Jump to content
Not connected, Your IP: 18.226.34.148
Sign in to follow this  
dadndadn

Mac OS 10.8.5, client 2.7, constant connecting/restart

Recommended Posts

Hi,

 

can't connect on my MacBook Pro, OS 10.8.5, client v.2.7

 

Any server, going into "Connecting..." state, then "Restart in 3sec", etc. Endless loop.

 

OK, then second laptop, OS 10.10, all works like a charm.  

 

Any ideas? Thank you!

 

Here's the log:

 

I 2014.11.24 18:46:02 - Session starting.
! 2014.11.24 18:46:02 - Checking environment
! 2014.11.24 18:46:02 - Checking authorization ...
! 2014.11.24 18:46:03 - Connecting to Librae (United States, Manassas, Virginia)
. 2014.11.24 18:46:03 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Oct 18 2014
. 2014.11.24 18:46:03 - OpenVPN > library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.05
. 2014.11.24 18:46:03 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2014.11.24 18:46:03 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2014.11.24 18:46:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.11.24 18:46:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.11.24 18:46:03 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]
. 2014.11.24 18:46:03 - OpenVPN > UDPv4 link local: [undef]
. 2014.11.24 18:46:03 - OpenVPN > UDPv4 link remote: [AF_INET]108.59.11.194:443
. 2014.11.24 18:46:03 - OpenVPN > TLS: Initial packet from [AF_INET]108.59.11.194:443, sid=2eade0fd 174c3bba
. 2014.11.24 18:46:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2014.11.24 18:46:04 - OpenVPN > Validating certificate key usage
. 2014.11.24 18:46:04 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2014.11.24 18:46:04 - OpenVPN > VERIFY KU OK
. 2014.11.24 18:46:04 - OpenVPN > Validating certificate extended key usage
. 2014.11.24 18:46:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2014.11.24 18:46:04 - OpenVPN > VERIFY EKU OK
. 2014.11.24 18:46:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2014.11.24 18:46:04 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2014.11.24 18:46:04 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.11.24 18:46:04 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2014.11.24 18:46:04 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.11.24 18:46:04 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2014.11.24 18:46:04 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]108.59.11.194:443
. 2014.11.24 18:46:06 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2014.11.24 18:46:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.148.170 10.4.148.169'
. 2014.11.24 18:46:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2014.11.24 18:46:06 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2014.11.24 18:46:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2014.11.24 18:46:06 - OpenVPN > OPTIONS IMPORT: route options modified
. 2014.11.24 18:46:06 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2014.11.24 18:46:06 - OpenVPN > dyld: lazy symbol binding failed: Symbol not found: ___strlcpy_chk
. 2014.11.24 18:46:06 - OpenVPN >   Referenced from: /Applications/AirVPN.app/Contents/MacOS/openvpn
. 2014.11.24 18:46:06 - OpenVPN >   Expected in: /usr/lib/libSystem.B.dylib
. 2014.11.24 18:46:06 - OpenVPN >
. 2014.11.24 18:46:06 - OpenVPN > dyld: Symbol not found: ___strlcpy_chk
. 2014.11.24 18:46:06 - OpenVPN >   Referenced from: /Applications/AirVPN.app/Contents/MacOS/openvpn
. 2014.11.24 18:46:06 - OpenVPN >   Expected in: /usr/lib/libSystem.B.dylib
. 2014.11.24 18:46:06 - OpenVPN >
! 2014.11.24 18:46:07 - Disconnecting
. 2014.11.24 18:46:07 - Connection terminated.
! 2014.11.24 18:46:10 - Checking authorization ...
! 2014.11.24 18:46:11 - Connecting to Librae (United States, Manassas, Virginia)
. 2014.11.24 18:46:11 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Oct 18 2014
. 2014.11.24 18:46:11 - OpenVPN > library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.05
. 2014.11.24 18:46:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2014.11.24 18:46:11 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2014.11.24 18:46:11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.11.24 18:46:11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.11.24 18:46:11 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]
. 2014.11.24 18:46:11 - OpenVPN > UDPv4 link local: [undef]
. 2014.11.24 18:46:11 - OpenVPN > UDPv4 link remote: [AF_INET]108.59.11.194:443
. 2014.11.24 18:46:11 - OpenVPN > TLS: Initial packet from [AF_INET]108.59.11.194:443, sid=0eda2ef1 fae9b711
. 2014.11.24 18:46:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2014.11.24 18:46:11 - OpenVPN > Validating certificate key usage
. 2014.11.24 18:46:11 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2014.11.24 18:46:11 - OpenVPN > VERIFY KU OK
. 2014.11.24 18:46:11 - OpenVPN > Validating certificate extended key usage
. 2014.11.24 18:46:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2014.11.24 18:46:11 - OpenVPN > VERIFY EKU OK
. 2014.11.24 18:46:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2014.11.24 18:46:11 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2014.11.24 18:46:11 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.11.24 18:46:11 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2014.11.24 18:46:11 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.11.24 18:46:11 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2014.11.24 18:46:11 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]108.59.11.194:443
. 2014.11.24 18:46:14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2014.11.24 18:46:14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.148.170 10.4.148.169'
