Jump to content
Not connected, Your IP: 18.119.133.214

Recommended Posts

So Staff has considered this ticket "solved". They did state there was something "unusual" in the info I gave them, that they would pass on. However, this is what I reported to them on the other ticket I sent regarding "Problem connecting to Vancouver servers". The mystery continues:

 

 

Hello,

 

just to frame correctly the issue and fix what you incorrectly wrote, the support team did not consider the issue resolved at all and you were told that the whole content of the ticket would have been transmitted to Eddie developers.

 

Kind regards

Share this post


Link to post

 

So Staff has considered this ticket "solved". They did state there was something "unusual" in the info I gave them, that they would pass on. However, this is what I reported to them on the other ticket I sent regarding "Problem connecting to Vancouver servers". The mystery continues:

 

 

Hello,

 

just to frame correctly the issue and fix what you incorrectly wrote, the support team did not consider the issue resolved at all and you were told that the whole content of the ticket would have been transmitted to Eddie developers.

 

Kind regards

My apologies, but under support tickets "Status" it does say "resolved". I assume I misunderstood what "resolved" meant. Perhaps there is some confusion, as I have 2 active support tickets. In any case, yes, Staff has sent the info I gave them to developers, and are actively looking into the problem. Hopefully they will find an answer. Staff's support is always much appreciated by me.

Share this post


Link to post

Same problems for me, too.

 

A few months ago I installed Eddie 2.12.4 and I have been having connection problems ever since. Sometimes I have to restart my iMac (El Capitan) and Eddie 3 or 4 times before it makes a connection.

 

I have now downloaded the latest Eddie and the first thing that appeared was 'unable to start PF Firewall'. I will try the various fixes mentioned above, but I might just have to put up with the old version for a bit longer. It's a bit frustrating, as previous to this AirVPN has run perfectly on my system.

 

Just wondering if it's okay to have both versions on my Mac at the same time - although obviously I wouldn't have them both open at same time - or am I meant to remove old version when I download new one.

 

Thanks.

Share this post


Link to post

Further to my post above from yesterday (#29) -

 

Unfortunately things have went a bit haywire now. When I couldn't install Eddie 2.13.6 on my Mac (El Capitan 10.11.2) due to 'unable to start PF Firewall' error message, I had to go back to Eddie 2.12.4, but I was horrified to discover today that the Network Lock function wasn't working correctly. It worked okay when I was actually connected to a server, but when I disconnected from server (but still had Network Lock activated) my browser was still connecting to the internet. Usually, of course, the NL stops any internet traffic coming through in that situation.

 

I then tried to get latest Eddie 2.13.6 working again by following above suggestion to uncheck Allow lan/private and Allow ping and this seemed to work as the 'unable to start PF Firewall' error message didn't appear. However, on the servers page, none of the country flags were visible and it obviously wasn't installed properly. I tried to connect to a random server but everything started flashing and I got an error message. I have now requested support help, and I'm hoping they will be able to get it working again for me.

 

I have been with AirVPN for a few years and had no problems at all, but all these connection problems have got me worried, especially after finding that the Network Lock feature wasn't stopping internet traffic getting through.

 

Share this post


Link to post

In regard to the above posts, Support have asked me to delete the configuration file for the new version of Eddie in case it's the same as the previous version, which could be causing the problem.

 

The file in question is AirVPN.xml and by checking the logs I can see that it is meant to be located here on my Mac - /Users/myname/.airvpn/AirVPN.xml.

 

However, after spending an hour searching for it, there is absolutely no sign of it - no xml file and no folder for AirVPN. I'm just wondering if anyone who has a Mac might know where else I can look for it. I've tried every search method I can think of, but as I'm no expert it's possible it might be found somewhere that I don't know about.

 

Thanks.

Share this post


Link to post

In regard to the above posts, Support have asked me to delete the configuration file for the new version of Eddie in case it's the same as the previous version, which could be causing the problem. The file in question is AirVPN.xml and by checking the logs I can see that it is meant to be located here on my Mac - /Users/myname/.airvpn/AirVPN.xml. However, after spending an hour searching for it, there is absolutely no sign of it - no xml file and no folder for AirVPN. I'm just wondering if anyone who has a Mac might know where else I can look for it. I've tried every search method I can think of, but as I'm no expert it's possible it might be found somewhere that I don't know about. Thanks.

Unable to locate on my Mac either.

Share this post


Link to post

Thanks to support for showing me how to find that xml file by using the Terminal app on my Mac. After a few attempts I was able to remove it and start again with Eddie 2.13.6. However, once again I couldn't get past 'unable to start PF Firewall' error message. I tried the solution mentioned before - I unchecked the 'Allow lan/private and Allow ping' boxes in Preferences and this got me past the error message, but when I tried to connect to a server it kept on disconnecting and trying to connect to another server. I then went back to Preferences and rechecked the 'Allow lan/private and Allow ping' boxes and this time I was able to successfully connect to a server. It seems to be running securely for the moment, but while checking the logs I see that I am still getting the 'unable to start PF Firewall' error message, and I'm worried that the system's security may in some way be compromised. I have contacted support to get their opinion on this matter.

Share this post


Link to post

Thanks for keeping us informed.

 

Yes, thanks stookie. I have had no further update since my ticket was passed on to developers. Hopefully, we'll get an update soon. Once I am connected, I don't seem to have any disconnection problems, luckily. Despite it showing network lock is active, it may or may not be working properly. I'm assuming "AirVPN.xml" is perhaps a hidden file?

Share this post


Link to post

Regarding the AirVPN.xml file - Support explained that it could only be accessed on a Mac by using Terminal which requires administrator privileges, and that it won't show up in a normal search. By deleting it in this way Eddie 2.13.6 will create a new configuration file when it is relaunched, and hopefully that way the old and new versions of Eddie on my Mac won't affect each other. Support said that it is okay to have more than one version of Eddie on the Mac at the same time, although I might if the new version runs smoothly I might remove the old one if it is a straightforward process. As with madrat, they have passed my ticket on to the developers, so hopefully they will find a solution to the 'unable to start PF Firewall' problem.

 

A quick question: what exactly does Allow lan/private and Allow ping mean in Preferences? What do they do? If we have to uncheck them to login, does that mean we are compromising security on the system.

 

Thanks.

Share this post


Link to post

Regarding the AirVPN.xml file - Support explained that it could only be accessed on a Mac by using Terminal which requires administrator privileges, and that it won't show up in a normal search. By deleting it in this way Eddie 2.13.6 will create a new configuration file when it is relaunched, and hopefully that way the old and new versions of Eddie on my Mac won't affect each other. Support said that it is okay to have more than one version of Eddie on the Mac at the same time, although I might if the new version runs smoothly I might remove the old one if it is a straightforward process. As with madrat, they have passed my ticket on to the developers, so hopefully they will find a solution to the 'unable to start PF Firewall' problem. A quick question: what exactly does Allow lan/private and Allow ping mean in Preferences? What do they do? If we have to uncheck them to login, does that mean we are compromising security on the system. Thanks.

 

Probably someone with a little more knowledge will have to answer that for you. I will tell you this - when I was unable to transfer a file from my iMac to my MacPro via wi-fi yesterday, I had to in fact recheck the "allow lan/private" box and save before I could transfer my file. So in fact, after you uncheck those to bypass the "unable to start PF Firewall" problem, once you are connected, you can recheck those and save if you like. Unless you become disconnected and Eddie tries to reconnect, it doesn't seem to cause a problem.

Share this post


Link to post

Just an update to my last reply. After you connect you can reselect "allow lan/private" box ONLY. If you also reselect "ping" option and save, you once again get the "unable to start PF Firewall" warning once again. Let me try only checking the "lan/private" box and not the "ping" box. Then I'll shut Eddie down and restart with those settings and see what happens.

Share this post


Link to post

So, I rechecked "lan/private" box. Left "ping" box unchecked. Saved. Shut down and restarted Eddie. On restart no "unable to start PF Firewall" notification, but Eddie got stuck on "checking route". I let it try and connect a few times and when it kept failing, I went back and rechecked "lan/private" box and as soon as I did that, it connected. Here are the logs:

 

Log:

. 2017.11.30 15:36:36 - OS X - PF rules updated, reloading
! 2017.11.30 15:36:36 - Disconnecting
. 2017.11.30 15:36:36 - Sending management termination signal
. 2017.11.30 15:36:36 - Management - Send 'signal SIGTERM'
. 2017.11.30 15:36:41 - Connection terminated.
. 2017.11.30 15:36:41 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)
. 2017.11.30 15:36:41 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2017.11.30 15:36:42 - Flushing DNS
. 2017.11.30 15:36:42 - IPv6 restored on network adapter (SAMSUNG Modem)
. 2017.11.30 15:36:42 - IPv6 restored on network adapter (Ethernet)
. 2017.11.30 15:36:42 - IPv6 restored on network adapter (FireWire)
. 2017.11.30 15:36:42 - IPv6 restored on network adapter (Wi-Fi)
! 2017.11.30 15:36:42 - Session terminated.
I 2017.11.30 15:36:50 - Session starting.
. 2017.11.30 15:36:50 - IPv6 disabled on network adapter (SAMSUNG Modem)
. 2017.11.30 15:36:51 - IPv6 disabled on network adapter (Ethernet)
. 2017.11.30 15:36:51 - IPv6 disabled on network adapter (FireWire)
. 2017.11.30 15:36:51 - IPv6 disabled on network adapter (Wi-Fi)
I 2017.11.30 15:36:51 - Checking authorization ...
! 2017.11.30 15:36:51 - Connecting to Cynosura (Canada, Vancouver)
. 2017.11.30 15:36:52 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017
. 2017.11.30 15:36:52 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2017.11.30 15:36:52 - Connection to OpenVPN Management Interface
. 2017.11.30 15:36:52 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.11.30 15:36:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.30 15:36:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.30 15:36:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443
. 2017.11.30 15:36:52 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2017.11.30 15:36:52 - OpenVPN > UDP link local: (not bound)
. 2017.11.30 15:36:52 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443
. 2017.11.30 15:36:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.11.30 15:36:52 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=f7c37c52 db12e88f
. 2017.11.30 15:36:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.30 15:36:52 - OpenVPN > VERIFY KU OK
. 2017.11.30 15:36:52 - OpenVPN > Validating certificate extended key usage
. 2017.11.30 15:36:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.30 15:36:52 - OpenVPN > VERIFY EKU OK
. 2017.11.30 15:36:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org
. 2017.11.30 15:36:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.30 15:36:52 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]71.19.252.21:443
. 2017.11.30 15:36:53 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1)
. 2017.11.30 15:36:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.175 255.255.0.0,peer-id 130,cipher AES-256-GCM'
. 2017.11.30 15:36:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.11.30 15:36:53 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.11.30 15:36:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.11.30 15:36:53 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.11.30 15:36:53 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.11.30 15:36:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.11.30 15:36:53 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2017.11.30 15:36:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2017.11.30 15:36:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2017.11.30 15:36:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2017.11.30 15:36:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 15:36:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 15:36:53 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2017.11.30 15:36:54 - OpenVPN > Opened utun device utun0
. 2017.11.30 15:36:54 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.11.30 15:36:54 - OpenVPN > /sbin/ifconfig utun0 delete
. 2017.11.30 15:36:54 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2017.11.30 15:36:54 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2017.11.30 15:36:54 - OpenVPN > /sbin/ifconfig utun0 10.4.1.175 10.4.1.175 netmask 255.255.0.0 mtu 1500 up
. 2017.11.30 15:36:54 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.175 255.255.0.0
. 2017.11.30 15:36:54 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.175
. 2017.11.30 15:36:54 - OpenVPN > /sbin/route add -net 71.19.252.21 192.168.1.254 255.255.255.255
. 2017.11.30 15:36:54 - OpenVPN > add net 71.19.252.21: gateway 192.168.1.254
. 2017.11.30 15:36:54 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2017.11.30 15:36:54 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2017.11.30 15:36:54 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2017.11.30 15:36:54 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2017.11.30 15:36:54 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)
. 2017.11.30 15:36:54 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2017.11.30 15:36:54 - Flushing DNS
. 2017.11.30 15:36:54 - OS X - PF rules updated, reloading
I 2017.11.30 15:36:55 - Checking route
I 2017.11.30 15:36:57 - Checking DNS
. 2017.11.30 15:36:58 - Checking DNS failed: nmuiqzjjljyvlilsheiczaxjueeoerpv
. 2017.11.30 15:36:58 - Checking DNS (2° try)
. 2017.11.30 15:37:00 - Checking DNS failed: nmuiqzjjljyvlilsheiczaxjueeoerpv
. 2017.11.30 15:37:00 - Checking DNS (3° try)
. 2017.11.30 15:37:07 - Checking DNS failed: nmuiqzjjljyvlilsheiczaxjueeoerpv
E 2017.11.30 15:37:07 - Checking DNS failed.
. 2017.11.30 15:37:07 - OpenVPN > Initialization Sequence Completed
! 2017.11.30 15:37:07 - Disconnecting
. 2017.11.30 15:37:08 - Sending management termination signal
. 2017.11.30 15:37:08 - Management - Send 'signal SIGTERM'
. 2017.11.30 15:37:13 - Connection terminated.
. 2017.11.30 15:37:14 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)
. 2017.11.30 15:37:14 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
I 2017.11.30 15:37:17 - Checking authorization ...
! 2017.11.30 15:37:17 - Connecting to Gemma (Canada, Vancouver)
. 2017.11.30 15:37:17 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017
. 2017.11.30 15:37:17 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2017.11.30 15:37:17 - Connection to OpenVPN Management Interface
. 2017.11.30 15:37:17 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.11.30 15:37:17 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.30 15:37:17 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.30 15:37:17 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.113:443
. 2017.11.30 15:37:17 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2017.11.30 15:37:17 - OpenVPN > UDP link local: (not bound)
. 2017.11.30 15:37:18 - OpenVPN > UDP link remote: [AF_INET]71.19.252.113:443
. 2017.11.30 15:37:18 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.11.30 15:37:18 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=7dea3625 53133b48
. 2017.11.30 15:37:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.30 15:37:18 - OpenVPN > VERIFY KU OK
. 2017.11.30 15:37:18 - OpenVPN > Validating certificate extended key usage
. 2017.11.30 15:37:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.30 15:37:18 - OpenVPN > VERIFY EKU OK
. 2017.11.30 15:37:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.11.30 15:37:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.30 15:37:18 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443
. 2017.11.30 15:37:19 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2017.11.30 15:37:19 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.5.71 255.255.0.0'
. 2017.11.30 15:37:19 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.11.30 15:37:19 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.11.30 15:37:19 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.11.30 15:37:19 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.11.30 15:37:19 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.11.30 15:37:19 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.11.30 15:37:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.11.30 15:37:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.30 15:37:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.11.30 15:37:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.30 15:37:19 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2017.11.30 15:37:19 - OpenVPN > Opened utun device utun0
. 2017.11.30 15:37:19 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.11.30 15:37:19 - OpenVPN > /sbin/ifconfig utun0 delete
. 2017.11.30 15:37:19 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2017.11.30 15:37:19 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2017.11.30 15:37:19 - OpenVPN > /sbin/ifconfig utun0 10.4.5.71 10.4.5.71 netmask 255.255.0.0 mtu 1500 up
. 2017.11.30 15:37:19 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.5.71 255.255.0.0
. 2017.11.30 15:37:19 - OpenVPN > add net 10.4.0.0: gateway 10.4.5.71
. 2017.11.30 15:37:19 - OpenVPN > /sbin/route add -net 71.19.252.113 192.168.1.254 255.255.255.255
. 2017.11.30 15:37:19 - OpenVPN > add net 71.19.252.113: gateway 192.168.1.254
. 2017.11.30 15:37:19 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2017.11.30 15:37:19 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2017.11.30 15:37:19 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2017.11.30 15:37:19 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2017.11.30 15:37:20 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)
. 2017.11.30 15:37:20 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2017.11.30 15:37:20 - Flushing DNS
I 2017.11.30 15:37:20 - Checking route
. 2017.11.30 15:37:50 - curl: (28) Connection timed out after 30000 milliseconds
. 2017.11.30 15:37:50 - Checking route (2° try)
. 2017.11.30 15:38:21 - curl: (28) Connection timed out after 30000 milliseconds
. 2017.11.30 15:38:21 - Checking route (3° try)
. 2017.11.30 15:38:53 - curl: (28) Connection timed out after 30001 milliseconds
E 2017.11.30 15:38:53 - Checking route failed.
. 2017.11.30 15:38:53 - OpenVPN > Initialization Sequence Completed
! 2017.11.30 15:38:53 - Disconnecting
. 2017.11.30 15:38:53 - Sending management termination signal
. 2017.11.30 15:38:53 - Management - Send 'signal SIGTERM'
. 2017.11.30 15:38:58 - Connection terminated.
. 2017.11.30 15:38:58 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)
. 2017.11.30 15:38:58 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
I 2017.11.30 15:39:01 - Checking authorization ...
! 2017.11.30 15:39:01 - Connecting to Kleeia (Canada, Vancouver)
. 2017.11.30 15:39:02 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017
. 2017.11.30 15:39:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2017.11.30 15:39:02 - Connection to OpenVPN Management Interface
. 2017.11.30 15:39:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.11.30 15:39:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.30 15:39:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.30 15:39:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.31:443
. 2017.11.30 15:39:02 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2017.11.30 15:39:02 - OpenVPN > UDP link local: (not bound)
. 2017.11.30 15:39:02 - OpenVPN > UDP link remote: [AF_INET]71.19.252.31:443
. 2017.11.30 15:39:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.11.30 15:39:02 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.31:443, sid=250dd946 468d7a3c
. 2017.11.30 15:39:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.30 15:39:02 - OpenVPN > VERIFY KU OK
. 2017.11.30 15:39:02 - OpenVPN > Validating certificate extended key usage
. 2017.11.30 15:39:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.30 15:39:02 - OpenVPN > VERIFY EKU OK
. 2017.11.30 15:39:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.30 15:39:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.30 15:39:02 - OpenVPN > [Kleeia] Peer Connection Initiated with [AF_INET]71.19.252.31:443
. 2017.11.30 15:39:03 - OpenVPN > SENT CONTROL [Kleeia]: 'PUSH_REQUEST' (status=1)
. 2017.11.30 15:39:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.47 255.255.0.0,peer-id 27,cipher AES-256-GCM'
. 2017.11.30 15:39:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.11.30 15:39:03 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.11.30 15:39:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.11.30 15:39:03 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.11.30 15:39:03 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.11.30 15:39:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.11.30 15:39:03 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2017.11.30 15:39:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2017.11.30 15:39:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2017.11.30 15:39:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2017.11.30 15:39:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 15:39:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 15:39:03 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2017.11.30 15:39:03 - OpenVPN > Opened utun device utun0
. 2017.11.30 15:39:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.11.30 15:39:03 - OpenVPN > /sbin/ifconfig utun0 delete
. 2017.11.30 15:39:03 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2017.11.30 15:39:03 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2017.11.30 15:39:03 - OpenVPN > /sbin/ifconfig utun0 10.4.1.47 10.4.1.47 netmask 255.255.0.0 mtu 1500 up
. 2017.11.30 15:39:03 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.47 255.255.0.0
. 2017.11.30 15:39:03 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.47
. 2017.11.30 15:39:03 - OpenVPN > /sbin/route add -net 71.19.252.31 192.168.1.254 255.255.255.255
. 2017.11.30 15:39:03 - OpenVPN > add net 71.19.252.31: gateway 192.168.1.254
. 2017.11.30 15:39:03 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2017.11.30 15:39:03 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2017.11.30 15:39:03 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2017.11.30 15:39:04 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2017.11.30 15:39:04 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)
. 2017.11.30 15:39:04 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2017.11.30 15:39:04 - Flushing DNS
I 2017.11.30 15:39:04 - Checking route
. 2017.11.30 15:39:28 - OS X - PF rules updated, reloading
. 2017.11.30 15:39:34 - curl: (28) Connection timed out after 30002 milliseconds
. 2017.11.30 15:39:34 - Checking route (2° try)
I 2017.11.30 15:39:36 - Checking DNS
! 2017.11.30 15:39:37 - Connected.
. 2017.11.30 15:39:37 - OpenVPN > Initialization Sequence Completed

 

System log:

 

Eddie System/Environment Report - 11/30/2017 11:46 PM UTC

Eddie version: 2.13.6
Eddie OS build: macos_x64
Eddie architecture: x64
OS type: MacOS
OS name: 10.11.6
OS version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Mon Oct  2 22:20:08 PDT 2017; root:xnu-3248.71.4~1/RELEASE_X86_64 x86_64
OS architecture: x64
Mono /.Net Framework: v4.0.30319
OpenVPN driver: Expected
OpenVPN: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)
SSH: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)
SSL: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)
curl: 7.43.0 (/usr/bin/curl)
Profile path: /Users/madrat/.airvpn/AirVPN.xml
Data path: /Users/madrat/.airvpn
Application path: /Applications/Eddie.app/Contents/MacOS
Executable path: /Applications/Eddie.app/Contents/MacOS/Eddie
Command line arguments: (0 args)
Network Lock Active: Yes, OS X - PF
Connected to VPN: Yes, Eddie.Core.StatsEntry
Detected DNS: 10.4.0.1
Test DNS IPv4: Ok
Test DNS IPv6: Ok
Test HTTP: Status: HTTP/1.1 200 OK
 - Headers: server:nginx;date:Thu, 30 Nov 2017 23:46:00 GMT;content-type:text/html; charset=UTF-8;transfer-encoding:chunked;connection:keep-alive;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (8 bytes): Success.
Test HTTPS: Status: HTTP/1.1 200 OK
 - Headers: server:nginx;date:Thu, 30 Nov 2017 23:46:01 GMT;content-type:text/html; charset=UTF-8;transfer-encoding:chunked;connection:keep-alive;cache-control:no-store, no-cache, must-revalidate, max-age=0;cache-control:post-check=0, pre-check=0;pragma:no-cache;strict-transport-security:max-age=31536000; includeSubdomains; preload;x-frame-options:SAMEORIGIN;x-xss-protection:1; mode=block;x-content-type-options:nosniff;referrer-policy:strict-origin-when-cross-origin;x-filter:limit; - Body (8 bytes): Success.
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
connect: True
netlock: True
areas.whitelist: ca,us
netlock.allow_private: False
netlock.allow_ping: False
gui.osx.notifications: True
gui.osx.sysbar.show_info: True
gui.osx.sysbar.show_server: True

----------------------------
Logs:

