Jump to content
Not connected, Your IP: 52.14.176.111

Search the Community

Showing results for tags 'e900'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 1 result

  1. Hi, I was using the dd-wrt with AirVPN for more than a year. Unfortunately it has stopped working since last couple of days. I have tried and updated the certificates but of new use. I am posting the log below and the router settings are attached. Can someone please help? Serverlog Clientlog 20180425 19:13:15 I OpenVPN 2.3.0 mipsel-unknown-linux-gnu [sSL (OpenSSL)] [LZO] [EPOLL] [MH] [iPv6] built on Mar 25 2013 20180425 19:13:15 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16 20180425 19:13:15 W NOTE: the current --script-security setting may allow this configuration to call user-defined scripts 20180425 19:13:15 W WARNING: file '/tmp/openvpncl/client.key' is group or others accessible 20180425 19:13:15 W WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible 20180425 19:13:15 I Control Channel Authentication: using '/tmp/openvpncl/ta.key' as a OpenVPN static key file 20180425 19:13:15 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 20180425 19:13:15 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication 20180425 19:13:15 Socket Buffers: R=[114688->131072] S=[114688->131072] 20180425 19:13:15 I UDPv4 link local: [undef] 20180425 19:13:15 I UDPv4 link remote: [AF_INET]213.152.161.100:53 20180425 19:13:15 TLS: Initial packet from [AF_INET]213.152.161.100:53 sid=bee09a1d eb5855ac 20180425 19:14:05 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20180425 19:14:05 D MANAGEMENT: CMD 'state' 20180425 19:14:05 MANAGEMENT: Client disconnected 20180425 19:14:05 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20180425 19:14:05 D MANAGEMENT: CMD 'state' 20180425 19:14:05 MANAGEMENT: Client disconnected 20180425 19:14:05 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20180425 19:14:05 D MANAGEMENT: CMD 'state' 20180425 19:14:05 MANAGEMENT: Client disconnected 20180425 19:14:05 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16 20180425 19:14:05 D MANAGEMENT: CMD 'log 500'
×
×
  • Create New...