. 2014.11.24 18:46:14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2014.11.24 18:46:14 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2014.11.24 18:46:14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2014.11.24 18:46:14 - OpenVPN > OPTIONS IMPORT: route options modified
. 2014.11.24 18:46:14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2014.11.24 18:46:14 - OpenVPN > dyld: lazy symbol binding failed: Symbol not found: ___strlcpy_chk
. 2014.11.24 18:46:14 - OpenVPN >   Referenced from: /Applications/AirVPN.app/Contents/MacOS/openvpn
. 2014.11.24 18:46:14 - OpenVPN >   Expected in: /usr/lib/libSystem.B.dylib
. 2014.11.24 18:46:14 - OpenVPN >
. 2014.11.24 18:46:14 - OpenVPN > dyld: Symbol not found: ___strlcpy_chk
. 2014.11.24 18:46:14 - OpenVPN >   Referenced from: /Applications/AirVPN.app/Contents/MacOS/openvpn
. 2014.11.24 18:46:14 - OpenVPN >   Expected in: /usr/lib/libSystem.B.dylib
. 2014.11.24 18:46:14 - OpenVPN >
! 2014.11.24 18:46:14 - Disconnecting
. 2014.11.24 18:46:14 - Connection terminated.
! 2014.11.24 18:46:17 - Checking authorization ...
! 2014.11.24 18:46:18 - Connecting to Persei (United States, Fremont, California)
. 2014.11.24 18:46:18 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Oct 18 2014
. 2014.11.24 18:46:18 - OpenVPN > library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.05
. 2014.11.24 18:46:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2014.11.24 18:46:18 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2014.11.24 18:46:18 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.11.24 18:46:18 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.11.24 18:46:18 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]
. 2014.11.24 18:46:18 - OpenVPN > UDPv4 link local: [undef]
. 2014.11.24 18:46:18 - OpenVPN > UDPv4 link remote: [AF_INET]94.100.23.162:443
. 2014.11.24 18:46:19 - OpenVPN > TLS: Initial packet from [AF_INET]94.100.23.162:443, sid=79d7e7d6 2ed75a06
. 2014.11.24 18:46:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2014.11.24 18:46:20 - OpenVPN > Validating certificate key usage
. 2014.11.24 18:46:20 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2014.11.24 18:46:20 - OpenVPN > VERIFY KU OK
. 2014.11.24 18:46:20 - OpenVPN > Validating certificate extended key usage
. 2014.11.24 18:46:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2014.11.24 18:46:20 - OpenVPN > VERIFY EKU OK
. 2014.11.24 18:46:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2014.11.24 18:46:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2014.11.24 18:46:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.11.24 18:46:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2014.11.24 18:46:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.11.24 18:46:35 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2014.11.24 18:46:35 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]94.100.23.162:443
. 2014.11.24 18:46:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2014.11.24 18:46:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.135.74 10.4.135.73'
. 2014.11.24 18:46:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2014.11.24 18:46:38 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2014.11.24 18:46:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2014.11.24 18:46:38 - OpenVPN > OPTIONS IMPORT: route options modified
. 2014.11.24 18:46:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2014.11.24 18:46:38 - OpenVPN > dyld: lazy symbol binding failed: Symbol not found: ___strlcpy_chk
. 2014.11.24 18:46:38 - OpenVPN >   Referenced from: /Applications/AirVPN.app/Contents/MacOS/openvpn
. 2014.11.24 18:46:38 - OpenVPN >   Expected in: /usr/lib/libSystem.B.dylib
. 2014.11.24 18:46:38 - OpenVPN >
. 2014.11.24 18:46:38 - OpenVPN > dyld: Symbol not found: ___strlcpy_chk
. 2014.11.24 18:46:38 - OpenVPN >   Referenced from: /Applications/AirVPN.app/Contents/MacOS/openvpn
. 2014.11.24 18:46:38 - OpenVPN >   Expected in: /usr/lib/libSystem.B.dylib
. 2014.11.24 18:46:38 - OpenVPN >
! 2014.11.24 18:46:38 - Disconnecting
. 2014.11.24 18:46:38 - Connection terminated.
! 2014.11.24 18:46:41 - Checking authorization ...
! 2014.11.24 18:46:42 - Connecting to Librae (United States, Manassas, Virginia)
. 2014.11.24 18:46:42 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Oct 18 2014
. 2014.11.24 18:46:42 - OpenVPN > library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.05
. 2014.11.24 18:46:42 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2014.11.24 18:46:42 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2014.11.24 18:46:42 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.11.24 18:46:42 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.11.24 18:46:42 - OpenVPN > Socket Buffers: R=[196724->65536] S=[9216->65536]
. 2014.11.24 18:46:42 - OpenVPN > UDPv4 link local: [undef]
. 2014.11.24 18:46:42 - OpenVPN > UDPv4 link remote: [AF_INET]108.59.11.194:443
. 2014.11.24 18:46:42 - OpenVPN > TLS: Initial packet from [AF_INET]108.59.11.194:443, sid=afd52913 2158057c
. 2014.11.24 18:46:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2014.11.24 18:46:42 - OpenVPN > Validating certificate key usage
. 2014.11.24 18:46:42 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2014.11.24 18:46:42 - OpenVPN > VERIFY KU OK
. 2014.11.24 18:46:42 - OpenVPN > Validating certificate extended key usage
. 2014.11.24 18:46:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2014.11.24 18:46:42 - OpenVPN > VERIFY EKU OK
. 2014.11.24 18:46:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

Share this post


Link to post

Hello!