I 2017.11.29 07:18:54 - Eddie version: 2.13.6 / macos_x64, System: MacOS, Name: 10.11.6, Version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Mon Oct  2 22:20:08 PDT 2017; root:xnu-3248.71.4~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319
. 2017.11.29 07:18:57 - Reading options from /Users/madrat/.airvpn/AirVPN.xml
. 2017.11.29 07:19:11 - Command line arguments (0):
I 2017.11.29 07:19:20 - OpenVPN Driver - Expected
I 2017.11.29 07:19:20 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)
I 2017.11.29 07:19:20 - SSH - Version: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)
I 2017.11.29 07:19:20 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)
I 2017.11.29 07:19:20 - curl - Version: 7.43.0 (/usr/bin/curl)
I 2017.11.29 07:19:20 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/cacert.pem
! 2017.11.29 07:19:20 - Activation of Network Lock - OS X - PF
. 2017.11.29 07:19:20 - OS X - PF rules updated, reloading
. 2017.11.29 07:19:20 - Updating systems & servers data ...
. 2017.11.29 07:19:21 - OS X - PF rules updated, reloading
I 2017.11.29 07:19:22 - Session starting.
. 2017.11.29 07:19:22 - Systems & servers data update completed
. 2017.11.29 07:19:23 - IPv6 disabled on network adapter (SAMSUNG Modem)
. 2017.11.29 07:19:24 - IPv6 disabled on network adapter (Ethernet)
. 2017.11.29 07:19:24 - IPv6 disabled on network adapter (FireWire)
. 2017.11.29 07:19:25 - IPv6 disabled on network adapter (Wi-Fi)
I 2017.11.29 07:19:33 - Checking authorization ...
! 2017.11.29 07:19:33 - Connecting to Cynosura (Canada, Vancouver)
. 2017.11.29 07:19:34 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017
. 2017.11.29 07:19:34 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2017.11.29 07:19:34 - Connection to OpenVPN Management Interface
. 2017.11.29 07:19:34 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.11.29 07:19:34 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.29 07:19:34 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.29 07:19:34 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443
. 2017.11.29 07:19:34 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2017.11.29 07:19:34 - OpenVPN > UDP link local: (not bound)
. 2017.11.29 07:19:34 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443
. 2017.11.29 07:19:34 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.11.29 07:19:35 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=0fb67daf 810383c0
. 2017.11.29 07:20:07 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting
. 2017.11.29 07:20:08 - OpenVPN > SIGTERM received, sending exit notification to peer
! 2017.11.29 07:20:13 - Disconnecting
. 2017.11.29 07:20:13 - Connection terminated.
I 2017.11.29 07:20:16 - Checking authorization ...
! 2017.11.29 07:20:16 - Connecting to Kleeia (Canada, Vancouver)
. 2017.11.29 07:20:16 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017
. 2017.11.29 07:20:16 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2017.11.29 07:20:16 - Connection to OpenVPN Management Interface
. 2017.11.29 07:20:16 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.11.29 07:20:16 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.29 07:20:16 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.29 07:20:16 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.31:443
. 2017.11.29 07:20:16 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2017.11.29 07:20:16 - OpenVPN > UDP link local: (not bound)
. 2017.11.29 07:20:16 - OpenVPN > UDP link remote: [AF_INET]71.19.252.31:443
. 2017.11.29 07:20:17 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.11.29 07:20:17 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.31:443, sid=77c92142 082f37cf
. 2017.11.29 07:20:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.29 07:20:17 - OpenVPN > VERIFY KU OK
. 2017.11.29 07:20:17 - OpenVPN > Validating certificate extended key usage
. 2017.11.29 07:20:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.29 07:20:17 - OpenVPN > VERIFY EKU OK
. 2017.11.29 07:20:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.29 07:20:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.29 07:20:17 - OpenVPN > [Kleeia] Peer Connection Initiated with [AF_INET]71.19.252.31:443
. 2017.11.29 07:20:18 - OpenVPN > SENT CONTROL [Kleeia]: 'PUSH_REQUEST' (status=1)
. 2017.11.29 07:20:18 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.47 255.255.0.0,peer-id 12,cipher AES-256-GCM'
. 2017.11.29 07:20:18 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.11.29 07:20:18 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.11.29 07:20:18 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.11.29 07:20:18 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.11.29 07:20:18 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.11.29 07:20:18 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.11.29 07:20:18 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2017.11.29 07:20:18 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2017.11.29 07:20:18 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2017.11.29 07:20:18 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2017.11.29 07:20:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 07:20:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 07:20:18 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2017.11.29 07:20:18 - OpenVPN > Opened utun device utun0
. 2017.11.29 07:20:18 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.11.29 07:20:18 - OpenVPN > /sbin/ifconfig utun0 delete
. 2017.11.29 07:20:18 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2017.11.29 07:20:18 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2017.11.29 07:20:18 - OpenVPN > /sbin/ifconfig utun0 10.4.1.47 10.4.1.47 netmask 255.255.0.0 mtu 1500 up
. 2017.11.29 07:20:18 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.47 255.255.0.0
. 2017.11.29 07:20:18 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.47
. 2017.11.29 07:20:18 - OpenVPN > /sbin/route add -net 71.19.252.31 192.168.1.254 255.255.255.255
. 2017.11.29 07:20:18 - OpenVPN > add net 71.19.252.31: gateway 192.168.1.254
. 2017.11.29 07:20:18 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2017.11.29 07:20:18 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2017.11.29 07:20:18 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2017.11.29 07:20:18 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2017.11.29 07:20:18 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)
. 2017.11.29 07:20:18 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2017.11.29 07:20:19 - Flushing DNS
. 2017.11.29 07:20:19 - OS X - PF rules updated, reloading
I 2017.11.29 07:20:19 - Checking route
I 2017.11.29 07:20:20 - Checking DNS
! 2017.11.29 07:20:20 - Connected.
. 2017.11.29 07:20:21 - OpenVPN > Initialization Sequence Completed
. 2017.11.29 07:29:34 - Updating systems & servers data ...
. 2017.11.29 07:29:36 - Systems & servers data update completed
. 2017.11.29 07:39:45 - Updating systems & servers data ...
. 2017.11.29 07:39:46 - Systems & servers data update completed
. 2017.11.29 07:49:54 - Updating systems & servers data ...
. 2017.11.29 07:49:56 - Systems & servers data update completed
. 2017.11.29 08:00:05 - Updating systems & servers data ...
. 2017.11.29 08:00:07 - Systems & servers data update completed
. 2017.11.29 08:10:20 - Updating systems & servers data ...
. 2017.11.29 08:10:21 - Systems & servers data update completed
. 2017.11.29 08:20:17 - OpenVPN > TLS: soft reset sec=0 bytes=32129066/-1 pkts=62203/0
. 2017.11.29 08:20:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.29 08:20:17 - OpenVPN > VERIFY KU OK
. 2017.11.29 08:20:17 - OpenVPN > Validating certificate extended key usage
. 2017.11.29 08:20:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.29 08:20:17 - OpenVPN > VERIFY EKU OK
. 2017.11.29 08:20:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.29 08:20:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 08:20:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 08:20:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.29 08:20:31 - Updating systems & servers data ...
. 2017.11.29 08:20:33 - Systems & servers data update completed
. 2017.11.29 08:30:43 - Updating systems & servers data ...
. 2017.11.29 08:30:44 - Systems & servers data update completed
. 2017.11.29 08:40:52 - Updating systems & servers data ...
. 2017.11.29 08:40:56 - Systems & servers data update completed
. 2017.11.29 08:51:00 - Updating systems & servers data ...
. 2017.11.29 08:51:07 - Systems & servers data update completed
. 2017.11.29 09:01:20 - Updating systems & servers data ...
. 2017.11.29 09:01:21 - Systems & servers data update completed
. 2017.11.29 09:11:30 - Updating systems & servers data ...
. 2017.11.29 09:11:31 - Systems & servers data update completed
. 2017.11.29 09:20:17 - OpenVPN > TLS: soft reset sec=0 bytes=1929151719/-1 pkts=2398578/0
. 2017.11.29 09:20:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.29 09:20:17 - OpenVPN > VERIFY KU OK
. 2017.11.29 09:20:17 - OpenVPN > Validating certificate extended key usage
. 2017.11.29 09:20:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.29 09:20:17 - OpenVPN > VERIFY EKU OK
. 2017.11.29 09:20:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.29 09:20:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 09:20:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 09:20:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.29 09:21:36 - Updating systems & servers data ...
. 2017.11.29 09:21:38 - Systems & servers data update completed
. 2017.11.29 09:48:00 - Updating systems & servers data ...
. 2017.11.29 09:48:01 - Systems & servers data update completed
. 2017.11.29 10:10:43 - Updating systems & servers data ...
. 2017.11.29 10:10:44 - Systems & servers data update completed
. 2017.11.29 10:20:21 - OpenVPN > TLS: soft reset sec=0 bytes=6653706/-1 pkts=36810/0
. 2017.11.29 10:20:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.29 10:20:21 - OpenVPN > VERIFY KU OK
. 2017.11.29 10:20:21 - OpenVPN > Validating certificate extended key usage
. 2017.11.29 10:20:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.29 10:20:21 - OpenVPN > VERIFY EKU OK
. 2017.11.29 10:20:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.29 10:20:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 10:20:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 10:20:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.29 10:23:42 - Updating systems & servers data ...
. 2017.11.29 10:23:43 - Systems & servers data update completed
. 2017.11.29 10:50:03 - Updating systems & servers data ...
. 2017.11.29 10:50:05 - Systems & servers data update completed
. 2017.11.29 11:05:00 - Updating systems & servers data ...
. 2017.11.29 11:05:02 - Systems & servers data update completed
. 2017.11.29 11:20:21 - OpenVPN > TLS: soft reset sec=0 bytes=5248172/-1 pkts=25531/0
. 2017.11.29 11:20:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.29 11:20:21 - OpenVPN > VERIFY KU OK
. 2017.11.29 11:20:21 - OpenVPN > Validating certificate extended key usage
. 2017.11.29 11:20:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.29 11:20:21 - OpenVPN > VERIFY EKU OK
. 2017.11.29 11:20:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.29 11:20:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 11:20:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 11:20:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.29 11:23:22 - Updating systems & servers data ...
. 2017.11.29 11:23:23 - Systems & servers data update completed
. 2017.11.29 11:39:02 - Updating systems & servers data ...
. 2017.11.29 11:39:03 - Systems & servers data update completed
. 2017.11.29 11:57:42 - Updating systems & servers data ...
. 2017.11.29 11:57:44 - Systems & servers data update completed
. 2017.11.29 12:13:00 - Updating systems & servers data ...
. 2017.11.29 12:13:02 - Systems & servers data update completed
. 2017.11.29 12:20:21 - OpenVPN > TLS: soft reset sec=0 bytes=5542858/-1 pkts=25527/0
. 2017.11.29 12:20:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.29 12:20:21 - OpenVPN > VERIFY KU OK
. 2017.11.29 12:20:21 - OpenVPN > Validating certificate extended key usage
. 2017.11.29 12:20:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.29 12:20:21 - OpenVPN > VERIFY EKU OK
. 2017.11.29 12:20:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.29 12:20:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 12:20:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 12:20:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.29 12:29:03 - Updating systems & servers data ...
. 2017.11.29 12:29:05 - Systems & servers data update completed
. 2017.11.29 12:54:02 - Updating systems & servers data ...
. 2017.11.29 12:54:03 - Systems & servers data update completed
. 2017.11.29 13:20:21 - OpenVPN > TLS: soft reset sec=0 bytes=4293330/-1 pkts=20676/0
. 2017.11.29 13:20:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.29 13:20:21 - OpenVPN > VERIFY KU OK
. 2017.11.29 13:20:21 - OpenVPN > Validating certificate extended key usage
. 2017.11.29 13:20:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.29 13:20:21 - OpenVPN > VERIFY EKU OK
. 2017.11.29 13:20:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.29 13:20:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 13:20:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 13:20:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.29 13:33:41 - Updating systems & servers data ...
. 2017.11.29 13:33:43 - Systems & servers data update completed
. 2017.11.29 13:57:01 - Updating systems & servers data ...
. 2017.11.29 13:57:02 - Systems & servers data update completed
. 2017.11.29 14:13:01 - Updating systems & servers data ...
. 2017.11.29 14:13:03 - Systems & servers data update completed
. 2017.11.29 14:20:21 - OpenVPN > TLS: soft reset sec=0 bytes=4041302/-1 pkts=19042/0
. 2017.11.29 14:20:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.29 14:20:21 - OpenVPN > VERIFY KU OK
. 2017.11.29 14:20:21 - OpenVPN > Validating certificate extended key usage
. 2017.11.29 14:20:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.29 14:20:21 - OpenVPN > VERIFY EKU OK
. 2017.11.29 14:20:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.29 14:20:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 14:20:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 14:20:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.29 14:29:02 - Updating systems & servers data ...
. 2017.11.29 14:29:03 - Systems & servers data update completed
. 2017.11.29 14:47:00 - Updating systems & servers data ...
. 2017.11.29 14:47:03 - Systems & servers data update completed
. 2017.11.29 15:06:37 - Updating systems & servers data ...
. 2017.11.29 15:06:39 - Systems & servers data update completed
. 2017.11.29 15:19:30 - Updating systems & servers data ...
. 2017.11.29 15:19:33 - Systems & servers data update completed
. 2017.11.29 15:20:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.29 15:20:23 - OpenVPN > VERIFY KU OK
. 2017.11.29 15:20:23 - OpenVPN > Validating certificate extended key usage
. 2017.11.29 15:20:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.29 15:20:23 - OpenVPN > VERIFY EKU OK
. 2017.11.29 15:20:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.29 15:20:23 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 15:20:23 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 15:20:23 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.29 15:34:27 - Updating systems & servers data ...
. 2017.11.29 15:34:29 - Systems & servers data update completed
. 2017.11.29 15:58:13 - Updating systems & servers data ...
. 2017.11.29 15:58:14 - Systems & servers data update completed
I 2017.11.29 16:20:21 - Renewing TLS key
. 2017.11.29 16:20:21 - OpenVPN > TLS: tls_process: killed expiring key
. 2017.11.29 16:20:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.29 16:20:21 - OpenVPN > VERIFY KU OK
. 2017.11.29 16:20:21 - OpenVPN > Validating certificate extended key usage
. 2017.11.29 16:20:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.29 16:20:21 - OpenVPN > VERIFY EKU OK
. 2017.11.29 16:20:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.29 16:20:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 16:20:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 16:20:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.29 16:23:01 - Updating systems & servers data ...
. 2017.11.29 16:23:02 - Systems & servers data update completed
. 2017.11.29 16:49:01 - Updating systems & servers data ...
. 2017.11.29 16:49:03 - Systems & servers data update completed
. 2017.11.29 17:10:00 - Updating systems & servers data ...
. 2017.11.29 17:10:02 - Systems & servers data update completed
. 2017.11.29 17:20:21 - OpenVPN > TLS: soft reset sec=0 bytes=3308735/-1 pkts=15217/0
. 2017.11.29 17:20:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.29 17:20:21 - OpenVPN > VERIFY KU OK
. 2017.11.29 17:20:21 - OpenVPN > Validating certificate extended key usage
. 2017.11.29 17:20:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.29 17:20:21 - OpenVPN > VERIFY EKU OK
. 2017.11.29 17:20:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.29 17:20:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 17:20:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 17:20:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.29 17:31:01 - Updating systems & servers data ...
. 2017.11.29 17:31:02 - Systems & servers data update completed
. 2017.11.29 17:46:29 - Updating systems & servers data ...
. 2017.11.29 17:46:31 - Systems & servers data update completed
. 2017.11.29 17:56:45 - Updating systems & servers data ...
. 2017.11.29 17:56:47 - Systems & servers data update completed
. 2017.11.29 18:06:56 - Updating systems & servers data ...
. 2017.11.29 18:06:58 - Systems & servers data update completed
. 2017.11.29 18:17:09 - Updating systems & servers data ...
. 2017.11.29 18:17:12 - Systems & servers data update completed
I 2017.11.29 18:20:18 - Renewing TLS key
. 2017.11.29 18:20:18 - OpenVPN > TLS: tls_process: killed expiring key
. 2017.11.29 18:20:20 - OpenVPN > TLS: soft reset sec=0 bytes=45109655/-1 pkts=72387/0
. 2017.11.29 18:20:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.29 18:20:20 - OpenVPN > VERIFY KU OK
. 2017.11.29 18:20:20 - OpenVPN > Validating certificate extended key usage
. 2017.11.29 18:20:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.29 18:20:20 - OpenVPN > VERIFY EKU OK
. 2017.11.29 18:20:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.29 18:20:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 18:20:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 18:20:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.29 18:27:22 - Updating systems & servers data ...
. 2017.11.29 18:27:26 - Systems & servers data update completed
. 2017.11.29 18:37:33 - Updating systems & servers data ...
. 2017.11.29 18:37:35 - Systems & servers data update completed
