Jump to content
Not connected, Your IP: 3.137.164.229
Staff

Eddie 2.14beta released

Recommended Posts

UPDATE 06.06.18: EDDIE 2.14.5 HAS BEEN RELEASED AS "STABLE" VERSION

 

Hello!

We're very glad to inform you that a new Eddie Air client version has been released: 2.14beta. It is ready for public beta testing.

To download Eddie 2.14beta please select "Other versions" > "Experimental" from the download page.

Please see the changelog:
https://eddie.website/changelog/?software=client&format=html

--------------------------
This version is released in combo with a new server called Castor (Belgium) that supports IPv6, tls-crypt modes and other features.
For more information about the IPv6 experimental phase, read the thread IPv6 support - Experimental phase
 
Note: please make sure you don't have IPv6 disabled on your OS before the tests (at OS level or at network adapter level). Improved notification will be implemented in the next release.
 

Please talk in this thread only about Eddie 2.14beta NOT related to IPv6 or tls-crypt support. Rely on IPv6 support - Experimental phase for issues related to Castor.

--------------------------
 
Eddie is free and open source software released under GPLv3. GitHub repository https://github.com/AirVPN/airvpn-client

Do not hesitate to write in this thread if you decide to test Eddie 2.14beta and you find some glitch or bug.

Kind regards & datalove
Air Staff

Share this post


Link to post
Guest

When I attempt to start a connection I get this error:
 

W 2018.01.31 18:05:51 - Windows WFP, Add rule failed: Interface ID $ID unknown or disabled for the layer.:<rule name="Dns - Allow port 53 on TAP" layer="ale_auth_connect_v6" action="permit" weight="2000"><if field="ip_remote_port" match="equal" port="53" /><if field="ip_local_interface" match="equal" interface="$ID}" /></rule>
 
 
EDIT: Happens when you have ipv6 disabled in tap adapter properties. 

Share this post


Link to post

Thank you for fixing this issue."Unable to start PF Firewall." in some old macOS versions. Confirmed working on Mac OS Yosemite and El Capitan.

Share this post


Link to post

Minimize to tray is not working for me under i3wm. I click on "Hide main window", to have it minimized to tray, but it doesn't work..

Share this post


Link to post

The macOS app is not signed by a developer signature, it should be signed to protect against malicious impersonating apps.

Share this post


Link to post

Thank you for fixing this issue."Unable to start PF Firewall." in some old macOS versions. Confirmed working on Mac OS Yosemite and El Capitan.

 

Yes, up and running on El Capitan here, too. No problems with PF Firewall so far, which was causing me problems on the previous version. Looks okay on ipleak.

Share this post


Link to post

There is an error when installing using the RPM package under Fedora 27.

 Problem: conflicting requests
  - nothing provides libappindicator1 needed by airvpn-2.14.0-0.x86_64

This is solved of course by using only the OpenVPN configuration file or by using the portable version of the Eddie client. Similar problem described here with another application.

Share this post


Link to post

Thank you for fixing this issue."Unable to start PF Firewall." in some old macOS versions. Confirmed working on Mac OS Yosemite and El Capitan.

Good, thanks to you to confirm that. 

 

The macOS app is not signed by a developer signature, it should be signed to protect against malicious impersonating apps.

Absolutely. An issue with deployment. Fixed, please re-download. Thx.

Share this post


Link to post

Couple of things on my Mac El Capitan:

 

1/ Can't quit Eddie. When I tried to quit Eddie the server page closed, but the icon in the dock shows me still connected. I tried to force quit but no joy there. I then tried to restart Mac, but again nothing happens. Then I tried shutting down Mac, but again nothing. In the end I had to switch off power to Mac and then restart - this finally allowed Eddie to quit. This has now happened three times, and I can't think what I'm doing wrong. As soon as I try to quit Eddie seems to be locking my system in some way.

 

2/ At the moment I'm connected, but on the Overview page where it says download and upload the numbers aren't changing - both download and upload read 14322kb/s. However, I am still able to connect to websites.

Share this post


Link to post

Couple of things on my Mac El Capitan:

 

1/ Can't quit Eddie. When I tried to quit Eddie the server page closed, but the icon in the dock shows me still connected. I tried to force quit but no joy there. I then tried to restart Mac, but again nothing happens. Then I tried shutting down Mac, but again nothing. In the end I had to switch off power to Mac and then restart - this finally allowed Eddie to quit. This has now happened three times, and I can't think what I'm doing wrong. As soon as I try to quit Eddie seems to be locking my system in some way.

 

2/ At the moment I'm connected, but on the Overview page where it says download and upload the numbers aren't changing - both download and upload read 14322kb/s. However, I am still able to connect to websites.

 

Have not tried to quit Eddie yet, but can confirm, both upload and download read 14322kb/s and are not changing. Also able to connect to websites.

Share this post


Link to post

2/ At the moment I'm connected, but on the Overview page where it says download and upload the numbers aren't changing - both download and upload read 14322kb/s. However, I am still able to connect to websites.

Have not tried to quit Eddie yet, but can confirm, both upload and download read 14322kb/s and are not changing. Also able to connect to websites.

Fixed, only a UI bug. Please re-download.

1/ Can't quit Eddie. When I tried to quit Eddie the server page closed, but the icon in the dock shows me still connected. I tried to force quit but no joy there. I then tried to restart Mac, but again nothing happens. Then I tried shutting down Mac, but again nothing. In the end I had to switch off power to Mac and then restart - this finally allowed Eddie to quit. This has now happened three times, and I can't think what I'm doing wrong. As soon as I try to quit Eddie seems to be locking my system in some way.

I can't reproduce this issue on High Sierra yet. Anyone else have this issue?

Share this post


Link to post

 

2/ At the moment I'm connected, but on the Overview page where it says download and upload the numbers aren't changing - both download and upload read 14322kb/s. However, I am still able to connect to websites.

>Have not tried to quit Eddie yet, but can confirm, both upload and download read 14322kb/s and are not changing. Also able to connect to websites.

Fixed, only a UI bug. Please re-download.

1/ Can't quit Eddie. When I tried to quit Eddie the server page closed, but the icon in the dock shows me still connected. I tried to force quit but no joy there. I then tried to restart Mac, but again nothing happens. Then I tried shutting down Mac, but again nothing. In the end I had to switch off power to Mac and then restart - this finally allowed Eddie to quit. This has now happened three times, and I can't think what I'm doing wrong. As soon as I try to quit Eddie seems to be locking my system in some way.

I can't reproduce this issue on High Sierra yet. Anyone else have this issue?

 

 

Thanks, Clodo. Downloads and Uploads now showing correctly after re-download.

 

Obviously, to install new download I had to quit old download, and once again I couldn't completely quit. It seems to be caught in a state where Eddie stops functioning and fully quitting. I tried to remove previous download from system but it wouldn't allow because it still thinks it's connected, same thing if I try to move it to trash. Normally on a Mac when trying to force quit from an app it gives a warning that app isn't functioning correctly, but it doesn't even give that warning in this case. Eventually I had to switch off power to Mac and then restart, and this finally allows Eddie to totally quit. Perhaps it is an issue with El Capitan.

Share this post


Link to post

 

 

2/ At the moment I'm connected, but on the Overview page where it says download and upload the numbers aren't changing - both download and upload read 14322kb/s. However, I am still able to connect to websites.

>>Have not tried to quit Eddie yet, but can confirm, both upload and download read 14322kb/s and are not changing. Also able to connect to websites.

lockquote>Fixed, only a UI bug. Please re-download.

>1/ Can't quit Eddie. When I tried to quit Eddie the server page closed, but the icon in the dock shows me still connected. I tried to force quit but no joy there. I then tried to restart Mac, but again nothing happens. Then I tried shutting down Mac, but again nothing. In the end I had to switch off power to Mac and then restart - this finally allowed Eddie to quit. This has now happened three times, and I can't think what I'm doing wrong. As soon as I try to quit Eddie seems to be locking my system in some way.

I can't reproduce this issue on High Sierra yet. Anyone else have this issue?

 

Thanks, Clodo. Downloads and Uploads now showing correctly after re-download.

 

Obviously, to install new download I had to quit old download, and once again I couldn't completely quit. It seems to be caught in a state where Eddie stops functioning and fully quitting. I tried to remove previous download from system but it wouldn't allow because it still thinks it's connected, same thing if I try to move it to trash. Normally on a Mac when trying to force quit from an app it gives a warning that app isn't functioning correctly, but it doesn't even give that warning in this case. Eventually I had to switch off power to Mac and then restart, and this finally allows Eddie to totally quit. Perhaps it is an issue with El Capitan.

 

 

Originally had 2.14 beta running on El Capitan, but then redownloaded as Stookie suggested to fix the "download and upload read 14322kb/s" problem. Quit Eddie (no problem doing that as suggested by someone else). Reinstalled 2.14 and restarted Eddie. Unfortunately, even after a reboot, it kept getting stuck on "Checking Route IPV4" and would not connect to any server. I decided to revert to 2.13.6 for now and that connected no problem. Hmmm .... except I just double checked version after reinstalling 2.13.6 and it shows V.2.14. Will have to examine further?????

2018.02.01 16:44:20 - Eddie version: 2.14.0 / macos_x64, System: MacOS, Name: 10.11.6, Version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Tue Jan  9 20:12:05 PST 2018; root:xnu-3248.73.5~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319

. 2018.02.01 16:44:20 - Reading options from /Users/madrat/.airvpn/AirVPN.xml

. 2018.02.01 16:44:21 - Command line arguments (0):

. 2018.02.01 16:44:23 - OpenVPN Driver - Expected

. 2018.02.01 16:44:23 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

. 2018.02.01 16:44:23 - SSH - Version: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)

. 2018.02.01 16:44:23 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)

. 2018.02.01 16:44:23 - curl - Version: 7.43.0 (/usr/bin/curl)

. 2018.02.01 16:44:23 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem

! 2018.02.01 16:44:23 - Activation of Network Lock - macOS - PF

. 2018.02.01 16:44:24 - macOS - PF rules updated, reloading

. 2018.02.01 16:44:24 - Updating systems & servers data ...

. 2018.02.01 16:44:24 - macOS - PF rules updated, reloading

I 2018.02.01 16:44:24 - Session starting.

. 2018.02.01 16:44:25 - Systems & servers data update completed

I 2018.02.01 16:44:36 - Checking authorization ...

. 2018.02.01 16:44:36 - IPv6 disabled on network adapter (SAMSUNG Modem)

. 2018.02.01 16:44:37 - IPv6 disabled on network adapter (Ethernet)

. 2018.02.01 16:44:37 - IPv6 disabled on network adapter (FireWire)

. 2018.02.01 16:44:37 - IPv6 disabled on network adapter (Wi-Fi)

! 2018.02.01 16:44:37 - Connecting to Mimosa (Canada, Vancouver)

. 2018.02.01 16:44:37 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.02.01 16:44:37 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.02.01 16:44:37 - Connection to OpenVPN Management Interface

. 2018.02.01 16:44:37 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.02.01 16:44:37 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 16:44:37 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 16:44:37 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.251.247:443

. 2018.02.01 16:44:37 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.02.01 16:44:37 - OpenVPN > UDP link local: (not bound)

. 2018.02.01 16:44:37 - OpenVPN > UDP link remote: [AF_INET]71.19.251.247:443

. 2018.02.01 16:44:37 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.02.01 16:44:37 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.251.247:443, sid=c9d79d3d a436a122

. 2018.02.01 16:44:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.02.01 16:44:37 - OpenVPN > VERIFY KU OK

. 2018.02.01 16:44:37 - OpenVPN > Validating certificate extended key usage

. 2018.02.01 16:44:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.02.01 16:44:37 - OpenVPN > VERIFY EKU OK

. 2018.02.01 16:44:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.02.01 16:44:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.02.01 16:44:38 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.251.247:443

. 2018.02.01 16:44:39 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.02.01 16:44:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.167 255.255.0.0'

. 2018.02.01 16:44:39 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.02.01 16:44:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.02.01 16:44:39 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.02.01 16:44:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.02.01 16:44:39 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.02.01 16:44:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.02.01 16:44:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 16:44:39 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 16:44:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 16:44:39 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 16:44:39 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2018.02.01 16:44:39 - OpenVPN > Opened utun device utun0

. 2018.02.01 16:44:39 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.02.01 16:44:39 - OpenVPN > /sbin/ifconfig utun0 delete

. 2018.02.01 16:44:39 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.02.01 16:44:39 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.02.01 16:44:39 - OpenVPN > /sbin/ifconfig utun0 10.4.0.167 10.4.0.167 netmask 255.255.0.0 mtu 1500 up

. 2018.02.01 16:44:39 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.167 255.255.0.0

. 2018.02.01 16:44:39 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.167

. 2018.02.01 16:44:39 - OpenVPN > /sbin/route add -net 71.19.251.247 192.168.1.254 255.255.255.255

. 2018.02.01 16:44:39 - OpenVPN > add net 71.19.251.247: gateway 192.168.1.254

. 2018.02.01 16:44:39 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 16:44:39 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.02.01 16:44:39 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 16:44:39 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.02.01 16:44:40 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2018.02.01 16:44:40 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.02.01 16:44:40 - Routes, added a new route, 71.19.251.248 for gateway 10.4.0.1

. 2018.02.01 16:44:40 - Flushing DNS

. 2018.02.01 16:44:40 - macOS - PF rules updated, reloading

I 2018.02.01 16:44:40 - Checking route IPv4

I 2018.02.01 16:44:41 - Checking DNS

! 2018.02.01 16:44:42 - Connected.

. 2018.02.01 16:44:42 - OpenVPN > Initialization Sequence Completed

Share this post


Link to post

 

 

 

2/ At the moment I'm connected, but on the Overview page where it says download and upload the numbers aren't changing - both download and upload read 14322kb/s. However, I am still able to connect to websites.

>>Have not tried to quit Eddie yet, but can confirm, both upload and download read 14322kb/s and are not changing. Also able to connect to websites.

lockquote>Fixed, only a UI bug. Please re-download.

>1/ Can't quit Eddie. When I tried to quit Eddie the server page closed, but the icon in the dock shows me still connected. I tried to force quit but no joy there. I then tried to restart Mac, but again nothing happens. Then I tried shutting down Mac, but again nothing. In the end I had to switch off power to Mac and then restart - this finally allowed Eddie to quit. This has now happened three times, and I can't think what I'm doing wrong. As soon as I try to quit Eddie seems to be locking my system in some way.

I can't reproduce this issue on High Sierra yet. Anyone else havethis issue?

 

Thanks, Clodo. Downloads and Uploads now showing correctly after re-download.

 

Obviously, to install new download I had to quit old download, and once again I couldn't completely quit. It seems to be caught in a state where Eddie stops functioning and fully quitting. I tried to remove previous download from system but it wouldn't allow because it still thinks it's connected, same thing if I try to move it to trash. Normally on a Mac when trying to force quit from an app it gives a warning that app isn't functioning correctly, but it doesn't even give that warning in this case. Eventually I had to switch off power to Mac and then restart, and this finally allows Eddie to totally quit. Perhaps it is an issue with El Capitan.

 

Originally had 2.14 beta running on El Capitan, but then redownloaded as Stookie suggested to fix the "download and upload read 14322kb/s" problem. Quit Eddie (no problem doing that as suggested by someone else). Reinstalled 2.14 and restarted Eddie. Unfortunately, even after a reboot, it kept getting stuck on "Checking Route IPV4" and would not connect to any server. I decided to revert to 2.13.6 for now and that connected no problem. Hmmm .... except I just double checked version after reinstalling 2.13.6 and it shows V.2.14. Will have to examine further?????