 

Our client Eddie can run only in OS X Mavericks and Yosemite. Upgrade to Mavericks is free, anyway if you don't want or can't upgrade you can run Tunnelblick instead of Eddie. Instructions for Tunnelblick and download link are in the usual OS X page https://airvpn.org/macosx

 

Kind regards

Share this post


Link to post
Guest

I have the exact same problem....but on Yosemite. Any help would be appreciated with the endless loop.

Share this post


Link to post

Thank you, I'll give it a try!

 

Hello!

 

Our client Eddie can run only in OS X Mavericks and Yosemite. Upgrade to Mavericks is free, anyway if you don't want or can't upgrade you can run Tunnelblick instead of Eddie. Instructions for Tunnelblick and download link are in the usual OS X page https://airvpn.org/osx

 

Kind regards

Share this post


Link to post

I have the exact same problem....but on Yosemite. Any help would be appreciated with the endless loop.

 

Hello!

 

Can you please publish or send us the logs pertaining to the loop?

 

Kind regards

Share this post


Link to post
Guest

Log files below. I'm using VPN through SSH as I'm based in China. 

 

2014.12.06 21:27:19 - AirVPN client version: 2.7, System: OSX, Architecture: x64

. 2014.12.06 21:27:19 - Reading options from /Users/XXXXX/.airvpn/AirVPN.xml
. 2014.12.06 21:27:19 - Data Path: /Users/XXXXX/.airvpn
. 2014.12.06 21:27:19 - App Path: /Applications/AirVPN.app/Contents/MacOS
. 2014.12.06 21:27:19 - Executable Path: /Applications/AirVPN.app/Contents/MacOS/AirVPN
. 2014.12.06 21:27:19 - Command line arguments:
. 2014.12.06 21:27:20 - Updating systems & servers data ...
. 2014.12.06 21:27:20 - Operating System: Unix 14.0.0.0 - Darwin XXXXXs-MacBook-Pro.local 14.0.0 Darwin Kernel Version 14.0.0: Fri Sep 19 00:26:44 PDT 2014; root:xnu-2782.1.97~2/RELEASE_X86_64 x86_64
I 2014.12.06 21:27:20 - OpenVPN Driver - Expected
I 2014.12.06 21:27:20 - OpenVPN - Version: OpenVPN 2.3.4 (/Applications/AirVPN.app/Contents/MacOS/openvpn)
I 2014.12.06 21:27:20 - SSH - Version: OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011 (/usr/bin/ssh)
I 2014.12.06 21:27:20 - SSL - Version: stunnel 5.06 (/Applications/AirVPN.app/Contents/MacOS/stunnel)
I 2014.12.06 21:27:20 - IPV6: Available
W 2014.12.06 21:27:20 - Recovery. Unexpected crash?
I 2014.12.06 21:27:20 - DNS of a network adapter restored to original settings (Bluetooth DUN)
I 2014.12.06 21:27:20 - DNS of a network adapter restored to original settings (Wi-Fi)
I 2014.12.06 21:27:20 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)
I 2014.12.06 21:27:20 - Session starting.
! 2014.12.06 21:27:20 - Checking environment
! 2014.12.06 21:27:20 - Retrieving manifest
. 2014.12.06 21:27:30 - Updating systems & servers data ..., 1° try failed (The request timed out)
. 2014.12.06 21:27:34 - Systems & servers data update completed
! 2014.12.06 21:27:34 - Checking authorization ...
. 2014.12.06 21:27:44 - Checking authorization ..., 1° try failed (The request timed out)
! 2014.12.06 21:27:46 - Connecting to Pavonis (United States, Chicago, Illinois)
. 2014.12.06 21:27:46 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011
. 2014.12.06 21:27:46 - SSH > debug1: Reading configuration data /etc/ssh_config
. 2014.12.06 21:27:46 - SSH > debug1: /etc/ssh_config line 20: Applying options for *
. 2014.12.06 21:27:46 - SSH > debug1: Connecting to 149.255.33.156 [149.255.33.156] port 22.
. 2014.12.06 21:27:47 - SSH > debug1: Connection established.
. 2014.12.06 21:27:47 - SSH > debug1: permanently_set_uid: 501/20
. 2014.12.06 21:27:47 - SSH > debug1: identity file /Users/XXXXX/.airvpn/1c85d7141445efef107ef41549857f055f92ff9bb0644cfbd07ad4647fc24679.tmp.key type -1
. 2014.12.06 21:27:47 - SSH > debug1: identity file /Users/XXXXX/.airvpn/1c85d7141445efef107ef41549857f055f92ff9bb0644cfbd07ad4647fc24679.tmp.key-cert type -1
. 2014.12.06 21:27:47 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2014.12.06 21:27:47 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2
. 2014.12.06 21:27:48 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.0p1 Debian-4+deb7u2
. 2014.12.06 21:27:48 - SSH > debug1: match: OpenSSH_6.0p1 Debian-4+deb7u2 pat OpenSSH*
. 2014.12.06 21:27:48 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2014.12.06 21:27:49 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2014.12.06 21:27:49 - SSH > debug1: kex: server->client aes128-ctr hmac-md5 none
. 2014.12.06 21:27:49 - SSH > debug1: kex: client->server aes128-ctr hmac-md5 none
. 2014.12.06 21:27:49 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
. 2014.12.06 21:27:49 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
. 2014.12.06 21:27:51 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
. 2014.12.06 21:27:51 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
. 2014.12.06 21:27:52 - SSH > debug1: Server host key: RSA 86:7d:6a:e1:3c:9e:ff:78:0a:1d:0d:01:9b:13:df:55
. 2014.12.06 21:27:52 - SSH > Warning: Permanently added '149.255.33.156' (RSA) to the list of known hosts.
. 2014.12.06 21:27:52 - SSH > debug1: ssh_rsa_verify: signature correct
. 2014.12.06 21:27:52 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2014.12.06 21:27:52 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2014.12.06 21:27:52 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2014.12.06 21:27:52 - SSH > debug1: Roaming not allowed by server
. 2014.12.06 21:27:52 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2014.12.06 21:27:55 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2014.12.06 21:27:57 - SSH > debug1: Authentications that can continue: publickey,password