. 2017.11.29 18:47:44 - Updating systems & servers data ...
. 2017.11.29 18:47:46 - Systems & servers data update completed
. 2017.11.29 18:57:53 - Updating systems & servers data ...
. 2017.11.29 18:57:55 - Systems & servers data update completed
. 2017.11.29 19:08:00 - Updating systems & servers data ...
. 2017.11.29 19:08:02 - Systems & servers data update completed
. 2017.11.29 19:18:09 - Updating systems & servers data ...
. 2017.11.29 19:18:11 - Systems & servers data update completed
. 2017.11.29 19:20:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.29 19:20:20 - OpenVPN > VERIFY KU OK
. 2017.11.29 19:20:20 - OpenVPN > Validating certificate extended key usage
. 2017.11.29 19:20:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.29 19:20:20 - OpenVPN > VERIFY EKU OK
. 2017.11.29 19:20:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.29 19:20:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 19:20:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 19:20:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.29 19:28:16 - Updating systems & servers data ...
. 2017.11.29 19:28:19 - Systems & servers data update completed
. 2017.11.29 19:51:00 - Updating systems & servers data ...
. 2017.11.29 19:51:02 - Systems & servers data update completed
. 2017.11.29 20:20:21 - OpenVPN > TLS: soft reset sec=0 bytes=387363505/-1 pkts=554294/0
. 2017.11.29 20:20:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.29 20:20:21 - OpenVPN > VERIFY KU OK
. 2017.11.29 20:20:21 - OpenVPN > Validating certificate extended key usage
. 2017.11.29 20:20:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.29 20:20:21 - OpenVPN > VERIFY EKU OK
. 2017.11.29 20:20:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.29 20:20:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 20:20:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 20:20:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.29 20:23:47 - Updating systems & servers data ...
. 2017.11.29 20:23:49 - Systems & servers data update completed
. 2017.11.29 20:34:08 - Updating systems & servers data ...
. 2017.11.29 20:34:10 - Systems & servers data update completed
. 2017.11.29 20:44:17 - Updating systems & servers data ...
. 2017.11.29 20:44:20 - Systems & servers data update completed
. 2017.11.29 20:54:27 - Updating systems & servers data ...
. 2017.11.29 20:54:30 - Systems & servers data update completed
. 2017.11.29 21:04:34 - Updating systems & servers data ...
. 2017.11.29 21:04:39 - Systems & servers data update completed
. 2017.11.29 21:14:43 - Updating systems & servers data ...
. 2017.11.29 21:14:46 - Systems & servers data update completed
I 2017.11.29 21:20:20 - Renewing TLS key
. 2017.11.29 21:20:20 - OpenVPN > TLS: tls_process: killed expiring key
. 2017.11.29 21:20:21 - OpenVPN > TLS: soft reset sec=0 bytes=515688570/-1 pkts=943499/0
. 2017.11.29 21:20:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.29 21:20:21 - OpenVPN > VERIFY KU OK
. 2017.11.29 21:20:21 - OpenVPN > Validating certificate extended key usage
. 2017.11.29 21:20:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.29 21:20:21 - OpenVPN > VERIFY EKU OK
. 2017.11.29 21:20:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.29 21:20:21 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 21:20:21 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 21:20:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.29 21:24:56 - Updating systems & servers data ...
. 2017.11.29 21:24:58 - Systems & servers data update completed
. 2017.11.29 21:37:00 - Updating systems & servers data ...
. 2017.11.29 21:37:03 - Systems & servers data update completed
. 2017.11.29 22:03:01 - Updating systems & servers data ...
. 2017.11.29 22:03:04 - Systems & servers data update completed
. 2017.11.29 22:18:00 - Updating systems & servers data ...
. 2017.11.29 22:18:02 - Systems & servers data update completed
. 2017.11.29 22:20:38 - OpenVPN > TLS: soft reset sec=0 bytes=769038576/-1 pkts=1217935/0
. 2017.11.29 22:20:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.29 22:20:38 - OpenVPN > VERIFY KU OK
. 2017.11.29 22:20:38 - OpenVPN > Validating certificate extended key usage
. 2017.11.29 22:20:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.29 22:20:38 - OpenVPN > VERIFY EKU OK
. 2017.11.29 22:20:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.29 22:20:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 22:20:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 22:20:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.29 22:39:00 - Updating systems & servers data ...
. 2017.11.29 22:39:03 - Systems & servers data update completed
. 2017.11.29 22:57:12 - Updating systems & servers data ...
. 2017.11.29 22:57:14 - Systems & servers data update completed
. 2017.11.29 23:18:01 - Updating systems & servers data ...
. 2017.11.29 23:18:03 - Systems & servers data update completed
I 2017.11.29 23:20:40 - Renewing TLS key
. 2017.11.29 23:20:40 - OpenVPN > TLS: tls_process: killed expiring key
. 2017.11.29 23:20:40 - OpenVPN > TLS: soft reset sec=0 bytes=7820658/-1 pkts=47559/0
. 2017.11.29 23:20:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.29 23:20:40 - OpenVPN > VERIFY KU OK
. 2017.11.29 23:20:40 - OpenVPN > Validating certificate extended key usage
. 2017.11.29 23:20:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.29 23:20:40 - OpenVPN > VERIFY EKU OK
. 2017.11.29 23:20:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.29 23:20:40 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 23:20:40 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.29 23:20:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.29 23:38:00 - Updating systems & servers data ...
. 2017.11.29 23:38:02 - Systems & servers data update completed
. 2017.11.30 00:00:00 - Updating systems & servers data ...
. 2017.11.30 00:00:02 - Systems & servers data update completed
. 2017.11.30 00:20:41 - OpenVPN > TLS: soft reset sec=0 bytes=6577768/-1 pkts=36966/0
. 2017.11.30 00:20:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.30 00:20:41 - OpenVPN > VERIFY KU OK
. 2017.11.30 00:20:41 - OpenVPN > Validating certificate extended key usage
. 2017.11.30 00:20:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.30 00:20:41 - OpenVPN > VERIFY EKU OK
. 2017.11.30 00:20:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.30 00:20:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 00:20:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 00:20:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.30 00:50:41 - Updating systems & servers data ...
. 2017.11.30 00:50:44 - Systems & servers data update completed
. 2017.11.30 01:08:01 - Updating systems & servers data ...
. 2017.11.30 01:08:03 - Systems & servers data update completed
. 2017.11.30 01:20:41 - OpenVPN > TLS: soft reset sec=0 bytes=6356455/-1 pkts=34805/0
. 2017.11.30 01:20:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.30 01:20:41 - OpenVPN > VERIFY KU OK
. 2017.11.30 01:20:41 - OpenVPN > Validating certificate extended key usage
. 2017.11.30 01:20:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.30 01:20:41 - OpenVPN > VERIFY EKU OK
. 2017.11.30 01:20:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.30 01:20:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 01:20:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 01:20:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.30 01:28:01 - Updating systems & servers data ...
. 2017.11.30 01:28:03 - Systems & servers data update completed
. 2017.11.30 01:45:01 - Updating systems & servers data ...
. 2017.11.30 01:45:03 - Systems & servers data update completed
. 2017.11.30 01:57:45 - Updating systems & servers data ...
. 2017.11.30 01:57:47 - Systems & servers data update completed
. 2017.11.30 02:10:36 - Updating systems & servers data ...
. 2017.11.30 02:10:37 - Systems & servers data update completed
. 2017.11.30 02:20:41 - OpenVPN > TLS: soft reset sec=0 bytes=5765260/-1 pkts=30037/0
. 2017.11.30 02:20:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.30 02:20:41 - OpenVPN > VERIFY KU OK
. 2017.11.30 02:20:41 - OpenVPN > Validating certificate extended key usage
. 2017.11.30 02:20:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.30 02:20:41 - OpenVPN > VERIFY EKU OK
. 2017.11.30 02:20:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.30 02:20:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 02:20:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 02:20:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.30 02:22:00 - Updating systems & servers data ...
. 2017.11.30 02:22:02 - Systems & servers data update completed
. 2017.11.30 02:44:11 - Updating systems & servers data ...
. 2017.11.30 02:44:13 - Systems & servers data update completed
. 2017.11.30 03:00:00 - Updating systems & servers data ...
. 2017.11.30 03:00:02 - Systems & servers data update completed
. 2017.11.30 03:18:16 - Updating systems & servers data ...
. 2017.11.30 03:18:19 - Systems & servers data update completed
. 2017.11.30 03:20:41 - OpenVPN > TLS: soft reset sec=0 bytes=582670325/-1 pkts=850807/0
. 2017.11.30 03:20:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.30 03:20:41 - OpenVPN > VERIFY KU OK
. 2017.11.30 03:20:41 - OpenVPN > Validating certificate extended key usage
. 2017.11.30 03:20:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.30 03:20:41 - OpenVPN > VERIFY EKU OK
. 2017.11.30 03:20:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.30 03:20:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 03:20:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 03:20:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.30 03:30:51 - Updating systems & servers data ...
. 2017.11.30 03:30:54 - Systems & servers data update completed
. 2017.11.30 03:52:30 - Updating systems & servers data ...
. 2017.11.30 03:52:32 - Systems & servers data update completed
. 2017.11.30 04:10:00 - Updating systems & servers data ...
. 2017.11.30 04:10:02 - Systems & servers data update completed
. 2017.11.30 04:20:01 - Updating systems & servers data ...
. 2017.11.30 04:20:04 - Systems & servers data update completed
. 2017.11.30 04:20:22 - OpenVPN > TLS: soft reset sec=0 bytes=578624629/-1 pkts=834213/0
. 2017.11.30 04:20:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.30 04:20:22 - OpenVPN > VERIFY KU OK
. 2017.11.30 04:20:22 - OpenVPN > Validating certificate extended key usage
. 2017.11.30 04:20:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.30 04:20:22 - OpenVPN > VERIFY EKU OK
. 2017.11.30 04:20:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.30 04:20:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 04:20:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 04:20:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.30 04:34:40 - Updating systems & servers data ...
. 2017.11.30 04:34:42 - Systems & servers data update completed
. 2017.11.30 04:57:26 - Updating systems & servers data ...
. 2017.11.30 04:57:28 - Systems & servers data update completed
. 2017.11.30 05:18:01 - Updating systems & servers data ...
. 2017.11.30 05:18:02 - Systems & servers data update completed
. 2017.11.30 05:20:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.30 05:20:41 - OpenVPN > VERIFY KU OK
. 2017.11.30 05:20:41 - OpenVPN > Validating certificate extended key usage
. 2017.11.30 05:20:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.30 05:20:41 - OpenVPN > VERIFY EKU OK
. 2017.11.30 05:20:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.30 05:20:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 05:20:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 05:20:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.30 05:38:19 - Updating systems & servers data ...
. 2017.11.30 05:38:21 - Systems & servers data update completed
. 2017.11.30 05:57:00 - Updating systems & servers data ...
. 2017.11.30 05:57:02 - Systems & servers data update completed
. 2017.11.30 06:17:41 - Updating systems & servers data ...
. 2017.11.30 06:17:43 - Systems & servers data update completed
. 2017.11.30 06:20:40 - OpenVPN > TLS: soft reset sec=0 bytes=6349721/-1 pkts=30396/0
. 2017.11.30 06:20:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.30 06:20:40 - OpenVPN > VERIFY KU OK
. 2017.11.30 06:20:40 - OpenVPN > Validating certificate extended key usage
. 2017.11.30 06:20:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.30 06:20:40 - OpenVPN > VERIFY EKU OK
. 2017.11.30 06:20:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.30 06:20:40 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 06:20:40 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 06:20:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.30 06:28:05 - Updating systems & servers data ...
. 2017.11.30 06:28:07 - Systems & servers data update completed
. 2017.11.30 06:38:30 - Updating systems & servers data ...
. 2017.11.30 06:38:32 - Systems & servers data update completed
. 2017.11.30 06:48:41 - Updating systems & servers data ...
. 2017.11.30 06:48:43 - Systems & servers data update completed
. 2017.11.30 06:58:51 - Updating systems & servers data ...
. 2017.11.30 06:58:53 - Systems & servers data update completed
. 2017.11.30 07:09:01 - Updating systems & servers data ...
. 2017.11.30 07:09:03 - Systems & servers data update completed
. 2017.11.30 07:19:10 - Updating systems & servers data ...
. 2017.11.30 07:19:12 - Systems & servers data update completed
. 2017.11.30 07:20:22 - OpenVPN > TLS: soft reset sec=0 bytes=27713253/-1 pkts=59559/0
. 2017.11.30 07:20:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.30 07:20:22 - OpenVPN > VERIFY KU OK
. 2017.11.30 07:20:22 - OpenVPN > Validating certificate extended key usage
. 2017.11.30 07:20:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.30 07:20:22 - OpenVPN > VERIFY EKU OK
. 2017.11.30 07:20:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.30 07:20:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 07:20:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 07:20:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.30 07:29:23 - Updating systems & servers data ...
. 2017.11.30 07:29:25 - Systems & servers data update completed
. 2017.11.30 07:39:30 - Updating systems & servers data ...
. 2017.11.30 07:39:32 - Systems & servers data update completed
. 2017.11.30 07:49:43 - Updating systems & servers data ...
. 2017.11.30 07:49:45 - Systems & servers data update completed
. 2017.11.30 07:59:53 - Updating systems & servers data ...
. 2017.11.30 07:59:54 - Systems & servers data update completed
. 2017.11.30 08:09:59 - Updating systems & servers data ...
. 2017.11.30 08:10:01 - Systems & servers data update completed
. 2017.11.30 08:20:06 - Updating systems & servers data ...
. 2017.11.30 08:20:08 - Systems & servers data update completed
. 2017.11.30 08:20:22 - OpenVPN > TLS: soft reset sec=0 bytes=17830624/-1 pkts=49419/0
. 2017.11.30 08:20:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.30 08:20:22 - OpenVPN > VERIFY KU OK
. 2017.11.30 08:20:22 - OpenVPN > Validating certificate extended key usage
. 2017.11.30 08:20:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.30 08:20:22 - OpenVPN > VERIFY EKU OK
. 2017.11.30 08:20:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.30 08:20:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 08:20:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 08:20:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.30 09:01:01 - Updating systems & servers data ...
. 2017.11.30 09:01:04 - Systems & servers data update completed
. 2017.11.30 09:18:45 - Updating systems & servers data ...
. 2017.11.30 09:18:47 - Systems & servers data update completed
. 2017.11.30 09:20:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.30 09:20:41 - OpenVPN > VERIFY KU OK
. 2017.11.30 09:20:41 - OpenVPN > Validating certificate extended key usage
. 2017.11.30 09:20:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.30 09:20:41 - OpenVPN > VERIFY EKU OK
. 2017.11.30 09:20:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.30 09:20:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 09:20:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 09:20:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.30 09:41:00 - Updating systems & servers data ...
. 2017.11.30 09:41:01 - Systems & servers data update completed
. 2017.11.30 10:03:01 - Updating systems & servers data ...
. 2017.11.30 10:03:03 - Systems & servers data update completed
. 2017.11.30 10:20:41 - OpenVPN > TLS: soft reset sec=0 bytes=5435881/-1 pkts=26223/0
. 2017.11.30 10:20:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.30 10:20:41 - OpenVPN > VERIFY KU OK
. 2017.11.30 10:20:41 - OpenVPN > Validating certificate extended key usage
. 2017.11.30 10:20:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.30 10:20:41 - OpenVPN > VERIFY EKU OK
. 2017.11.30 10:20:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.30 10:20:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 10:20:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 10:20:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.30 10:28:00 - Updating systems & servers data ...
. 2017.11.30 10:28:02 - Systems & servers data update completed
. 2017.11.30 10:48:00 - Updating systems & servers data ...
. 2017.11.30 10:48:02 - Systems & servers data update completed
. 2017.11.30 11:07:01 - Updating systems & servers data ...
. 2017.11.30 11:07:02 - Systems & servers data update completed
. 2017.11.30 11:20:41 - Updating systems & servers data ...
. 2017.11.30 11:20:41 - OpenVPN > TLS: soft reset sec=0 bytes=5076406/-1 pkts=24242/0
. 2017.11.30 11:20:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.30 11:20:41 - OpenVPN > VERIFY KU OK
. 2017.11.30 11:20:41 - OpenVPN > Validating certificate extended key usage
. 2017.11.30 11:20:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.30 11:20:41 - OpenVPN > VERIFY EKU OK
. 2017.11.30 11:20:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.30 11:20:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 11:20:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 11:20:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.30 11:20:44 - Systems & servers data update completed
. 2017.11.30 11:38:00 - Updating systems & servers data ...
. 2017.11.30 11:38:02 - Systems & servers data update completed
. 2017.11.30 11:58:05 - Updating systems & servers data ...
. 2017.11.30 11:58:07 - Systems & servers data update completed
. 2017.11.30 12:19:49 - Updating systems & servers data ...
. 2017.11.30 12:19:51 - Systems & servers data update completed
. 2017.11.30 12:20:41 - OpenVPN > TLS: soft reset sec=0 bytes=5028867/-1 pkts=23569/0
. 2017.11.30 12:20:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.30 12:20:41 - OpenVPN > VERIFY KU OK
. 2017.11.30 12:20:41 - OpenVPN > Validating certificate extended key usage
. 2017.11.30 12:20:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.30 12:20:41 - OpenVPN > VERIFY EKU OK
