muser 0 Posted ... Hello,I am using macbook, have the latest Eddie installed. I have been using airvpn for 3 months now and never had any issue before. But recently I am having an issue for the past two days. Every time I connect, it stays connected for 1 hour and then resets. Now the problem has become worse where it stays connected for 3 to 5 minutes. Even as I am typing, it gets disconnected and re-connected. The protocols I have tried are TCP 443, Automatic,SSH 22,SSL 443. I am attaching the log. Please let me know what can be done? I have not changed my ISP for the last one year. All the devices are the same. . 2018.05.31 13:16:10 - SSH > debug1: Local forwarding listening on 127.0.0.1 port 5704.. 2018.05.31 13:16:10 - SSH > debug1: channel 1: new [port listener]. 2018.05.31 13:16:10 - SSH > debug1: Requesting no-more-sessions@openssh.com. 2018.05.31 13:16:10 - SSH > debug1: Entering interactive session.. 2018.05.31 13:16:10 - SSH > debug1: pledge: network. 2018.05.31 13:16:10 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017. 2018.05.31 13:16:10 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.31 13:16:10 - Connection to OpenVPN Management Interface. 2018.05.31 13:16:10 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.31 13:16:10 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:16:10 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:16:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:5704. 2018.05.31 13:16:10 - OpenVPN > Socket Buffers: R=[131072->262144] S=[131072->262144]. 2018.05.31 13:16:10 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:5704 [nonblock]. 2018.05.31 13:16:10 - SSH > debug1: Connection to port 5704 forwarding to 127.0.0.1 port 2018 requested.. 2018.05.31 13:16:10 - SSH > debug1: channel 2: new [direct-tcpip]. 2018.05.31 13:16:10 - SSH > debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0. 2018.05.31 13:16:10 - SSH > debug1: Remote: PTY allocation disabled.. 2018.05.31 13:16:10 - SSH > debug1: Remote: X11 forwarding disabled.. 2018.05.31 13:16:10 - SSH > debug1: Remote: Forced command.. 2018.05.31 13:16:10 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.31 13:16:11 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:5704. 2018.05.31 13:16:11 - OpenVPN > TCP_CLIENT link local: (not bound). 2018.05.31 13:16:11 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:5704. 2018.05.31 13:16:11 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:5704, sid=6d1d1ace d9c9ec42. 2018.05.31 13:16:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.31 13:16:12 - OpenVPN > VERIFY KU OK. 2018.05.31 13:16:12 - OpenVPN > Validating certificate extended key usage. 2018.05.31 13:16:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.31 13:16:12 - OpenVPN > VERIFY EKU OK. 2018.05.31 13:16:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.31 13:16:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.31 13:16:12 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:5704. 2018.05.31 13:16:13 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.31 13:16:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.125 255.255.0.0,peer-id 0,cipher AES-256-GCM'. 2018.05.31 13:16:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.31 13:16:13 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.31 13:16:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.31 13:16:13 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.31 13:16:13 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.31 13:16:13 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.31 13:16:13 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.05.31 13:16:13 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627. 2018.05.31 13:16:13 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.05.31 13:16:13 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.05.31 13:16:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.05.31 13:16:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.05.31 13:16:13 - OpenVPN > ROUTE_GATEWAY 172.20.110.1/255.255.252.0 IFACE=en0 HWADDR=9c:f3:87:a2:8f:08. 2018.05.31 13:16:13 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2018.05.31 13:16:13 - OpenVPN > Opened utun device utun1. 