Jump to content
Not connected, Your IP: 34.201.8.144

Search the Community

Showing results for tags 'restarting'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 2 results

  1. I recently purchased AirVPN and wanted to use it on my Imac that has windows bootcamped on it (that might have something to do with it). I keep trying to connect to a server, but it constantly just restarts and doesn't work properly. I have found other threads with the same problem, but none oftheir solutions worked for me. These are my logs I hope any of you can be of service. Thank You. I 2018.01.14 11:09:17 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.16299.0, Mono/.Net Framework: v4.0.30319. 2018.01.14 11:09:18 - Reading options from C:\Users\Aaron Lozhkin\AppData\Local\AirVPN\AirVPN.xml. 2018.01.14 11:09:18 - Command line arguments (1): path="home"I 2018.01.14 11:09:22 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2I 2018.01.14 11:09:22 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l 25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)I 2018.01.14 11:09:22 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)I 2018.01.14 11:09:22 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)I 2018.01.14 11:09:22 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)I 2018.01.14 11:09:22 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem. 2018.01.14 11:09:23 - Updating systems & servers data ...! 2018.01.14 11:09:23 - Ready. 2018.01.14 11:09:24 - Systems & servers data update completedI 2018.01.14 11:09:38 - Checking login ...! 2018.01.14 11:09:39 - Logged in.I 2018.01.14 11:09:42 - Session starting.. 2018.01.14 11:09:43 - IPv6 disabled with packet filtering.I 2018.01.14 11:09:47 - Checking authorization ...! 2018.01.14 11:09:48 - Connecting to Cephei (Canada, Toronto, Ontario). 2018.01.14 11:09:48 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.01.14 11:09:48 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.01.14 11:09:48 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.01.14 11:09:48 - Connection to OpenVPN Management Interface. 2018.01.14 11:09:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.01.14 11:09:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.162:443. 2018.01.14 11:09:48 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.01.14 11:09:48 - OpenVPN > UDP link local: (not bound). 2018.01.14 11:09:48 - OpenVPN > UDP link remote: [AF_INET]184.75.214.162:443. 2018.01.14 11:09:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.01.14 11:09:48 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.214.162:443, sid=4b733229 f2c60aa0. 2018.01.14 11:09:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.01.14 11:09:48 - OpenVPN > VERIFY KU OK. 2018.01.14 11:09:48 - OpenVPN > Validating certificate extended key usage. 2018.01.14 11:09:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.01.14 11:09:48 - OpenVPN > VERIFY EKU OK. 2018.01.14 11:09:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.01.14 11:09:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.01.14 11:09:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.214.162:443. 2018.01.14 11:09:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.01.14 11:09:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.117.254 255.255.0.0'. 2018.01.14 11:09:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.01.14 11:09:50 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.01.14 11:09:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.01.14 11:09:50 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.01.14 11:09:50 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.01.14 11:09:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.01.14 11:09:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.01.14 11:09:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.01.14 11:09:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:50 - OpenVPN > interactive service msg_channel=0. 2018.01.14 11:09:50 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=9 HWADDR=ec:35:86:52:65:02! 2018.01.14 11:09:50 - Disconnecting. 2018.01.14 11:09:50 - Connection terminated.I 2018.01.14 11:09:53 - Checking authorization ...! 2018.01.14 11:09:54 - Connecting to Regulus (Canada, Toronto, Ontario). 2018.01.14 11:09:54 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.01.14 11:09:54 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.01.14 11:09:54 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.01.14 11:09:54 - Connection to OpenVPN Management Interface. 2018.01.14 11:09:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.01.14 11:09:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:54 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.34:443. 2018.01.14 11:09:54 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.01.14 11:09:54 - OpenVPN > UDP link local: (not bound). 2018.01.14 11:09:54 - OpenVPN > UDP link remote: [AF_INET]184.75.221.34:443. 2018.01.14 11:09:54 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.01.14 11:09:54 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.34:443, sid=d1979e04 9eab1da8. 2018.01.14 11:09:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.01.14 11:09:54 - OpenVPN > VERIFY KU OK. 2018.01.14 11:09:54 - OpenVPN > Validating certificate extended key usage. 2018.01.14 11:09:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.01.14 11:09:54 - OpenVPN > VERIFY EKU OK. 2018.01.14 11:09:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.01.14 11:09:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.01.14 11:09:55 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.34:443. 2018.01.14 11:09:56 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.01.14 11:09:56 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.21.160 255.255.0.0'. 2018.01.14 11:09:56 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.01.14 11:09:56 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.01.14 11:09:56 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.01.14 11:09:56 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.01.14 11:09:56 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.01.14 11:09:56 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.01.14 11:09:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.01.14 11:09:56 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.01.14 11:09:56 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:09:56 - OpenVPN > interactive service msg_channel=0. 2018.01.14 11:09:56 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=9 HWADDR=ec:35:86:52:65:02! 2018.01.14 11:09:56 - Disconnecting. 2018.01.14 11:09:56 - Connection terminated.I 2018.01.14 11:09:59 - Checking authorization ...! 