. 2017.11.30 12:20:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.30 12:20:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 12:20:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 12:20:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.30 12:44:19 - Updating systems & servers data ...
. 2017.11.30 12:44:21 - Systems & servers data update completed
. 2017.11.30 12:55:58 - Updating systems & servers data ...
. 2017.11.30 12:56:01 - Systems & servers data update completed
. 2017.11.30 13:09:39 - Updating systems & servers data ...
. 2017.11.30 13:09:40 - Systems & servers data update completed
. 2017.11.30 13:20:41 - OpenVPN > TLS: soft reset sec=0 bytes=11019855/-1 pkts=32000/0
. 2017.11.30 13:20:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.30 13:20:41 - OpenVPN > VERIFY KU OK
. 2017.11.30 13:20:41 - OpenVPN > Validating certificate extended key usage
. 2017.11.30 13:20:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.30 13:20:41 - OpenVPN > VERIFY EKU OK
. 2017.11.30 13:20:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.30 13:20:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 13:20:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 13:20:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.30 13:21:44 - Updating systems & servers data ...
. 2017.11.30 13:21:46 - Systems & servers data update completed
. 2017.11.30 13:32:39 - Updating systems & servers data ...
. 2017.11.30 13:32:40 - Systems & servers data update completed
. 2017.11.30 13:43:58 - Updating systems & servers data ...
. 2017.11.30 13:44:04 - Systems & servers data update completed
. 2017.11.30 14:03:57 - Updating systems & servers data ...
. 2017.11.30 14:03:59 - Systems & servers data update completed
. 2017.11.30 14:14:10 - Updating systems & servers data ...
. 2017.11.30 14:14:12 - Systems & servers data update completed
. 2017.11.30 14:20:22 - OpenVPN > TLS: soft reset sec=0 bytes=14006910/-1 pkts=34054/0
. 2017.11.30 14:20:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.30 14:20:22 - OpenVPN > VERIFY KU OK
. 2017.11.30 14:20:22 - OpenVPN > Validating certificate extended key usage
. 2017.11.30 14:20:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.30 14:20:22 - OpenVPN > VERIFY EKU OK
. 2017.11.30 14:20:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.30 14:20:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 14:20:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 14:20:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.30 14:24:19 - Updating systems & servers data ...
. 2017.11.30 14:24:21 - Systems & servers data update completed
. 2017.11.30 14:34:31 - Updating systems & servers data ...
. 2017.11.30 14:34:33 - Systems & servers data update completed
. 2017.11.30 14:44:40 - Updating systems & servers data ...
. 2017.11.30 14:44:42 - Systems & servers data update completed
. 2017.11.30 14:54:49 - Updating systems & servers data ...
. 2017.11.30 14:54:51 - Systems & servers data update completed
. 2017.11.30 15:04:56 - Updating systems & servers data ...
. 2017.11.30 15:04:58 - Systems & servers data update completed
. 2017.11.30 15:15:03 - Updating systems & servers data ...
. 2017.11.30 15:15:05 - Systems & servers data update completed
. 2017.11.30 15:20:22 - OpenVPN > TLS: soft reset sec=0 bytes=12457826/-1 pkts=33037/0
. 2017.11.30 15:20:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.30 15:20:22 - OpenVPN > VERIFY KU OK
. 2017.11.30 15:20:22 - OpenVPN > Validating certificate extended key usage
. 2017.11.30 15:20:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.30 15:20:22 - OpenVPN > VERIFY EKU OK
. 2017.11.30 15:20:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.30 15:20:22 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 15:20:22 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 15:20:22 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.30 15:25:12 - Updating systems & servers data ...
. 2017.11.30 15:25:13 - Systems & servers data update completed
. 2017.11.30 15:29:49 - OS X - PF rules updated, reloading
E 2017.11.30 15:29:49 - Unable to start PF Firewall.
. 2017.11.30 15:30:08 - OS X - PF rules updated, reloading
. 2017.11.30 15:35:18 - Updating systems & servers data ...
. 2017.11.30 15:35:20 - Systems & servers data update completed
. 2017.11.30 15:36:36 - OS X - PF rules updated, reloading
! 2017.11.30 15:36:36 - Disconnecting
. 2017.11.30 15:36:36 - Sending management termination signal
. 2017.11.30 15:36:36 - Management - Send 'signal SIGTERM'
. 2017.11.30 15:36:41 - Connection terminated.
. 2017.11.30 15:36:41 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)
. 2017.11.30 15:36:41 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2017.11.30 15:36:42 - Flushing DNS
. 2017.11.30 15:36:42 - IPv6 restored on network adapter (SAMSUNG Modem)
. 2017.11.30 15:36:42 - IPv6 restored on network adapter (Ethernet)
. 2017.11.30 15:36:42 - IPv6 restored on network adapter (FireWire)
. 2017.11.30 15:36:42 - IPv6 restored on network adapter (Wi-Fi)
! 2017.11.30 15:36:42 - Session terminated.
I 2017.11.30 15:36:50 - Session starting.
. 2017.11.30 15:36:50 - IPv6 disabled on network adapter (SAMSUNG Modem)
. 2017.11.30 15:36:51 - IPv6 disabled on network adapter (Ethernet)
. 2017.11.30 15:36:51 - IPv6 disabled on network adapter (FireWire)
. 2017.11.30 15:36:51 - IPv6 disabled on network adapter (Wi-Fi)
I 2017.11.30 15:36:51 - Checking authorization ...
! 2017.11.30 15:36:51 - Connecting to Cynosura (Canada, Vancouver)
. 2017.11.30 15:36:52 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017
. 2017.11.30 15:36:52 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2017.11.30 15:36:52 - Connection to OpenVPN Management Interface
. 2017.11.30 15:36:52 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.11.30 15:36:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.30 15:36:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.30 15:36:52 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443
. 2017.11.30 15:36:52 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2017.11.30 15:36:52 - OpenVPN > UDP link local: (not bound)
. 2017.11.30 15:36:52 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443
. 2017.11.30 15:36:52 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.11.30 15:36:52 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=f7c37c52 db12e88f
. 2017.11.30 15:36:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.30 15:36:52 - OpenVPN > VERIFY KU OK
. 2017.11.30 15:36:52 - OpenVPN > Validating certificate extended key usage
. 2017.11.30 15:36:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.30 15:36:52 - OpenVPN > VERIFY EKU OK
. 2017.11.30 15:36:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org
. 2017.11.30 15:36:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.30 15:36:52 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]71.19.252.21:443
. 2017.11.30 15:36:53 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1)
. 2017.11.30 15:36:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.175 255.255.0.0,peer-id 130,cipher AES-256-GCM'
. 2017.11.30 15:36:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.11.30 15:36:53 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.11.30 15:36:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.11.30 15:36:53 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.11.30 15:36:53 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.11.30 15:36:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.11.30 15:36:53 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2017.11.30 15:36:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2017.11.30 15:36:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2017.11.30 15:36:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2017.11.30 15:36:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 15:36:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 15:36:53 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2017.11.30 15:36:54 - OpenVPN > Opened utun device utun0
. 2017.11.30 15:36:54 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.11.30 15:36:54 - OpenVPN > /sbin/ifconfig utun0 delete
. 2017.11.30 15:36:54 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2017.11.30 15:36:54 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2017.11.30 15:36:54 - OpenVPN > /sbin/ifconfig utun0 10.4.1.175 10.4.1.175 netmask 255.255.0.0 mtu 1500 up
. 2017.11.30 15:36:54 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.175 255.255.0.0
. 2017.11.30 15:36:54 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.175
. 2017.11.30 15:36:54 - OpenVPN > /sbin/route add -net 71.19.252.21 192.168.1.254 255.255.255.255
. 2017.11.30 15:36:54 - OpenVPN > add net 71.19.252.21: gateway 192.168.1.254
. 2017.11.30 15:36:54 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2017.11.30 15:36:54 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2017.11.30 15:36:54 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2017.11.30 15:36:54 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2017.11.30 15:36:54 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)
. 2017.11.30 15:36:54 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2017.11.30 15:36:54 - Flushing DNS
. 2017.11.30 15:36:54 - OS X - PF rules updated, reloading
I 2017.11.30 15:36:55 - Checking route
I 2017.11.30 15:36:57 - Checking DNS
. 2017.11.30 15:36:58 - Checking DNS failed: nmuiqzjjljyvlilsheiczaxjueeoerpv
. 2017.11.30 15:36:58 - Checking DNS (2° try)
. 2017.11.30 15:37:00 - Checking DNS failed: nmuiqzjjljyvlilsheiczaxjueeoerpv
. 2017.11.30 15:37:00 - Checking DNS (3° try)
. 2017.11.30 15:37:07 - Checking DNS failed: nmuiqzjjljyvlilsheiczaxjueeoerpv
E 2017.11.30 15:37:07 - Checking DNS failed.
. 2017.11.30 15:37:07 - OpenVPN > Initialization Sequence Completed
! 2017.11.30 15:37:07 - Disconnecting
. 2017.11.30 15:37:08 - Sending management termination signal
. 2017.11.30 15:37:08 - Management - Send 'signal SIGTERM'
. 2017.11.30 15:37:13 - Connection terminated.
. 2017.11.30 15:37:14 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)
. 2017.11.30 15:37:14 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
I 2017.11.30 15:37:17 - Checking authorization ...
! 2017.11.30 15:37:17 - Connecting to Gemma (Canada, Vancouver)
. 2017.11.30 15:37:17 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017
. 2017.11.30 15:37:17 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2017.11.30 15:37:17 - Connection to OpenVPN Management Interface
. 2017.11.30 15:37:17 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.11.30 15:37:17 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.30 15:37:17 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.30 15:37:17 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.113:443
. 2017.11.30 15:37:17 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2017.11.30 15:37:17 - OpenVPN > UDP link local: (not bound)
. 2017.11.30 15:37:18 - OpenVPN > UDP link remote: [AF_INET]71.19.252.113:443
. 2017.11.30 15:37:18 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.11.30 15:37:18 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=7dea3625 53133b48
. 2017.11.30 15:37:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.30 15:37:18 - OpenVPN > VERIFY KU OK
. 2017.11.30 15:37:18 - OpenVPN > Validating certificate extended key usage
. 2017.11.30 15:37:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.30 15:37:18 - OpenVPN > VERIFY EKU OK
. 2017.11.30 15:37:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.11.30 15:37:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.30 15:37:18 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443
. 2017.11.30 15:37:19 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2017.11.30 15:37:19 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.5.71 255.255.0.0'
. 2017.11.30 15:37:19 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.11.30 15:37:19 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.11.30 15:37:19 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.11.30 15:37:19 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.11.30 15:37:19 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.11.30 15:37:19 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.11.30 15:37:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.11.30 15:37:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.30 15:37:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.11.30 15:37:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.30 15:37:19 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2017.11.30 15:37:19 - OpenVPN > Opened utun device utun0
. 2017.11.30 15:37:19 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.11.30 15:37:19 - OpenVPN > /sbin/ifconfig utun0 delete
. 2017.11.30 15:37:19 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2017.11.30 15:37:19 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2017.11.30 15:37:19 - OpenVPN > /sbin/ifconfig utun0 10.4.5.71 10.4.5.71 netmask 255.255.0.0 mtu 1500 up
. 2017.11.30 15:37:19 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.5.71 255.255.0.0
. 2017.11.30 15:37:19 - OpenVPN > add net 10.4.0.0: gateway 10.4.5.71
. 2017.11.30 15:37:19 - OpenVPN > /sbin/route add -net 71.19.252.113 192.168.1.254 255.255.255.255
. 2017.11.30 15:37:19 - OpenVPN > add net 71.19.252.113: gateway 192.168.1.254
. 2017.11.30 15:37:19 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2017.11.30 15:37:19 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2017.11.30 15:37:19 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2017.11.30 15:37:19 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2017.11.30 15:37:20 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)
. 2017.11.30 15:37:20 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2017.11.30 15:37:20 - Flushing DNS
I 2017.11.30 15:37:20 - Checking route
. 2017.11.30 15:37:50 - curl: (28) Connection timed out after 30000 milliseconds
. 2017.11.30 15:37:50 - Checking route (2° try)
. 2017.11.30 15:38:21 - curl: (28) Connection timed out after 30000 milliseconds
. 2017.11.30 15:38:21 - Checking route (3° try)
. 2017.11.30 15:38:53 - curl: (28) Connection timed out after 30001 milliseconds
E 2017.11.30 15:38:53 - Checking route failed.
. 2017.11.30 15:38:53 - OpenVPN > Initialization Sequence Completed
! 2017.11.30 15:38:53 - Disconnecting
. 2017.11.30 15:38:53 - Sending management termination signal
. 2017.11.30 15:38:53 - Management - Send 'signal SIGTERM'
. 2017.11.30 15:38:58 - Connection terminated.
. 2017.11.30 15:38:58 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)
. 2017.11.30 15:38:58 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
I 2017.11.30 15:39:01 - Checking authorization ...
! 2017.11.30 15:39:01 - Connecting to Kleeia (Canada, Vancouver)
. 2017.11.30 15:39:02 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017
. 2017.11.30 15:39:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2017.11.30 15:39:02 - Connection to OpenVPN Management Interface
. 2017.11.30 15:39:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.11.30 15:39:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.30 15:39:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.11.30 15:39:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.31:443
. 2017.11.30 15:39:02 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2017.11.30 15:39:02 - OpenVPN > UDP link local: (not bound)
. 2017.11.30 15:39:02 - OpenVPN > UDP link remote: [AF_INET]71.19.252.31:443
. 2017.11.30 15:39:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.11.30 15:39:02 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.31:443, sid=250dd946 468d7a3c
. 2017.11.30 15:39:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.11.30 15:39:02 - OpenVPN > VERIFY KU OK
. 2017.11.30 15:39:02 - OpenVPN > Validating certificate extended key usage
. 2017.11.30 15:39:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.11.30 15:39:02 - OpenVPN > VERIFY EKU OK
. 2017.11.30 15:39:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kleeia, emailAddress=info@airvpn.org
. 2017.11.30 15:39:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.11.30 15:39:02 - OpenVPN > [Kleeia] Peer Connection Initiated with [AF_INET]71.19.252.31:443
. 2017.11.30 15:39:03 - OpenVPN > SENT CONTROL [Kleeia]: 'PUSH_REQUEST' (status=1)
. 2017.11.30 15:39:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.47 255.255.0.0,peer-id 27,cipher AES-256-GCM'
. 2017.11.30 15:39:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.11.30 15:39:03 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.11.30 15:39:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.11.30 15:39:03 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.11.30 15:39:03 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.11.30 15:39:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.11.30 15:39:03 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2017.11.30 15:39:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2017.11.30 15:39:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2017.11.30 15:39:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2017.11.30 15:39:03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 15:39:03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.11.30 15:39:03 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2017.11.30 15:39:03 - OpenVPN > Opened utun device utun0
. 2017.11.30 15:39:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.11.30 15:39:03 - OpenVPN > /sbin/ifconfig utun0 delete
. 2017.11.30 15:39:03 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2017.11.30 15:39:03 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2017.11.30 15:39:03 - OpenVPN > /sbin/ifconfig utun0 10.4.1.47 10.4.1.47 netmask 255.255.0.0 mtu 1500 up
. 2017.11.30 15:39:03 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.47 255.255.0.0
. 2017.11.30 15:39:03 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.47
. 2017.11.30 15:39:03 - OpenVPN > /sbin/route add -net 71.19.252.31 192.168.1.254 255.255.255.255
. 2017.11.30 15:39:03 - OpenVPN > add net 71.19.252.31: gateway 192.168.1.254
. 2017.11.30 15:39:03 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2017.11.30 15:39:03 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2017.11.30 15:39:03 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2017.11.30 15:39:04 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2017.11.30 15:39:04 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)
. 2017.11.30 15:39:04 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2017.11.30 15:39:04 - Flushing DNS
I 2017.11.30 15:39:04 - Checking route
. 2017.11.30 15:39:28 - OS X - PF rules updated, reloading
. 2017.11.30 15:39:34 - curl: (28) Connection timed out after 30002 milliseconds
. 2017.11.30 15:39:34 - Checking route (2° try)
I 2017.11.30 15:39:36 - Checking DNS
! 2017.11.30 15:39:37 - Connected.
. 2017.11.30 15:39:37 - OpenVPN > Initialization Sequence Completed
. 2017.11.30 15:45:28 - Updating systems & servers data ...
. 2017.11.30 15:45:30 - Systems & servers data update completed