2018.02.01 16:44:20 - Eddie version: 2.14.0 / macos_x64, System: MacOS, Name: 10.11.6, Version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Tue Jan  9 20:12:05 PST 2018; root:xnu-3248.73.5~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319

. 2018.02.01 16:44:20 - Reading options from /Users/madrat/.airvpn/AirVPN.xml

. 2018.02.01 16:44:21 - Command line arguments (0):

. 2018.02.01 16:44:23 - OpenVPN Driver - Expected

. 2018.02.01 16:44:23 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

. 2018.02.01 16:44:23 - SSH - Version: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)

. 2018.02.01 16:44:23 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)

. 2018.02.01 16:44:23 - curl - Version: 7.43.0 (/usr/bin/curl)

. 2018.02.01 16:44:23 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem

! 2018.02.01 16:44:23 - Activation of Network Lock - macOS - PF

. 2018.02.01 16:44:24 - macOS - PF rules updated, reloading

. 2018.02.01 16:44:24 - Updating systems & servers data ...

. 2018.02.01 16:44:24 - macOS - PF rules updated, reloading

I 2018.02.01 16:44:24 - Session starting.

. 2018.02.01 16:44:25 - Systems & servers data update completed

I 2018.02.01 16:44:36 - Checking authorization ...

. 2018.02.01 16:44:36 - IPv6 disabled on network adapter (SAMSUNG Modem)

. 2018.02.01 16:44:37 - IPv6 disabled on network adapter (Ethernet)

. 2018.02.01 16:44:37 - IPv6 disabled on network adapter (FireWire)

. 2018.02.01 16:44:37 - IPv6 disabled on network adapter (Wi-Fi)

! 2018.02.01 16:44:37 - Connecting to Mimosa (Canada, Vancouver)

. 2018.02.01 16:44:37 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.02.01 16:44:37 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.02.01 16:44:37 - Connection to OpenVPN Management Interface

. 2018.02.01 16:44:37 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.02.01 16:44:37 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 16:44:37 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 16:44:37 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.251.247:443

. 2018.02.01 16:44:37 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.02.01 16:44:37 - OpenVPN > UDP link local: (not bound)

. 2018.02.01 16:44:37 - OpenVPN > UDP link remote: [AF_INET]71.19.251.247:443

. 2018.02.01 16:44:37 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.02.01 16:44:37 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.251.247:443, sid=c9d79d3d a436a122

. 2018.02.01 16:44:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.02.01 16:44:37 - OpenVPN > VERIFY KU OK

. 2018.02.01 16:44:37 - OpenVPN > Validating certificate extended key usage

. 2018.02.01 16:44:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.02.01 16:44:37 - OpenVPN > VERIFY EKU OK

. 2018.02.01 16:44:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.02.01 16:44:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.02.01 16:44:38 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.251.247:443

. 2018.02.01 16:44:39 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.02.01 16:44:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.167 255.255.0.0'

. 2018.02.01 16:44:39 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.02.01 16:44:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.02.01 16:44:39 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.02.01 16:44:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.02.01 16:44:39 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.02.01 16:44:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.02.01 16:44:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 16:44:39 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 16:44:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 16:44:39 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 16:44:39 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2018.02.01 16:44:39 - OpenVPN > Opened utun device utun0

. 2018.02.01 16:44:39 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.02.01 16:44:39 - OpenVPN > /sbin/ifconfig utun0 delete

. 2018.02.01 16:44:39 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.02.01 16:44:39 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.02.01 16:44:39 - OpenVPN > /sbin/ifconfig utun0 10.4.0.167 10.4.0.167 netmask 255.255.0.0 mtu 1500 up

. 2018.02.01 16:44:39 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.167 255.255.0.0

. 2018.02.01 16:44:39 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.167

. 2018.02.01 16:44:39 - OpenVPN > /sbin/route add -net 71.19.251.247 192.168.1.254 255.255.255.255

. 2018.02.01 16:44:39 - OpenVPN > add net 71.19.251.247: gateway 192.168.1.254

. 2018.02.01 16:44:39 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 16:44:39 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.02.01 16:44:39 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 16:44:39 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.02.01 16:44:40 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2018.02.01 16:44:40 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.02.01 16:44:40 - Routes, added a new route, 71.19.251.248 for gateway 10.4.0.1

. 2018.02.01 16:44:40 - Flushing DNS

. 2018.02.01 16:44:40 - macOS - PF rules updated, reloading

I 2018.02.01 16:44:40 - Checking route IPv4

I 2018.02.01 16:44:41 - Checking DNS

! 2018.02.01 16:44:42 - Connected.

. 2018.02.01 16:44:42 - OpenVPN > Initialization Sequence Completed

 

 

So to make sure I was still running 2.14, as my log showed, and despite having reinstalled 2.13.6, I rebooted. Eddie started and connected no problem and is still showing 2.14 as the version. Not sure how all that is possible, but it's working now, so I'm not messing with it any more!

Share this post


Link to post

So after finally getting 2.14 running on my iMac with El Capitan, I decided to install 2.14 on my Macbook Pro running Sierra. No problems. Eddie loaded and connected right away. However, (and I had this same problem with 2.13.6) right after Eddie loaded on my laptop, Eddie disconnected on my iMac and then reconnected. No idea why this happens. Here are the logs from my iMac:

. 2018.02.01 17:21:22 - Eddie version: 2.14.0 / macos_x64, System: MacOS, Name: 10.11.6, Version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Tue Jan  9 20:12:05 PST 2018; root:xnu-3248.73.5~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319
. 2018.02.01 17:21:23 - Reading options from /Users/madrat/.airvpn/AirVPN.xml
. 2018.02.01 17:21:29 - Command line arguments (0):
. 2018.02.01 17:21:36 - OpenVPN Driver - Expected
. 2018.02.01 17:21:36 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)
. 2018.02.01 17:21:36 - SSH - Version: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)
. 2018.02.01 17:21:36 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)
. 2018.02.01 17:21:36 - curl - Version: 7.43.0 (/usr/bin/curl)
. 2018.02.01 17:21:36 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem
! 2018.02.01 17:21:36 - Activation of Network Lock - macOS - PF
. 2018.02.01 17:21:36 - macOS - PF rules updated, reloading
. 2018.02.01 17:21:37 - Updating systems & servers data ...
. 2018.02.01 17:21:37 - macOS - PF rules updated, reloading
I 2018.02.01 17:21:37 - Session starting.
. 2018.02.01 17:21:38 - Systems & servers data update completed
I 2018.02.01 17:21:49 - Checking authorization ...
. 2018.02.01 17:21:49 - IPv6 disabled on network adapter (SAMSUNG Modem)
. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (Ethernet)
. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (FireWire)
. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (Wi-Fi)
! 2018.02.01 17:21:50 - Connecting to Mimosa (Canada, Vancouver)
. 2018.02.01 17:21:50 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.02.01 17:21:50 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.02.01 17:21:50 - Connection to OpenVPN Management Interface
. 2018.02.01 17:21:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.02.01 17:21:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.01 17:21:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.01 17:21:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.251.247:443
. 2018.02.01 17:21:50 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2018.02.01 17:21:50 - OpenVPN > UDP link local: (not bound)
. 2018.02.01 17:21:50 - OpenVPN > UDP link remote: [AF_INET]71.19.251.247:443
. 2018.02.01 17:21:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.02.01 17:21:50 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.251.247:443, sid=599a00fc 7bacc66c
. 2018.02.01 17:21:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.01 17:21:50 - OpenVPN > VERIFY KU OK
. 2018.02.01 17:21:50 - OpenVPN > Validating certificate extended key usage
. 2018.02.01 17:21:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.01 17:21:51 - OpenVPN > VERIFY EKU OK
. 2018.02.01 17:21:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.02.01 17:21:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.01 17:21:51 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.251.247:443
. 2018.02.01 17:21:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.02.01 17:21:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.167 255.255.0.0'
. 2018.02.01 17:21:52 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.01 17:21:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.01 17:21:52 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.01 17:21:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.01 17:21:52 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.01 17:21:52 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2018.02.01 17:21:52 - OpenVPN > Opened utun device utun0
. 2018.02.01 17:21:52 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.02.01 17:21:52 - OpenVPN > /sbin/ifconfig utun0 delete
. 2018.02.01 17:21:52 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.02.01 17:21:52 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.02.01 17:21:52 - OpenVPN > /sbin/ifconfig utun0 10.4.0.167 10.4.0.167 netmask 255.255.0.0 mtu 1500 up
. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.167 255.255.0.0
. 2018.02.01 17:21:52 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.167
. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 71.19.251.247 192.168.1.254 255.255.255.255
. 2018.02.01 17:21:52 - OpenVPN > add net 71.19.251.247: gateway 192.168.1.254
. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.02.01 17:21:52 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.02.01 17:21:52 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.02.01 17:21:53 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)
. 2018.02.01 17:21:53 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.02.01 17:21:53 - Routes, added a new route, 71.19.251.248 for gateway 10.4.0.1
. 2018.02.01 17:21:53 - Flushing DNS
. 2018.02.01 17:21:53 - macOS - PF rules updated, reloading
I 2018.02.01 17:21:54 - Checking route IPv4
I 2018.02.01 17:21:55 - Checking DNS
! 2018.02.01 17:22:01 - Connected.
. 2018.02.01 17:22:01 - OpenVPN > Initialization Sequence Completed
. 2018.02.01 17:32:02 - Updating systems & servers data ...
. 2018.02.01 17:32:05 - Systems & servers data update completed
. 2018.02.01 17:40:47 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2018.02.01 17:40:47 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2018.02.01 17:40:47 - OpenVPN > Restart pause, 5 second(s)
. 2018.02.01 17:40:47 - macOS - PF rules updated, reloading
! 2018.02.01 17:40:47 - Disconnecting
. 2018.02.01 17:40:47 - Routes, removed a route previously added, 71.19.251.248 for gateway 10.4.0.1
. 2018.02.01 17:40:47 - Sending management termination signal
. 2018.02.01 17:40:47 - Management - Send 'signal SIGTERM'
. 2018.02.01 17:40:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 71.19.251.247 192.168.1.254 255.255.255.255
. 2018.02.01 17:40:47 - OpenVPN > delete net 71.19.251.247: gateway 192.168.1.254
. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.02.01 17:40:47 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.02.01 17:40:47 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.02.01 17:40:47 - OpenVPN > Closing TUN/TAP interface
. 2018.02.01 17:40:47 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.02.01 17:40:48 - Connection terminated.
. 2018.02.01 17:40:48 - IPv6 restored on network adapter (SAMSUNG Modem)
. 2018.02.01 17:40:48 - IPv6 restored on network adapter (Ethernet)
. 2018.02.01 17:40:48 - IPv6 restored on network adapter (FireWire)
. 2018.02.01 17:40:48 - IPv6 restored on network adapter (Wi-Fi)
. 2018.02.01 17:40:48 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)
. 2018.02.01 17:40:48 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
I 2018.02.01 17:40:57 - Checking authorization ...
. 2018.02.01 17:40:57 - IPv6 disabled on network adapter (SAMSUNG Modem)
. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (Ethernet)
. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (FireWire)
. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (Wi-Fi)
! 2018.02.01 17:40:58 - Connecting to Gemma (Canada, Vancouver)
. 2018.02.01 17:40:58 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.02.01 17:40:58 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.02.01 17:40:58 - Connection to OpenVPN Management Interface
. 2018.02.01 17:40:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.02.01 17:40:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.01 17:40:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.01 17:40:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.113:443
. 2018.02.01 17:40:58 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2018.02.01 17:40:58 - OpenVPN > UDP link local: (not bound)
. 2018.02.01 17:40:58 - OpenVPN > UDP link remote: [AF_INET]71.19.252.113:443
. 2018.02.01 17:40:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.02.01 17:40:58 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=1e4979b3 32cd1b5e
. 2018.02.01 17:40:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.01 17:40:58 - OpenVPN > VERIFY KU OK
. 2018.02.01 17:40:58 - OpenVPN > Validating certificate extended key usage
. 2018.02.01 17:40:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.01 17:40:58 - OpenVPN > VERIFY EKU OK
. 2018.02.01 17:40:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.02.01 17:40:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.01 17:40:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443
. 2018.02.01 17:41:00 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.02.01 17:41:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.5.71 255.255.0.0'
. 2018.02.01 17:41:00 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.01 17:41:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.01 17:41:00 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.01 17:41:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.01 17:41:00 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.01 17:41:00 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2018.02.01 17:41:00 - OpenVPN > Opened utun device utun0
. 2018.02.01 17:41:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.02.01 17:41:00 - OpenVPN > /sbin/ifconfig utun0 delete
. 2018.02.01 17:41:00 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.02.01 17:41:00 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.02.01 17:41:00 - OpenVPN > /sbin/ifconfig utun0 10.4.5.71 10.4.5.71 netmask 255.255.0.0 mtu 1500 up
. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.5.71 255.255.0.0
. 2018.02.01 17:41:00 - OpenVPN > add net 10.4.0.0: gateway 10.4.5.71
. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 71.19.252.113 192.168.1.254 255.255.255.255
. 2018.02.01 17:41:00 - OpenVPN > add net 71.19.252.113: gateway 192.168.1.254
. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.02.01 17:41:00 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.02.01 17:41:00 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.02.01 17:41:00 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)
. 2018.02.01 17:41:00 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.02.01 17:41:01 - Routes, added a new route, 71.19.252.114 for gateway 10.4.0.1
. 2018.02.01 17:41:01 - Flushing DNS
. 2018.02.01 17:41:01 - macOS - PF rules updated, reloading
I 2018.02.01 17:41:01 - Checking route IPv4
I 2018.02.01 17:41:05 - Checking DNS
! 2018.02.01 17:41:06 - Connected.
. 2018.02.01 17:41:06 - OpenVPN > Initialization Sequence Completed
. 2018.02.01 17:42:37 - Updating systems & servers data ...
. 2018.02.01 17:42:42 - Systems & servers data update completed
. 2018.02.01 17:53:38 - Updating systems & servers data ...
. 2018.02.01 17:53:46 - Systems & servers data update completed

 

System log:

Eddie System/Environment Report - 2/2/2018 1:54 AM UTC

Eddie version: 2.14.0
Eddie OS build: macos_x64
Eddie architecture: x64
OS type: MacOS
OS name: 10.11.6
OS version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Tue Jan  9 20:12:05 PST 2018; root:xnu-3248.73.5~1/RELEASE_X86_64 x86_64
OS architecture: x64
Mono /.Net Framework: v4.0.30319
OpenVPN driver: Expected
OpenVPN: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)
SSH: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)
SSL: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)
curl: 7.43.0 (/usr/bin/curl)
Profile path: /Users/madrat/.airvpn/AirVPN.xml
Data path: /Users/madrat/.airvpn
Application path: /Applications/Eddie.app/Contents/MacOS
Executable path: /Applications/Eddie.app/Contents/MacOS/Eddie
Command line arguments: (0 args)
Network Lock Active: Yes, macOS - PF
Connected to VPN: Yes, Gemma
Detected DNS: 10.4.0.1
Test DNS IPv4: Ok
Test DNS IPv6: Ok
Test Ping IPv4: 130 ms
Test Ping IPv6: -1 ms
Test HTTP IPv4: Ok
Test HTTP IPv6: Error:curl: (7) Couldn't connect to server
Test HTTPS: Ok
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
connect: True
netlock: True

----------------------------
Logs:

. 2018.02.01 17:21:22 - Eddie version: 2.14.0 / macos_x64, System: MacOS, Name: 10.11.6, Version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Tue Jan  9 20:12:05 PST 2018; root:xnu-3248.73.5~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319
. 2018.02.01 17:21:23 - Reading options from /Users/madrat/.airvpn/AirVPN.xml
. 2018.02.01 17:21:29 - Command line arguments (0):
. 2018.02.01 17:21:36 - OpenVPN Driver - Expected
. 2018.02.01 17:21:36 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)
. 2018.02.01 17:21:36 - SSH - Version: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)
. 2018.02.01 17:21:36 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)
. 2018.02.01 17:21:36 - curl - Version: 7.43.0 (/usr/bin/curl)
. 2018.02.01 17:21:36 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem
! 2018.02.01 17:21:36 - Activation of Network Lock - macOS - PF
. 2018.02.01 17:21:36 - macOS - PF rules updated, reloading
. 2018.02.01 17:21:37 - Updating systems & servers data ...
. 2018.02.01 17:21:37 - macOS - PF rules updated, reloading
I 2018.02.01 17:21:37 - Session starting.
. 2018.02.01 17:21:38 - Systems & servers data update completed
I 2018.02.01 17:21:49 - Checking authorization ...
. 2018.02.01 17:21:49 - IPv6 disabled on network adapter (SAMSUNG Modem)
. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (Ethernet)
. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (FireWire)
. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (Wi-Fi)
! 2018.02.01 17:21:50 - Connecting to Mimosa (Canada, Vancouver)
. 2018.02.01 17:21:50 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.02.01 17:21:50 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.02.01 17:21:50 - Connection to OpenVPN Management Interface
. 2018.02.01 17:21:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.02.01 17:21:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.01 17:21:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.01 17:21:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.251.247:443
. 2018.02.01 17:21:50 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2018.02.01 17:21:50 - OpenVPN > UDP link local: (not bound)
. 2018.02.01 17:21:50 - OpenVPN > UDP link remote: [AF_INET]71.19.251.247:443
. 2018.02.01 17:21:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.02.01 17:21:50 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.251.247:443, sid=599a00fc 7bacc66c
. 2018.02.01 17:21:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.01 17:21:50 - OpenVPN > VERIFY KU OK
. 2018.02.01 17:21:50 - OpenVPN > Validating certificate extended key usage
. 2018.02.01 17:21:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.01 17:21:51 - OpenVPN > VERIFY EKU OK
. 2018.02.01 17:21:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.02.01 17:21:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.01 17:21:51 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.251.247:443
. 2018.02.01 17:21:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.02.01 17:21:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.167 255.255.0.0'
. 2018.02.01 17:21:52 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.01 17:21:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.01 17:21:52 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.01 17:21:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.01 17:21:52 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.01 17:21:52 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2018.02.01 17:21:52 - OpenVPN > Opened utun device utun0
. 2018.02.01 17:21:52 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.02.01 17:21:52 - OpenVPN > /sbin/ifconfig utun0 delete
. 2018.02.01 17:21:52 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.02.01 17:21:52 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.02.01 17:21:52 - OpenVPN > /sbin/ifconfig utun0 10.4.0.167 10.4.0.167 netmask 255.255.0.0 mtu 1500 up
. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.167 255.255.0.0
. 2018.02.01 17:21:52 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.167
. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 71.19.251.247 192.168.1.254 255.255.255.255
. 2018.02.01 17:21:52 - OpenVPN > add net 71.19.251.247: gateway 192.168.1.254
. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.02.01 17:21:52 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.02.01 17:21:52 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.02.01 17:21:53 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)
. 2018.02.01 17:21:53 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.02.01 17:21:53 - Routes, added a new route, 71.19.251.248 for gateway 10.4.0.1
. 2018.02.01 17:21:53 - Flushing DNS
. 2018.02.01 17:21:53 - macOS - PF rules updated, reloading
I 2018.02.01 17:21:54 - Checking route IPv4
I 2018.02.01 17:21:55 - Checking DNS
! 2018.02.01 17:22:01 - Connected.
. 2018.02.01 17:22:01 - OpenVPN > Initialization Sequence Completed
. 2018.02.01 17:32:02 - Updating systems & servers data ...
. 2018.02.01 17:32:05 - Systems & servers data update completed
. 2018.02.01 17:40:47 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2018.02.01 17:40:47 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2018.02.01 17:40:47 - OpenVPN > Restart pause, 5 second(s)
. 2018.02.01 17:40:47 - macOS - PF rules updated, reloading
! 2018.02.01 17:40:47 - Disconnecting
. 2018.02.01 17:40:47 - Routes, removed a route previously added, 71.19.251.248 for gateway 10.4.0.1
. 2018.02.01 17:40:47 - Sending management termination signal
. 2018.02.01 17:40:47 - Management - Send 'signal SIGTERM'
. 2018.02.01 17:40:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 71.19.251.247 192.168.1.254 255.255.255.255
. 2018.02.01 17:40:47 - OpenVPN > delete net 71.19.251.247: gateway 192.168.1.254
. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.02.01 17:40:47 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.02.01 17:40:47 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
. 2018.02.01 17:40:47 - OpenVPN > Closing TUN/TAP interface
. 2018.02.01 17:40:47 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
. 2018.02.01 17:40:48 - Connection terminated.
. 2018.02.01 17:40:48 - IPv6 restored on network adapter (SAMSUNG Modem)
. 2018.02.01 17:40:48 - IPv6 restored on network adapter (Ethernet)
. 2018.02.01 17:40:48 - IPv6 restored on network adapter (FireWire)
. 2018.02.01 17:40:48 - IPv6 restored on network adapter (Wi-Fi)
. 2018.02.01 17:40:48 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)
. 2018.02.01 17:40:48 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
I 2018.02.01 17:40:57 - Checking authorization ...
. 2018.02.01 17:40:57 - IPv6 disabled on network adapter (SAMSUNG Modem)
. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (Ethernet)
. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (FireWire)
. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (Wi-Fi)
! 2018.02.01 17:40:58 - Connecting to Gemma (Canada, Vancouver)
. 2018.02.01 17:40:58 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
. 2018.02.01 17:40:58 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2018.02.01 17:40:58 - Connection to OpenVPN Management Interface
. 2018.02.01 17:40:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.02.01 17:40:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.01 17:40:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.01 17:40:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.113:443
. 2018.02.01 17:40:58 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2018.02.01 17:40:58 - OpenVPN > UDP link local: (not bound)
. 2018.02.01 17:40:58 - OpenVPN > UDP link remote: [AF_INET]71.19.252.113:443
. 2018.02.01 17:40:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.02.01 17:40:58 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=1e4979b3 32cd1b5e
. 2018.02.01 17:40:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.02.01 17:40:58 - OpenVPN > VERIFY KU OK
. 2018.02.01 17:40:58 - OpenVPN > Validating certificate extended key usage
. 2018.02.01 17:40:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.02.01 17:40:58 - OpenVPN > VERIFY EKU OK
. 2018.02.01 17:40:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.02.01 17:40:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.02.01 17:40:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443
. 2018.02.01 17:41:00 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.02.01 17:41:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.5.71 255.255.0.0'
. 2018.02.01 17:41:00 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.02.01 17:41:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.01 17:41:00 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.01 17:41:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.02.01 17:41:00 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.02.01 17:41:00 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2018.02.01 17:41:00 - OpenVPN > Opened utun device utun0
. 2018.02.01 17:41:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.02.01 17:41:00 - OpenVPN > /sbin/ifconfig utun0 delete
. 2018.02.01 17:41:00 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.02.01 17:41:00 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.02.01 17:41:00 - OpenVPN > /sbin/ifconfig utun0 10.4.5.71 10.4.5.71 netmask 255.255.0.0 mtu 1500 up
. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.5.71 255.255.0.0
. 2018.02.01 17:41:00 - OpenVPN > add net 10.4.0.0: gateway 10.4.5.71
. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 71.19.252.113 192.168.1.254 255.255.255.255
. 2018.02.01 17:41:00 - OpenVPN > add net 71.19.252.113: gateway 192.168.1.254
. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2018.02.01 17:41:00 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2018.02.01 17:41:00 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2018.02.01 17:41:00 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)
. 2018.02.01 17:41:00 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2018.02.01 17:41:01 - Routes, added a new route, 71.19.252.114 for gateway 10.4.0.1
. 2018.02.01 17:41:01 - Flushing DNS
. 2018.02.01 17:41:01 - macOS - PF rules updated, reloading
I 2018.02.01 17:41:01 - Checking route IPv4
I 2018.02.01 17:41:05 - Checking DNS
! 2018.02.01 17:41:06 - Connected.
. 2018.02.01 17:41:06 - OpenVPN > Initialization Sequence Completed
. 2018.02.01 17:42:37 - Updating systems & servers data ...
. 2018.02.01 17:42:42 - Systems & servers data update completed
. 2018.02.01 17:53:38 - Updating systems & servers data ...
. 2018.02.01 17:53:46 - Systems & servers data update completed

----------------------------
Network Interfaces and Routes:

{
    "support_ipv4": true,
    "support_ipv6": true,
    "routes": [
        {
            "address": "0.0.0.0\/1",
            "gateway": "10.4.0.1",
            "flags": "UGSc",
            "refs": "94",
            "use": "1",
            "mtu": "1500",
            "interface": "utun0"
        },
        {
            "address": "0.0.0.0\/0",
            "gateway": "192.168.1.254",
            "flags": "UGSc",
            "refs": "1",
            "use": "432",
            "mtu": "1500",
            "interface": "en0"
        },
        {
            "address": "10.0.0.4\/16",
            "gateway": "10.4.5.71",
            "flags": "UGSc",
            "refs": "7",
            "use": "0",
            "mtu": "1500",
            "interface": "utun0"
        },
        {
            "address": "10.4.5.71",
            "gateway": "10.4.5.71",
            "flags": "UH",
            "refs": "2",
            "use": "5",
            "mtu": "1500",
            "interface": "utun0"
        },
        {
            "address": "71.19.252.113",
            "gateway": "192.168.1.254",
            "flags": "UGSc",
            "refs": "1",
            "use": "0",
            "mtu": "1500",
            "interface": "en0"
        },
        {
            "address": "71.19.252.114",
            "gateway": "10.4.0.1",
            "flags": "UGHS",
            "refs": "0",
            "use": "34",
            "mtu": "1500",
            "interface": "utun0"
        },
        {
            "address": "0.0.0.127",
            "gateway": "127.0.0.1",
            "flags": "UCS",
            "refs": "0",
            "use": "0",
            "mtu": "16384",
            "interface": "lo0"
        },
        {
            "address": "127.0.0.1",
            "gateway": "127.0.0.1",
            "flags": "UH",
            "refs": "5",
            "use": "7322",
            "mtu": "16384",
            "interface": "lo0"
        },
        {
            "address": "128.0.0.0\/1",
            "gateway": "10.4.0.1",
            "flags": "UGSc",
            "refs": "23",
            "use": "0",
            "mtu": "1500",
            "interface": "utun0"
        },
        {
            "address": "169.0.0.254",
            "gateway": "link#4",
            "flags": "UCS",
            "refs": "0",
            "use": "0",
            "mtu": "1500",
            "interface": "en0"
        },
        {
            "address": "192.168.0.1",
            "gateway": "link#4",
            "flags": "UCS",
            "refs": "2",
            "use": "0",
            "mtu": "1500",
            "interface": "en0"
        },
        {
            "address": "192.168.1.65",
            "gateway": "link#4",
            "flags": "UCS",
            "refs": "1",
            "use": "0",
            "mtu": "1500",
            "interface": "en0"
        },
        {
            "address": "192.168.1.65",
            "gateway": "0:23:df:8c:a0:ae",
            "flags": "UHLWI",
            "refs": "0",
            "use": "7",
            "mtu": "16384",
            "interface": "lo0"
        },
        {
            "address": "192.168.1.67",
            "gateway": "e4:ce:8f:33:33:72",
            "flags": "UHLWI",
            "refs": "0",
            "use": "0",
            "mtu": "1500",
            "interface": "en0",
            "expire": "214"
        },
        {
            "address": "192.168.1.254",
            "gateway": "link#4",
            "flags": "UCS",
            "refs": "1",
            "use": "0",
            "mtu": "1500",
            "interface": "en0"
        },
        {
            "address": "192.168.1.254",
            "gateway": "1c:af:f7:d9:72:db",
            "flags": "UHLWIir",
            "refs": "5",
            "use": "263",
            "mtu": "1500",
            "interface": "en0",
            "expire": "1192"
        },
        {
            "address": "192.168.1.255",
            "gateway": "ff:ff:ff:ff:ff:ff",
            "flags": "UHLWbI",
            "refs": "0",
            "use": "25",
            "mtu": "1500",
            "interface": "en0"
        },
        {
            "address": "224.0.0.0",
            "gateway": "link#4",
            "flags": "UmCS",
            "refs": "2",
            "use": "0",
            "mtu": "1500",
            "interface": "en0"
        },
        {
            "address": "224.0.0.1",
            "gateway": "1:0:5e:0:0:1",
            "flags": "UHmLWI",
            "refs": "0",
            "use": "285",
            "mtu": "1500",
            "interface": "en0"
        },
        {
            "address": "224.0.0.251",
            "gateway": "1:0:5e:0:0:fb",
            "flags": "UHmLWI",
            "refs": "0",
            "use": "0",
            "mtu": "1500",
            "interface": "en0"
        },
        {
            "address": "255.255.255.255",
            "gateway": "link#4",
            "flags": "UCS",
            "refs": "0",
            "use": "0",
            "mtu": "1500",
            "interface": "en0"
        },
        {
            "address": "::1",
            "gateway": "::1",
            "flags": "UHL",
            "refs": "0",
            "use": "0",
            "mtu": "16384",
            "interface": "lo0"
        },
        {
            "address": "fe80::",
            "gateway": "fe80::1%lo0",
            "flags": "UcI",
            "refs": "1",
            "use": "0",
            "mtu": "16384",
            "interface": "lo0"
        },
        {
            "address": "fe80::1",
            "gateway": "link#1",
            "flags": "UHLI",
            "refs": "1",
            "use": "0",
            "mtu": "16384",
            "interface": "lo0"
        },
        {
            "address": "ff01::",
            "gateway": "::1",
            "flags": "UmCI",
            "refs": "0",
            "use": "0",
            "mtu": "16384",
            "interface": "lo0"
        },
        {
            "address": "ff02::",
            "gateway": "::1",
            "flags": "UmCI",
            "refs": "0",
            "use": "0",
            "mtu": "16384",
            "interface": "lo0"
        }
    ],
    "interfaces": [
        {
            "friendly": "lo0",
            "id": "lo0",
            "name": "lo0",
            "description": "lo0",
            "type": "Loopback",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": false,
            "ips": [
                "::1",
                "127.0.0.1",
                "fe80::1"
            ],
            "gateways": [
                "127.0.0.1",
                "::1",
                "fe80::1"
            ],
            "bind": true
        },
        {
            "friendly": "gif0",
            "id": "gif0",
            "name": "gif0",
            "description": "gif0",
            "type": "Unknown",
            "status": "Unknown",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": false,
            "ips": [],
            "gateways": [],
            "bind": false
        },
        {
            "friendly": "stf0",
            "id": "stf0",
            "name": "stf0",
            "description": "stf0",
            "type": "Unknown",
            "status": "Unknown",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": false,
            "ips": [],
            "gateways": [],
            "bind": false
        },
        {
            "friendly": "Ethernet",
            "id": "en0",
            "name": "en0",
            "description": "en0",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": false,
            "ips": [
                "192.168.1.65"
            ],
            "gateways": [
                "192.168.1.254"
            ],
            "bind": true
        },
        {
            "friendly": "Wi-Fi",
            "id": "en1",
            "name": "en1",
            "description": "en1",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": false,
            "ips": [],
            "gateways": [],
            "bind": false
        },
        {
            "friendly": "FireWire",
            "id": "fw0",
            "name": "fw0",
            "description": "fw0",
            "type": "Unknown",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": false,
            "ips": [],
            "gateways": [],
            "bind": false
        },
        {
            "friendly": "p2p0",
            "id": "p2p0",
            "name": "p2p0",
            "description": "p2p0",
            "type": "Ethernet",
            "status": "Unknown",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": false,
            "ips": [],
            "gateways": [],
            "bind": false
        },
        {
            "friendly": "utun0",
            "id": "utun0",
            "name": "utun0",
            "description": "utun0",
            "type": "Unknown",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": false,
            "ips": [
                "10.4.5.71"
            ],
            "gateways": [
                "10.4.0.1",
                "10.4.5.71"
            ],
            "bind": true
        }
    ],
    "ipv4-default-gateway": "192.168.1.254",
    "ipv4-default-interface": "en0"
}
----------------------------
ifconfig:

lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
    options=3<RXCSUM,TXCSUM>
    inet6 ::1 prefixlen 128
    inet 127.0.0.1 netmask 0xff000000
    inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1
    nd6 options=1<PERFORMNUD>
gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280
stf0: flags=0<> mtu 1280
en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
    options=27<RXCSUM,TXCSUM,VLAN_MTU,TSO4>
    ether 00:23:df:8c:a0:ae
    inet 192.168.1.65 netmask 0xffffff00 broadcast 192.168.1.255
    nd6 options=1<PERFORMNUD>
    media: autoselect (100baseTX <full-duplex,flow-control>)
    status: active
en1: flags=8823<UP,BROADCAST,SMART,SIMPLEX,MULTICAST> mtu 1500
    ether 00:1f:f3:bd:82:25
    nd6 options=1<PERFORMNUD>
    media: autoselect (<unknown type>)
    status: inactive
fw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 4078
    lladdr 00:23:df:ff:fe:8c:a0:ae
    nd6 options=1<PERFORMNUD>
    media: autoselect <full-duplex>
    status: inactive
p2p0: flags=8802<BROADCAST,SIMPLEX,MULTICAST> mtu 2304
    ether 02:1f:f3:bd:82:25
    media: autoselect
    status: inactive
utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500
    inet 10.4.5.71 --> 10.4.5.71 netmask 0xffff0000

Share this post


Link to post

madrat, when I downloaded 2.14 for the first time I still had 2.12 and 2.13 on my system, and when I opened 2.14 for the first time it was showing up as 2.12 for some reason. I then removed all three versions and reinstalled 2.14, and it now shows up as 2.14.

