed May 29 02:49:21 2013 TLS: Initial packet from [AF_INET]108.59.8.142:443, sid=8bee1ae8 1457c8f8 Wed May 29 02:49:21 2013 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org Wed May 29 02:49:21 2013 VERIFY OK: nsCertType=SERVER Wed May 29 02:49:21 2013 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org Wed May 29 02:49:26 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Wed May 29 02:49:26 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Wed May 29 02:49:26 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Wed May 29 02:49:26 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Wed May 29 02:49:26 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA Wed May 29 02:49:26 2013 [server] Peer Connection Initiated with [AF_INET]108.59.8.142:443 Wed May 29 02:49:29 2013 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Wed May 29 02:49:29 2013 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.42.174 10.4.42.173' Wed May 29 02:49:29 2013 OPTIONS IMPORT: timers and/or timeouts modified Wed May 29 02:49:29 2013 OPTIONS IMPORT: LZO parms modified Wed May 29 02:49:29 2013 OPTIONS IMPORT: --ifconfig/up options modified Wed May 29 02:49:29 2013 OPTIONS IMPORT: route options modified Wed May 29 02:49:29 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Wed May 29 02:49:29 2013 ROUTE default_gateway=192.168.1.1 Wed May 29 02:49:29 2013 TUN/TAP device tun0 opened Wed May 29 02:49:29 2013 TUN/TAP TX queue length set to 100 Wed May 29 02:49:29 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 Wed May 29 02:49:29 2013 /sbin/ifconfig tun0 10.4.42.174 pointopoint 10.4.42.173 mtu 1500 Wed May 29 02:49:29 2013 /sbin/route add -net 108.59.8.142 netmask 255.255.255.255 gw 192.168.1.1 Wed May 29 02:49:29 2013 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.4.42.173 Wed May 29 02:49:29 2013 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.4.42.173 Wed May 29 02:49:29 2013 /sbin/route add -net 10.4.0.1 netmask 255.255.255.255 gw 10.4.42.173 Wed May 29 02:49:29 2013 Initialization Sequence Completed Wed May 29 02:51:27 2013 [server] Inactivity timeout (--ping-restart), restarting Wed May 29 02:51:27 2013 TCP/UDP: Closing socket Wed May 29 02:51:27 2013 /sbin/route del -net 10.4.0.1 netmask 255.255.255.255 Wed May 29 02:51:27 2013 /sbin/route del -net 108.59.8.142 netmask 255.255.255.255 Wed May 29 02:51:27 2013 /sbin/route del -net 0.0.0.0 netmask 128.0.0.0 Wed May 29 02:51:27 2013 /sbin/route del -net 128.0.0.0 netmask 128.0.0.0 Wed May 29 02:51:27 2013 Closing TUN/TAP interface Wed May 29 02:51:27 2013 /sbin/ifconfig tun0 0.0.0.0 Wed May 29 02:51:27 2013 SIGUSR1[soft,ping-restart] received, process restarting Wed May 29 02:51:27 2013 Restart pause, 2 second(s) Wed May 29 02:51:29 2013 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables Wed May 29 02:51:29 2013 WARNING: file 'user.key' is group or others accessible Wed May 29 02:51:29 2013 LZO compression initialized Wed May 29 02:51:29 2013 Control Channel MTU parms [ L:1558 D:138 EF:38 EB:0 ET:0 EL:0 ] Wed May 29 02:51:29 2013 Socket Buffers: R=[212992->131072] S=[212992->131072] Wed May 29 02:51:29 2013 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ] Wed May 29 02:51:29 2013 Local Options hash (VER=V4): '22188c5b' Wed May 29 02:51:29 2013 Expected Remote Options hash (VER=V4): 'a8f55717' Wed May 29 02:51:29 2013 UDPv4 link local: [undef] Wed May 29 02:51:29 2013 UDPv4 link remote: [AF_INET]108.59.8.142:443 Wed May 29 02:51:29 2013 TLS: Initial packet from [AF_INET]108.59.8.142:443, sid=f5a8a0d4 a7d96f55 Wed May 29 02:51:29 2013 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org_CA/emailAddress=info@airvpn.org Wed May 29 02:51:29 2013 VERIFY OK: nsCertType=SERVER Wed May 29 02:51:29 2013 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=server/emailAddress=info@airvpn.org Wed May 29 02:51:29 2013 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Wed May 29 02:51:29 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Wed May 29 02:51:29 2013 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Wed May 29 02:51:29 