. 2020.09.15 17:00:36 - Eddie version: 2.18.9 / macos_x64, System: MacOS, Name: macOS 10.15.6, Version: 10.15.6 (Build 19G2021), Mono/.Net: v4.0.30319 . 2020.09.15 17:00:36 - Command line arguments (0): . 2020.09.15 17:00:36 - Raise system privileges . 2020.09.15 17:00:40 - Profile path: /Users/kaizen/.config/eddie/default.profile . 2020.09.15 17:00:41 - Reading options from /Users/kaizen/.config/eddie/default.profile . 2020.09.15 17:00:42 - Tun Driver - Expected . 2020.09.15 17:00:42 - OpenVPN - Version: 2.4.8 - OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 (/private/var/folders/kq/72q8xvvd5qq4mnqskf4yfm3h0000gn/T/AppTranslocation/0C18711C-83FC-4DEA-A705-10A59E5D72CD/d/Eddie.app/Contents/MacOS/openvpn) . 2020.09.15 17:00:42 - SSH - Version: OpenSSH_8.1p1, LibreSSL 2.7.3 (/usr/bin/ssh) . 2020.09.15 17:00:42 - SSL - Version: stunnel 5.48 (/private/var/folders/kq/72q8xvvd5qq4mnqskf4yfm3h0000gn/T/AppTranslocation/0C18711C-83FC-4DEA-A705-10A59E5D72CD/d/Eddie.app/Contents/MacOS/stunnel) . 2020.09.15 17:00:42 - curl - Version: 7.64.1 (/usr/bin/curl) . 2020.09.15 17:00:42 - Recovery. Unexpected crash? . 2020.09.15 17:00:42 - Routes, removed an existing route, 103.254.153.99 for gateway 10.9.122.1 . 2020.09.15 17:00:42 - Routes, removed an existing route, 2001:df1:800:a000:11::9bb9 for gateway fde6:7a:7d20:57a::1 . 2020.09.15 17:00:42 - Routes, removed an existing route, 103.254.153.99 for gateway 10.9.122.1 . 2020.09.15 17:00:42 - Routes, removed an existing route, 2001:df1:800:a000:11::9bb9 for gateway fde6:7a:7d20:57a::1 I 2020.09.15 17:00:42 - Ready . 2020.09.15 17:00:44 - Collect information about AirVPN completed I 2020.09.15 17:01:02 - Session starting. I 2020.09.15 17:01:02 - Checking authorization ... ! 2020.09.15 17:01:03 - Connecting to Antares (Singapore, Singapore) . 2020.09.15 17:01:03 - OpenVPN > OpenVPN 2.4.8 x86_64-apple-darwin17.7.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Nov 22 2019 . 2020.09.15 17:01:03 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.09.15 17:01:03 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.09.15 17:01:03 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.09.15 17:01:03 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.09.15 17:01:03 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.09.15 17:01:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]103.254.153.107:443 . 2020.09.15 17:01:03 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144] . 2020.09.15 17:01:03 - OpenVPN > UDP link local: (not bound) . 2020.09.15 17:01:03 - OpenVPN > UDP link remote: [AF_INET]103.254.153.107:443 . 2020.09.15 17:01:03 - OpenVPN > TLS: Initial packet from [AF_INET]103.254.153.107:443, sid=59bfce9d 4c72cc57 . 2020.09.15 17:01:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.09.15 17:01:03 - OpenVPN > VERIFY KU OK . 2020.09.15 17:01:03 - OpenVPN > Validating certificate extended key usage . 2020.09.15 17:01:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.09.15 17:01:03 - OpenVPN > VERIFY EKU OK . 2020.09.15 17:01:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Antares, emailAddress=info@airvpn.org . 2020.09.15 17:01:03 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.09.15 17:01:03 - OpenVPN > [Antares] Peer Connection Initiated with [AF_INET]103.254.153.107:443 . 2020.09.15 17:01:04 - OpenVPN > SENT CONTROL [Antares]: 'PUSH_REQUEST' (status=1) W 2020.09.15 17:01:04 - Authorization failed. Look at the client area to discover the reason. . 2020.09.15 17:01:04 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2020.09.15 17:01:04 - OpenVPN > SIGTERM received, sending exit notification to peer ! 2020.09.15 17:01:04 - Disconnecting . 2020.09.15 17:01:04 - Sending soft termination signal . 2020.09.15 17:01:05 - OpenVPN > event_wait : Interrupted system call (code=4) . 2020.09.15 17:01:05 - OpenVPN > SIGINT[hard,] received, process exiting . 2020.09.15 17:01:05 - Connection terminated. I 2020.09.15 17:01:08 - Checking authorization ... ! 2020.09.15 17:01:08 - Connecting to Antares (Singapore, Singapore) . 2020.09.15 17:01:09 - OpenVPN > OpenVPN 2.4.8 x86_64-apple-darwin17.7.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Nov 22 2019 . 