 

If you can quit out of Eddie 2.14 with no problem, then it sounds as if it's something to do with my Mac. I've tried to attach a jpeg to show what it looks like after I try to quit. At this point the app is disconnected, but the little dot shows that it hasn't fully quit. When it's like this, no other apps can work, and I can't force quit, go to sleep, or even shut down the system unless I switch off the power. For some reason it's freezing my system.

 

Usually I leave Eddie connected, but because of disconnecting problems with 2.12 and PF Firewall errors with 2.13 in recent months, I have got used to having to quit Eddie in order to get it working again. Obviously, I will try and reduce the times I have to disconnect to 2.14.

 

Apart from the quit problem, it seems to be running okay at this point.

Share this post


Link to post

I have downloaded the new version and I am still having issues connecting. I am on a mac and have downloaded the new high sierra 10.13.3 update and it has now stuffed up everything. Does anyone know how I can get air vpn working with this new update?

 

 

well I have downloaded the new version and I am still having issues getting connected - SO ANNOYING!!

 

I have deleted all old versions of eddie and rebooted the machine and still its not connecting. wifi connection is good. I have also uninstalled and reinstalled this new 2.14 version and still not connecting. I'm about ready to give up.

 

ARRGGGHHH!!!

Share this post


Link to post

 

well I have downloaded the new version and I am still having issues getting connected - SO ANNOYING!!

Just a suggestion. Try rebooting, if you have not already done so, to see if that helps. 2.14 update worked fine on my MacBook Pro running Sierra, but As you can see in my earlier post, I had problems on El Capitan. How that all got solved, I have no idea whatsoever. A quick question for those in the know. When you revert to an older version of Eddie, do you first have to uninstall the newer version before you install the older version? I ask, because I reinstalled 2.13.6 over 2.14 I still ended up with 2.14. Fortunately, after that, everything worked fine, so I let it be. And kittymcaff, try copying and pasting your log if possible as some people can actually read them and may be able to help you further.

Share this post


Link to post

I have deleted all old versions of eddie and rebooted the machine and still its not connecting.  wifi connection is good.  I have also uninstalled and reinstalled this new 2.14 version and still not connecting.  I'm about ready to give up.

 

ARRGGGHHH!!! 

 

Post logs.  Otherwise how can anybody help?

Share this post


Link to post

So after finally getting 2.14 running on my iMac with El Capitan, I decided to install 2.14 on my Macbook Pro running Sierra. No problems. Eddie loaded and connected right away. However, (and I had this same problem with 2.13.6) right after Eddie loaded on my laptop, Eddie disconnected on my iMac and then reconnected. No idea why this happens. Here are the logs from my iMac:

. 2018.02.01 17:21:22 - Eddie version: 2.14.0 / macos_x64, System: MacOS, Name: 10.11.6, Version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Tue Jan  9 20:12:05 PST 2018; root:xnu-3248.73.5~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319

. 2018.02.01 17:21:23 - Reading options from /Users/madrat/.airvpn/AirVPN.xml

. 2018.02.01 17:21:29 - Command line arguments (0):

. 2018.02.01 17:21:36 - OpenVPN Driver - Expected

. 2018.02.01 17:21:36 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

. 2018.02.01 17:21:36 - SSH - Version: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)

. 2018.02.01 17:21:36 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)

. 2018.02.01 17:21:36 - curl - Version: 7.43.0 (/usr/bin/curl)

. 2018.02.01 17:21:36 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem

! 2018.02.01 17:21:36 - Activation of Network Lock - macOS - PF

. 2018.02.01 17:21:36 - macOS - PF rules updated, reloading

. 2018.02.01 17:21:37 - Updating systems & servers data ...

. 2018.02.01 17:21:37 - macOS - PF rules updated, reloading

I 2018.02.01 17:21:37 - Session starting.

. 2018.02.01 17:21:38 - Systems & servers data update completed

I 2018.02.01 17:21:49 - Checking authorization ...

. 2018.02.01 17:21:49 - IPv6 disabled on network adapter (SAMSUNG Modem)

. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (Ethernet)

. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (FireWire)

. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (Wi-Fi)

! 2018.02.01 17:21:50 - Connecting to Mimosa (Canada, Vancouver)

. 2018.02.01 17:21:50 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.02.01 17:21:50 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.02.01 17:21:50 - Connection to OpenVPN Management Interface

. 2018.02.01 17:21:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.02.01 17:21:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.251.247:443

. 2018.02.01 17:21:50 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.02.01 17:21:50 - OpenVPN > UDP link local: (not bound)

. 2018.02.01 17:21:50 - OpenVPN > UDP link remote: [AF_INET]71.19.251.247:443

. 2018.02.01 17:21:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.02.01 17:21:50 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.251.247:443, sid=599a00fc 7bacc66c

. 2018.02.01 17:21:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.02.01 17:21:50 - OpenVPN > VERIFY KU OK

. 2018.02.01 17:21:50 - OpenVPN > Validating certificate extended key usage

. 2018.02.01 17:21:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.02.01 17:21:51 - OpenVPN > VERIFY EKU OK

. 2018.02.01 17:21:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.02.01 17:21:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.02.01 17:21:51 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.251.247:443

. 2018.02.01 17:21:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.02.01 17:21:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.167 255.255.0.0'

. 2018.02.01 17:21:52 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.02.01 17:21:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:21:52 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:21:52 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:52 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2018.02.01 17:21:52 - OpenVPN > Opened utun device utun0

. 2018.02.01 17:21:52 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.02.01 17:21:52 - OpenVPN > /sbin/ifconfig utun0 delete

. 2018.02.01 17:21:52 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.02.01 17:21:52 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.02.01 17:21:52 - OpenVPN > /sbin/ifconfig utun0 10.4.0.167 10.4.0.167 netmask 255.255.0.0 mtu 1500 up

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.167 255.255.0.0

. 2018.02.01 17:21:52 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.167

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 71.19.251.247 192.168.1.254 255.255.255.255

. 2018.02.01 17:21:52 - OpenVPN > add net 71.19.251.247: gateway 192.168.1.254

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:21:52 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:21:52 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:21:53 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2018.02.01 17:21:53 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.02.01 17:21:53 - Routes, added a new route, 71.19.251.248 for gateway 10.4.0.1

. 2018.02.01 17:21:53 - Flushing DNS

. 2018.02.01 17:21:53 - macOS - PF rules updated, reloading

I 2018.02.01 17:21:54 - Checking route IPv4

I 2018.02.01 17:21:55 - Checking DNS

! 2018.02.01 17:22:01 - Connected.

. 2018.02.01 17:22:01 - OpenVPN > Initialization Sequence Completed

. 2018.02.01 17:32:02 - Updating systems & servers data ...

. 2018.02.01 17:32:05 - Systems & servers data update completed

. 2018.02.01 17:40:47 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.02.01 17:40:47 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.02.01 17:40:47 - OpenVPN > Restart pause, 5 second(s)

. 2018.02.01 17:40:47 - macOS - PF rules updated, reloading

! 2018.02.01 17:40:47 - Disconnecting

. 2018.02.01 17:40:47 - Routes, removed a route previously added, 71.19.251.248 for gateway 10.4.0.1

. 2018.02.01 17:40:47 - Sending management termination signal

. 2018.02.01 17:40:47 - Management - Send 'signal SIGTERM'

. 2018.02.01 17:40:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 71.19.251.247 192.168.1.254 255.255.255.255

. 2018.02.01 17:40:47 - OpenVPN > delete net 71.19.251.247: gateway 192.168.1.254

. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:40:47 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:40:47 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:40:47 - OpenVPN > Closing TUN/TAP interface

. 2018.02.01 17:40:47 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.02.01 17:40:48 - Connection terminated.

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (SAMSUNG Modem)

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (Ethernet)

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (FireWire)

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (Wi-Fi)

. 2018.02.01 17:40:48 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)

. 2018.02.01 17:40:48 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

I 2018.02.01 17:40:57 - Checking authorization ...

. 2018.02.01 17:40:57 - IPv6 disabled on network adapter (SAMSUNG Modem)

. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (Ethernet)

. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (FireWire)

. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (Wi-Fi)

! 2018.02.01 17:40:58 - Connecting to Gemma (Canada, Vancouver)

. 2018.02.01 17:40:58 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.02.01 17:40:58 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.02.01 17:40:58 - Connection to OpenVPN Management Interface

. 2018.02.01 17:40:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.02.01 17:40:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:40:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:40:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.113:443

. 2018.02.01 17:40:58 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.02.01 17:40:58 - OpenVPN > UDP link local: (not bound)

. 2018.02.01 17:40:58 - OpenVPN > UDP link remote: [AF_INET]71.19.252.113:443

. 2018.02.01 17:40:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.02.01 17:40:58 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=1e4979b3 32cd1b5e

. 2018.02.01 17:40:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.02.01 17:40:58 - OpenVPN > VERIFY KU OK

. 2018.02.01 17:40:58 - OpenVPN > Validating certificate extended key usage

. 2018.02.01 17:40:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.02.01 17:40:58 - OpenVPN > VERIFY EKU OK

. 2018.02.01 17:40:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.02.01 17:40:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.02.01 17:40:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443

. 2018.02.01 17:41:00 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.02.01 17:41:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.5.71 255.255.0.0'

. 2018.02.01 17:41:00 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.02.01 17:41:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:41:00 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:41:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:41:00 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:41:00 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2018.02.01 17:41:00 - OpenVPN > Opened utun device utun0

. 2018.02.01 17:41:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.02.01 17:41:00 - OpenVPN > /sbin/ifconfig utun0 delete

. 2018.02.01 17:41:00 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.02.01 17:41:00 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.02.01 17:41:00 - OpenVPN > /sbin/ifconfig utun0 10.4.5.71 10.4.5.71 netmask 255.255.0.0 mtu 1500 up

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.5.71 255.255.0.0

. 2018.02.01 17:41:00 - OpenVPN > add net 10.4.0.0: gateway 10.4.5.71

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 71.19.252.113 192.168.1.254 255.255.255.255

. 2018.02.01 17:41:00 - OpenVPN > add net 71.19.252.113: gateway 192.168.1.254

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:41:00 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:41:00 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:41:00 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2018.02.01 17:41:00 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.02.01 17:41:01 - Routes, added a new route, 71.19.252.114 for gateway 10.4.0.1

. 2018.02.01 17:41:01 - Flushing DNS

. 2018.02.01 17:41:01 - macOS - PF rules updated, reloading

I 2018.02.01 17:41:01 - Checking route IPv4

I 2018.02.01 17:41:05 - Checking DNS

! 2018.02.01 17:41:06 - Connected.

. 2018.02.01 17:41:06 - OpenVPN > Initialization Sequence Completed

. 2018.02.01 17:42:37 - Updating systems & servers data ...

. 2018.02.01 17:42:42 - Systems & servers data update completed

. 2018.02.01 17:53:38 - Updating systems & servers data ...

. 2018.02.01 17:53:46 - Systems & servers data update completed

 

System log:

Eddie System/Environment Report - 2/2/2018 1:54 AM UTC

 

Eddie version: 2.14.0

Eddie OS build: macos_x64

Eddie architecture: x64

OS type: MacOS

OS name: 10.11.6

OS version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Tue Jan  9 20:12:05 PST 2018; root:xnu-3248.73.5~1/RELEASE_X86_64 x86_64

OS architecture: x64

Mono /.Net Framework: v4.0.30319

OpenVPN driver: Expected

OpenVPN: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

SSH: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)

SSL: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)

curl: 7.43.0 (/usr/bin/curl)

Profile path: /Users/madrat/.airvpn/AirVPN.xml

Data path: /Users/madrat/.airvpn

Application path: /Applications/Eddie.app/Contents/MacOS

Executable path: /Applications/Eddie.app/Contents/MacOS/Eddie

Command line arguments: (0 args)

Network Lock Active: Yes, macOS - PF

Connected to VPN: Yes, Gemma

Detected DNS: 10.4.0.1

Test DNS IPv4: Ok

Test DNS IPv6: Ok

Test Ping IPv4: 130 ms

Test Ping IPv6: -1 ms

Test HTTP IPv4: Ok

Test HTTP IPv6: Error:curl: (7) Couldn't connect to server

Test HTTPS: Ok

----------------------------

Important options not at defaults:

 

login: (omissis)

password: (omissis)

remember: True

connect: True

netlock: True

 

----------------------------

Logs:

 

. 2018.02.01 17:21:22 - Eddie version: 2.14.0 / macos_x64, System: MacOS, Name: 10.11.6, Version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Tue Jan  9 20:12:05 PST 2018; root:xnu-3248.73.5~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319

. 2018.02.01 17:21:23 - Reading options from /Users/madrat/.airvpn/AirVPN.xml

. 2018.02.01 17:21:29 - Command line arguments (0):

. 2018.02.01 17:21:36 - OpenVPN Driver - Expected

. 2018.02.01 17:21:36 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

. 2018.02.01 17:21:36 - SSH - Version: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)

. 2018.02.01 17:21:36 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)

. 2018.02.01 17:21:36 - curl - Version: 7.43.0 (/usr/bin/curl)

. 2018.02.01 17:21:36 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem

! 2018.02.01 17:21:36 - Activation of Network Lock - macOS - PF

. 2018.02.01 17:21:36 - macOS - PF rules updated, reloading

. 2018.02.01 17:21:37 - Updating systems & servers data ...

. 2018.02.01 17:21:37 - macOS - PF rules updated, reloading

I 2018.02.01 17:21:37 - Session starting.

. 2018.02.01 17:21:38 - Systems & servers data update completed

I 2018.02.01 17:21:49 - Checking authorization ...