2018.01.14 11:10:03 - Connecting to Mintaka (Canada, Toronto, Ontario). 2018.01.14 11:10:03 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.01.14 11:10:03 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.01.14 11:10:03 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.01.14 11:10:03 - Connection to OpenVPN Management Interface. 2018.01.14 11:10:03 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.01.14 11:10:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.218:443. 2018.01.14 11:10:03 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.01.14 11:10:03 - OpenVPN > UDP link local: (not bound). 2018.01.14 11:10:03 - OpenVPN > UDP link remote: [AF_INET]184.75.223.218:443. 2018.01.14 11:10:03 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.01.14 11:10:03 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.218:443, sid=373e21ff 395332df. 2018.01.14 11:10:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.01.14 11:10:03 - OpenVPN > VERIFY KU OK. 2018.01.14 11:10:03 - OpenVPN > Validating certificate extended key usage. 2018.01.14 11:10:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.01.14 11:10:03 - OpenVPN > VERIFY EKU OK. 2018.01.14 11:10:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.01.14 11:10:03 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.01.14 11:10:03 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.218:443. 2018.01.14 11:10:04 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.01.14 11:10:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.33.169 255.255.0.0'. 2018.01.14 11:10:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.01.14 11:10:04 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.01.14 11:10:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.01.14 11:10:04 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.01.14 11:10:04 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.01.14 11:10:04 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.01.14 11:10:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.01.14 11:10:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.01.14 11:10:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:04 - OpenVPN > interactive service msg_channel=0. 2018.01.14 11:10:04 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=9 HWADDR=ec:35:86:52:65:02! 2018.01.14 11:10:04 - Disconnecting. 2018.01.14 11:10:04 - Connection terminated.I 2018.01.14 11:10:07 - Checking authorization ...! 2018.01.14 11:10:08 - Connecting to Tegmen (Canada, Toronto, Ontario). 2018.01.14 11:10:08 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.01.14 11:10:08 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.01.14 11:10:08 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.01.14 11:10:08 - Connection to OpenVPN Management Interface. 2018.01.14 11:10:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.01.14 11:10:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]137.63.71.50:443. 2018.01.14 11:10:08 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.01.14 11:10:08 - OpenVPN > UDP link local: (not bound). 2018.01.14 11:10:08 - OpenVPN > UDP link remote: [AF_INET]137.63.71.50:443. 2018.01.14 11:10:08 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.01.14 11:10:10 - OpenVPN > TLS: Initial packet from [AF_INET]137.63.71.50:443, sid=f11e385e b86412f6. 2018.01.14 11:10:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.01.14 11:10:10 - OpenVPN > VERIFY KU OK. 2018.01.14 11:10:10 - OpenVPN > Validating certificate extended key usage. 2018.01.14 11:10:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.01.14 11:10:10 - OpenVPN > VERIFY EKU OK. 2018.01.14 11:10:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tegmen, emailAddress=info@airvpn.org. 2018.01.14 11:10:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.01.14 11:10:10 - OpenVPN > [Tegmen] Peer Connection Initiated with [AF_INET]137.63.71.50:443! 2018.01.14 11:10:11 - Disconnecting. 2018.01.14 11:10:11 - Connection terminated.I 2018.01.14 11:10:14 - Checking authorization ...! 2018.01.14 11:10:15 - Connecting to Tyl (Canada, Toronto, Ontario). 2018.01.14 11:10:15 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017. 2018.01.14 11:10:15 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit. 2018.01.14 11:10:15 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.01.14 11:10:15 - Connection to OpenVPN Management Interface. 2018.01.14 11:10:15 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.01.14 11:10:15 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:15 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.01.14 11:10:15 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.202:443. 2018.01.14 11:10:15 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]. 2018.01.14 11:10:15 - OpenVPN > UDP link local: (not bound). 2018.01.14 11:10:15 - OpenVPN > UDP link remote: [AF_INET]184.75.223.202:443. 2018.01.14 11:10:15 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.01.14 11:10:15 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.202:443, sid=d6e8c2f8 49cc15b3. 2018.01.14 11:10:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.01.14 11:10:15 - OpenVPN > VERIFY KU OK. 2018.01.14 11:10:15 - OpenVPN > Validating certificate extended key usage. 2018.01.14 11:10:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.01.14 11:10:15 - OpenVPN > VERIFY EKU OK. 2018.01.14 11:10:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.01.14 11:10:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.01.14 11:10:15 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.202:443. 2018.01.14 11:10:16 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)! 2018.01.14 11:10:17 - Disconnecting. 2018.01.14 11:10:17 - Connection terminated.I 2018.01.14 11:10:20 - Checking authorization .... 2018.01.14 11:10:29 - Above log line repeated 2 times moreI 2018.01.14 11:10:29 - Cancel requested.. 2018.01.14 11:10:29 - IPv6 restored with packet filtering.! 2018.01.14 11:10:29 - Session terminated.
  2. Hi! I have installed AirVPN using the .deb file and I then run the Eddie from a desktop manager. Then I log in successfully and try to connect to a server and here the problems occur... I starting saying "connecting to server", then "restarting", then "connecting to server", then "restarting".... Just like a loop and I cannot connect to any server! I have just said for this so it is really frustrating for me. I have tried to enable "network lock" and have tried to change the protocol to TCP but non of it worked, sadly. I HAVE ATTACHED THE LOG FILE Can anybody help me with this one? Thanks! It is really appreciated! Cheers, Me
×
×
  • Create New...