2018.05.31 13:16:13 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.31 13:16:13 - OpenVPN > /sbin/ifconfig utun1 delete. 2018.05.31 13:16:13 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2018.05.31 13:16:13 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2018.05.31 13:16:13 - OpenVPN > /sbin/ifconfig utun1 10.50.0.125 10.50.0.125 netmask 255.255.0.0 mtu 1500 up. 2018.05.31 13:16:13 - OpenVPN > /sbin/route add -net 10.50.0.0 10.50.0.125 255.255.0.0. 2018.05.31 13:16:13 - OpenVPN > add net 10.50.0.0: gateway 10.50.0.125. 2018.05.31 13:16:13 - OpenVPN > /sbin/route add -net 127.0.0.1 172.20.110.1 255.255.255.255. 2018.05.31 13:16:13 - OpenVPN > add net 127.0.0.1: gateway 172.20.110.1. 2018.05.31 13:16:13 - OpenVPN > /sbin/route add -net 0.0.0.0 10.50.0.1 128.0.0.0. 2018.05.31 13:16:13 - OpenVPN > add net 0.0.0.0: gateway 10.50.0.1. 2018.05.31 13:16:13 - OpenVPN > /sbin/route add -net 128.0.0.0 10.50.0.1 128.0.0.0. 2018.05.31 13:16:13 - OpenVPN > add net 128.0.0.0: gateway 10.50.0.1. 2018.05.31 13:16:13 - OpenVPN > /sbin/route add -net 46.21.154.84 172.20.110.1 255.255.255.255. 2018.05.31 13:16:13 - OpenVPN > add net 46.21.154.84: gateway 172.20.110.1. 2018.05.31 13:16:13 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.50.0.1). 2018.05.31 13:16:13 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.50.0.1). 2018.05.31 13:16:14 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.50.0.1). 2018.05.31 13:16:14 - Flushing DNS. 2018.05.31 13:16:14 - OS X - PF rules updated, reloadingI 2018.05.31 13:16:14 - Checking routeI 2018.05.31 13:16:15 - Checking DNS! 2018.05.31 13:16:16 - Connected.. 2018.05.31 13:16:16 - OpenVPN > Initialization Sequence Completed. 2018.05.31 13:18:26 - SSH > packet_write_wait: Connection to 46.21.154.84 port 22: Broken pipe. 2018.05.31 13:18:26 - OpenVPN > Connection reset, restarting [0]. 2018.05.31 13:18:26 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting. 2018.05.31 13:18:26 - OpenVPN > Restart pause, 5 second(s). 2018.05.31 13:18:26 - OS X - PF rules updated, reloading! 2018.05.31 13:18:27 - Disconnecting. 2018.05.31 13:18:27 - Sending management termination signal. 2018.05.31 13:18:27 - Management - Send 'signal SIGTERM'. 2018.05.31 13:18:27 - Connection terminated.. 2018.05.31 13:18:27 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic). 2018.05.31 13:18:27 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic). 2018.05.31 13:18:27 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)I 2018.05.31 13:18:38 - Checking authorization ...! 2018.05.31 13:18:39 - Connecting to Antlia (United States, Atlanta, Georgia). 2018.05.31 13:18:39 - SSL > 2018.05.31 13:18:39 LOG5[ui]: stunnel 5.40 on x86_64-apple-darwin16.3.0 platform. 2018.05.31 13:18:39 - SSL > 2018.05.31 13:18:39 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k 26 Jan 2017. 2018.05.31 13:18:39 - SSL > 2018.05.31 13:18:39 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2018.05.31 13:18:39 - SSL > 2018.05.31 13:18:39 LOG5[ui]: Reading configuration from file /Users/apple/.airvpn/99e954fe51e8576a9faa9253a2565aa55e181127d1e400309ed0335b8a819d27.tmp.ssl. 2018.05.31 13:18:39 - SSL > 2018.05.31 13:18:39 LOG5[ui]: UTF-8 byte order mark not detected. 2018.05.31 13:18:39 - SSL > 2018.05.31 13:18:39 LOG6[ui]: Initializing service [openvpn]. 2018.05.31 13:18:39 - SSL > 2018.05.31 13:18:39 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks. 2018.05.31 13:18:39 - SSL > 2018.05.31 13:18:39 LOG5[ui]: Configuration successful. 2018.05.31 13:18:39 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017. 2018.05.31 13:18:39 - SSL > 2018.05.31 13:18:39 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:55592. 2018.05.31 13:18:39 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.31 13:18:39 - Connection to OpenVPN Management Interface. 2018.05.31 13:18:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.31 13:18:39 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:18:39 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:18:39 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:29736. 2018.05.31 13:18:39 - OpenVPN > Socket Buffers: R=[131072->262144] S=[131072->262144]. 