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Wed May 29 02:51:29 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA Wed May 29 02:51:29 2013 [server] Peer Connection Initiated with [AF_INET]108.59.8.142:443 Wed May 29 02:51:32 2013 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Wed May 29 02:51:32 2013 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.42.174 10.4.42.173' Wed May 29 02:51:32 2013 OPTIONS IMPORT: timers and/or timeouts modified Wed May 29 02:51:32 2013 OPTIONS IMPORT: LZO parms modified Wed May 29 02:51:32 2013 OPTIONS IMPORT: --ifconfig/up options modified Wed May 29 02:51:32 2013 OPTIONS IMPORT: route options modified Wed May 29 02:51:32 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Wed May 29 02:51:32 2013 ROUTE default_gateway=192.168.1.1 Wed May 29 02:51:32 2013 TUN/TAP device tun0 opened Wed May 29 02:51:32 2013 TUN/TAP TX queue length set to 100 Wed May 29 02:51:32 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 Wed May 29 02:51:32 2013 /sbin/ifconfig tun0 10.4.42.174 pointopoint 10.4.42.173 mtu 1500 Wed May 29 02:51:32 2013 /sbin/route add -net 108.59.8.142 netmask 255.255.255.255 gw 192.168.1.1 Wed May 29 02:51:32 2013 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.4.42.173 Wed May 29 02:51:32 2013 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.4.42.173 Wed May 29 02:51:32 2013 /sbin/route add -net 10.4.0.1 netmask 255.255.255.255 gw 10.4.42.173 Wed May 29 02:51:32 2013 Initialization Sequence Completed
  20. Hi As the topic say - does anyone know how to configure the openvpn client in a tomato (shibbys) firmware router not to tunnel traffic on a specific port. Example: I want everything except Utorrent port 4548 and Usenet port 119 to be tunneled thru airvpn. My LAN is based on a 192.168.1.x subnet (where my router router has 192.168.1.3 Regards Daniel
  21. Hello! ISSUE (CRITICAL) Just 4 days ago Tunnelblick 3.3beta44 was released. We can now surely recommend the upgrade to 3.3beta44 (or beta46) to all Mac OS X 10.8.x (Mountain Lion) users, however it is now clear that there's a critical problem with this version of Tunnelblick and OpenVPN 2.2.1 which prevents connections to our service. SOLUTION Switch to OpenVPN 2.3.x from inside Tunnelblick menu. Kind regards
  22. I've been looking at pre-configured DD-WRT dual band routers on flashrouters[dot]com. They set up OpenVPN on a list of VPN services, but AirVPN isn't listed. They also offer to install/configure for other OpenVPN providers if there's a install manual provided by the VPN provider. Will there be any problem with sharing the install information to them? Is it against the rules to run connections from 2 computers through the router to your service?
  23. Hi, Just wanted to share a solution which (for me) continued from this post , which explained in great detail how to set up your OpenVPN with linux. After having followed the steps exactly, I was unable to click on the "Save" button to save my VPN configuration/import because the "save" button was just grey. No matter what I tried, the button just stayed grey. Having researched this topic on Google, I found many posts where other Linux users had the same problem and in some instances reported this as a bug. Like here for example. Well, as it turns out the answer is so simple, that I could kick myself for having not thought of such a simple solution earlier. The answer is right here on AirVPN. Normally when saving a configuration, you probably just save it from AirVPN onto your laptop or computer, right? Well, there is one single thing that you need to do prior to clicking the Generate button. Place a "tick" in the "Advanced Mode box. Then pick "Linux and others", and most importantly under Advanced pick "Separe keys/certs from .ovpn file". You then get seperate files: ca.crt, user.crt, user.key, and the .ovpn file. Then click the "Import" button button in your Network > VPN config section and import the .ovpn file. It automatically populates all the other fields with your other certificates and keys. And your "Save" button is now clickable.
×
×
  • Create New...