Jump to content
Not connected, Your IP: 13.59.218.147
Weasel

Cannot connect to Cynosura (Vancouver Canada) for months

Recommended Posts

Like another poster I have not been able to connect to Cynosura since well back in 2017.  I can connect to any other server, but that one fails at the DNS check.

 

I 2018.02.06 13:00:03 - Eddie version: 2.13.6 / windows_x64, System: Windows, Name: Windows 8.1, Version: Microsoft Windows NT 6.3.9600.0, Mono/.Net Framework: v4.0.30319
. 2018.02.06 13:00:03 - Reading options from C:\Users\Chris\AppData\Local\AirVPN\AirVPN.xml
. 2018.02.06 13:00:03 - Command line arguments (1): path="home"
I 2018.02.06 13:00:05 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.2
I 2018.02.06 13:00:05 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
I 2018.02.06 13:00:05 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
I 2018.02.06 13:00:05 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
I 2018.02.06 13:00:05 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
I 2018.02.06 13:00:05 - Certification Authorities: C:\Program Files\AirVPN\cacert.pem
. 2018.02.06 13:00:05 - Updating systems & servers data ...
! 2018.02.06 13:00:05 - Ready
. 2018.02.06 13:00:06 - Systems & servers data update completed
I 2018.02.06 13:00:06 - Checking login ...
! 2018.02.06 13:00:07 - Logged in.
! 2018.02.06 13:00:14 - Activation of Network Lock - Windows Filtering Platform
I 2018.02.06 13:00:18 - Session starting.
. 2018.02.06 13:00:18 - IPv6 disabled with packet filtering.
I 2018.02.06 13:00:18 - Checking authorization ...
! 2018.02.06 13:00:19 - Connecting to Cynosura (Canada, Vancouver)
. 2018.02.06 13:00:19 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.02.06 13:00:19 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.02.06 13:00:19 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.02.06 13:00:19 - Connection to OpenVPN Management Interface
. 2018.02.06 13:00:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.02.06 13:00:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.06 13:00:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.06 13:00:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443
. 2018.02.06 13:00:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.02.06 13:00:19 - OpenVPN > UDP link local: (not bound)
. 2018.02.06 13:00:19 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443
. 2018.02.06 13:00:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.02.06 13:00:19 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=6debc49e 0b190428
. 2018.02.06 13:00:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.06 13:00:19 - OpenVPN > VERIFY KU OK
. 2018.02.06 13:00:19 - OpenVPN > Validating certificate extended key usage
. 2018.02.06 13:00:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.06 13:00:19 - OpenVPN > VERIFY EKU OK
. 2018.02.06 13:00:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org
. 2018.02.06 13:00:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.06 13:00:19 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]71.19.252.21:443
. 2018.02.06 13:00:21 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1)
. 2018.02.06 13:00:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.90 255.255.0.0,peer-id 24,cipher AES-256-GCM'
. 2018.02.06 13:00:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.06 13:00:21 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.02.06 13:00:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.06 13:00:21 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.06 13:00:21 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.06 13:00:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.06 13:00:21 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.02.06 13:00:21 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.02.06 13:00:21 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.02.06 13:00:21 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.02.06 13:00:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.02.06 13:00:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.02.06 13:00:21 - OpenVPN > interactive service msg_channel=0
. 2018.02.06 13:00:21 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=12 HWADDR=24:77:03:1a:30:24
. 2018.02.06 13:00:21 - OpenVPN > open_tun
. 2018.02.06 13:00:21 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D34CCD9A-7A08-4E4C-AD2A-39FEDB17E164}.tap
. 2018.02.06 13:00:21 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.02.06 13:00:21 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.1.90/255.255.0.0 [sUCCEEDED]
. 2018.02.06 13:00:21 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.1.90/255.255.0.0 on interface {D34CCD9A-7A08-4E4C-AD2A-39FEDB17E164} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.02.06 13:00:21 - OpenVPN > Successful ARP Flush on interface [15] {D34CCD9A-7A08-4E4C-AD2A-39FEDB17E164}
. 2018.02.06 13:00:21 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.02.06 13:00:26 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.02.06 13:00:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.21 MASK 255.255.255.255 192.168.0.1
. 2018.02.06 13:00:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2018.02.06 13:00:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.02.06 13:00:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.02.06 13:00:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.02.06 13:00:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.02.06 13:00:26 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.02.06 13:00:26 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.02.06 13:00:26 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.02.06 13:00:26 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.02.06 13:00:26 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.02.06 13:00:26 - DNS leak protection with packet filtering enabled.
. 2018.02.06 13:00:26 - DNS of a network adapter forced (TAP-Windows Adapter V9, from manual (10.50.0.1) to 10.4.0.1)
. 2018.02.06 13:00:26 - Flushing DNS
I 2018.02.06 13:00:29 - Checking route
I 2018.02.06 13:00:29 - Checking DNS
. 2018.02.06 13:00:30 - Checking DNS failed: zuvbdcrxlivcafrcpjuildyhhhvkjdeg
. 2018.02.06 13:00:30 - Checking DNS (2° try)
. 2018.02.06 13:00:31 - Checking DNS failed: zuvbdcrxlivcafrcpjuildyhhhvkjdeg
. 2018.02.06 13:00:31 - Checking DNS (3° try)
. 2018.02.06 13:00:33 - Checking DNS failed: zuvbdcrxlivcafrcpjuildyhhhvkjdeg
E 2018.02.06 13:00:33 - Checking DNS failed.