----------------------------
Network Interfaces:

Network Interface: lo0 (lo0, ID:lo0) - Loopback - Up
Network Interface: gif0 (gif0, ID:gif0) - Unknown - Unknown
Network Interface: stf0 (stf0, ID:stf0) - Unknown - Unknown
Network Interface: en0 (en0, ID:en0) - Ethernet - Up
Network Interface: en1 (en1, ID:en1) - Ethernet - Up
Network Interface: fw0 (fw0, ID:fw0) - Unknown - Up
Network Interface: p2p0 (p2p0, ID:p2p0) - Ethernet - Unknown
Network Interface: utun0 (utun0, ID:utun0) - Unknown - Up

----------------------------
Default gateways:

127.0.0.1, lo0
192.168.1.254, en0
10.4.0.1, utun0
10.4.1.47, utun0

----------------------------
ifconfig:

lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
    options=3<RXCSUM,TXCSUM>
    inet6 ::1 prefixlen 128
    inet 127.0.0.1 netmask 0xff000000
    inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1
    nd6 options=1<PERFORMNUD>
gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280
stf0: flags=0<> mtu 1280
en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
    options=27<RXCSUM,TXCSUM,VLAN_MTU,TSO4>
    ether 00:23:df:8c:a0:ae
    inet 192.168.1.65 netmask 0xffffff00 broadcast 192.168.1.255
    nd6 options=1<PERFORMNUD>
    media: autoselect (100baseTX <full-duplex,flow-control>)
    status: active
en1: flags=8823<UP,BROADCAST,SMART,SIMPLEX,MULTICAST> mtu 1500
    ether 00:1f:f3:bd:82:25
    nd6 options=1<PERFORMNUD>
    media: autoselect (<unknown type>)
    status: inactive
fw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 4078
    lladdr 00:23:df:ff:fe:8c:a0:ae
    nd6 options=1<PERFORMNUD>
    media: autoselect <full-duplex>
    status: inactive
p2p0: flags=8802<BROADCAST,SIMPLEX,MULTICAST> mtu 2304
    ether 02:1f:f3:bd:82:25
    media: autoselect
    status: inactive
utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500
    inet 10.4.1.47 --> 10.4.1.47 netmask 0xffff0000
----------------------------
netstat /rnl:

Active Internet connections
Proto Recv-Q Send-Q  Local Address          Foreign Address        (state)    
tcp4       0      0  10.4.1.47.60417        ns334629.ip-5-19.https ESTABLISHED
tcp4       0      0  10.4.1.47.60414        ec2-34-197-18-15.https ESTABLISHED
tcp4       0      0  10.4.1.47.60413        ec2-34-197-18-15.https ESTABLISHED
tcp4       0      0  10.4.1.47.60368        17.188.166.10.5223     ESTABLISHED
tcp4       0      0  10.4.1.47.60356        17.249.44.86.5223      ESTABLISHED
tcp4       0      0  localhost.opcon-xps    localhost.60335        ESTABLISHED
tcp4       0      0  localhost.60335        localhost.opcon-xps    ESTABLISHED
tcp4       0      0  localhost.49153        localhost.1023         ESTABLISHED
tcp4       0      0  localhost.1023         localhost.49153        ESTABLISHED
udp4       0      0  *.53810                *.*                               
udp4       0      0  *.55088                *.*                               
udp4       0      0  10.4.1.47.ntp          *.*                               
udp6       0      0  *.63983                *.*                               
udp4       0      0  *.63983                *.*                               
udp4       0      0  *.53236                *.*                               
udp4       0      0  192.168.1.65.52427     192.168.1.254.nat-pmp             
udp4       0      0  *.40212                *.*                               
udp4       0      0  *.59406                *.*                               
udp4       0      0  *.pn-requester2        *.*                               
udp4       0      0  *.61508                *.*                               
udp4       0      0  *.*                    *.*                               
udp4       0      0  *.*                    *.*                               
udp4       0      0  *.*                    *.*                               
udp4       0      0  *.*                    *.*                               
udp4       0      0  *.*                    *.*                               
udp4       0      0  *.*                    *.*                               
udp6       0      0  *.57172                *.*                               
udp4       0      0  *.57172                *.*                               
udp6       0      0  *.50453                *.*                               
udp4       0      0  *.50453                *.*                               
udp4       0      0  *.*                    *.*                               
udp4       0      0  192.168.1.65.ntp       *.*                               
udp6       0      0  madrat.ntp             *.*                               
udp4       0      0  localhost.ntp          *.*                               
udp6       0      0  localhost.ntp          *.*                               
udp6       0      0  *.ntp                  *.*                               
udp4       0      0  *.ntp                  *.*                               
udp4       0      0  *.*                    *.*                               
udp4       0      0  *.kerberos             *.*                               
udp6       0      0  *.kerberos             *.*                               
udp4       0      0  *.*                    *.*                               
udp4       0      0  *.*                    *.*                               
udp4       0      0  *.*                    *.*                               
udp4       0      0  *.*                    *.*                               
udp4       0      0  *.*                    *.*                               
udp4       0      0  *.*                    *.*                               
udp4       0      0  *.*                    *.*                               
udp4       0      0  *.*                    *.*                               
udp46      0      0  *.*                    *.*                               
udp4       0      0  *.*                    *.*                               
udp4       0      0  *.*                    *.*                               
udp4       0      0  *.*                    *.*                               
udp6       0      0  *.mdns                 *.*                               
udp4       0      0  *.mdns                 *.*                               
udp4       0      0  *.*                    *.*                               
udp4       0      0  *.netbios-ns           *.*                               
udp4       0      0  *.netbios-dgm          *.*                               
Active Multipath Internet connections
Proto/ID  Flags      Local Address          Foreign Address        (state)    
Active LOCAL (UNIX) domain sockets
Address          Type   Recv-Q Send-Q            Inode             Conn             Refs          Nextref Addr
63369b54c49ba489 stream      0      0                0 63369b54c49baeb1                0                0 /var/run/mDNSResponder
63369b54c49baeb1 stream      0      0                0 63369b54c49ba489                0                0
63369b54b35dd039 stream      0      0                0 63369b54c49b9809                0                0 /var/run/mDNSResponder.littlesnitch
63369b54c49b9809 stream      0      0                0 63369b54b35dd039                0                0
63369b54c49b9d81 stream      0      0                0 63369b54b5d41359                0                0
63369b54b5d41359 stream      0      0                0 63369b54c49b9d81                0                0
63369b54b5d40549 stream      0      0                0 63369b54b5d41fd9                0                0
63369b54b5d41fd9 stream      0      0                0 63369b54b5d40549                0                0
63369b54b5d423c1 stream      0      0                0 63369b54b5d42231                0                0 /var/run/mDNSResponder
63369b54b5d42231 stream      0      0                0 63369b54b5d423c1                0                0
63369b54c49ba871 stream      0      0                0 63369b54c49b9101                0                0 /var/run/mDNSResponder.littlesnitch
63369b54c49b9101 stream      0      0                0 63369b54c49ba871                0                0
63369b54c49b9999 stream      0      0                0 63369b54b5d41a61                0                0
63369b54b5d41a61 stream      0      0                0 63369b54c49b9999                0                0
63369b54b35df299 stream      0      0                0 63369b54b35dcf71                0                0
63369b54b35dcf71 stream      0      0                0 63369b54b35df299                0                0
63369b54c49bad21 stream      0      0                0 63369b54c49ba6e1                0                0
63369b54c49ba6e1 stream      0      0                0 63369b54c49bad21                0                0
63369b54c49b9a61 stream      0      0                0 63369b54b5d41809                0                0
63369b54b5d41809 stream      0      0                0 63369b54c49b9a61                0                0
63369b54c49b98d1 stream      0      0                0 63369b54b5d42c59                0                0
63369b54b5d42c59 stream      0      0                0 63369b54c49b98d1                0                0
63369b54c49ba3c1 stream      0      0                0 63369b54b5d42eb1                0                0
63369b54b5d42eb1 stream      0      0                0 63369b54c49ba3c1                0                0
63369b54b5d40869 stream      0      0                0 63369b54b5d41679                0                0
63369b54b5d41679 stream      0      0                0 63369b54b5d40869                0                0
63369b54c49b9e49 stream      0      0                0 63369b54b5d43299                0                0 /var/run/mDNSResponder
63369b54b5d43299 stream      0      0                0 63369b54c49b9e49                0                0
63369b54b5d42d21 stream      0      0                0 63369b54b5d42619                0                0 /var/run/mDNSResponder.littlesnitch
63369b54b5d42619 stream      0      0                0 63369b54b5d42d21                0                0
63369b54b5d42b91 stream      0      0                0 63369b54c49b8d19                0                0 /var/run/mDNSResponder
63369b54c49b8d19 stream      0      0                0 63369b54b5d42b91                0                0
63369b54c49baa01 stream      0      0                0 63369b54b5d42939                0                0 /var/run/mDNSResponder.littlesnitch
63369b54b5d42939 stream      0      0                0 63369b54c49baa01                0                0
63369b54b5d43429 stream      0      0                0 63369b54b35dd4e9                0                0 /var/run/mDNSResponder
63369b54b35dd4e9 stream      0      0                0 63369b54b5d43429                0                0
63369b54b5d426e1 stream      0      0                0 63369b54b5d42f79                0                0 /var/run/mDNSResponder.littlesnitch
63369b54b5d42f79 stream      0      0                0 63369b54b5d426e1                0                0
63369b54b5d43109 stream      0      0                0 63369b54b5d422f9                0                0 /var/run/mDNSResponder
63369b54b5d422f9 stream      0      0                0 63369b54b5d43109                0                0
63369b54b35df109 stream      0      0                0 63369b54b5d42871                0                0 /var/run/mDNSResponder.littlesnitch
63369b54b5d42871 stream      0      0                0 63369b54b35df109                0                0
63369b54b5d41b29 stream      0      0                0 63369b54b5d420a1                0                0 /var/run/mDNSResponder
63369b54b5d420a1 stream      0      0                0 63369b54b5d41b29                0                0
63369b54b5d427a9 stream      0      0                0 63369b54b35deeb1                0                0 /var/run/mDNSResponder.littlesnitch
63369b54b35deeb1 stream      0      0                0 63369b54b5d427a9                0                0
63369b54b35df429 stream      0      0                0 63369b54b35dc611                0                0 /var/run/mDNSResponder
63369b54b35dc611 stream      0      0                0 63369b54b35df429                0                0
63369b54b35dc549 stream      0      0                0 63369b54b5d41d81                0                0 /var/run/mDNSResponder.littlesnitch
63369b54b5d41d81 stream      0      0                0 63369b54b35dc549                0                0
63369b54b35df361 stream      0      0                0 63369b54b35dd1c9                0                0 /Users/madrat/Library/Group Containers/2Y8XE5CQ94.com.kaspersky.kas/sockets/PRRemote:440440
63369b54b35dd1c9 stream      0      0                0 63369b54b35df361                0                0
63369b54b35dc7a1 stream      0      0                0 63369b54b35dc6d9                0                0 /Users/madrat/Library/Group Containers/2Y8XE5CQ94.com.kaspersky.kas/sockets/PRRemote:555555
63369b54b35dc6d9 stream      0      0                0 63369b54b35dc7a1                0                0
63369b54b35dc931 stream      0      0 63369b54b58e6ae9                0                0                0 /Users/madrat/Library/Group Containers/2Y8XE5CQ94.com.kaspersky.kas/sockets/PRRemote:555555
63369b54b35dd421 stream      0      0 63369b54b53ab909                0                0                0 /Users/madrat/Library/Group Containers/2Y8XE5CQ94.com.kaspersky.kas/sockets/PRRemote:440440
63369b54b35deac9 stream      0      0                0                0                0                0
63369b54b35de7a9 stream      0      0                0 63369b54b35de6e1                0                0 /var/run/mDNSResponder
63369b54b35de6e1 stream      0      0                0 63369b54b35de7a9                0                0
63369b54b35de2f9 stream      0      0                0 63369b54b146e101                0                0 /var/run/mDNSResponder.littlesnitch
63369b54b146e101 stream      0      0                0 63369b54b35de2f9                0                0
63369b54b35de489 stream      0      0 63369b54b429eea9                0                0                0 /var/folders/c6/qdk3973j19z_z2p8_ttp_t0c0000gp/T/icdd502
63369b54b35de231 stream      0      0                0 63369b54b35ddb29                0                0
63369b54b35ddb29 stream      0      0                0 63369b54b35de231                0                0
63369b54b35ddbf1 stream      0      0                0 63369b54b35de169                0                0
63369b54b35de169 stream      0      0                0 63369b54b35ddbf1                0                0
63369b54b35de0a1 stream      0      0                0 63369b54b35ddfd9                0                0
63369b54b35ddfd9 stream      0      0                0 63369b54b35de0a1                0                0
63369b54b35ddcb9 stream      0      0                0 63369b54b1470429                0                0
63369b54b1470429 stream      0      0                0 63369b54b35ddcb9                0                0
63369b54b146d549 stream      0      0                0 63369b54b146d611                0                0 /var/run/mDNSResponder
63369b54b146d611 stream      0      0                0 63369b54b146d549                0                0
63369b54b1470299 stream      0      0                0 63369b54b14701d1                0                0 /var/run/mDNSResponder.littlesnitch
63369b54b14701d1 stream      0      0                0 63369b54b1470299                0                0
63369b54b1470109 stream      0      0 63369b54b3354729                0                0                0 /var/folders/c6/qdk3973j19z_z2p8_ttp_t0c0000gp/T/ics320
63369b54b146d6d9 stream      0      0                0 63369b54b1470041                0                0 /var/run/mDNSResponder
63369b54b1470041 stream      0      0                0 63369b54b146d6d9                0                0
63369b54b146d7a1 stream      0      0                0 63369b54b146ff79                0                0 /var/run/mDNSResponder.littlesnitch
63369b54b146ff79 stream      0      0                0 63369b54b146d7a1                0                0
63369b54b146d869 stream      0      0                0 63369b54b146feb1                0                0 /var/run/mDNSResponder
63369b54b146feb1 stream      0      0                0 63369b54b146d869                0                0
63369b54b146d931 stream      0      0                0 63369b54b146fde9                0                0 /var/run/mDNSResponder.littlesnitch
63369b54b146fde9 stream      0      0                0 63369b54b146d931                0                0
63369b54b146d9f9 stream      0      0                0 63369b54b146fd21                0                0 /var/run/mDNSResponder
63369b54b146fd21 stream      0      0                0 63369b54b146d9f9                0                0
63369b54b146fc59 stream      0      0                0 63369b54b146dac1                0                0 /var/run/mDNSResponder.littlesnitch
63369b54b146dac1 stream      0      0                0 63369b54b146fc59                0                0
63369b54b146fb91 stream      0      0                0 63369b54b146fac9                0                0 /var/run/mDNSResponder
63369b54b146fac9 stream      0      0                0 63369b54b146fb91                0                0
63369b54b146fa01 stream      0      0                0 63369b54b146db89                0                0 /var/run/mDNSResponder.littlesnitch
63369b54b146db89 stream      0      0                0 63369b54b146fa01                0                0
63369b54b146f939 stream      0      0                0 63369b54b146dd19                0                0 /var/run/mDNSResponder
63369b54b146dd19 stream      0      0                0 63369b54b146f939                0                0
63369b54b146f871 stream      0      0                0 63369b54b146f7a9                0                0 /var/run/mDNSResponder.littlesnitch
63369b54b146f7a9 stream      0      0                0 63369b54b146f871                0                0
63369b54b146dde1 stream      0      0                0 63369b54b146dea9                0                0 /var/run/mDNSResponder
63369b54b146dea9 stream      0      0                0 63369b54b146dde1                0                0
63369b54b146df71 stream      0      0                0 63369b54b146e039                0                0 /var/run/mDNSResponder.littlesnitch
63369b54b146e039 stream      0      0                0 63369b54b146df71                0                0
63369b54b146f619 stream      0      0                0 63369b54b146f551                0                0 /var/run/mDNSResponder
63369b54b146f551 stream      0      0                0 63369b54b146f619                0                0
63369b54b146f489 stream      0      0                0 63369b54b146f3c1                0                0 /var/run/mDNSResponder.littlesnitch
63369b54b146f3c1 stream      0      0                0 63369b54b146f489                0                0
63369b54b146e1c9 stream      0      0                0 63369b54b146f2f9                0                0 /var/run/mDNSResponder
63369b54b146f2f9 stream      0      0                0 63369b54b146e1c9                0                0
63369b54b146e291 stream      0      0                0 63369b54b146e359                0                0 /var/run/mDNSResponder.littlesnitch
63369b54b146e359 stream      0      0                0 63369b54b146e291                0                0
63369b54b146f231 stream      0      0                0 63369b54b146f169                0                0 /var/run/mDNSResponder
63369b54b146f169 stream      0      0                0 63369b54b146f231                0                0
63369b54b146f0a1 stream      0      0                0 63369b54b146e421                0                0 /var/run/mDNSResponder.littlesnitch
63369b54b146e421 stream      0      0                0 63369b54b146f0a1                0                0
63369b54adcfc359 stream      0      0                0 63369b54b146e809                0                0 /var/run/mDNSResponder
63369b54b146e809 stream      0      0                0 63369b54adcfc359                0                0
63369b54adcfb6d9 stream      0      0                0 63369b54adcfb549                0                0 /var/run/mDNSResponder.littlesnitch
63369b54adcfb549 stream      0      0                0 63369b54adcfb6d9                0                0
63369b54b146efd9 stream      0      0                0 63369b54b146ef11                0                0 /var/run/mDNSResponder
63369b54b146ef11 stream      0      0                0 63369b54b146efd9                0                0
63369b54b146ee49 stream      0      0                0 63369b54adcfb611                0                0 /var/run/mDNSResponder.littlesnitch
63369b54adcfb611 stream      0      0                0 63369b54b146ee49                0                0
63369b54adcfb931 stream      0      0                0 63369b54adcfb7a1                0                0 /var/run/mDNSResponder
63369b54adcfb7a1 stream      0      0                0 63369b54adcfb931                0                0
63369b54b146e999 stream      0      0                0 63369b54b146ea61                0                0 /var/run/mDNSResponder.littlesnitch
63369b54b146ea61 stream      0      0                0 63369b54b146e999                0                0
63369b54adcfe361 stream      0      0 63369b54b274d9f9                0                0                0 /private/tmp/com.apple.launchd.6oB6IGPUWo/Listeners
63369b54b146ed81 stream      0      0 63369b54b274dea9                0                0                0 /private/tmp/com.apple.launchd.w54bSNd3qg/Render
63369b54b146e4e9 stream      0      0 63369b54b097d639                0                0                0 /var/tmp/filesystemui.socket
63369b54b146e741 stream      0      0                0 63369b54b146ecb9                0                0 /var/run/mDNSResponder
63369b54b146ecb9 stream      0      0                0 63369b54b146e741                0                0
63369b54b146e679 stream      0      0                0 63369b54b146e5b1                0                0 /var/run/mDNSResponder.littlesnitch
63369b54b146e5b1 stream      0      0                0 63369b54b146e679                0                0
63369b54adcfb9f9 stream      0      0                0 63369b54adcfbac1                0                0 /var/run/mDNSResponder
63369b54adcfbac1 stream      0      0                0 63369b54adcfb9f9                0                0
63369b54adcfbd19 stream      0      0                0 63369b54adcfe299                0                0 /var/run/mDNSResponder.littlesnitch
63369b54adcfe299 stream      0      0                0 63369b54adcfbd19                0                0
63369b54adcfe1d1 stream      0      0                0 63369b54adcfbde1                0                0 /var/run/mDNSResponder
63369b54adcfbde1 stream      0      0                0 63369b54adcfe1d1                0                0
63369b54adcfbea9 stream      0      0                0 63369b54adcfbf71                0                0 /var/run/mDNSResponder.littlesnitch
63369b54adcfbf71 stream      0      0                0 63369b54adcfbea9                0                0
63369b54adcfc101 stream      0      0                0 63369b54adcfe041                0                0 /var/run/mDNSResponder
63369b54adcfe041 stream      0      0                0 63369b54adcfc101                0                0
63369b54adcfdeb1 stream      0      0                0 63369b54adcfc1c9                0                0 /var/run/mDNSResponder.littlesnitch
63369b54adcfc1c9 stream      0      0                0 63369b54adcfdeb1                0                0
63369b54adcfdde9 stream      0      0 63369b54afa88ea9                0                0                0 /var/run/mDNSResponder.littlesnitch
63369b54adcfc291 stream      0      0                0 63369b54adcfdb91                0                0 /var/run/mDNSResponder
63369b54adcfdb91 stream      0      0                0 63369b54adcfc291                0                0
63369b54adcfc4e9 stream      0      0 63369b54aefe3819                0                0                0 /var/run/pppconfd
63369b54adcfc679 stream      0      0                0 63369b54adcfd871                0                0
63369b54adcfd871 stream      0      0                0 63369b54adcfc679                0                0
63369b54adcfc8d1 stream      0      0 63369b54adf84179                0                0                0 /var/run/com.sparklabs.ViscosityHelper.socket
63369b54adcfc999 stream      0      0 63369b54adf84089                0                0                0 /var/run/com.skype.skypeinstaller.socket
63369b54adcfca61 stream      0      0 63369b54adf77bd9                0                0                0 /private/var/run/cupsd
63369b54adcfcb29 stream      0      0 63369b54adf77cc9                0                0                0 /var/run/usbmuxd
63369b54adcfcbf1 stream      0      0 63369b54adf77db9                0                0                0 /var/run/systemkeychaincheck.socket
63369b54adcfccb9 stream      0      0 63369b54adf77f99                0                0                0 /var/run/portmap.socket
63369b54adcfd619 stream      0      0 63369b54adf77ea9                0                0                0 /var/run/vpncontrol.sock
63369b54adcfcd81 stream      0      0 63369b54adf139f9                0                0                0 /var/rpc/ncacn_np/wkssvc
63369b54adcfce49 stream      0      0 63369b54adf14269                0                0                0 /var/rpc/ncalrpc/wkssvc
63369b54adcfcf11 stream      0      0 63369b54adf14179                0                0                0 /var/rpc/ncacn_np/srvsvc
63369b54adcfd551 stream      0      0 63369b54adf14089                0                0                0 /var/rpc/ncalrpc/srvsvc
63369b54adcfcfd9 stream      0      0 63369b54adf13ae9                0                0                0 /var/rpc/ncalrpc/NETLOGON
63369b54adcfd489 stream      0      0 63369b54adf13f99                0                0                0 /var/rpc/ncacn_np/mdssvc
63369b54adcfd0a1 stream      0      0 63369b54adf13bd9                0                0                0 /var/rpc/ncacn_np/lsarpc
63369b54adcfd3c1 stream      0      0 63369b54adf0c449                0                0                0 /var/rpc/ncalrpc/lsarpc
63369b54adcfd169 stream      0      0 63369b54adf0bdb9                0                0                0 /var/run/mDNSResponder
63369b54b5d41291 dgram       0      0                0 63369b54b5d42489 63369b54b5d42489                0
63369b54b5d42489 dgram       0      0                0 63369b54b5d41291 63369b54b5d41291                0
63369b54b35df041 dgram       0      0                0 63369b54b5d431d1 63369b54b5d431d1                0
63369b54b5d431d1 dgram       0      0                0 63369b54b35df041 63369b54b35df041                0
63369b54c49ba231 dgram       0      0                0 63369b54adcfd2f9                0 63369b54b146dc51
63369b54c49b95b1 dgram       0      0                0 63369b54c49ba169 63369b54c49ba169                0
63369b54c49ba169 dgram       0      0                0 63369b54c49b95b1 63369b54c49b95b1                0
63369b54b5d41bf1 dgram       0      0                0 63369b54b5d40d19 63369b54b5d40d19                0
63369b54b5d40d19 dgram       0      0                0 63369b54b5d41bf1 63369b54b5d41bf1                0
63369b54c49b9291 dgram       0      0                0 63369b54c49b9fd9 63369b54c49b9fd9                0
63369b54c49b9fd9 dgram       0      0                0 63369b54c49b9291 63369b54c49b9291                0
63369b54b5d40c51 dgram       0      0                0 63369b54c49ba0a1 63369b54c49ba0a1                0
63369b54c49ba0a1 dgram       0      0                0 63369b54b5d40c51 63369b54b5d40c51                0
63369b54b35dc9f9 dgram       0      0                0 63369b54b5d41f11 63369b54b5d41f11                0
63369b54b5d41f11 dgram       0      0                0 63369b54b35dc9f9 63369b54b35dc9f9                0
63369b54b5d41101 dgram       0      0                0 63369b54b5d41039 63369b54b5d41039                0
63369b54b5d41039 dgram       0      0                0 63369b54b5d41101 63369b54b5d41101                0
63369b54b5d40ac1 dgram       0      0                0 63369b54b5d418d1 63369b54b5d418d1                0
63369b54b5d418d1 dgram       0      0                0 63369b54b5d40ac1 63369b54b5d40ac1                0
63369b54b5d41999 dgram       0      0                0 63369b54b5d42169 63369b54b5d42169                0
63369b54b5d42169 dgram       0      0                0 63369b54b5d41999 63369b54b5d41999                0
63369b54b35dcb89 dgram       0      0                0 63369b54b35dcc51 63369b54b35dcc51                0
63369b54b35dcc51 dgram       0      0                0 63369b54b35dcb89 63369b54b35dcb89                0
63369b54b35df1d1 dgram       0      0                0 63369b54b35dcde1 63369b54b35dcde1                0
63369b54b35dcde1 dgram       0      0                0 63369b54b35df1d1 63369b54b35df1d1                0
63369b54b35deb91 dgram       0      0                0 63369b54b35dcd19 63369b54b35dcd19                0
63369b54b35dcd19 dgram       0      0                0 63369b54b35deb91 63369b54b35deb91                0
63369b54b35dd5b1 dgram       0      0                0 63369b54b35dcea9 63369b54b35dcea9                0
63369b54b35dcea9 dgram       0      0                0 63369b54b35dd5b1 63369b54b35dd5b1                0
63369b54b35dd291 dgram       0      0                0 63369b54b35def79 63369b54b35def79                0
63369b54b35def79 dgram       0      0                0 63369b54b35dd291 63369b54b35dd291                0
63369b54b35dd679 dgram       0      0                0 63369b54b35dea01 63369b54b35dea01                0
63369b54b35dea01 dgram       0      0                0 63369b54b35dd679 63369b54b35dd679                0
63369b54b35dede9 dgram       0      0                0 63369b54b35dd101 63369b54b35dd101                0
63369b54b35dd101 dgram       0      0                0 63369b54b35dede9 63369b54b35dede9                0
63369b54b35dd359 dgram       0      0                0 63369b54b35ded21 63369b54b35ded21                0
63369b54b35ded21 dgram       0      0                0 63369b54b35dd359 63369b54b35dd359                0
63369b54b35dd999 dgram       0      0                0 63369b54b146f6e1 63369b54b146f6e1                0
63369b54b146f6e1 dgram       0      0                0 63369b54b35dd999 63369b54b35dd999                0
63369b54b35dec59 dgram       0      0                0 63369b54b35de871 63369b54b35de871                0
63369b54b35de871 dgram       0      0                0 63369b54b35dec59 63369b54b35dec59                0
63369b54b35de939 dgram       0      0                0 63369b54b35dd741 63369b54b35dd741                0
63369b54b35dd741 dgram       0      0                0 63369b54b35de939 63369b54b35de939                0
63369b54b35dda61 dgram       0      0                0 63369b54b35de3c1 63369b54b35de3c1                0
63369b54b35de3c1 dgram       0      0                0 63369b54b35dda61 63369b54b35dda61                0
63369b54b35dd8d1 dgram       0      0                0 63369b54adcfc741 63369b54adcfc741                0
63369b54adcfc741 dgram       0      0                0 63369b54b35dd8d1 63369b54b35dd8d1                0
63369b54b35de551 dgram       0      0                0 63369b54b35de619 63369b54b35de619                0
63369b54b35de619 dgram       0      0                0 63369b54b35de551 63369b54b35de551                0
63369b54b35dde49 dgram       0      0                0 63369b54b35ddf11 63369b54b35ddf11                0
63369b54b35ddf11 dgram       0      0                0 63369b54b35dde49 63369b54b35dde49                0
63369b54b35ddd81 dgram       0      0                0 63369b54b1470361 63369b54b1470361                0
63369b54b1470361 dgram       0      0                0 63369b54b35ddd81 63369b54b35ddd81                0
63369b54b146dc51 dgram       0      0                0 63369b54adcfd2f9                0 63369b54b146eb29
63369b54adcfb869 dgram       0      0                0 63369b54adcfbc51 63369b54adcfbc51                0
63369b54adcfbc51 dgram       0      0                0 63369b54adcfb869 63369b54adcfb869                0
63369b54b146ebf1 dgram       0      0                0 63369b54adcfdac9 63369b54adcfdac9                0
63369b54adcfdac9 dgram       0      0                0 63369b54b146ebf1 63369b54b146ebf1                0
63369b54b146eb29 dgram       0      0                0 63369b54adcfd2f9                0 63369b54b146e8d1
63369b54b146e8d1 dgram       0      0                0 63369b54adcfd2f9                0 63369b54adcfdf79
63369b54adcfe429 dgram       0      0                0 63369b54adcfbb89 63369b54adcfbb89                0
63369b54adcfbb89 dgram       0      0                0 63369b54adcfe429 63369b54adcfe429                0
63369b54adcfe109 dgram       0      0                0 63369b54adcfc039 63369b54adcfc039                0
63369b54adcfc039 dgram       0      0                0 63369b54adcfe109 63369b54adcfe109                0
63369b54adcfdf79 dgram       0      0                0 63369b54adcfd2f9                0 63369b54adcfd231
63369b54adcfdd21 dgram       0      0                0 63369b54adcfdc59 63369b54adcfdc59                0
63369b54adcfdc59 dgram       0      0                0 63369b54adcfdd21 63369b54adcfdd21                0
63369b54adcfc421 dgram       0      0                0 63369b54adcfda01 63369b54adcfda01                0
63369b54adcfda01 dgram       0      0                0 63369b54adcfc421 63369b54adcfc421                0
63369b54adcfd939 dgram       0      0                0 63369b54adcfc5b1 63369b54adcfc5b1                0
63369b54adcfc5b1 dgram       0      0                0 63369b54adcfd939 63369b54adcfd939                0
63369b54adcfc809 dgram       0      0                0 63369b54adcfd6e1 63369b54adcfd6e1                0
63369b54adcfd6e1 dgram       0      0                0 63369b54adcfc809 63369b54adcfc809                0
63369b54adcfd231 dgram       0      0                0 63369b54adcfd2f9                0                0
63369b54adcfd2f9 dgram       0      0 63369b54adce1179                0 63369b54c49ba231                0 /private//var/run/syslog
Registered kernel control modules
id       flags    pcbcount rcvbuf   sndbuf   name
       1        9        0   131072     8192 com.apple.flow-divert
       2        1        1    16384     2048 com.apple.nke.sockwall
       3        9        0   524288   524288 com.apple.content-filter
       4        9        0     8192     2048 com.apple.packet-mangler
       5        1        1    65536    65536 com.apple.net.necp_control
       6        1        0    65536    65536 com.apple.net.netagent
       7        9        1   524288   524288 com.apple.net.utun_control
       8        1        0    65536    65536 com.apple.net.ipsec_control
       9        0       22     8192     2048 com.apple.netsrc
       a       18        4     8192     2048 com.apple.network.statistics
       b        5        0     8192     2048 com.apple.network.tcp_ccdebug
       c        1        1     8192     2048 com.apple.network.advisory
Active kernel event sockets
Proto Recv-Q Send-Q vendor  class subcla
kevt       0      0      1      1      2
kevt       0      0      1      6      1
kevt       0      0      1      6      1
kevt       0      0      1      6      1
kevt       0      0      1      1      2
kevt       0      0      1      1      7
kevt       0      0      1      1      1
kevt       0      0      1      1     10
kevt       0      0   1001      5     11
kevt       0      0      1      1      9
kevt       0      0      1      1      8
kevt       0      0      1      6      1
kevt       0      0      1      6      1
kevt       0      0      1      6      1
kevt       0      0      1      6      1
kevt       0      0      1      6      1
kevt       0      0      1      1      2
kevt       0      0      1      6      1
kevt       0      0      1      1      2
kevt       0      0      1      1      0
Active kernel control sockets
Proto Recv-Q Send-Q   unit     id name
kctl       0      0      1      2 com.apple.nke.sockwall
kctl       0      0      1      5 com.apple.net.necp_control
kctl       0      0      1      7 com.apple.net.utun_control
kctl       0      0      1      9 com.apple.netsrc
kctl       0      0      2      9 com.apple.netsrc
kctl       0      0      3      9 com.apple.netsrc
kctl       0      0      4      9 com.apple.netsrc
kctl       0      0      5      9 com.apple.netsrc
kctl       0      0      6      9 com.apple.netsrc
kctl       0      0      7      9 com.apple.netsrc
kctl       0      0      8      9 com.apple.netsrc
kctl       0      0      9      9 com.apple.netsrc
kctl       0      0     10      9 com.apple.netsrc
kctl       0      0     11      9 com.apple.netsrc
kctl       0      0     12      9 com.apple.netsrc
kctl       0      0     13      9 com.apple.netsrc
kctl       0      0     14      9 com.apple.netsrc
kctl       0      0     15      9 com.apple.netsrc
kctl       0      0     16      9 com.apple.netsrc
kctl       0      0     17      9 com.apple.netsrc
kctl       0      0     18      9 com.apple.netsrc
kctl       0      0     19      9 com.apple.netsrc
kctl       0      0     20      9 com.apple.netsrc
kctl       0      0     21      9 com.apple.netsrc
kctl       0      0     23      9 com.apple.netsrc
kctl       0      0      1     10 com.apple.network.statistics
kctl       0      0      2     10 com.apple.network.statistics
kctl       0      0      3     10 com.apple.network.statistics
kctl       0      0      4     10 com.apple.network.statistics
kctl       0      0      1     12 com.apple.network.advisory