. 2014.12.06 21:27:57 - SSH > debug1: Next authentication method: publickey
. 2014.12.06 21:27:57 - SSH > debug1: Trying private key: /Users/XXXXX/.airvpn/1c85d7141445efef107ef41549857f055f92ff9bb0644cfbd07ad4647fc24679.tmp.key
. 2014.12.06 21:27:57 - SSH > debug1: read PEM private key done: type RSA
. 2014.12.06 21:27:58 - SSH > debug1: Authentication succeeded (publickey).
. 2014.12.06 21:27:58 - SSH > Authenticated to 149.255.33.156 ([149.255.33.156]:22).
. 2014.12.06 21:27:58 - SSH > debug1: Local connections to LOCALHOST:61650 forwarded to remote address 127.0.0.1:2018
! 2014.12.06 21:27:58 - Disconnecting
. 2014.12.06 21:27:58 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Oct 18 2014
. 2014.12.06 21:27:58 - SSH > debug1: Local forwarding listening on ::1 port 61650.
. 2014.12.06 21:27:58 - OpenVPN > library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.05
. 2014.12.06 21:27:58 - SSH > debug1: channel 0: new [port listener]
. 2014.12.06 21:27:58 - Auto retry with another port.
. 2014.12.06 21:27:59 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 61650.
. 2014.12.06 21:27:59 - OpenVPN > MANAGEMENT: Socket bind failed on local address [AF_INET]127.0.0.1:3103: Address already in use
. 2014.12.06 21:27:59 - Connection terminated.
. 2014.12.06 21:27:59 - SSH > debug1: channel 1: new [port listener]
. 2014.12.06 21:27:59 - OpenVPN > Exiting due to fatal error
. 2014.12.06 21:27:59 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2014.12.06 21:27:59 - SSH > debug1: Entering interactive session.
! 2014.12.06 21:28:02 - Waiting for latency tests (59 to go)
! 2014.12.06 21:28:03 - Waiting for latency tests (58 to go)
! 2014.12.06 21:28:04 - Waiting for latency tests (57 to go)
! 2014.12.06 21:28:04 - Waiting for latency tests (56 to go)
! 2014.12.06 21:28:05 - Waiting for latency tests (55 to go)
! 2014.12.06 21:28:05 - Waiting for latency tests (53 to go)
! 2014.12.06 21:28:06 - Waiting for latency tests (51 to go)
! 2014.12.06 21:28:06 - Waiting for latency tests (49 to go)
! 2014.12.06 21:28:07 - Waiting for latency tests (46 to go)
! 2014.12.06 21:28:07 - Waiting for latency tests (43 to go)
! 2014.12.06 21:28:08 - Waiting for latency tests (40 to go)
! 2014.12.06 21:28:08 - Waiting for latency tests (36 to go)
! 2014.12.06 21:28:09 - Waiting for latency tests (32 to go)
! 2014.12.06 21:28:09 - Waiting for latency tests (28 to go)
! 2014.12.06 21:28:10 - Waiting for latency tests (23 to go)
! 2014.12.06 21:28:11 - Waiting for latency tests (18 to go)
! 2014.12.06 21:28:11 - Waiting for latency tests (15 to go)
! 2014.12.06 21:28:11 - Waiting for latency tests (12 to go)
! 2014.12.06 21:28:12 - Waiting for latency tests (7 to go)
! 2014.12.06 21:28:12 - Checking authorization ...
. 2014.12.06 21:28:22 - Checking authorization ..., 1° try failed (The request timed out)
! 2014.12.06 21:28:24 - Connecting to Pavonis (United States, Chicago, Illinois)
. 2014.12.06 21:28:25 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011
. 2014.12.06 21:28:25 - SSH > debug1: Reading configuration data /etc/ssh_config
. 2014.12.06 21:28:25 - SSH > debug1: /etc/ssh_config line 20: Applying options for *
. 2014.12.06 21:28:25 - SSH > debug1: Connecting to 149.255.33.156 [149.255.33.156] port 22.
. 2014.12.06 21:28:25 - SSH > debug1: Connection established.
. 2014.12.06 21:28:25 - SSH > debug1: permanently_set_uid: 501/20
. 2014.12.06 21:28:26 - SSH > debug1: identity file /Users/XXXXX/.airvpn/1e97e853a1473d38d65f1ac6ca33e33175f0ef8e4507885928fcde98b8c3a336.tmp.key type -1
. 2014.12.06 21:28:26 - SSH > debug1: identity file /Users/XXXXX/.airvpn/1e97e853a1473d38d65f1ac6ca33e33175f0ef8e4507885928fcde98b8c3a336.tmp.key-cert type -1
. 2014.12.06 21:28:26 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2014.12.06 21:28:26 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2
. 2014.12.06 21:28:26 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.0p1 Debian-4+deb7u2
. 2014.12.06 21:28:26 - SSH > debug1: match: OpenSSH_6.0p1 Debian-4+deb7u2 pat OpenSSH*
. 2014.12.06 21:28:27 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2014.12.06 21:28:27 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2014.12.06 21:28:27 - SSH > debug1: kex: server->client aes128-ctr hmac-md5 none
. 2014.12.06 21:28:28 - SSH > debug1: kex: client->server aes128-ctr hmac-md5 none
. 2014.12.06 21:28:28 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
. 2014.12.06 21:28:28 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
. 2014.12.06 21:28:29 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
. 2014.12.06 21:28:29 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
. 2014.12.06 21:28:30 - SSH > debug1: Server host key: RSA 86:7d:6a:e1:3c:9e:ff:78:0a:1d:0d:01:9b:13:df:55
. 2014.12.06 21:28:30 - SSH > Warning: Permanently added '149.255.33.156' (RSA) to the list of known hosts.
. 2014.12.06 21:28:30 - SSH > debug1: ssh_rsa_verify: signature correct
. 2014.12.06 21:28:30 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2014.12.06 21:28:30 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2014.12.06 21:28:30 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2014.12.06 21:28:30 - SSH > debug1: Roaming not allowed by server
. 2014.12.06 21:28:30 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2014.12.06 21:28:32 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2014.12.06 21:28:33 - SSH > debug1: Authentications that can continue: publickey,password
. 2014.12.06 21:28:33 - SSH > debug1: Next authentication method: publickey