. 2018.02.06 13:00:33 - OpenVPN > Initialization Sequence Completed
! 2018.02.06 13:00:33 - Disconnecting
. 2018.02.06 13:00:33 - Sending management termination signal
. 2018.02.06 13:00:33 - Management - Send 'signal SIGTERM'
. 2018.02.06 13:00:38 - Connection terminated.
. 2018.02.06 13:00:38 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9, to 10.50.0.1)
. 2018.02.06 13:00:38 - DNS leak protection with packet filtering disabled.
. 2018.02.06 13:00:38 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.02.06 13:00:38 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
I 2018.02.06 13:00:40 - Cancel requested.
. 2018.02.06 13:00:40 - IPv6 restored with packet filtering.
! 2018.02.06 13:00:40 - Session terminated.
I 2018.02.06 13:00:45 - Session starting.
. 2018.02.06 13:00:45 - IPv6 disabled with packet filtering.
I 2018.02.06 13:00:45 - Checking authorization ...
! 2018.02.06 13:00:45 - Connecting to Homam (Canada, Vancouver)
. 2018.02.06 13:00:45 - OpenVPN > OpenVPN 2.4.3 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 23 2017
. 2018.02.06 13:00:45 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.02.06 13:00:45 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.02.06 13:00:45 - Connection to OpenVPN Management Interface
. 2018.02.06 13:00:45 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.02.06 13:00:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.06 13:00:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.06 13:00:45 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.26:443
. 2018.02.06 13:00:45 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.02.06 13:00:45 - OpenVPN > UDP link local: (not bound)
. 2018.02.06 13:00:45 - OpenVPN > UDP link remote: [AF_INET]71.19.252.26:443
. 2018.02.06 13:00:45 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.02.06 13:00:45 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.26:443, sid=4005295e a634ec0b
. 2018.02.06 13:00:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.06 13:00:45 - OpenVPN > VERIFY KU OK
. 2018.02.06 13:00:45 - OpenVPN > Validating certificate extended key usage
. 2018.02.06 13:00:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.06 13:00:45 - OpenVPN > VERIFY EKU OK
. 2018.02.06 13:00:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Homam, emailAddress=info@airvpn.org
. 2018.02.06 13:00:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.06 13:00:46 - OpenVPN > [Homam] Peer Connection Initiated with [AF_INET]71.19.252.26:443
. 2018.02.06 13:00:47 - OpenVPN > SENT CONTROL [Homam]: 'PUSH_REQUEST' (status=1)
. 2018.02.06 13:00:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.15.100 255.255.0.0,peer-id 20,cipher AES-256-GCM'
. 2018.02.06 13:00:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.06 13:00:47 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.02.06 13:00:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.06 13:00:47 - OpenVPN > OPTIONS IMPORT: route options modified
. 2018.02.06 13:00:47 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.06 13:00:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.06 13:00:47 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.02.06 13:00:47 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.02.06 13:00:47 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.02.06 13:00:47 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.02.06 13:00:47 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.02.06 13:00:47 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.02.06 13:00:47 - OpenVPN > interactive service msg_channel=0
. 2018.02.06 13:00:47 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=12 HWADDR=24:77:03:1a:30:24
. 2018.02.06 13:00:47 - OpenVPN > open_tun
. 2018.02.06 13:00:47 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D34CCD9A-7A08-4E4C-AD2A-39FEDB17E164}.tap
. 2018.02.06 13:00:47 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.02.06 13:00:47 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.15.100/255.255.0.0 [sUCCEEDED]
. 2018.02.06 13:00:47 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.15.100/255.255.0.0 on interface {D34CCD9A-7A08-4E4C-AD2A-39FEDB17E164} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.02.06 13:00:47 - OpenVPN > Successful ARP Flush on interface [15] {D34CCD9A-7A08-4E4C-AD2A-39FEDB17E164}
. 2018.02.06 13:00:47 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.02.06 13:00:52 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.02.06 13:00:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 71.19.252.26 MASK 255.255.255.255 192.168.0.1
. 2018.02.06 13:00:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2018.02.06 13:00:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.02.06 13:00:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.02.06 13:00:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.02.06 13:00:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.02.06 13:00:52 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.02.06 13:00:52 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2018.02.06 13:00:52 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.02.06 13:00:52 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.02.06 13:00:52 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.02.06 13:00:52 - DNS leak protection with packet filtering enabled.
. 2018.02.06 13:00:52 - Flushing DNS
I 2018.02.06 13:00:55 - Checking route
I 2018.02.06 13:00:55 - Checking DNS
! 2018.02.06 13:00:57 - Connected.
. 2018.02.06 13:00:57 - OpenVPN > Initialization Sequence Completed
. 2018.02.06 13:06:35 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #284071 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2018.02.06 13:10:58 - Above log line repeated 9 times more
. 2018.02.06 13:10:58 - Updating systems & servers data ...
. 2018.02.06 13:11:00 - Systems & servers data update completed
. 2018.02.06 13:11:32 - OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #613312 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
 