2018.05.31 13:18:39 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:29736 [nonblock]. 2018.05.31 13:18:39 - SSL > 2018.05.31 13:18:39 LOG6[0]: s_connect: connecting 108.177.134.108:443. 2018.05.31 13:18:39 - SSL > 2018.05.31 13:18:39 LOG5[0]: s_connect: connected 108.177.134.108:443. 2018.05.31 13:18:39 - SSL > 2018.05.31 13:18:39 LOG5[0]: Service [openvpn] connected remote server from 172.20.110.55:55593. 2018.05.31 13:18:39 - SSL > 2018.05.31 13:18:39 LOG6[0]: SNI: sending servername: 108.177.134.108. 2018.05.31 13:18:39 - SSL > 2018.05.31 13:18:39 LOG6[0]: Peer certificate not required. 2018.05.31 13:18:39 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.31 13:18:40 - SSL > 2018.05.31 13:18:40 LOG6[0]: Certificate verification disabled. 2018.05.31 13:18:40 - SSL > 2018.05.31 13:18:40 LOG6[0]: Client certificate not requested. 2018.05.31 13:18:40 - SSL > 2018.05.31 13:18:40 LOG6[0]: TLS connected: new session negotiated. 2018.05.31 13:18:40 - SSL > 2018.05.31 13:18:40 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption). 2018.05.31 13:18:40 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:29736. 2018.05.31 13:18:40 - OpenVPN > TCP_CLIENT link local: (not bound). 2018.05.31 13:18:40 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:29736. 2018.05.31 13:18:40 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:29736, sid=8f6982be e755fb85. 2018.05.31 13:18:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.31 13:18:41 - OpenVPN > VERIFY KU OK. 2018.05.31 13:18:41 - OpenVPN > Validating certificate extended key usage. 2018.05.31 13:18:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.31 13:18:41 - OpenVPN > VERIFY EKU OK. 2018.05.31 13:18:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Antlia, emailAddress=info@airvpn.org. 2018.05.31 13:18:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.31 13:18:42 - OpenVPN > [Antlia] Peer Connection Initiated with [AF_INET]127.0.0.1:29736. 2018.05.31 13:18:43 - OpenVPN > SENT CONTROL [Antlia]: 'PUSH_REQUEST' (status=1). 2018.05.31 13:18:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.73 255.255.0.0,peer-id 0,cipher AES-256-GCM'. 2018.05.31 13:18:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.31 13:18:43 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.31 13:18:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.31 13:18:43 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.31 13:18:43 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.31 13:18:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.31 13:18:43 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.05.31 13:18:43 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627. 2018.05.31 13:18:43 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.05.31 13:18:43 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.05.31 13:18:43 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.05.31 13:18:43 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.05.31 13:18:43 - OpenVPN > ROUTE_GATEWAY 172.20.110.1/255.255.252.0 IFACE=en0 HWADDR=9c:f3:87:a2:8f:08. 2018.05.31 13:18:43 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2018.05.31 13:18:43 - OpenVPN > Opened utun device utun1. 2018.05.31 13:18:43 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.31 13:18:43 - OpenVPN > /sbin/ifconfig utun1 delete. 2018.05.31 13:18:43 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2018.05.31 13:18:43 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2018.05.31 13:18:43 - OpenVPN > /sbin/ifconfig utun1 10.50.1.73 10.50.1.73 netmask 255.255.0.0 mtu 1500 up. 2018.05.31 13:18:43 - OpenVPN > /sbin/route add -net 10.50.0.0 10.50.1.73 255.255.0.0. 2018.05.31 13:18:43 - OpenVPN > add net 10.50.0.0: gateway 10.50.1.73. 2018.05.31 13:18:43 - OpenVPN > /sbin/route add -net 127.0.0.1 172.20.110.1 255.255.255.255. 2018.05.31 13:18:43 - OpenVPN > add net 127.0.0.1: gateway 172.20.110.1. 2018.05.31 13:18:43 - OpenVPN > /sbin/route add -net 0.0.0.0 10.50.0.1 128.0.0.0. 2018.05.31 13:18:43 - OpenVPN > add net 0.0.0.0: gateway 10.50.0.1. 2018.05.31 13:18:43 - OpenVPN > /sbin/route add -net 128.0.0.0 10.50.0.1 128.0.0.0. 