. 2018.02.01 17:21:49 - IPv6 disabled on network adapter (SAMSUNG Modem)

. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (Ethernet)

. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (FireWire)

. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (Wi-Fi)

! 2018.02.01 17:21:50 - Connecting to Mimosa (Canada, Vancouver)

. 2018.02.01 17:21:50 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.02.01 17:21:50 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.02.01 17:21:50 - Connection to OpenVPN Management Interface

. 2018.02.01 17:21:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.02.01 17:21:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.251.247:443

. 2018.02.01 17:21:50 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.02.01 17:21:50 - OpenVPN > UDP link local: (not bound)

. 2018.02.01 17:21:50 - OpenVPN > UDP link remote: [AF_INET]71.19.251.247:443

. 2018.02.01 17:21:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.02.01 17:21:50 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.251.247:443, sid=599a00fc 7bacc66c

. 2018.02.01 17:21:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.02.01 17:21:50 - OpenVPN > VERIFY KU OK

. 2018.02.01 17:21:50 - OpenVPN > Validating certificate extended key usage

. 2018.02.01 17:21:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.02.01 17:21:51 - OpenVPN > VERIFY EKU OK

. 2018.02.01 17:21:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.02.01 17:21:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.02.01 17:21:51 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.251.247:443

. 2018.02.01 17:21:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.02.01 17:21:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.167 255.255.0.0'

. 2018.02.01 17:21:52 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.02.01 17:21:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:21:52 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:21:52 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:52 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2018.02.01 17:21:52 - OpenVPN > Opened utun device utun0

. 2018.02.01 17:21:52 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.02.01 17:21:52 - OpenVPN > /sbin/ifconfig utun0 delete

. 2018.02.01 17:21:52 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.02.01 17:21:52 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.02.01 17:21:52 - OpenVPN > /sbin/ifconfig utun0 10.4.0.167 10.4.0.167 netmask 255.255.0.0 mtu 1500 up

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.167 255.255.0.0

. 2018.02.01 17:21:52 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.167

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 71.19.251.247 192.168.1.254 255.255.255.255

. 2018.02.01 17:21:52 - OpenVPN > add net 71.19.251.247: gateway 192.168.1.254

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:21:52 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:21:52 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:21:53 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2018.02.01 17:21:53 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.02.01 17:21:53 - Routes, added a new route, 71.19.251.248 for gateway 10.4.0.1

. 2018.02.01 17:21:53 - Flushing DNS

. 2018.02.01 17:21:53 - macOS - PF rules updated, reloading

I 2018.02.01 17:21:54 - Checking route IPv4

I 2018.02.01 17:21:55 - Checking DNS

! 2018.02.01 17:22:01 - Connected.

. 2018.02.01 17:22:01 - OpenVPN > Initialization Sequence Completed

. 2018.02.01 17:32:02 - Updating systems & servers data ...

. 2018.02.01 17:32:05 - Systems & servers data update completed

. 2018.02.01 17:40:47 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.02.01 17:40:47 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.02.01 17:40:47 - OpenVPN > Restart pause, 5 second(s)

. 2018.02.01 17:40:47 - macOS - PF rules updated, reloading

! 2018.02.01 17:40:47 - Disconnecting

. 2018.02.01 17:40:47 - Routes, removed a route previously added, 71.19.251.248 for gateway 10.4.0.1

. 2018.02.01 17:40:47 - Sending management termination signal

. 2018.02.01 17:40:47 - Management - Send 'signal SIGTERM'

. 2018.02.01 17:40:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 71.19.251.247 192.168.1.254 255.255.255.255

. 2018.02.01 17:40:47 - OpenVPN > delete net 71.19.251.247: gateway 192.168.1.254

. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:40:47 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:40:47 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:40:47 - OpenVPN > Closing TUN/TAP interface

. 2018.02.01 17:40:47 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.02.01 17:40:48 - Connection terminated.

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (SAMSUNG Modem)

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (Ethernet)

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (FireWire)

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (Wi-Fi)

. 2018.02.01 17:40:48 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)

. 2018.02.01 17:40:48 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

I 2018.02.01 17:40:57 - Checking authorization ...

. 2018.02.01 17:40:57 - IPv6 disabled on network adapter (SAMSUNG Modem)

. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (Ethernet)

. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (FireWire)

. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (Wi-Fi)

! 2018.02.01 17:40:58 - Connecting to Gemma (Canada, Vancouver)

. 2018.02.01 17:40:58 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.02.01 17:40:58 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.02.01 17:40:58 - Connection to OpenVPN Management Interface

. 2018.02.01 17:40:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.02.01 17:40:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:40:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:40:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.113:443

. 2018.02.01 17:40:58 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.02.01 17:40:58 - OpenVPN > UDP link local: (not bound)

. 2018.02.01 17:40:58 - OpenVPN > UDP link remote: [AF_INET]71.19.252.113:443

. 2018.02.01 17:40:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.02.01 17:40:58 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=1e4979b3 32cd1b5e

. 2018.02.01 17:40:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.02.01 17:40:58 - OpenVPN > VERIFY KU OK

. 2018.02.01 17:40:58 - OpenVPN > Validating certificate extended key usage

. 2018.02.01 17:40:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.02.01 17:40:58 - OpenVPN > VERIFY EKU OK

. 2018.02.01 17:40:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.02.01 17:40:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.02.01 17:40:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443

. 2018.02.01 17:41:00 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.02.01 17:41:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.5.71 255.255.0.0'

. 2018.02.01 17:41:00 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.02.01 17:41:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:41:00 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:41:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:41:00 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:41:00 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2018.02.01 17:41:00 - OpenVPN > Opened utun device utun0

. 2018.02.01 17:41:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.02.01 17:41:00 - OpenVPN > /sbin/ifconfig utun0 delete

. 2018.02.01 17:41:00 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.02.01 17:41:00 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.02.01 17:41:00 - OpenVPN > /sbin/ifconfig utun0 10.4.5.71 10.4.5.71 netmask 255.255.0.0 mtu 1500 up

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.5.71 255.255.0.0

. 2018.02.01 17:41:00 - OpenVPN > add net 10.4.0.0: gateway 10.4.5.71

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 71.19.252.113 192.168.1.254 255.255.255.255

. 2018.02.01 17:41:00 - OpenVPN > add net 71.19.252.113: gateway 192.168.1.254

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:41:00 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:41:00 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:41:00 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2018.02.01 17:41:00 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.02.01 17:41:01 - Routes, added a new route, 71.19.252.114 for gateway 10.4.0.1

. 2018.02.01 17:41:01 - Flushing DNS

. 2018.02.01 17:41:01 - macOS - PF rules updated, reloading

I 2018.02.01 17:41:01 - Checking route IPv4

I 2018.02.01 17:41:05 - Checking DNS

! 2018.02.01 17:41:06 - Connected.

. 2018.02.01 17:41:06 - OpenVPN > Initialization Sequence Completed

. 2018.02.01 17:42:37 - Updating systems & servers data ...

. 2018.02.01 17:42:42 - Systems & servers data update completed

. 2018.02.01 17:53:38 - Updating systems & servers data ...

. 2018.02.01 17:53:46 - Systems & servers data update completed

 

----------------------------

Network Interfaces and Routes:

 

{

    "support_ipv4": true,

    "support_ipv6": true,

    "routes": [

        {

            "address": "0.0.0.0\/1",

            "gateway": "10.4.0.1",

            "flags": "UGSc",

            "refs": "94",

            "use": "1",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "0.0.0.0\/0",

            "gateway": "192.168.1.254",

            "flags": "UGSc",

            "refs": "1",

            "use": "432",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "10.0.0.4\/16",

            "gateway": "10.4.5.71",

            "flags": "UGSc",

            "refs": "7",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "10.4.5.71",

            "gateway": "10.4.5.71",

            "flags": "UH",

            "refs": "2",

            "use": "5",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "71.19.252.113",

            "gateway": "192.168.1.254",

            "flags": "UGSc",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "71.19.252.114",

            "gateway": "10.4.0.1",

            "flags": "UGHS",

            "refs": "0",

            "use": "34",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "0.0.0.127",

            "gateway": "127.0.0.1",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "127.0.0.1",

            "gateway": "127.0.0.1",

            "flags": "UH",

            "refs": "5",

            "use": "7322",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "128.0.0.0\/1",

            "gateway": "10.4.0.1",

            "flags": "UGSc",

            "refs": "23",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "169.0.0.254",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.0.1",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "2",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.1.65",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.1.65",

            "gateway": "0:23:df:8c:a0:ae",

            "flags": "UHLWI",

            "refs": "0",

            "use": "7",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "192.168.1.67",

            "gateway": "e4:ce:8f:33:33:72",

            "flags": "UHLWI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0",

            "expire": "214"

        },

        {

            "address": "192.168.1.254",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.1.254",

            "gateway": "1c:af:f7:d9:72:db",

            "flags": "UHLWIir",

            "refs": "5",

            "use": "263",

            "mtu": "1500",

            "interface": "en0",

            "expire": "1192"

        },

        {

            "address": "192.168.1.255",

            "gateway": "ff:ff:ff:ff:ff:ff",

            "flags": "UHLWbI",

            "refs": "0",

            "use": "25",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "224.0.0.0",

            "gateway": "link#4",

            "flags": "UmCS",

            "refs": "2",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "224.0.0.1",

            "gateway": "1:0:5e:0:0:1",

            "flags": "UHmLWI",

            "refs": "0",

            "use": "285",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "224.0.0.251",

            "gateway": "1:0:5e:0:0:fb",

            "flags": "UHmLWI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "255.255.255.255",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "::1",

            "gateway": "::1",

            "flags": "UHL",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::",

            "gateway": "fe80::1%lo0",

            "flags": "UcI",

            "refs": "1",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::1",

            "gateway": "link#1",

            "flags": "UHLI",

            "refs": "1",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "ff01::",

            "gateway": "::1",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "ff02::",

            "gateway": "::1",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        }

    ],

    "interfaces": [

        {

            "friendly": "lo0",

            "id": "lo0",

            "name": "lo0",

            "description": "lo0",

            "type": "Loopback",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [

                "::1",

                "127.0.0.1",

                "fe80::1"

            ],

            "gateways": [

                "127.0.0.1",

                "::1",

                "fe80::1"

            ],

            "bind": true

        },

        {

            "friendly": "gif0",

            "id": "gif0",

            "name": "gif0",

            "description": "gif0",

            "type": "Unknown",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "stf0",

            "id": "stf0",

            "name": "stf0",

            "description": "stf0",

            "type": "Unknown",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "Ethernet",

            "id": "en0",

            "name": "en0",

            "description": "en0",

            "type": "Ethernet",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [

                "192.168.1.65"

            ],

            "gateways": [

                "192.168.1.254"

            ],

            "bind": true

        },

        {

            "friendly": "Wi-Fi",

            "id": "en1",

            "name": "en1",

            "description": "en1",

            "type": "Ethernet",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "FireWire",

            "id": "fw0",

            "name": "fw0",

            "description": "fw0",

            "type": "Unknown",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "p2p0",

            "id": "p2p0",

            "name": "p2p0",

            "description": "p2p0",

            "type": "Ethernet",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "utun0",

            "id": "utun0",

            "name": "utun0",

            "description": "utun0",

            "type": "Unknown",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [

                "10.4.5.71"

            ],

            "gateways": [

                "10.4.0.1",

                "10.4.5.71"

            ],

            "bind": true

        }

    ],

    "ipv4-default-gateway": "192.168.1.254",

    "ipv4-default-interface": "en0"

}

----------------------------

ifconfig:

 

lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384

    options=3<RXCSUM,TXCSUM>

    inet6 ::1 prefixlen 128

    inet 127.0.0.1 netmask 0xff000000

    inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1

    nd6 options=1<PERFORMNUD>

gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280

stf0: flags=0<> mtu 1280

en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500

    options=27<RXCSUM,TXCSUM,VLAN_MTU,TSO4>

    ether 00:23:df:8c:a0:ae

    inet 192.168.1.65 netmask 0xffffff00 broadcast 192.168.1.255

    nd6 options=1<PERFORMNUD>

    media: autoselect (100baseTX <full-duplex,flow-control>)

    status: active

en1: flags=8823<UP,BROADCAST,SMART,SIMPLEX,MULTICAST> mtu 1500

    ether 00:1f:f3:bd:82:25

    nd6 options=1<PERFORMNUD>

    media: autoselect (<unknown type>)

    status: inactive

fw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 4078

    lladdr 00:23:df:ff:fe:8c:a0:ae

    nd6 options=1<PERFORMNUD>

    media: autoselect <full-duplex>

    status: inactive

p2p0: flags=8802<BROADCAST,SIMPLEX,MULTICAST> mtu 2304

    ether 02:1f:f3:bd:82:25

    media: autoselect

    status: inactive

utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500

    inet 10.4.5.71 --> 10.4.5.71 netmask 0xffff0000

 

Might this problem be caused by my laptop trying to connect to the same server that my iMac is already running?

Share this post


Link to post
Guest

 

So after finally getting 2.14 running on my iMac with El Capitan, I decided to install 2.14 on my Macbook Pro running Sierra. No problems. Eddie loaded and connected right away. However, (and I had this same problem with 2.13.6) right after Eddie loaded on my laptop, Eddie disconnected on my iMac and then reconnected. No idea why this happens. Here are the logs from my iMac:

. 2018.02.01 17:21:22 - Eddie version: 2.14.0 / macos_x64, System: MacOS, Name: 10.11.6, Version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Tue Jan  9 20:12:05 PST 2018; root:xnu-3248.73.5~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319

. 2018.02.01 17:21:23 - Reading options from /Users/madrat/.airvpn/AirVPN.xml

. 2018.02.01 17:21:29 - Command line arguments (0):

. 2018.02.01 17:21:36 - OpenVPN Driver - Expected

. 2018.02.01 17:21:36 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

. 2018.02.01 17:21:36 - SSH - Version: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)

. 2018.02.01 17:21:36 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)

. 2018.02.01 17:21:36 - curl - Version: 7.43.0 (/usr/bin/curl)

. 2018.02.01 17:21:36 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem

! 2018.02.01 17:21:36 - Activation of Network Lock - macOS - PF

. 2018.02.01 17:21:36 - macOS - PF rules updated, reloading

. 2018.02.01 17:21:37 - Updating systems & servers data ...

. 2018.02.01 17:21:37 - macOS - PF rules updated, reloading

I 2018.02.01 17:21:37 - Session starting.

. 2018.02.01 17:21:38 - Systems & servers data update completed

I 2018.02.01 17:21:49 - Checking authorization ...

. 2018.02.01 17:21:49 - IPv6 disabled on network adapter (SAMSUNG Modem)

. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (Ethernet)

. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (FireWire)

. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (Wi-Fi)

! 2018.02.01 17:21:50 - Connecting to Mimosa (Canada, Vancouver)

. 2018.02.01 17:21:50 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.02.01 17:21:50 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.02.01 17:21:50 - Connection to OpenVPN Management Interface

. 2018.02.01 17:21:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.02.01 17:21:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.251.247:443

. 2018.02.01 17:21:50 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.02.01 17:21:50 - OpenVPN > UDP link local: (not bound)

. 2018.02.01 17:21:50 - OpenVPN > UDP link remote: [AF_INET]71.19.251.247:443

. 2018.02.01 17:21:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.02.01 17:21:50 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.251.247:443, sid=599a00fc 7bacc66c

. 2018.02.01 17:21:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.02.01 17:21:50 - OpenVPN > VERIFY KU OK

. 2018.02.01 17:21:50 - OpenVPN > Validating certificate extended key usage

. 2018.02.01 17:21:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.02.01 17:21:51 - OpenVPN > VERIFY EKU OK

. 2018.02.01 17:21:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.02.01 17:21:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.02.01 17:21:51 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.251.247:443

. 2018.02.01 17:21:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.02.01 17:21:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.167 255.255.0.0'

. 2018.02.01 17:21:52 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.02.01 17:21:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:21:52 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:21:52 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:52 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2018.02.01 17:21:52 - OpenVPN > Opened utun device utun0

. 2018.02.01 17:21:52 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.02.01 17:21:52 - OpenVPN > /sbin/ifconfig utun0 delete

. 2018.02.01 17:21:52 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.02.01 17:21:52 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.02.01 17:21:52 - OpenVPN > /sbin/ifconfig utun0 10.4.0.167 10.4.0.167 netmask 255.255.0.0 mtu 1500 up

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.167 255.255.0.0

. 2018.02.01 17:21:52 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.167

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 71.19.251.247 192.168.1.254 255.255.255.255

. 2018.02.01 17:21:52 - OpenVPN > add net 71.19.251.247: gateway 192.168.1.254

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:21:52 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:21:52 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:21:53 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2018.02.01 17:21:53 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.02.01 17:21:53 - Routes, added a new route, 71.19.251.248 for gateway 10.4.0.1

. 2018.02.01 17:21:53 - Flushing DNS

. 2018.02.01 17:21:53 - macOS - PF rules updated, reloading

I 2018.02.01 17:21:54 - Checking route IPv4

I 2018.02.01 17:21:55 - Checking DNS

! 2018.02.01 17:22:01 - Connected.