Share this post


Link to post

First off, apologies that my posts keep appearing as solid blocks of text. I do use paragraph breaks, but when I post those disappear. I also can't quote directly from a previous post.

 

Thanks, madrat, for trying those different sequences. After my last post I had to go out for a few hours, and when I got back I found that once again Eddie wouldn't connect to a server. I then had to quit Eddie and go through the whole uncheck/recheck process again, which is of course rather frustrating. I don't know what happened in those few hours to cause such a problem. I'm not changing my routine at all.

Share this post


Link to post

Just wondering if any progress has been made in dealing with this problem. A few of us put in tickets awhile ago, but so far I haven't heard anything further about fixing it. Currently, I'm having to use Eddie 2.12.4, but that too is giving me problems, as I mentioned in a post above. Obviously I'd like to use the latest version, if possible. Unfortunately, because of these various connection problems that have only started in the last few months, trying to use AirVPN has become a very frustrating experience, never knowing if it'll connect or not.

 

Any updated info from others would be appreciated.

 

Thanks.

Share this post


Link to post

Just wondering if any progress has been made in dealing with this problem. A few of us put in tickets awhile ago, but so far I haven't heard anything further about fixing it. Currently, I'm having to use Eddie 2.12.4, but that too is giving me problems, as I mentioned in a post above. Obviously I'd like to use the latest version, if possible. Unfortunately, because of these various connection problems that have only started in the last few months, trying to use AirVPN has become a very frustrating experience, never knowing if it'll connect or not.

 

Any updated info from others would be appreciated.

 

Thanks.

 

Yes. We are still waiting for the next update. In the meantime, I find these settings work for me on El Capitan running Eddie 2.13.6. Under GENERAL check "Connect at startup" and "Activate network lock at startup". Under NETWORK LOCK, uncheck everything. "Allow lan/private" may be checked after you connect if you wish. Fingers crossed for the new version very soon??

Share this post


Link to post

Thanks, madrat. Like you, I'm hoping for a new version soon, too, as I'm otherwise very happy with Air. I followed those instructions when you suggested them some time ago, but although it got me connected, I found that the Network Lock function was compromised, so I went back to 2.12.4. even though it was having failure to connect problems of its own. Happily, I seem to have stumbled on a solution for that problem, so at least I can continue using it until we get an update.

Share this post


Link to post
Guest
This topic is now closed to further replies.

×
×
  • Create New...