. 2014.12.06 21:28:33 - SSH > debug1: Trying private key: /Users/XXXXX/.airvpn/1e97e853a1473d38d65f1ac6ca33e33175f0ef8e4507885928fcde98b8c3a336.tmp.key
. 2014.12.06 21:28:34 - SSH > debug1: read PEM private key done: type RSA
. 2014.12.06 21:28:34 - SSH > debug1: Authentication succeeded (publickey).
. 2014.12.06 21:28:34 - SSH > Authenticated to 149.255.33.156 ([149.255.33.156]:22).
. 2014.12.06 21:28:35 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Oct 18 2014
. 2014.12.06 21:28:35 - SSH > debug1: Local connections to LOCALHOST:45934 forwarded to remote address 127.0.0.1:2018
. 2014.12.06 21:28:35 - OpenVPN > library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.05
. 2014.12.06 21:28:35 - SSH > debug1: Local forwarding listening on ::1 port 45934.
. 2014.12.06 21:28:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3104
. 2014.12.06 21:28:35 - SSH > debug1: channel 0: new [port listener]
. 2014.12.06 21:28:35 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2014.12.06 21:28:35 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 45934.
. 2014.12.06 21:28:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.12.06 21:28:35 - SSH > debug1: channel 1: new [port listener]
. 2014.12.06 21:28:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.12.06 21:28:35 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2014.12.06 21:28:35 - OpenVPN > Socket Buffers: R=[131072->65536] S=[131072->65536]
. 2014.12.06 21:28:35 - SSH > debug1: Entering interactive session.
. 2014.12.06 21:28:35 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:45934 [nonblock]
. 2014.12.06 21:28:35 - SSH > debug1: Connection to port 45934 forwarding to 127.0.0.1 port 2018 requested.
. 2014.12.06 21:28:35 - SSH > debug1: channel 2: new [direct-tcpip]
. 2014.12.06 21:28:35 - SSH > debug1: Remote: Pty allocation disabled.
. 2014.12.06 21:28:35 - SSH > debug1: Remote: X11 forwarding disabled.
. 2014.12.06 21:28:36 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:45934
. 2014.12.06 21:28:36 - SSH > debug1: Remote: Forced command.
. 2014.12.06 21:28:36 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2014.12.06 21:28:36 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:45934
. 2014.12.06 21:28:38 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:45934, sid=d9028d03 91da3f4a
. 2014.12.06 21:28:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2014.12.06 21:28:59 - OpenVPN > Validating certificate key usage
. 2014.12.06 21:28:59 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2014.12.06 21:28:59 - OpenVPN > VERIFY KU OK
. 2014.12.06 21:28:59 - OpenVPN > Validating certificate extended key usage
. 2014.12.06 21:28:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2014.12.06 21:28:59 - OpenVPN > VERIFY EKU OK
. 2014.12.06 21:28:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2014.12.06 21:29:22 - OpenVPN > Connection reset, restarting [0]
. 2014.12.06 21:29:22 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
! 2014.12.06 21:29:22 - Disconnecting
. 2014.12.06 21:29:22 - OpenVPN > Restart pause, 5 second(s)
. 2014.12.06 21:29:23 - Connection terminated.
! 2014.12.06 21:29:26 - Checking authorization ...
. 2014.12.06 21:29:36 - Checking authorization ..., 1° try failed (The request timed out)
! 2014.12.06 21:29:39 - Connecting to Pavonis (United States, Chicago, Illinois)
. 2014.12.06 21:29:39 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011
. 2014.12.06 21:29:39 - SSH > debug1: Reading configuration data /etc/ssh_config
. 2014.12.06 21:29:39 - SSH > debug1: /etc/ssh_config line 20: Applying options for *
. 2014.12.06 21:29:39 - SSH > debug1: Connecting to 149.255.33.156 [149.255.33.156] port 22.
. 2014.12.06 21:29:40 - SSH > debug1: Connection established.
. 2014.12.06 21:29:40 - SSH > debug1: permanently_set_uid: 501/20
. 2014.12.06 21:29:40 - SSH > debug1: identity file /Users/XXXXX/.airvpn/28ba73950155f600af8ea87ce9db7686474c1e32a213e42c858200ff65aba095.tmp.key type -1
. 2014.12.06 21:29:40 - SSH > debug1: identity file /Users/XXXXX/.airvpn/28ba73950155f600af8ea87ce9db7686474c1e32a213e42c858200ff65aba095.tmp.key-cert type -1
. 2014.12.06 21:29:40 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2014.12.06 21:29:40 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2
. 2014.12.06 21:29:41 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.0p1 Debian-4+deb7u2
. 2014.12.06 21:29:41 - SSH > debug1: match: OpenSSH_6.0p1 Debian-4+deb7u2 pat OpenSSH*
. 2014.12.06 21:29:41 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2014.12.06 21:29:43 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2014.12.06 21:29:43 - SSH > debug1: kex: server->client aes128-ctr hmac-md5 none
. 2014.12.06 21:29:43 - SSH > debug1: kex: client->server aes128-ctr hmac-md5 none
. 2014.12.06 21:29:43 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
. 2014.12.06 21:29:43 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
. 2014.12.06 21:29:45 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
. 2014.12.06 21:29:45 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
. 2014.12.06 21:29:46 - SSH > debug1: Server host key: RSA 86:7d:6a:e1:3c:9e:ff:78:0a:1d:0d:01:9b:13:df:55
. 2014.12.06 21:29:46 - SSH > Warning: Permanently added '149.255.33.156' (RSA) to the list of known hosts.
. 2014.12.06 21:29:47 - SSH > debug1: ssh_rsa_verify: signature correct
. 2014.12.06 21:29:47 - SSH > debug1: SSH2_MSG_NEWKEYS sent
. 2014.12.06 21:29:47 - SSH > debug1: expecting SSH2_MSG_NEWKEYS
. 2014.12.06 21:29:47 - SSH > debug1: SSH2_MSG_NEWKEYS received