. 2018.02.01 17:22:01 - OpenVPN > Initialization Sequence Completed

. 2018.02.01 17:32:02 - Updating systems & servers data ...

. 2018.02.01 17:32:05 - Systems & servers data update completed

. 2018.02.01 17:40:47 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.02.01 17:40:47 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.02.01 17:40:47 - OpenVPN > Restart pause, 5 second(s)

. 2018.02.01 17:40:47 - macOS - PF rules updated, reloading

! 2018.02.01 17:40:47 - Disconnecting

. 2018.02.01 17:40:47 - Routes, removed a route previously added, 71.19.251.248 for gateway 10.4.0.1

. 2018.02.01 17:40:47 - Sending management termination signal

. 2018.02.01 17:40:47 - Management - Send 'signal SIGTERM'

. 2018.02.01 17:40:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 71.19.251.247 192.168.1.254 255.255.255.255

. 2018.02.01 17:40:47 - OpenVPN > delete net 71.19.251.247: gateway 192.168.1.254

. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:40:47 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:40:47 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:40:47 - OpenVPN > Closing TUN/TAP interface

. 2018.02.01 17:40:47 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.02.01 17:40:48 - Connection terminated.

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (SAMSUNG Modem)

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (Ethernet)

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (FireWire)

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (Wi-Fi)

. 2018.02.01 17:40:48 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)

. 2018.02.01 17:40:48 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

I 2018.02.01 17:40:57 - Checking authorization ...

. 2018.02.01 17:40:57 - IPv6 disabled on network adapter (SAMSUNG Modem)

. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (Ethernet)

. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (FireWire)

. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (Wi-Fi)

! 2018.02.01 17:40:58 - Connecting to Gemma (Canada, Vancouver)

. 2018.02.01 17:40:58 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.02.01 17:40:58 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.02.01 17:40:58 - Connection to OpenVPN Management Interface

. 2018.02.01 17:40:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.02.01 17:40:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:40:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:40:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.113:443

. 2018.02.01 17:40:58 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.02.01 17:40:58 - OpenVPN > UDP link local: (not bound)

. 2018.02.01 17:40:58 - OpenVPN > UDP link remote: [AF_INET]71.19.252.113:443

. 2018.02.01 17:40:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.02.01 17:40:58 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=1e4979b3 32cd1b5e

. 2018.02.01 17:40:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.02.01 17:40:58 - OpenVPN > VERIFY KU OK

. 2018.02.01 17:40:58 - OpenVPN > Validating certificate extended key usage

. 2018.02.01 17:40:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.02.01 17:40:58 - OpenVPN > VERIFY EKU OK

. 2018.02.01 17:40:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.02.01 17:40:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.02.01 17:40:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443

. 2018.02.01 17:41:00 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.02.01 17:41:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.5.71 255.255.0.0'

. 2018.02.01 17:41:00 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.02.01 17:41:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:41:00 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:41:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:41:00 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:41:00 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2018.02.01 17:41:00 - OpenVPN > Opened utun device utun0

. 2018.02.01 17:41:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.02.01 17:41:00 - OpenVPN > /sbin/ifconfig utun0 delete

. 2018.02.01 17:41:00 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.02.01 17:41:00 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.02.01 17:41:00 - OpenVPN > /sbin/ifconfig utun0 10.4.5.71 10.4.5.71 netmask 255.255.0.0 mtu 1500 up

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.5.71 255.255.0.0

. 2018.02.01 17:41:00 - OpenVPN > add net 10.4.0.0: gateway 10.4.5.71

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 71.19.252.113 192.168.1.254 255.255.255.255

. 2018.02.01 17:41:00 - OpenVPN > add net 71.19.252.113: gateway 192.168.1.254

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:41:00 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:41:00 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:41:00 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2018.02.01 17:41:00 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.02.01 17:41:01 - Routes, added a new route, 71.19.252.114 for gateway 10.4.0.1

. 2018.02.01 17:41:01 - Flushing DNS

. 2018.02.01 17:41:01 - macOS - PF rules updated, reloading

I 2018.02.01 17:41:01 - Checking route IPv4

I 2018.02.01 17:41:05 - Checking DNS

! 2018.02.01 17:41:06 - Connected.

. 2018.02.01 17:41:06 - OpenVPN > Initialization Sequence Completed

. 2018.02.01 17:42:37 - Updating systems & servers data ...

. 2018.02.01 17:42:42 - Systems & servers data update completed

. 2018.02.01 17:53:38 - Updating systems & servers data ...

. 2018.02.01 17:53:46 - Systems & servers data update completed

 System log:
Eddie System/Environment Report - 2/2/2018 1:54 AM UTC

 

Eddie version: 2.14.0

Eddie OS build: macos_x64

Eddie architecture: x64

OS type: MacOS

OS name: 10.11.6

OS version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Tue Jan  9 20:12:05 PST 2018; root:xnu-3248.73.5~1/RELEASE_X86_64 x86_64

OS architecture: x64

Mono /.Net Framework: v4.0.30319

OpenVPN driver: Expected

OpenVPN: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

SSH: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)

SSL: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)

curl: 7.43.0 (/usr/bin/curl)

Profile path: /Users/madrat/.airvpn/AirVPN.xml

Data path: /Users/madrat/.airvpn

Application path: /Applications/Eddie.app/Contents/MacOS

Executable path: /Applications/Eddie.app/Contents/MacOS/Eddie

Command line arguments: (0 args)

Network Lock Active: Yes, macOS - PF

Connected to VPN: Yes, Gemma

Detected DNS: 10.4.0.1

Test DNS IPv4: Ok

Test DNS IPv6: Ok

Test Ping IPv4: 130 ms

Test Ping IPv6: -1 ms

Test HTTP IPv4: Ok

Test HTTP IPv6: Error:curl: (7) Couldn't connect to server

Test HTTPS: Ok

----------------------------

Important options not at defaults:

 

login: (omissis)

password: (omissis)

remember: True

connect: True

netlock: True

 

----------------------------

Logs:

 

. 2018.02.01 17:21:22 - Eddie version: 2.14.0 / macos_x64, System: MacOS, Name: 10.11.6, Version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Tue Jan  9 20:12:05 PST 2018; root:xnu-3248.73.5~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319

. 2018.02.01 17:21:23 - Reading options from /Users/madrat/.airvpn/AirVPN.xml

. 2018.02.01 17:21:29 - Command line arguments (0):

. 2018.02.01 17:21:36 - OpenVPN Driver - Expected

. 2018.02.01 17:21:36 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

. 2018.02.01 17:21:36 - SSH - Version: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)

. 2018.02.01 17:21:36 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)

. 2018.02.01 17:21:36 - curl - Version: 7.43.0 (/usr/bin/curl)

. 2018.02.01 17:21:36 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem

! 2018.02.01 17:21:36 - Activation of Network Lock - macOS - PF

. 2018.02.01 17:21:36 - macOS - PF rules updated, reloading

. 2018.02.01 17:21:37 - Updating systems & servers data ...

. 2018.02.01 17:21:37 - macOS - PF rules updated, reloading

I 2018.02.01 17:21:37 - Session starting.

. 2018.02.01 17:21:38 - Systems & servers data update completed

I 2018.02.01 17:21:49 - Checking authorization ...

. 2018.02.01 17:21:49 - IPv6 disabled on network adapter (SAMSUNG Modem)

. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (Ethernet)

. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (FireWire)

. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (Wi-Fi)

! 2018.02.01 17:21:50 - Connecting to Mimosa (Canada, Vancouver)

. 2018.02.01 17:21:50 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.02.01 17:21:50 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.02.01 17:21:50 - Connection to OpenVPN Management Interface

. 2018.02.01 17:21:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.02.01 17:21:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.251.247:443

. 2018.02.01 17:21:50 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.02.01 17:21:50 - OpenVPN > UDP link local: (not bound)

. 2018.02.01 17:21:50 - OpenVPN > UDP link remote: [AF_INET]71.19.251.247:443

. 2018.02.01 17:21:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.02.01 17:21:50 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.251.247:443, sid=599a00fc 7bacc66c

. 2018.02.01 17:21:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.02.01 17:21:50 - OpenVPN > VERIFY KU OK

. 2018.02.01 17:21:50 - OpenVPN > Validating certificate extended key usage

. 2018.02.01 17:21:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.02.01 17:21:51 - OpenVPN > VERIFY EKU OK

. 2018.02.01 17:21:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.02.01 17:21:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.02.01 17:21:51 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.251.247:443

. 2018.02.01 17:21:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.02.01 17:21:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.167 255.255.0.0'

. 2018.02.01 17:21:52 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.02.01 17:21:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:21:52 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:21:52 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:52 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2018.02.01 17:21:52 - OpenVPN > Opened utun device utun0

. 2018.02.01 17:21:52 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.02.01 17:21:52 - OpenVPN > /sbin/ifconfig utun0 delete

. 2018.02.01 17:21:52 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.02.01 17:21:52 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.02.01 17:21:52 - OpenVPN > /sbin/ifconfig utun0 10.4.0.167 10.4.0.167 netmask 255.255.0.0 mtu 1500 up

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.167 255.255.0.0

. 2018.02.01 17:21:52 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.167

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 71.19.251.247 192.168.1.254 255.255.255.255

. 2018.02.01 17:21:52 - OpenVPN > add net 71.19.251.247: gateway 192.168.1.254

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:21:52 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:21:52 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:21:53 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2018.02.01 17:21:53 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.02.01 17:21:53 - Routes, added a new route, 71.19.251.248 for gateway 10.4.0.1

. 2018.02.01 17:21:53 - Flushing DNS

. 2018.02.01 17:21:53 - macOS - PF rules updated, reloading

I 2018.02.01 17:21:54 - Checking route IPv4

I 2018.02.01 17:21:55 - Checking DNS

! 2018.02.01 17:22:01 - Connected.

. 2018.02.01 17:22:01 - OpenVPN > Initialization Sequence Completed

. 2018.02.01 17:32:02 - Updating systems & servers data ...

. 2018.02.01 17:32:05 - Systems & servers data update completed

. 2018.02.01 17:40:47 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.02.01 17:40:47 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.02.01 17:40:47 - OpenVPN > Restart pause, 5 second(s)

. 2018.02.01 17:40:47 - macOS - PF rules updated, reloading

! 2018.02.01 17:40:47 - Disconnecting

. 2018.02.01 17:40:47 - Routes, removed a route previously added, 71.19.251.248 for gateway 10.4.0.1

. 2018.02.01 17:40:47 - Sending management termination signal

. 2018.02.01 17:40:47 - Management - Send 'signal SIGTERM'

. 2018.02.01 17:40:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 71.19.251.247 192.168.1.254 255.255.255.255

. 2018.02.01 17:40:47 - OpenVPN > delete net 71.19.251.247: gateway 192.168.1.254

. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:40:47 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:40:47 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:40:47 - OpenVPN > Closing TUN/TAP interface

. 2018.02.01 17:40:47 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.02.01 17:40:48 - Connection terminated.

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (SAMSUNG Modem)

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (Ethernet)

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (FireWire)

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (Wi-Fi)

. 2018.02.01 17:40:48 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)

. 2018.02.01 17:40:48 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

I 2018.02.01 17:40:57 - Checking authorization ...

. 2018.02.01 17:40:57 - IPv6 disabled on network adapter (SAMSUNG Modem)

. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (Ethernet)

. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (FireWire)

. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (Wi-Fi)

! 2018.02.01 17:40:58 - Connecting to Gemma (Canada, Vancouver)

. 2018.02.01 17:40:58 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.02.01 17:40:58 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.02.01 17:40:58 - Connection to OpenVPN Management Interface

. 2018.02.01 17:40:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.02.01 17:40:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:40:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:40:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.113:443

. 2018.02.01 17:40:58 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.02.01 17:40:58 - OpenVPN > UDP link local: (not bound)

. 2018.02.01 17:40:58 - OpenVPN > UDP link remote: [AF_INET]71.19.252.113:443

. 2018.02.01 17:40:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.02.01 17:40:58 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=1e4979b3 32cd1b5e

. 2018.02.01 17:40:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.02.01 17:40:58 - OpenVPN > VERIFY KU OK

. 2018.02.01 17:40:58 - OpenVPN > Validating certificate extended key usage

. 2018.02.01 17:40:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.02.01 17:40:58 - OpenVPN > VERIFY EKU OK

. 2018.02.01 17:40:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.02.01 17:40:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.02.01 17:40:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443

. 2018.02.01 17:41:00 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.02.01 17:41:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.5.71 255.255.0.0'

. 2018.02.01 17:41:00 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.02.01 17:41:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:41:00 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:41:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:41:00 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:41:00 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2018.02.01 17:41:00 - OpenVPN > Opened utun device utun0

. 2018.02.01 17:41:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.02.01 17:41:00 - OpenVPN > /sbin/ifconfig utun0 delete

. 2018.02.01 17:41:00 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.02.01 17:41:00 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.02.01 17:41:00 - OpenVPN > /sbin/ifconfig utun0 10.4.5.71 10.4.5.71 netmask 255.255.0.0 mtu 1500 up

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.5.71 255.255.0.0

. 2018.02.01 17:41:00 - OpenVPN > add net 10.4.0.0: gateway 10.4.5.71

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 71.19.252.113 192.168.1.254 255.255.255.255

. 2018.02.01 17:41:00 - OpenVPN > add net 71.19.252.113: gateway 192.168.1.254

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:41:00 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:41:00 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:41:00 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2018.02.01 17:41:00 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.02.01 17:41:01 - Routes, added a new route, 71.19.252.114 for gateway 10.4.0.1

. 2018.02.01 17:41:01 - Flushing DNS

. 2018.02.01 17:41:01 - macOS - PF rules updated, reloading

I 2018.02.01 17:41:01 - Checking route IPv4

I 2018.02.01 17:41:05 - Checking DNS

! 2018.02.01 17:41:06 - Connected.

. 2018.02.01 17:41:06 - OpenVPN > Initialization Sequence Completed

. 2018.02.01 17:42:37 - Updating systems & servers data ...

. 2018.02.01 17:42:42 - Systems & servers data update completed

. 2018.02.01 17:53:38 - Updating systems & servers data ...