2020.09.15 17:01:09 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.09.15 17:01:09 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.09.15 17:01:09 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.09.15 17:01:09 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.09.15 17:01:09 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.09.15 17:01:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]103.254.153.107:443 . 2020.09.15 17:01:09 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144] . 2020.09.15 17:01:09 - OpenVPN > UDP link local: (not bound) . 2020.09.15 17:01:09 - OpenVPN > UDP link remote: [AF_INET]103.254.153.107:443 . 2020.09.15 17:01:09 - OpenVPN > TLS: Initial packet from [AF_INET]103.254.153.107:443, sid=8d49ddde 7a9cf775 . 2020.09.15 17:01:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.09.15 17:01:09 - OpenVPN > VERIFY KU OK . 2020.09.15 17:01:09 - OpenVPN > Validating certificate extended key usage . 2020.09.15 17:01:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.09.15 17:01:09 - OpenVPN > VERIFY EKU OK . 2020.09.15 17:01:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Antares, emailAddress=info@airvpn.org . 2020.09.15 17:01:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.09.15 17:01:09 - OpenVPN > [Antares] Peer Connection Initiated with [AF_INET]103.254.153.107:443 . 2020.09.15 17:01:10 - OpenVPN > SENT CONTROL [Antares]: 'PUSH_REQUEST' (status=1) W 2020.09.15 17:01:10 - Authorization failed. Look at the client area to discover the reason. . 2020.09.15 17:01:10 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2020.09.15 17:01:10 - OpenVPN > SIGTERM received, sending exit notification to peer ! 2020.09.15 17:01:10 - Disconnecting . 2020.09.15 17:01:10 - Sending soft termination signal . 2020.09.15 17:01:10 - OpenVPN > event_wait : Interrupted system call (code=4) . 2020.09.15 17:01:10 - OpenVPN > SIGINT[hard,] received, process exiting . 2020.09.15 17:01:10 - Connection terminated. I 2020.09.15 17:01:13 - Checking authorization ... ! 2020.09.15 17:01:14 - Connecting to Antares (Singapore, Singapore) . 2020.09.15 17:01:14 - OpenVPN > OpenVPN 2.4.8 x86_64-apple-darwin17.7.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Nov 22 2019 . 2020.09.15 17:01:14 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.09.15 17:01:14 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.09.15 17:01:14 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.09.15 17:01:14 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.09.15 17:01:14 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.09.15 17:01:14 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]103.254.153.107:443 . 2020.09.15 17:01:14 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144] . 2020.09.15 17:01:14 - OpenVPN > UDP link local: (not bound) . 2020.09.15 17:01:14 - OpenVPN > UDP link remote: [AF_INET]103.254.153.107:443 . 2020.09.15 17:01:14 - OpenVPN > TLS: Initial packet from [AF_INET]103.254.153.107:443, sid=ff0532b7 2189d048 . 2020.09.15 17:01:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.09.15 17:01:14 - OpenVPN > VERIFY KU OK . 2020.09.15 17:01:14 - OpenVPN > Validating certificate extended key usage . 2020.09.15 17:01:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.09.15 17:01:14 - OpenVPN > VERIFY EKU OK . 2020.09.15 17:01:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Antares, emailAddress=info@airvpn.org . 2020.09.15 17:01:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.09.15 17:01:15 - OpenVPN > [Antares] Peer Connection Initiated with [AF_INET]103.254.153.107:443 . 2020.09.15 17:01:16 - OpenVPN > SENT CONTROL [Antares]: 'PUSH_REQUEST' (status=1) W 2020.09.15 17:01:16 - Authorization failed. Look at the client area to discover the reason. . 2020.09.15 17:01:16 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2020.09.15 17:01:16 - OpenVPN > SIGTERM received, sending exit notification to peer ! 2020.09.15 17:01:16 - Disconnecting . 2020.09.15 17:01:16 - Sending soft termination signal . 2020.09.15 17:01:16 - OpenVPN > event_wait : Interrupted system call (code=4) . 2020.09.15 17:01:16 - OpenVPN > SIGINT[hard,] received, process exiting . 2020.09.15 17:01:16 - Connection terminated. I 2020.09.15 17:01:19 - Checking authorization ... ! 2020.09.15 17:01:20 - Connecting to Antares (Singapore, Singapore) . 2020.09.15 17:01:20 - OpenVPN > OpenVPN 2.4.8 x86_64-apple-darwin17.7.