I 2020.04.24 12:59:39 - AirVPN client version: 2.10.3 / x86, System: OSX, Name: 10.12.6 / x64 . 2020.04.24 12:59:39 - Reading options from /Users/kristofertheodorakis/.airvpn/AirVPN.xml . 2020.04.24 12:59:40 - Data Path: /Users/kristofertheodorakis/.airvpn . 2020.04.24 12:59:40 - App Path: /Users/kristofertheodorakis/Downloads/PROGRAMS/AirVPN.app/Contents/MacOS . 2020.04.24 12:59:40 - Executable Path: /Users/kristofertheodorakis/Downloads/PROGRAMS/AirVPN.app/Contents/MacOS/AirVPN . 2020.04.24 12:59:40 - Command line arguments (0): . 2020.04.24 12:59:40 - Updating systems & servers data ... . 2020.04.24 12:59:40 - Operating System: Unix 16.7.0.0 - Darwin tests-mbp-5.lan 16.7.0 Darwin Kernel Version 16.7.0: Wed Apr 24 20:50:53 PDT 2019; root:xnu-3789.73.49~1/RELEASE_X86_64 x86_64 I 2020.04.24 12:59:40 - OpenVPN Driver - Expected I 2020.04.24 12:59:40 - OpenVPN - Version: OpenVPN 2.3.8 (/Users/kristofertheodorakis/Downloads/PROGRAMS/AirVPN.app/Contents/MacOS/openvpn) I 2020.04.24 12:59:40 - SSH - Version: OpenSSH_7.4p1, LibreSSL 2.5.0 (/usr/bin/ssh) I 2020.04.24 12:59:40 - SSL - Version: stunnel 5.17 (/Users/kristofertheodorakis/Downloads/PROGRAMS/AirVPN.app/Contents/MacOS/stunnel) ! 2020.04.24 12:59:40 - Ready . 2020.04.24 12:59:41 - Systems & servers data update completed I 2020.04.24 12:59:51 - Session starting. I 2020.04.24 12:59:51 - IPv6 disabled on network adapter (Ethernet) I 2020.04.24 12:59:51 - IPv6 disabled on network adapter (FireWire) I 2020.04.24 12:59:51 - IPv6 disabled on network adapter (Wi-Fi) I 2020.04.24 12:59:51 - IPv6 disabled on network adapter (Bluetooth PAN) I 2020.04.24 12:59:51 - IPv6 disabled on network adapter (Thunderbolt Bridge) I 2020.04.24 12:59:51 - Checking authorization ... ! 2020.04.24 12:59:52 - Connecting to Ukdah (Canada, Toronto, Ontario) . 2020.04.24 12:59:52 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 13 2015 . 2020.04.24 12:59:52 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2020.04.24 12:59:52 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3103 . 2020.04.24 12:59:52 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2020.04.24 12:59:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.04.24 12:59:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.04.24 12:59:52 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072] . 2020.04.24 12:59:52 - OpenVPN > UDPv4 link local: [undef] . 2020.04.24 12:59:52 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.221.58:443 . 2020.04.24 12:59:52 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.58:443, sid=ff35ae17 a80503cc . 2020.04.24 12:59:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.04.24 12:59:52 - OpenVPN > Validating certificate key usage . 2020.04.24 12:59:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.04.24 12:59:52 - OpenVPN > VERIFY KU OK . 2020.04.24 12:59:52 - OpenVPN > Validating certificate extended key usage . 2020.04.24 12:59:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.04.24 12:59:52 - OpenVPN > VERIFY EKU OK . 2020.04.24 12:59:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ukdah, emailAddress=info@airvpn.org . 2020.04.24 12:59:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2020.04.24 12:59:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.04.24 12:59:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2020.04.24 12:59:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.04.24 12:59:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.04.24 12:59:52 - OpenVPN > [Ukdah] Peer Connection Initiated with [AF_INET]184.75.221.58:443 . 2020.04.24 12:59:55 - OpenVPN > SENT CONTROL [Ukdah]: 'PUSH_REQUEST' (status=1) . 2020.04.24 12:59:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.31.232.1,route-gateway 10.31.232.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.31.232.173 255.255.255.0,peer-id 3' . 2020.04.24 12:59:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.04.24 12:59:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified . 2020.04.24 12:59:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.04.24 12:59:55 - OpenVPN > OPTIONS IMPORT: route options modified . 2020.04.24 12:59:55 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.04.24 12:59:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.04.24 12:59:55 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.04.24 12:59:55 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1561 . 2020.04.24 12:59:55 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy . 2020.04.24 12:59:55 - OpenVPN > Opened utun device utun1 . 2020.04.24 12:59:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 . 2020.04.24 12:59:55 - OpenVPN > /sbin/ifconfig utun1 delete . 2020.04.24 12:59:55 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address . 2020.04.24 12:59:55 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure . 2020.04.24 12:59:55 - OpenVPN > /sbin/ifconfig utun1 10.31.232.173 10.31.232.173 netmask 255.255.255.0 mtu 1500 up . 2020.04.24 12:59:55 - OpenVPN > /sbin/route add -net 10.31.232.0 10.31.232.173 255.255.255.0 . 2020.04.24 12:59:55 - OpenVPN > add net 10.31.232.0: gateway 10.31.232.173 . 2020.04.24 12:59:55 - OpenVPN > /sbin/route add -net 184.75.221.58 192.168.86.1 255.255.255.255 . 2020.04.24 12:59:55 - OpenVPN > add net 184.75.221.58: gateway 192.168.86.1 . 2020.04.24 12:59:55 - OpenVPN > /sbin/route add -net 0.0.0.0 10.31.232.1 128.0.0.0 . 2020.04.24 12:59:55 - OpenVPN > add net 0.0.0.0: gateway 10.31.232.1 . 2020.04.24 12:59:55 - OpenVPN > /sbin/route add -net 128.0.0.0 10.31.232.1 128.0.0.0 . 2020.04.24 12:59:55 - OpenVPN > add net 128.0.0.0: gateway 10.31.232.1 . 2020.04.24 12:59:55 - Starting Management Interface . 2020.04.24 12:59:55 - OpenVPN > Initialization Sequence Completed I 2020.04.24 12:59:55 - DNS of a network adapter forced (Ethernet) I 2020.04.24 12:59:55 - DNS of a network adapter forced (FireWire) I 2020.04.24 12:59:55 - DNS of a network adapter forced (Wi-Fi) I 2020.04.24 12:59:55 - DNS of a network adapter forced (Bluetooth PAN) I 2020.04.24 12:59:55 - DNS of a network adapter forced (Thunderbolt Bridge) I 2020.04.24 12:59:55 - Flushing DNS I 2020.04.24 12:59:55 - Checking route W 2020.04.24 13:00:26 - The request timed out ! 2020.04.24 13:00:26 - Disconnecting . 2020.04.24 13:00:26 - Management - Send 'signal SIGTERM' . 2020.04.24 13:00:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.04.24 13:00:26 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.04.24 13:00:26 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info . 2020.04.24 13:00:26 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2020.04.24 13:00:31 - OpenVPN > /sbin/route delete -net 184.75.221.58 192.168.86.1 255.255.255.255 . 2020.04.24 13:00:31 - OpenVPN > delete net 184.75.221.58: gateway 192.168.86.1 . 2020.04.24 13:00:31 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.31.232.1 128.0.0.0 . 2020.04.24 13:00:31 - OpenVPN > delete net 0.0.0.0: gateway 10.31.232.1 . 2020.04.24 13:00:31 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.31.232.1 128.0.0.0 . 2020.04.24 13:00:31 - OpenVPN > delete net 128.0.0.0: gateway 10.31.232.1 . 2020.04.24 13:00:31 - OpenVPN > Closing TUN/TAP interface . 2020.04.24 13:00:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.04.24 13:00:31 - Connection terminated. I 2020.04.24 13:00:31 - DNS of a network adapter restored to original settings (Ethernet) I 2020.04.24 13:00:31 - DNS of a network adapter restored to original settings (FireWire) I 2020.04.24 13:00:31 - DNS of a network adapter restored to original settings (Wi-Fi) I 2020.04.24 13:00:31 - DNS of a network adapter restored to original settings (Bluetooth PAN) I 2020.04.24 13:00:31 - DNS of a network adapter restored to original settings (Thunderbolt Bridge) I 2020.04.24 13:00:34 - Checking authorization ... ! 2020.04.24 13:00:35 - Connecting to Ukdah (Canada, Toronto, Ontario) . 2020.04.24 13:00:35 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Aug 13 2015 . 2020.04.24 13:00:35 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08 . 2020.04.24 13:00:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3103 . 2020.04.24 13:00:35 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file . 2020.04.24 13:00:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.04.24 13:00:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.04.24 13:00:35 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072] . 2020.04.24 13:00:35 - OpenVPN > UDPv4 link local: [undef] . 2020.04.24 13:00:35 - OpenVPN > UDPv4 link remote: [AF_INET]184.75.221.58:443 . 2020.04.24 13:00:35 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.58:443, sid=8d66344c c6608f75 . 2020.04.24 13:00:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.04.24 13:00:35 - OpenVPN > Validating certificate key usage . 2020.04.24 13:00:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0 . 2020.04.24 13:00:35 - OpenVPN > VERIFY KU OK . 2020.04.24 13:00:35 - OpenVPN > Validating certificate extended key usage . 2020.04.24 13:00:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.04.24 13:00:35 - OpenVPN > VERIFY EKU OK . 2020.04.24 13:00:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ukdah, emailAddress=info@airvpn.org . 2020.04.24 13:00:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2020.04.24 13:00:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.04.24 13:00:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key . 2020.04.24 13:00:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication . 2020.04.24 13:00:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.04.24 13:00:35 - OpenVPN > [Ukdah] Peer Connection Initiated with [AF_INET]184.75.221.58:443