. 2018.02.01 17:53:46 - Systems & servers data update completed

 

----------------------------

Network Interfaces and Routes:

 

{

    "support_ipv4": true,

    "support_ipv6": true,

    "routes": [

        {

            "address": "0.0.0.0\/1",

            "gateway": "10.4.0.1",

            "flags": "UGSc",

            "refs": "94",

            "use": "1",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "0.0.0.0\/0",

            "gateway": "192.168.1.254",

            "flags": "UGSc",

            "refs": "1",

            "use": "432",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "10.0.0.4\/16",

            "gateway": "10.4.5.71",

            "flags": "UGSc",

            "refs": "7",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "10.4.5.71",

            "gateway": "10.4.5.71",

            "flags": "UH",

            "refs": "2",

            "use": "5",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "71.19.252.113",

            "gateway": "192.168.1.254",

            "flags": "UGSc",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "71.19.252.114",

            "gateway": "10.4.0.1",

            "flags": "UGHS",

            "refs": "0",

            "use": "34",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "0.0.0.127",

            "gateway": "127.0.0.1",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "127.0.0.1",

            "gateway": "127.0.0.1",

            "flags": "UH",

            "refs": "5",

            "use": "7322",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "128.0.0.0\/1",

            "gateway": "10.4.0.1",

            "flags": "UGSc",

            "refs": "23",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "169.0.0.254",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.0.1",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "2",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.1.65",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.1.65",

            "gateway": "0:23:df:8c:a0:ae",

            "flags": "UHLWI",

            "refs": "0",

            "use": "7",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "192.168.1.67",

            "gateway": "e4:ce:8f:33:33:72",

            "flags": "UHLWI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0",

            "expire": "214"

        },

        {

            "address": "192.168.1.254",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.1.254",

            "gateway": "1c:af:f7:d9:72:db",

            "flags": "UHLWIir",

            "refs": "5",

            "use": "263",

            "mtu": "1500",

            "interface": "en0",

            "expire": "1192"

        },

        {

            "address": "192.168.1.255",

            "gateway": "ff:ff:ff:ff:ff:ff",

            "flags": "UHLWbI",

            "refs": "0",

            "use": "25",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "224.0.0.0",

            "gateway": "link#4",

            "flags": "UmCS",

            "refs": "2",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "224.0.0.1",

            "gateway": "1:0:5e:0:0:1",

            "flags": "UHmLWI",

            "refs": "0",

            "use": "285",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "224.0.0.251",

            "gateway": "1:0:5e:0:0:fb",

            "flags": "UHmLWI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "255.255.255.255",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "::1",

            "gateway": "::1",

            "flags": "UHL",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::",

            "gateway": "fe80::1%lo0",

            "flags": "UcI",

            "refs": "1",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::1",

            "gateway": "link#1",

            "flags": "UHLI",

            "refs": "1",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "ff01::",

            "gateway": "::1",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "ff02::",

            "gateway": "::1",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        }

    ],

    "interfaces": [

        {

            "friendly": "lo0",

            "id": "lo0",

            "name": "lo0",

            "description": "lo0",

            "type": "Loopback",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [

                "::1",

                "127.0.0.1",

                "fe80::1"

            ],

            "gateways": [

                "127.0.0.1",

                "::1",

                "fe80::1"

            ],

            "bind": true

        },

        {

            "friendly": "gif0",

            "id": "gif0",

            "name": "gif0",

            "description": "gif0",

            "type": "Unknown",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "stf0",

            "id": "stf0",

            "name": "stf0",

            "description": "stf0",

            "type": "Unknown",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "Ethernet",

            "id": "en0",

            "name": "en0",

            "description": "en0",

            "type": "Ethernet",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [

                "192.168.1.65"

            ],

            "gateways": [

                "192.168.1.254"

            ],

            "bind": true

        },

        {

            "friendly": "Wi-Fi",

            "id": "en1",

            "name": "en1",

            "description": "en1",

            "type": "Ethernet",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "FireWire",

            "id": "fw0",

            "name": "fw0",

            "description": "fw0",

            "type": "Unknown",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "p2p0",

            "id": "p2p0",

            "name": "p2p0",

            "description": "p2p0",

            "type": "Ethernet",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "utun0",

            "id": "utun0",

            "name": "utun0",

            "description": "utun0",

            "type": "Unknown",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [

                "10.4.5.71"

            ],

            "gateways": [

                "10.4.0.1",

                "10.4.5.71"

            ],

            "bind": true

        }

    ],

    "ipv4-default-gateway": "192.168.1.254",

    "ipv4-default-interface": "en0"

}

----------------------------

ifconfig:

 

lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384

    options=3<RXCSUM,TXCSUM>

    inet6 ::1 prefixlen 128

    inet 127.0.0.1 netmask 0xff000000

    inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1

    nd6 options=1<PERFORMNUD>

gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280

stf0: flags=0<> mtu 1280

en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500

    options=27<RXCSUM,TXCSUM,VLAN_MTU,TSO4>

    ether 00:23:df:8c:a0:ae

    inet 192.168.1.65 netmask 0xffffff00 broadcast 192.168.1.255

    nd6 options=1<PERFORMNUD>

    media: autoselect (100baseTX <full-duplex,flow-control>)

    status: active

en1: flags=8823<UP,BROADCAST,SMART,SIMPLEX,MULTICAST> mtu 1500

    ether 00:1f:f3:bd:82:25

    nd6 options=1<PERFORMNUD>

    media: autoselect (<unknown type>)

    status: inactive

fw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 4078

    lladdr 00:23:df:ff:fe:8c:a0:ae

    nd6 options=1<PERFORMNUD>

    media: autoselect <full-duplex>

    status: inactive

p2p0: flags=8802<BROADCAST,SIMPLEX,MULTICAST> mtu 2304

    ether 02:1f:f3:bd:82:25

    media: autoselect

    status: inactive

utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500

    inet 10.4.5.71 --> 10.4.5.71 netmask 0xffff0000

 Might this problem be caused by my laptop trying to connect to the same server that my iMac is already running?

Yes - unless they use different keys, you cannot connect two devices to the same server as it yields a DC/RC loop

Share this post


Link to post

 

 

So after finally getting 2.14 running on my iMac with El Capitan, I decided to install 2.14 on my Macbook Pro running Sierra. No problems. Eddie loaded and connected right away. However, (and I had this same problem with 2.13.6) right after Eddie loaded on my laptop, Eddie disconnected on my iMac and then reconnected. No idea why this happens. Here are the logs from my iMac:

. 2018.02.01 17:21:22 - Eddie version: 2.14.0 / macos_x64, System: MacOS, Name: 10.11.6, Version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Tue Jan  9 20:12:05 PST 2018; root:xnu-3248.73.5~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319

. 2018.02.01 17:21:23 - Reading options from /Users/madrat/.airvpn/AirVPN.xml

. 2018.02.01 17:21:29 - Command line arguments (0):

. 2018.02.01 17:21:36 - OpenVPN Driver - Expected

. 2018.02.01 17:21:36 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

. 2018.02.01 17:21:36 - SSH - Version: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)

. 2018.02.01 17:21:36 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)

. 2018.02.01 17:21:36 - curl - Version: 7.43.0 (/usr/bin/curl)

. 2018.02.01 17:21:36 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem

! 2018.02.01 17:21:36 - Activation of Network Lock - macOS - PF

. 2018.02.01 17:21:36 - macOS - PF rules updated, reloading

. 2018.02.01 17:21:37 - Updating systems & servers data ...

. 2018.02.01 17:21:37 - macOS - PF rules updated, reloading

I 2018.02.01 17:21:37 - Session starting.

. 2018.02.01 17:21:38 - Systems & servers data update completed

I 2018.02.01 17:21:49 - Checking authorization ...

. 2018.02.01 17:21:49 - IPv6 disabled on network adapter (SAMSUNG Modem)

. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (Ethernet)

. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (FireWire)

. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (Wi-Fi)

! 2018.02.01 17:21:50 - Connecting to Mimosa (Canada, Vancouver)

. 2018.02.01 17:21:50 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.02.01 17:21:50 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.02.01 17:21:50 - Connection to OpenVPN Management Interface

. 2018.02.01 17:21:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.02.01 17:21:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.251.247:443

. 2018.02.01 17:21:50 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.02.01 17:21:50 - OpenVPN > UDP link local: (not bound)

. 2018.02.01 17:21:50 - OpenVPN > UDP link remote: [AF_INET]71.19.251.247:443

. 2018.02.01 17:21:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.02.01 17:21:50 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.251.247:443, sid=599a00fc 7bacc66c

. 2018.02.01 17:21:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.02.01 17:21:50 - OpenVPN > VERIFY KU OK

. 2018.02.01 17:21:50 - OpenVPN > Validating certificate extended key usage

. 2018.02.01 17:21:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.02.01 17:21:51 - OpenVPN > VERIFY EKU OK

. 2018.02.01 17:21:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.02.01 17:21:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.02.01 17:21:51 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.251.247:443

. 2018.02.01 17:21:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.02.01 17:21:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.167 255.255.0.0'

. 2018.02.01 17:21:52 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.02.01 17:21:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:21:52 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:21:52 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:52 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2018.02.01 17:21:52 - OpenVPN > Opened utun device utun0

. 2018.02.01 17:21:52 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.02.01 17:21:52 - OpenVPN > /sbin/ifconfig utun0 delete

. 2018.02.01 17:21:52 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.02.01 17:21:52 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.02.01 17:21:52 - OpenVPN > /sbin/ifconfig utun0 10.4.0.167 10.4.0.167 netmask 255.255.0.0 mtu 1500 up

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.167 255.255.0.0

. 2018.02.01 17:21:52 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.167

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 71.19.251.247 192.168.1.254 255.255.255.255

. 2018.02.01 17:21:52 - OpenVPN > add net 71.19.251.247: gateway 192.168.1.254

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:21:52 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:21:52 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:21:53 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2018.02.01 17:21:53 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.02.01 17:21:53 - Routes, added a new route, 71.19.251.248 for gateway 10.4.0.1

. 2018.02.01 17:21:53 - Flushing DNS

. 2018.02.01 17:21:53 - macOS - PF rules updated, reloading

I 2018.02.01 17:21:54 - Checking route IPv4

I 2018.02.01 17:21:55 - Checking DNS

! 2018.02.01 17:22:01 - Connected.

. 2018.02.01 17:22:01 - OpenVPN > Initialization Sequence Completed

. 2018.02.01 17:32:02 - Updating systems & servers data ...

. 2018.02.01 17:32:05 - Systems & servers data update completed

. 2018.02.01 17:40:47 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.02.01 17:40:47 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.02.01 17:40:47 - OpenVPN > Restart pause, 5 second(s)

. 2018.02.01 17:40:47 - macOS - PF rules updated, reloading

! 2018.02.01 17:40:47 - Disconnecting

. 2018.02.01 17:40:47 - Routes, removed a route previously added, 71.19.251.248 for gateway 10.4.0.1

. 2018.02.01 17:40:47 - Sending management termination signal

. 2018.02.01 17:40:47 - Management - Send 'signal SIGTERM'

. 2018.02.01 17:40:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 71.19.251.247 192.168.1.254 255.255.255.255

. 2018.02.01 17:40:47 - OpenVPN > delete net 71.19.251.247: gateway 192.168.1.254

. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:40:47 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:40:47 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:40:47 - OpenVPN > Closing TUN/TAP interface

. 2018.02.01 17:40:47 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.02.01 17:40:48 - Connection terminated.

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (SAMSUNG Modem)

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (Ethernet)

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (FireWire)

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (Wi-Fi)

. 2018.02.01 17:40:48 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)

. 2018.02.01 17:40:48 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

I 2018.02.01 17:40:57 - Checking authorization ...

. 2018.02.01 17:40:57 - IPv6 disabled on network adapter (SAMSUNG Modem)

. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (Ethernet)

. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (FireWire)

. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (Wi-Fi)

! 2018.02.01 17:40:58 - Connecting to Gemma (Canada, Vancouver)

. 2018.02.01 17:40:58 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.02.01 17:40:58 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.02.01 17:40:58 - Connection to OpenVPN Management Interface

. 2018.02.01 17:40:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.02.01 17:40:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:40:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:40:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.113:443

. 2018.02.01 17:40:58 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.02.01 17:40:58 - OpenVPN > UDP link local: (not bound)

. 2018.02.01 17:40:58 - OpenVPN > UDP link remote: [AF_INET]71.19.252.113:443

. 2018.02.01 17:40:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.02.01 17:40:58 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=1e4979b3 32cd1b5e

. 2018.02.01 17:40:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.02.01 17:40:58 - OpenVPN > VERIFY KU OK

. 2018.02.01 17:40:58 - OpenVPN > Validating certificate extended key usage

. 2018.02.01 17:40:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.02.01 17:40:58 - OpenVPN > VERIFY EKU OK

. 2018.02.01 17:40:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.02.01 17:40:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.02.01 17:40:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443

. 2018.02.01 17:41:00 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.02.01 17:41:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.5.71 255.255.0.0'

. 2018.02.01 17:41:00 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.02.01 17:41:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:41:00 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:41:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:41:00 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:41:00 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2018.02.01 17:41:00 - OpenVPN > Opened utun device utun0

. 2018.02.01 17:41:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.02.01 17:41:00 - OpenVPN > /sbin/ifconfig utun0 delete

. 2018.02.01 17:41:00 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.02.01 17:41:00 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.02.01 17:41:00 - OpenVPN > /sbin/ifconfig utun0 10.4.5.71 10.4.5.71 netmask 255.255.0.0 mtu 1500 up

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.5.71 255.255.0.0

. 2018.02.01 17:41:00 - OpenVPN > add net 10.4.0.0: gateway 10.4.5.71

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 71.19.252.113 192.168.1.254 255.255.255.255

. 2018.02.01 17:41:00 - OpenVPN > add net 71.19.252.113: gateway 192.168.1.254

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:41:00 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:41:00 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:41:00 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2018.02.01 17:41:00 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.02.01 17:41:01 - Routes, added a new route, 71.19.252.114 for gateway 10.4.0.1

. 2018.02.01 17:41:01 - Flushing DNS

. 2018.02.01 17:41:01 - macOS - PF rules updated, reloading

I 2018.02.01 17:41:01 - Checking route IPv4

I 2018.02.01 17:41:05 - Checking DNS

! 2018.02.01 17:41:06 - Connected.

. 2018.02.01 17:41:06 - OpenVPN > Initialization Sequence Completed

. 2018.02.01 17:42:37 - Updating systems & servers data ...

. 2018.02.01 17:42:42 - Systems & servers data update completed

. 2018.02.01 17:53:38 - Updating systems & servers data ...

. 2018.02.01 17:53:46 - Systems & servers data update completed

 System log:
Eddie System/Environment Report - 2/2/2018 1:54 AM UTC

 

Eddie version: 2.14.0

Eddie OS build: macos_x64

Eddie architecture: x64

OS type: MacOS

OS name: 10.11.6

OS version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Tue Jan  9 20:12:05 PST 2018; root:xnu-3248.73.5~1/RELEASE_X86_64 x86_64

OS architecture: x64

Mono /.Net Framework: v4.0.30319

OpenVPN driver: Expected

OpenVPN: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

SSH: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)

SSL: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)

curl: 7.43.0 (/usr/bin/curl)

Profile path: /Users/madrat/.airvpn/AirVPN.xml

Data path: /Users/madrat/.airvpn

Application path: /Applications/Eddie.app/Contents/MacOS

Executable path: /Applications/Eddie.app/Contents/MacOS/Eddie

Command line arguments: (0 args)

Network Lock Active: Yes, macOS - PF

Connected to VPN: Yes, Gemma

Detected DNS: 10.4.0.1

Test DNS IPv4: Ok

Test DNS IPv6: Ok

Test Ping IPv4: 130 ms

Test Ping IPv6: -1 ms

Test HTTP IPv4: Ok

Test HTTP IPv6: Error:curl: (7) Couldn't connect to server

Test HTTPS: Ok

----------------------------

Important options not at defaults:

 

login: (omissis)

password: (omissis)

remember: True

connect: True

netlock: True

 

----------------------------

Logs:

 

. 2018.02.01 17:21:22 - Eddie version: 2.14.0 / macos_x64, System: MacOS, Name: 10.11.6, Version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Tue Jan  9 20:12:05 PST 2018; root:xnu-3248.73.5~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319

. 2018.02.01 17:21:23 - Reading options from /Users/madrat/.airvpn/AirVPN.xml

. 2018.02.01 17:21:29 - Command line arguments (0):

. 2018.02.01 17:21:36 - OpenVPN Driver - Expected

. 2018.02.01 17:21:36 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

. 2018.02.01 17:21:36 - SSH - Version: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)

. 2018.02.01 17:21:36 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)

. 2018.02.01 17:21:36 - curl - Version: 7.43.0 (/usr/bin/curl)

. 2018.02.01 17:21:36 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem

! 2018.02.01 17:21:36 - Activation of Network Lock - macOS - PF

. 2018.02.01 17:21:36 - macOS - PF rules updated, reloading

. 2018.02.01 17:21:37 - Updating systems & servers data ...

. 2018.02.01 17:21:37 - macOS - PF rules updated, reloading

I 2018.02.01 17:21:37 - Session starting.

. 2018.02.01 17:21:38 - Systems & servers data update completed

I 2018.02.01 17:21:49 - Checking authorization ...