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Nov 22 2019 . 2020.09.15 17:01:20 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.09.15 17:01:20 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.09.15 17:01:20 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.09.15 17:01:20 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.09.15 17:01:20 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.09.15 17:01:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]103.254.153.107:443 . 2020.09.15 17:01:20 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144] . 2020.09.15 17:01:20 - OpenVPN > UDP link local: (not bound) . 2020.09.15 17:01:20 - OpenVPN > UDP link remote: [AF_INET]103.254.153.107:443 . 2020.09.15 17:01:20 - OpenVPN > TLS: Initial packet from [AF_INET]103.254.153.107:443, sid=642dd744 97914cb0 . 2020.09.15 17:01:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.09.15 17:01:20 - OpenVPN > VERIFY KU OK . 2020.09.15 17:01:20 - OpenVPN > Validating certificate extended key usage . 2020.09.15 17:01:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.09.15 17:01:20 - OpenVPN > VERIFY EKU OK . 2020.09.15 17:01:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Antares, emailAddress=info@airvpn.org . 2020.09.15 17:01:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.09.15 17:01:20 - OpenVPN > [Antares] Peer Connection Initiated with [AF_INET]103.254.153.107:443 . 2020.09.15 17:01:21 - OpenVPN > SENT CONTROL [Antares]: 'PUSH_REQUEST' (status=1) W 2020.09.15 17:01:21 - Authorization failed. Look at the client area to discover the reason. . 2020.09.15 17:01:21 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2020.09.15 17:01:21 - OpenVPN > SIGTERM received, sending exit notification to peer ! 2020.09.15 17:01:21 - Disconnecting . 2020.09.15 17:01:21 - Sending soft termination signal . 2020.09.15 17:01:22 - OpenVPN > event_wait : Interrupted system call (code=4) . 2020.09.15 17:01:22 - OpenVPN > SIGINT[hard,] received, process exiting . 2020.09.15 17:01:22 - Connection terminated. I 2020.09.15 17:01:25 - Checking authorization ... ! 2020.09.15 17:01:25 - Connecting to Antares (Singapore, Singapore) . 2020.09.15 17:01:26 - OpenVPN > OpenVPN 2.4.8 x86_64-apple-darwin17.7.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Nov 22 2019 . 2020.09.15 17:01:26 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.09.15 17:01:26 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.09.15 17:01:26 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.09.15 17:01:26 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.09.15 17:01:26 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.09.15 17:01:26 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]103.254.153.107:443 . 2020.09.15 17:01:26 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144] . 2020.09.15 17:01:26 - OpenVPN > UDP link local: (not bound) . 2020.09.15 17:01:26 - OpenVPN > UDP link remote: [AF_INET]103.254.153.107:443 . 2020.09.15 17:01:26 - OpenVPN > TLS: Initial packet from [AF_INET]103.254.153.107:443, sid=a3a87dd3 1a2d18a1 . 2020.09.15 17:01:26 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.09.15 17:01:26 - OpenVPN > VERIFY KU OK . 2020.09.15 17:01:26 - OpenVPN > Validating certificate extended key usage . 2020.09.15 17:01:26 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.09.15 17:01:26 - OpenVPN > VERIFY EKU OK . 2020.09.15 17:01:26 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Antares, emailAddress=info@airvpn.org . 2020.09.15 17:01:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.09.15 17:01:26 - OpenVPN > [Antares] Peer Connection Initiated with [AF_INET]103.254.153.107:443 . 2020.09.15 17:01:27 - OpenVPN > SENT CONTROL [Antares]: 'PUSH_REQUEST' (status=1) W 2020.09.15 17:01:27 - Authorization failed. Look at the client area to discover the reason. . 2020.09.15 17:01:27 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2020.09.15 17:01:27 - OpenVPN > SIGTERM received, sending exit notification to peer ! 2020.09.15 17:01:27 - Disconnecting . 2020.09.15 17:01:27 - Sending soft termination signal . 2020.09.15 17:01:27 - OpenVPN > event_wait : Interrupted system call (code=4) . 2020.09.15 17:01:27 - OpenVPN > SIGINT[hard,] received, process exiting