2018.05.31 13:18:43 - OpenVPN > add net 128.0.0.0: gateway 10.50.0.1. 2018.05.31 13:18:43 - OpenVPN > /sbin/route add -net 108.177.134.108 172.20.110.1 255.255.255.255. 2018.05.31 13:18:43 - OpenVPN > add net 108.177.134.108: gateway 172.20.110.1. 2018.05.31 13:18:43 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.50.0.1). 2018.05.31 13:18:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.50.0.1). 2018.05.31 13:18:43 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.50.0.1). 2018.05.31 13:18:43 - Flushing DNS. 2018.05.31 13:18:44 - OS X - PF rules updated, reloadingI 2018.05.31 13:18:44 - Checking routeI 2018.05.31 13:18:45 - Checking DNS! 2018.05.31 13:18:46 - Connected.. 2018.05.31 13:18:46 - OpenVPN > Initialization Sequence Completed. 2018.05.31 13:19:39 - SSL > 2018.05.31 13:19:39 LOG6[cron]: Executing cron jobs. 2018.05.31 13:19:39 - SSL > 2018.05.31 13:19:39 LOG6[cron]: Cron jobs completed in 0 seconds. 2018.05.31 13:25:12 - OS X - PF rules updated, reloading! 2018.05.31 13:25:12 - Disconnecting. 2018.05.31 13:25:12 - Sending management termination signal. 2018.05.31 13:25:12 - Management - Send 'signal SIGTERM'. 2018.05.31 13:25:22 - Sending soft termination signal. 2018.05.31 13:25:22 - Connection terminated.. 2018.05.31 13:25:22 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic). 2018.05.31 13:25:22 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic). 2018.05.31 13:25:22 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)I 2018.05.31 13:25:22 - Checking authorization ...! 2018.05.31 13:25:23 - Connecting to Alkaid (United States, Chicago, Illinois). 2018.05.31 13:25:23 - SSL > 2018.05.31 13:25:23 LOG5[ui]: stunnel 5.40 on x86_64-apple-darwin16.3.0 platform. 2018.05.31 13:25:23 - SSL > 2018.05.31 13:25:23 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k 26 Jan 2017. 2018.05.31 13:25:23 - SSL > 2018.05.31 13:25:23 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2018.05.31 13:25:23 - SSL > 2018.05.31 13:25:23 LOG5[ui]: Reading configuration from file /Users/apple/.airvpn/ccfb468665071913fe01d04e534db0269204191248a6e84fd41d9341c5857559.tmp.ssl. 2018.05.31 13:25:23 - SSL > 2018.05.31 13:25:23 LOG5[ui]: UTF-8 byte order mark not detected. 2018.05.31 13:25:23 - SSL > 2018.05.31 13:25:23 LOG6[ui]: Initializing service [openvpn]. 2018.05.31 13:25:23 - SSL > 2018.05.31 13:25:23 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks. 2018.05.31 13:25:23 - SSL > 2018.05.31 13:25:23 LOG5[ui]: Configuration successful! 2018.05.31 13:25:23 - Disconnecting. 2018.05.31 13:25:23 - Sending soft termination signal. 2018.05.31 13:25:23 - Connection terminated.I 2018.05.31 13:25:26 - Checking authorization ...! 2018.05.31 13:25:27 - Connecting to Antlia (United States, Atlanta, Georgia). 2018.05.31 13:25:27 - SSL > 2018.05.31 13:25:27 LOG5[ui]: stunnel 5.40 on x86_64-apple-darwin16.3.0 platform. 2018.05.31 13:25:27 - SSL > 2018.05.31 13:25:27 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k 26 Jan 2017. 2018.05.31 13:25:27 - SSL > 2018.05.31 13:25:27 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2018.05.31 13:25:27 - SSL > 2018.05.31 13:25:27 LOG5[ui]: Reading configuration from file /Users/apple/.airvpn/7eba8d9049b5a0c71bf5cc14f607ba4e56254becdca0fbb1bc30cac30dafa61a.tmp.ssl. 2018.05.31 13:25:27 - SSL > 2018.05.31 13:25:27 LOG5[ui]: UTF-8 byte order mark not detected. 2018.05.31 13:25:27 - SSL > 2018.05.31 13:25:27 LOG6[ui]: Initializing service [openvpn]. 2018.05.31 13:25:27 - SSL > 2018.05.31 13:25:27 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks. 2018.05.31 13:25:27 - SSL > 2018.05.31 13:25:27 LOG5[ui]: Configuration successful! 2018.05.31 13:25:27 - Disconnecting. 2018.05.31 13:25:27 - Sending soft termination signal. 2018.05.31 13:25:27 - Connection terminated.I 2018.05.31 13:25:30 - Checking authorization ...! 2018.05.31 13:25:31 - Connecting to Acamar (United States, Miami). 2018.05.31 13:25:31 - SSL > 2018.05.31 13:25:31 LOG5[ui]: stunnel 5.40 on x86_64-apple-darwin16.3.0 platform. 2018.05.31 13:25:31 - SSL > 2018.05.31 13:25:31 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k 26 Jan 2017. 