. 2018.02.01 17:21:49 - IPv6 disabled on network adapter (SAMSUNG Modem)

. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (Ethernet)

. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (FireWire)

. 2018.02.01 17:21:50 - IPv6 disabled on network adapter (Wi-Fi)

! 2018.02.01 17:21:50 - Connecting to Mimosa (Canada, Vancouver)

. 2018.02.01 17:21:50 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.02.01 17:21:50 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.02.01 17:21:50 - Connection to OpenVPN Management Interface

. 2018.02.01 17:21:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.02.01 17:21:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:50 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.251.247:443

. 2018.02.01 17:21:50 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.02.01 17:21:50 - OpenVPN > UDP link local: (not bound)

. 2018.02.01 17:21:50 - OpenVPN > UDP link remote: [AF_INET]71.19.251.247:443

. 2018.02.01 17:21:50 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.02.01 17:21:50 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.251.247:443, sid=599a00fc 7bacc66c

. 2018.02.01 17:21:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.02.01 17:21:50 - OpenVPN > VERIFY KU OK

. 2018.02.01 17:21:50 - OpenVPN > Validating certificate extended key usage

. 2018.02.01 17:21:51 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.02.01 17:21:51 - OpenVPN > VERIFY EKU OK

. 2018.02.01 17:21:51 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.02.01 17:21:51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.02.01 17:21:51 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.251.247:443

. 2018.02.01 17:21:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.02.01 17:21:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.167 255.255.0.0'

. 2018.02.01 17:21:52 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.02.01 17:21:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.02.01 17:21:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:21:52 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:21:52 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:21:52 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2018.02.01 17:21:52 - OpenVPN > Opened utun device utun0

. 2018.02.01 17:21:52 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.02.01 17:21:52 - OpenVPN > /sbin/ifconfig utun0 delete

. 2018.02.01 17:21:52 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.02.01 17:21:52 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.02.01 17:21:52 - OpenVPN > /sbin/ifconfig utun0 10.4.0.167 10.4.0.167 netmask 255.255.0.0 mtu 1500 up

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.167 255.255.0.0

. 2018.02.01 17:21:52 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.167

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 71.19.251.247 192.168.1.254 255.255.255.255

. 2018.02.01 17:21:52 - OpenVPN > add net 71.19.251.247: gateway 192.168.1.254

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:21:52 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:21:52 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:21:52 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:21:53 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2018.02.01 17:21:53 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.02.01 17:21:53 - Routes, added a new route, 71.19.251.248 for gateway 10.4.0.1

. 2018.02.01 17:21:53 - Flushing DNS

. 2018.02.01 17:21:53 - macOS - PF rules updated, reloading

I 2018.02.01 17:21:54 - Checking route IPv4

I 2018.02.01 17:21:55 - Checking DNS

! 2018.02.01 17:22:01 - Connected.

. 2018.02.01 17:22:01 - OpenVPN > Initialization Sequence Completed

. 2018.02.01 17:32:02 - Updating systems & servers data ...

. 2018.02.01 17:32:05 - Systems & servers data update completed

. 2018.02.01 17:40:47 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2018.02.01 17:40:47 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2018.02.01 17:40:47 - OpenVPN > Restart pause, 5 second(s)

. 2018.02.01 17:40:47 - macOS - PF rules updated, reloading

! 2018.02.01 17:40:47 - Disconnecting

. 2018.02.01 17:40:47 - Routes, removed a route previously added, 71.19.251.248 for gateway 10.4.0.1

. 2018.02.01 17:40:47 - Sending management termination signal

. 2018.02.01 17:40:47 - Management - Send 'signal SIGTERM'

. 2018.02.01 17:40:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 71.19.251.247 192.168.1.254 255.255.255.255

. 2018.02.01 17:40:47 - OpenVPN > delete net 71.19.251.247: gateway 192.168.1.254

. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:40:47 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:40:47 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:40:47 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:40:47 - OpenVPN > Closing TUN/TAP interface

. 2018.02.01 17:40:47 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting

. 2018.02.01 17:40:48 - Connection terminated.

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (SAMSUNG Modem)

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (Ethernet)

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (FireWire)

. 2018.02.01 17:40:48 - IPv6 restored on network adapter (Wi-Fi)

. 2018.02.01 17:40:48 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)

. 2018.02.01 17:40:48 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

I 2018.02.01 17:40:57 - Checking authorization ...

. 2018.02.01 17:40:57 - IPv6 disabled on network adapter (SAMSUNG Modem)

. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (Ethernet)

. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (FireWire)

. 2018.02.01 17:40:58 - IPv6 disabled on network adapter (Wi-Fi)

! 2018.02.01 17:40:58 - Connecting to Gemma (Canada, Vancouver)

. 2018.02.01 17:40:58 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017

. 2018.02.01 17:40:58 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2018.02.01 17:40:58 - Connection to OpenVPN Management Interface

. 2018.02.01 17:40:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2018.02.01 17:40:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:40:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:40:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.113:443

. 2018.02.01 17:40:58 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2018.02.01 17:40:58 - OpenVPN > UDP link local: (not bound)

. 2018.02.01 17:40:58 - OpenVPN > UDP link remote: [AF_INET]71.19.252.113:443

. 2018.02.01 17:40:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2018.02.01 17:40:58 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=1e4979b3 32cd1b5e

. 2018.02.01 17:40:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2018.02.01 17:40:58 - OpenVPN > VERIFY KU OK

. 2018.02.01 17:40:58 - OpenVPN > Validating certificate extended key usage

. 2018.02.01 17:40:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2018.02.01 17:40:58 - OpenVPN > VERIFY EKU OK

. 2018.02.01 17:40:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2018.02.01 17:40:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2018.02.01 17:40:59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443

. 2018.02.01 17:41:00 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2018.02.01 17:41:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.5.71 255.255.0.0'

. 2018.02.01 17:41:00 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2018.02.01 17:41:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2018.02.01 17:41:00 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:41:00 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:41:00 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2018.02.01 17:41:00 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2018.02.01 17:41:00 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2018.02.01 17:41:00 - OpenVPN > Opened utun device utun0

. 2018.02.01 17:41:00 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2018.02.01 17:41:00 - OpenVPN > /sbin/ifconfig utun0 delete

. 2018.02.01 17:41:00 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2018.02.01 17:41:00 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2018.02.01 17:41:00 - OpenVPN > /sbin/ifconfig utun0 10.4.5.71 10.4.5.71 netmask 255.255.0.0 mtu 1500 up

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.5.71 255.255.0.0

. 2018.02.01 17:41:00 - OpenVPN > add net 10.4.0.0: gateway 10.4.5.71

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 71.19.252.113 192.168.1.254 255.255.255.255

. 2018.02.01 17:41:00 - OpenVPN > add net 71.19.252.113: gateway 192.168.1.254

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:41:00 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:41:00 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2018.02.01 17:41:00 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2018.02.01 17:41:00 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2018.02.01 17:41:00 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2018.02.01 17:41:01 - Routes, added a new route, 71.19.252.114 for gateway 10.4.0.1

. 2018.02.01 17:41:01 - Flushing DNS

. 2018.02.01 17:41:01 - macOS - PF rules updated, reloading

I 2018.02.01 17:41:01 - Checking route IPv4

I 2018.02.01 17:41:05 - Checking DNS

! 2018.02.01 17:41:06 - Connected.

. 2018.02.01 17:41:06 - OpenVPN > Initialization Sequence Completed

. 2018.02.01 17:42:37 - Updating systems & servers data ...

. 2018.02.01 17:42:42 - Systems & servers data update completed

. 2018.02.01 17:53:38 - Updating systems & servers data ...

. 2018.02.01 17:53:46 - Systems & servers data update completed

 

----------------------------

Network Interfaces and Routes:

 

{

    "support_ipv4": true,

    "support_ipv6": true,

    "routes": [

        {

            "address": "0.0.0.0\/1",

            "gateway": "10.4.0.1",

            "flags": "UGSc",

            "refs": "94",

            "use": "1",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "0.0.0.0\/0",

            "gateway": "192.168.1.254",

            "flags": "UGSc",

            "refs": "1",

            "use": "432",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "10.0.0.4\/16",

            "gateway": "10.4.5.71",

            "flags": "UGSc",

            "refs": "7",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "10.4.5.71",

            "gateway": "10.4.5.71",

            "flags": "UH",

            "refs": "2",

            "use": "5",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "71.19.252.113",

            "gateway": "192.168.1.254",

            "flags": "UGSc",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "71.19.252.114",

            "gateway": "10.4.0.1",

            "flags": "UGHS",

            "refs": "0",

            "use": "34",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "0.0.0.127",

            "gateway": "127.0.0.1",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "127.0.0.1",

            "gateway": "127.0.0.1",

            "flags": "UH",

            "refs": "5",

            "use": "7322",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "128.0.0.0\/1",

            "gateway": "10.4.0.1",

            "flags": "UGSc",

            "refs": "23",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "169.0.0.254",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.0.1",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "2",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.1.65",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.1.65",

            "gateway": "0:23:df:8c:a0:ae",

            "flags": "UHLWI",

            "refs": "0",

            "use": "7",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "192.168.1.67",

            "gateway": "e4:ce:8f:33:33:72",

            "flags": "UHLWI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0",

            "expire": "214"

        },

        {

            "address": "192.168.1.254",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.1.254",

            "gateway": "1c:af:f7:d9:72:db",

            "flags": "UHLWIir",

            "refs": "5",

            "use": "263",

            "mtu": "1500",

            "interface": "en0",

            "expire": "1192"

        },

        {

            "address": "192.168.1.255",

            "gateway": "ff:ff:ff:ff:ff:ff",

            "flags": "UHLWbI",

            "refs": "0",

            "use": "25",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "224.0.0.0",

            "gateway": "link#4",

            "flags": "UmCS",

            "refs": "2",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "224.0.0.1",

            "gateway": "1:0:5e:0:0:1",

            "flags": "UHmLWI",

            "refs": "0",

            "use": "285",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "224.0.0.251",

            "gateway": "1:0:5e:0:0:fb",

            "flags": "UHmLWI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "255.255.255.255",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "::1",

            "gateway": "::1",

            "flags": "UHL",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::",

            "gateway": "fe80::1%lo0",

            "flags": "UcI",

            "refs": "1",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::1",

            "gateway": "link#1",

            "flags": "UHLI",

            "refs": "1",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "ff01::",

            "gateway": "::1",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "ff02::",

            "gateway": "::1",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        }

    ],

    "interfaces": [

        {

            "friendly": "lo0",

            "id": "lo0",

            "name": "lo0",

            "description": "lo0",

            "type": "Loopback",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [

                "::1",

                "127.0.0.1",

                "fe80::1"

            ],

            "gateways": [

                "127.0.0.1",

                "::1",

                "fe80::1"

            ],

            "bind": true

        },

        {

            "friendly": "gif0",

            "id": "gif0",

            "name": "gif0",

            "description": "gif0",

            "type": "Unknown",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "stf0",

            "id": "stf0",

            "name": "stf0",

            "description": "stf0",

            "type": "Unknown",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "Ethernet",

            "id": "en0",

            "name": "en0",

            "description": "en0",

            "type": "Ethernet",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [

                "192.168.1.65"

            ],

            "gateways": [

                "192.168.1.254"

            ],

            "bind": true

        },

        {

            "friendly": "Wi-Fi",

            "id": "en1",

            "name": "en1",

            "description": "en1",

            "type": "Ethernet",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "FireWire",

            "id": "fw0",

            "name": "fw0",

            "description": "fw0",

            "type": "Unknown",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "p2p0",

            "id": "p2p0",

            "name": "p2p0",

            "description": "p2p0",

            "type": "Ethernet",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "utun0",

            "id": "utun0",

            "name": "utun0",

            "description": "utun0",

            "type": "Unknown",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [

                "10.4.5.71"

            ],

            "gateways": [

                "10.4.0.1",

                "10.4.5.71"

            ],

            "bind": true

        }

    ],

    "ipv4-default-gateway": "192.168.1.254",

    "ipv4-default-interface": "en0"

}

----------------------------

ifconfig:

 

lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384

    options=3<RXCSUM,TXCSUM>

    inet6 ::1 prefixlen 128

    inet 127.0.0.1 netmask 0xff000000

    inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1

    nd6 options=1<PERFORMNUD>

gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280

stf0: flags=0<> mtu 1280

en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500

    options=27<RXCSUM,TXCSUM,VLAN_MTU,TSO4>

    ether 00:23:df:8c:a0:ae

    inet 192.168.1.65 netmask 0xffffff00 broadcast 192.168.1.255

    nd6 options=1<PERFORMNUD>

    media: autoselect (100baseTX <full-duplex,flow-control>)

    status: active

en1: flags=8823<UP,BROADCAST,SMART,SIMPLEX,MULTICAST> mtu 1500

    ether 00:1f:f3:bd:82:25

    nd6 options=1<PERFORMNUD>

    media: autoselect (<unknown type>)

    status: inactive

fw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 4078

    lladdr 00:23:df:ff:fe:8c:a0:ae

    nd6 options=1<PERFORMNUD>

    media: autoselect <full-duplex>

    status: inactive

p2p0: flags=8802<BROADCAST,SIMPLEX,MULTICAST> mtu 2304

    ether 02:1f:f3:bd:82:25

    media: autoselect

    status: inactive

utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500

    inet 10.4.5.71 --> 10.4.5.71 netmask 0xffff0000

 Might this problem be caused by my laptop trying to connect to the same server that my iMac is already running?
Yes - unless they use different keys, you cannot connect two devices to the same server as it yields a DC/RC loop

 

Thank you so much. Had no idea I had to do this. Apparently, I missed that class and need to do some more homework!

Share this post


Link to post

Well, after using it for the last three days on my Mac (El Capitan 10.11.6) I can say that when it's up and running it works fine - no connection problems so far.

 

However, as I mentioned in a post above, if I try to quit Eddie my whole system freezes and I have to switch off the power to my Mac in order to restart. I tried to get round that by leaving the app running in the background after disconnecting from a server at the end of the night, which was my routine with previous versions of Eddie, but when I switched on my Mac the following morning, I found that Eddie was completely greyed out, including the quit command in the drop down menu.  

 

As no one else seems to have similar problems I can only assume it has something to do with the set-up of my Mac, although I've never had this problem with previous versions of Eddie. At this stage there seems no point in continuing to use it if I have these problems every time I stop using it for any length of time. I had hoped this new version would solve the problems that I had with 2.12 and 2.13, but although it solved those issues the new version has just brought more problems. I can't even submit any logs as the problems only seem to arise after I disconnect from a server.

 

I did notice that there seem to have been some changes in the preferences with this version, and I'm just wondering if perhaps something in there might be causing the problem.

 

As always, any suggestions would be appreciated. 

Share this post


Link to post
Guest

Well, after using it for the last three days on my Mac (El Capitan 10.11.6) I can say that when it's up and running it works fine - no connection problems so far.

 

However, as I mentioned in a post above, if I try to quit Eddie my whole system freezes and I have to switch off the power to my Mac in order to restart. I tried to get round that by leaving the app running in the background after disconnecting from a server at the end of the night, which was my routine with previous versions of Eddie, but when I switched on my Mac the following morning, I found that Eddie was completely greyed out, including the quit command in the drop down menu.  

 

As no one else seems to have similar problems I can only assume it has something to do with the set-up of my Mac, although I've never had this problem with previous versions of Eddie. At this stage there seems no point in continuing to use it if I have these problems every time I stop using it for any length of time. I had hoped this new version would solve the problems that I had with 2.12 and 2.13, but although it solved those issues the new version has just brought more problems. I can't even submit any logs as the problems only seem to arise after I disconnect from a server.

 

I did notice that there seem to have been some changes in the preferences with this version, and I'm just wondering if perhaps something in there might be causing the problem.

 

As always, any suggestions would be appreciated. 

 

Honestly, the more data you can provide, the easier it will be to debug. If you can't do a screen recording due to the crashing, recording your screen with a cell phone (in decent quality) and uploading it to youtube clearly demonstrating the problem is likely to give the developers more of a clue. It's hard to work with just words alone

Share this post


Link to post
Guest
This topic is now closed to further replies.

×
×
  • Create New...