. 2014.12.06 21:29:47 - SSH > debug1: Roaming not allowed by server
. 2014.12.06 21:29:47 - SSH > debug1: SSH2_MSG_SERVICE_REQUEST sent
. 2014.12.06 21:29:48 - SSH > debug1: SSH2_MSG_SERVICE_ACCEPT received
. 2014.12.06 21:29:50 - SSH > debug1: Authentications that can continue: publickey,password
. 2014.12.06 21:29:50 - SSH > debug1: Next authentication method: publickey
. 2014.12.06 21:29:50 - SSH > debug1: Trying private key: /Users/XXXXX/.airvpn/28ba73950155f600af8ea87ce9db7686474c1e32a213e42c858200ff65aba095.tmp.key
. 2014.12.06 21:29:50 - SSH > debug1: read PEM private key done: type RSA
. 2014.12.06 21:29:51 - SSH > debug1: Authentication succeeded (publickey).
. 2014.12.06 21:29:51 - SSH > Authenticated to 149.255.33.156 ([149.255.33.156]:22).
. 2014.12.06 21:29:51 - OpenVPN > OpenVPN 2.3.4 x86_64-apple-darwin13.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Oct 18 2014
. 2014.12.06 21:29:51 - SSH > debug1: Local connections to LOCALHOST:34597 forwarded to remote address 127.0.0.1:2018
. 2014.12.06 21:29:51 - OpenVPN > library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.05
. 2014.12.06 21:29:51 - SSH > debug1: Local forwarding listening on ::1 port 34597.
. 2014.12.06 21:29:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3104
. 2014.12.06 21:29:51 - SSH > debug1: channel 0: new [port listener]
. 2014.12.06 21:29:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2014.12.06 21:29:51 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 34597.
. 2014.12.06 21:29:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.12.06 21:29:51 - SSH > debug1: channel 1: new [port listener]
. 2014.12.06 21:29:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2014.12.06 21:29:51 - SSH > debug1: Requesting no-more-sessions@openssh.com
. 2014.12.06 21:29:51 - OpenVPN > Socket Buffers: R=[131072->65536] S=[131072->65536]
. 2014.12.06 21:29:51 - SSH > debug1: Entering interactive session.
. 2014.12.06 21:29:51 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:34597 [nonblock]
. 2014.12.06 21:29:51 - SSH > debug1: Connection to port 34597 forwarding to 127.0.0.1 port 2018 requested.
. 2014.12.06 21:29:51 - SSH > debug1: channel 2: new [direct-tcpip]
. 2014.12.06 21:29:51 - SSH > debug1: Remote: Pty allocation disabled.
. 2014.12.06 21:29:51 - SSH > debug1: Remote: X11 forwarding disabled.
. 2014.12.06 21:29:51 - SSH > debug1: Remote: Forced command.
. 2014.12.06 21:29:52 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:34597
. 2014.12.06 21:29:52 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2014.12.06 21:29:52 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:34597
. 2014.12.06 21:29:54 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:34597, sid=37aa5366 a42c5fb9
. 2014.12.06 21:30:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2014.12.06 21:30:04 - OpenVPN > Validating certificate key usage
. 2014.12.06 21:30:04 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2014.12.06 21:30:04 - OpenVPN > VERIFY KU OK
. 2014.12.06 21:30:04 - OpenVPN > Validating certificate extended key usage
. 2014.12.06 21:30:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2014.12.06 21:30:04 - OpenVPN > VERIFY EKU OK
. 2014.12.06 21:30:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2014.12.06 21:30:22 - OpenVPN > Connection reset, restarting [0]
. 2014.12.06 21:30:22 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2014.12.06 21:30:22 - OpenVPN > Restart pause, 5 second(s)
! 2014.12.06 21:30:22 - Disconnecting
. 2014.12.06 21:30:22 - Connection terminated.
! 2014.12.06 21:30:25 - Checking authorization ...
. 2014.12.06 21:30:36 - Checking authorization ..., 1° try failed (The request timed out)
! 2014.12.06 21:30:38 - Connecting to Pavonis (United States, Chicago, Illinois)
. 2014.12.06 21:30:38 - SSH > OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011
. 2014.12.06 21:30:38 - SSH > debug1: Reading configuration data /etc/ssh_config
. 2014.12.06 21:30:38 - SSH > debug1: /etc/ssh_config line 20: Applying options for *
. 2014.12.06 21:30:38 - SSH > debug1: Connecting to 149.255.33.156 [149.255.33.156] port 22.
. 2014.12.06 21:30:40 - SSH > debug1: Connection established.
. 2014.12.06 21:30:40 - SSH > debug1: permanently_set_uid: 501/20
. 2014.12.06 21:30:40 - SSH > debug1: identity file /Users/XXXXX/.airvpn/2ac1038dff731d0e4cb4e307a9681c2afe41c31882878b4ecc9d39c1ff2883a6.tmp.key type -1
. 2014.12.06 21:30:40 - SSH > debug1: identity file /Users/XXXXX/.airvpn/2ac1038dff731d0e4cb4e307a9681c2afe41c31882878b4ecc9d39c1ff2883a6.tmp.key-cert type -1
. 2014.12.06 21:30:40 - SSH > debug1: Enabling compatibility mode for protocol 2.0
. 2014.12.06 21:30:40 - SSH > debug1: Local version string SSH-2.0-OpenSSH_6.2
. 2014.12.06 21:30:41 - SSH > debug1: Remote protocol version 2.0, remote software version OpenSSH_6.0p1 Debian-4+deb7u2
. 2014.12.06 21:30:41 - SSH > debug1: match: OpenSSH_6.0p1 Debian-4+deb7u2 pat OpenSSH*
. 2014.12.06 21:30:41 - SSH > debug1: SSH2_MSG_KEXINIT sent
. 2014.12.06 21:30:42 - SSH > debug1: SSH2_MSG_KEXINIT received
. 2014.12.06 21:30:42 - SSH > debug1: kex: server->client aes128-ctr hmac-md5 none
. 2014.12.06 21:30:42 - SSH > debug1: kex: client->server aes128-ctr hmac-md5 none
. 2014.12.06 21:30:42 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
. 2014.12.06 21:30:42 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
. 2014.12.06 21:30:44 - SSH > debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
. 2014.12.06 21:30:44 - SSH > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY

Share this post


Link to post
Guest

Does no-one have this issue as well? A friend also has this exact same issue.

Share this post


Link to post

Today, for the first time I installed Eddie on my Mac running Mavericks.

And, I immediately ran into the same looping issue discussed in this thread and elsewhere.

Here's how I solved it.

 

[01] Upon launching Eddie for the first time, I immediately had the same looping issue.

[02] So, I experimented with different versions of Eddie, including the latest experimental version.

[03] But, the looping issue persisted.

[04] I thought that the issue of not being able to connect to servers may have had something to do with DNS lookups.

[05] In my wireless router, I have 8.8.8.8 and 8.8.4.4 as primary and secondary DNS servers, respectively.

[06] I went into System Preferences > Network > Advanced > DNS. There, I found that I had the same (redundant) 8.8.8.8. and 8.8.4.4 entries.

[07] So, I deleted both entries to make the only entry there 192.168.10.1 (IP address of LAN port of the router). This entry should be in gray by default.

[08] Then, I clicked on OK to return to the main Network pane, clicked on Apply, and closed System Preferences.

[09] As I launched Eddie, it didn't have any issue in connecting to a recommended server.

 

I was reluctant in resetting the hosts file as suggested in this thread. So, I am very happy that [07] rectified the looping issue. 

Share this post


Link to post

 

I have the exact same problem....but on Yosemite. Any help would be appreciated with the endless loop.

 

Hello!

 

Can you please publish or send us the logs pertaining to the loop?