2018.05.31 13:25:31 - SSL > 2018.05.31 13:25:31 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2018.05.31 13:25:31 - SSL > 2018.05.31 13:25:31 LOG5[ui]: Reading configuration from file /Users/apple/.airvpn/430511648405498acfb6e1cf1439a3206c40cff34d82799f3f91a305ec1833d8.tmp.ssl. 2018.05.31 13:25:31 - SSL > 2018.05.31 13:25:31 LOG5[ui]: UTF-8 byte order mark not detected. 2018.05.31 13:25:31 - SSL > 2018.05.31 13:25:31 LOG6[ui]: Initializing service [openvpn]. 2018.05.31 13:25:31 - SSL > 2018.05.31 13:25:31 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks. 2018.05.31 13:25:31 - SSL > 2018.05.31 13:25:31 LOG5[ui]: Configuration successful. 2018.05.31 13:25:31 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017. 2018.05.31 13:25:31 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.31 13:25:31 - Connection to OpenVPN Management Interface. 2018.05.31 13:25:31 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.31 13:25:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:25:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:25:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:40659. 2018.05.31 13:25:31 - OpenVPN > Socket Buffers: R=[131072->262144] S=[131072->262144]. 2018.05.31 13:25:31 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:40659 [nonblock]. 2018.05.31 13:25:31 - SSL > 2018.05.31 13:25:31 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:55744. 2018.05.31 13:25:31 - SSL > 2018.05.31 13:25:31 LOG6[0]: s_connect: connecting 173.44.55.156:443. 2018.05.31 13:25:31 - SSL > 2018.05.31 13:25:31 LOG5[0]: s_connect: connected 173.44.55.156:443. 2018.05.31 13:25:31 - SSL > 2018.05.31 13:25:31 LOG5[0]: Service [openvpn] connected remote server from 172.20.110.55:55745. 2018.05.31 13:25:31 - SSL > 2018.05.31 13:25:31 LOG6[0]: SNI: sending servername: 173.44.55.156. 2018.05.31 13:25:31 - SSL > 2018.05.31 13:25:31 LOG6[0]: Peer certificate not required. 2018.05.31 13:25:31 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.31 13:25:31 - SSL > 2018.05.31 13:25:31 LOG6[0]: Certificate verification disabled. 2018.05.31 13:25:31 - SSL > 2018.05.31 13:25:31 LOG6[0]: Client certificate not requested. 2018.05.31 13:25:32 - SSL > 2018.05.31 13:25:31 LOG6[0]: TLS connected: new session negotiated. 2018.05.31 13:25:32 - SSL > 2018.05.31 13:25:31 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption). 2018.05.31 13:25:32 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:40659. 2018.05.31 13:25:32 - OpenVPN > TCP_CLIENT link local: (not bound). 2018.05.31 13:25:32 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:40659. 2018.05.31 13:25:32 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:40659, sid=5b54e8cd 35836df2. 2018.05.31 13:25:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.31 13:25:32 - OpenVPN > VERIFY KU OK. 2018.05.31 13:25:32 - OpenVPN > Validating certificate extended key usage. 2018.05.31 13:25:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.31 13:25:32 - OpenVPN > VERIFY EKU OK. 2018.05.31 13:25:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.31 13:25:33 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.31 13:25:33 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:40659. 2018.05.31 13:25:34 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.31 13:25:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.8.76 255.255.0.0'. 2018.05.31 13:25:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.31 13:25:34 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.31 13:25:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.31 13:25:34 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.31 13:25:34 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.31 13:25:34 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.31 13:25:34 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.31 13:25:34 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:25:34 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.31 13:25:34 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:25:34 - OpenVPN > ROUTE_GATEWAY 172.20.110.1/255.255.252.0 IFACE=en0 HWADDR=9c:f3:87:a2:8f:08. 2018.05.31 13:25:34 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2018.05.31 13:25:34 - OpenVPN > Opened utun device utun1. 