Share this post


Link to post

No help on this?  Still can't connect to the one server I always use to use because it was fast for me.

Share this post


Link to post

Hello!

 

. 2018.02.06 13:00:26 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.02.06 13:00:26 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6

 

Maybe you could try turning off IPv6 on all interfaces, including TAP. Air only just started rolling out IPv6.

 

You also got:

OpenVPN > AEAD Decrypt error: bad packet ID (may be a replay): [ #284071 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings

 

In which case I recommend you try switching to the TCP protocol in Eddie.

 

You may also experiment with going to Eddie preferences>DNS>Unchecking Check Air DNS. See if that changes anything.

 

Otherwise, as the other posters, you're always welcome to contact support, instead of waiting on a forum reply from volunteers such as myself .


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Hi;  Thanks for the feedback.  I checked Eddie, ip6 was disabled in the advanced settings but not under the "windows only" part but is now.  I have always had ip6 disabled in my network adapter.  For protocols I have been using automatic, I tried tcp but still nothing and there is no difference using ssl/ssh.

 

Disabling check DNS did work, but isn't the check DNS a security check to make sure the DNS isn't leaking or is properly configured?

 

I didn't know the tech problem area relied on volunteers, I thought the guys who run AIR would take care of it.

Share this post


Link to post

It's not ideal to disable DNS check, but to my understanding, as long as you use Network Lock you'll be good.

 

The forums are open for all. While you'll see the Staff account commenting quite frequently. They're the ones who run Air.

 

But if you want real professional support, you can always use the Contact Us tab

 

You could also try out the experimental client. I doubt if it'll change anything, but it can hardly hurt in most cases. But otherwise your issue is fixed for now at least.


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post

Thanks for your help LZ1.  I always use network lock and run DNS leak checks quite often, especially since firefox updates often reset about:config, like webrtc which was just reset on me with the latest update.

Share this post


Link to post

You're welcome. I should say there's little need for that though, as Network Lock also protects you from WebRTC leaks.

 

If you worry so much about DNS leaks, I would also urge you to consider switching to Linux, as there's no DNS leaks on Linux . Because Windows does DNS in a strange way compared to it.

 

Lastly, I would also urge you to consider trying out the experimental client if you wish, in case you want a headstart on new features and bugfixes. It's not dangerous .


Moderators do not speak on behalf of AirVPN. Only the Official Staff account does. Please also do not run Tor Exit Servers behind AirVPN, thank you.
Did you make a guide or how-to for something? Then contact me to get it listed in my new user guide's Guides Section, so that the community can find it more easily.

Share this post


Link to post
Guest
This topic is now closed to further replies.

×
×
  • Create New...