 

Kind regards

 

I'm having this same issue. Running Mac OS 10.10.3 and Eddie 2.9.2. However, for me the issue only seems to occur after my Mac has woken up from sleep (and then it almost always occurs). So far I haven't been able to fix it except by doing a reboot. Here's a sample of what I see in the logs:

 

 

I 2015.06.05 09:37:09 - AirVPN client version: 2.9.2, System: OSX, Name: 10.10.3, Architecture: x64

. 2015.06.05 09:37:09 - Reading options from /Users/TACD/.airvpn/AirVPN.xml
. 2015.06.05 09:37:09 - Data Path: /Users/TACD/.airvpn
. 2015.06.05 09:37:09 - App Path: /Applications/AirVPN.app/Contents/MacOS
. 2015.06.05 09:37:09 - Executable Path: /Applications/AirVPN.app/Contents/MacOS/AirVPN
. 2015.06.05 09:37:09 - Command line arguments (0):
. 2015.06.05 09:37:09 - Updating systems & servers data ...
. 2015.06.05 09:37:09 - Operating System: Unix 14.3.0.0 - Darwin Cobalt.local 14.3.0 Darwin Kernel Version 14.3.0: Mon Mar 23 11:59:05 PDT 2015; root:xnu-2782.20.48~5/RELEASE_X86_64 x86_64
I 2015.06.05 09:37:09 - OpenVPN Driver - Expected
I 2015.06.05 09:37:09 - OpenVPN - Version: OpenVPN 2.3.6 (/Applications/AirVPN.app/Contents/MacOS/openvpn)
I 2015.06.05 09:37:09 - SSH - Version: OpenSSH_6.2p2, OSSLShim 0.9.8r 8 Dec 2011 (/usr/bin/ssh)
I 2015.06.05 09:37:09 - SSL - Version: stunnel 5.09 (/Applications/AirVPN.app/Contents/MacOS/stunnel)
W 2015.06.05 09:37:09 - Recovery. Unexpected crash?
I 2015.06.05 09:37:09 - DNS of a network adapter restored to original settings (Bluetooth DUN)
I 2015.06.05 09:37:09 - DNS of a network adapter restored to original settings (Ethernet)
I 2015.06.05 09:37:09 - DNS of a network adapter restored to original settings (FireWire)
I 2015.06.05 09:37:09 - DNS of a network adapter restored to original settings (Wi-Fi)
I 2015.06.05 09:37:09 - DNS of a network adapter restored to original settings (iPhone USB)
I 2015.06.05 09:37:10 - DNS of a network adapter restored to original settings (Bluetooth PAN)
I 2015.06.05 09:37:10 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)
I 2015.06.05 09:37:10 - DNS of a network adapter restored to original settings (University of Sheffield)
! 2015.06.05 09:37:10 - Deactivation of Network Lock
! 2015.06.05 09:37:10 - Activation of Network Lock - OS X - PF
. 2015.06.05 09:37:10 - OS X - PF rules updated, reloading
I 2015.06.05 09:37:10 - Session starting.
. 2015.06.05 09:37:10 - OS X - PF rules updated, reloading
. 2015.06.05 09:37:10 - Systems & servers data update completed
I 2015.06.05 09:37:18 - Checking authorization ...
! 2015.06.05 09:37:18 - Connecting to Gienah (Netherlands, Alblasserdam)
. 2015.06.05 09:37:18 - OpenVPN > OpenVPN 2.3.6 x86_64-apple-darwin14.0.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Jan 12 2015
. 2015.06.05 09:37:18 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08
. 2015.06.05 09:37:53 - Auto retry with another port.
. 2015.06.05 09:37:53 - OpenVPN > MANAGEMENT: Socket bind failed on local address [AF_INET]127.0.0.1:3101: Address already in use
. 2015.06.05 09:37:53 - OpenVPN > Exiting due to fatal error
! 2015.06.05 09:37:53 - Disconnecting
. 2015.06.05 09:37:53 - Connection terminated.
I 2015.06.05 09:37:56 - Checking authorization ...
! 2015.06.05 09:37:57 - Connecting to Gienah (Netherlands, Alblasserdam)
. 2015.06.05 09:37:57 - OpenVPN > OpenVPN 2.3.6 x86_64-apple-darwin14.0.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Jan 12 2015
. 2015.06.05 09:37:57 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08

Share this post


Link to post

 

Log files below. I'm using VPN through SSH as I'm based in China. 

 

Hello!

 

In China, please try OpenVPN over SSL (it's called "SSL Tunnel - Port 443" in our client Eddie). Upgrade to Eddie version 2.8.8 or 2.9.2 is recommended.

 

Feel free to keep us posted.

 

Kind regards

Share this post


Link to post

For those Mac users who are having problems with the Air client 2.9 (like myself) what worked for me was deleteing the Airvpn saved files on my Mac and then installing the 2.8 client.

 

For those Mac users who are using OS's that are not Mavericks or Yosemite and cannot use the Air's client I highly suggest using Viscosity. It's $9 but it is WELL worth the cost. It has many options including the implementation of scripts that can act as a killswitch for programs you desire. Such as your torrent client.

 

Killswitch Thread: https://airvpn.org/topic/12665-viscosity-vpn-killswitch-for-mac-and-windows/

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...