2018.05.31 13:25:34 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.31 13:25:34 - OpenVPN > /sbin/ifconfig utun1 delete. 2018.05.31 13:25:34 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2018.05.31 13:25:34 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2018.05.31 13:25:34 - OpenVPN > /sbin/ifconfig utun1 10.50.8.76 10.50.8.76 netmask 255.255.0.0 mtu 1500 up. 2018.05.31 13:25:34 - OpenVPN > /sbin/route add -net 10.50.0.0 10.50.8.76 255.255.0.0. 2018.05.31 13:25:34 - OpenVPN > add net 10.50.0.0: gateway 10.50.8.76. 2018.05.31 13:25:34 - OpenVPN > /sbin/route add -net 127.0.0.1 172.20.110.1 255.255.255.255. 2018.05.31 13:25:34 - OpenVPN > add net 127.0.0.1: gateway 172.20.110.1. 2018.05.31 13:25:34 - OpenVPN > /sbin/route add -net 0.0.0.0 10.50.0.1 128.0.0.0. 2018.05.31 13:25:34 - OpenVPN > add net 0.0.0.0: gateway 10.50.0.1. 2018.05.31 13:25:34 - OpenVPN > /sbin/route add -net 128.0.0.0 10.50.0.1 128.0.0.0. 2018.05.31 13:25:34 - OpenVPN > add net 128.0.0.0: gateway 10.50.0.1. 2018.05.31 13:25:34 - OpenVPN > /sbin/route add -net 173.44.55.156 172.20.110.1 255.255.255.255. 2018.05.31 13:25:34 - OpenVPN > add net 173.44.55.156: gateway 172.20.110.1. 2018.05.31 13:25:34 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.50.0.1). 2018.05.31 13:25:34 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.50.0.1). 2018.05.31 13:25:35 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.50.0.1). 2018.05.31 13:25:35 - Flushing DNS. 2018.05.31 13:25:35 - OS X - PF rules updated, reloadingI 2018.05.31 13:25:35 - Checking routeI 2018.05.31 13:25:36 - Checking DNS! 2018.05.31 13:25:37 - Connected.. 2018.05.31 13:25:37 - OpenVPN > Initialization Sequence Completed. 2018.05.31 13:25:55 - OS X - PF rules updated, reloading! 2018.05.31 13:25:55 - Disconnecting. 2018.05.31 13:25:55 - Sending management termination signal. 2018.05.31 13:25:55 - Management - Send 'signal SIGTERM'. 2018.05.31 13:26:04 - Sending soft termination signal. 2018.05.31 13:26:04 - Connection terminated.. 2018.05.31 13:26:04 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic). 2018.05.31 13:26:04 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic). 2018.05.31 13:26:04 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)I 2018.05.31 13:26:04 - Checking authorization ...! 2018.05.31 13:26:05 - Connecting to Pegasus (United States, Dallas, Texas). 2018.05.31 13:26:06 - SSL > 2018.05.31 13:26:06 LOG5[ui]: stunnel 5.40 on x86_64-apple-darwin16.3.0 platform. 2018.05.31 13:26:06 - SSL > 2018.05.31 13:26:06 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k 26 Jan 2017. 2018.05.31 13:26:06 - SSL > 2018.05.31 13:26:06 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2018.05.31 13:26:06 - SSL > 2018.05.31 13:26:06 LOG5[ui]: Reading configuration from file /Users/apple/.airvpn/cc5eb16b738423061d8d030224e1c9a5c0415e98b9eeb7137afba45ee0856596.tmp.ssl. 2018.05.31 13:26:06 - SSL > 2018.05.31 13:26:06 LOG5[ui]: UTF-8 byte order mark not detected. 2018.05.31 13:26:06 - SSL > 2018.05.31 13:26:06 LOG6[ui]: Initializing service [openvpn]. 2018.05.31 13:26:06 - SSL > 2018.05.31 13:26:06 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks. 2018.05.31 13:26:06 - SSL > 2018.05.31 13:26:06 LOG5[ui]: Configuration successful. 2018.05.31 13:26:06 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017. 2018.05.31 13:26:06 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.31 13:26:06 - Connection to OpenVPN Management Interface. 2018.05.31 13:26:06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.31 13:26:06 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:26:06 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:26:06 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:49983. 2018.05.31 13:26:06 - OpenVPN > Socket Buffers: R=[131072->262144] S=[131072->262144]. 2018.05.31 13:26:06 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:49983 [nonblock]. 2018.05.31 13:26:06 - SSL > 2018.05.31 13:26:06 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:55779. 2018.05.31 13:26:06 - SSL > 2018.05.31 13:26:06 LOG6[0]: s_connect: connecting 199.249.230.18:443. 2018.05.31 13:26:06 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.31 13:26:06 - SSL > 2018.05.31 13:26:06 LOG5[0]: s_connect: connected 199.249.230.18:443. 2018.05.31 13:26:06 - SSL > 2018.05.31 13:26:06 LOG5[0]: Service [openvpn] connected remote server from 172.20.110.55:55780. 2018.05.31 13:26:06 - SSL > 2018.05.31 13:26:06 LOG6[0]: SNI: sending servername: 199.249.230.18. 2018.05.31 13:26:06 - SSL > 2018.05.31 13:26:06 LOG6[0]: Peer certificate not required. 2018.05.31 13:26:07 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:49983. 2018.05.31 13:26:07 - OpenVPN > TCP_CLIENT link local: (not bound). 2018.05.31 13:26:07 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:49983. 2018.05.31 13:26:07 - SSL > 2018.05.31 13:26:07 LOG6[0]: Certificate verification disabled. 2018.05.31 13:26:07 - SSL > 2018.05.31 13:26:07 LOG6[0]: Client certificate not requested. 2018.05.31 13:26:08 - SSL > 2018.05.31 13:26:08 LOG6[0]: TLS connected: new session negotiated. 2018.05.31 13:26:08 - SSL > 2018.05.31 13:26:08 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption). 2018.05.31 13:26:08 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:49983, sid=eb8d9a31 47ce7581. 2018.05.31 13:26:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.31 13:26:08 - OpenVPN > VERIFY KU OK. 2018.05.31 13:26:08 - OpenVPN > Validating certificate extended key usage. 2018.05.31 13:26:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.31 13:26:08 - OpenVPN > VERIFY EKU OK. 2018.05.31 13:26:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pegasus, emailAddress=info@airvpn.org. 2018.05.31 13:26:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.31 13:26:08 - OpenVPN > [Pegasus] Peer Connection Initiated with [AF_INET]127.0.0.1:49983. 2018.05.31 13:26:09 - OpenVPN > SENT CONTROL [Pegasus]: 'PUSH_REQUEST' (status=1). 2018.05.31 13:26:09 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.105 255.255.0.0,peer-id 0,cipher AES-256-GCM'. 2018.05.31 13:26:09 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.31 13:26:09 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.31 13:26:09 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.31 13:26:09 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.31 13:26:09 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.31 13:26:09 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.31 13:26:09 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.05.31 13:26:09 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627. 2018.05.31 13:26:09 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.05.31 13:26:09 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.05.31 13:26:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.05.31 13:26:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.05.31 13:26:09 - OpenVPN > ROUTE_GATEWAY 172.20.110.1/255.255.252.0 IFACE=en0 HWADDR=9c:f3:87:a2:8f:08. 2018.05.31 13:26:09 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2018.05.31 13:26:09 - OpenVPN > Opened utun device utun1. 2018.05.31 13:26:09 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.31 13:26:09 - OpenVPN > /sbin/ifconfig utun1 delete. 2018.05.31 13:26:09 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2018.05.31 13:26:09 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2018.05.31 13:26:09 - OpenVPN > /sbin/ifconfig utun1 10.50.1.105 10.50.1.105 netmask 255.255.0.0 mtu 1500 up. 2018.05.31 13:26:09 - OpenVPN > /sbin/route add -net 10.50.0.0 10.50.1.105 255.255.0.0. 2018.05.31 13:26:09 - OpenVPN > add net 10.50.0.0: gateway 10.50.1.105. 2018.05.31 13:26:09 - OpenVPN > /sbin/route add -net 127.0.0.1 172.20.110.1 255.255.255.255. 2018.05.31 13:26:09 - OpenVPN > add net 127.0.0.1: gateway 172.20.110.1. 2018.05.31 13:26:09 - OpenVPN > /sbin/route add -net 0.0.0.0 10.50.0.1 128.0.0.0. 2018.05.31 13:26:09 - OpenVPN > add net 0.0.0.0: gateway 10.50.0.1. 2018.05.31 13:26:09 - OpenVPN > /sbin/route add -net 128.0.0.0 10.50.0.1 128.0.0.0. 2018.05.31 13:26:09 - OpenVPN > add net 128.0.0.0: gateway 10.50.0.1. 2018.05.31 13:26:09 - OpenVPN > /sbin/route add -net 199.249.230.18 172.20.110.1 255.255.255.255. 2018.05.31 13:26:09 - OpenVPN > add net 199.249.230.18: gateway 172.20.110.1. 2018.05.31 13:26:10 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.50.0.1). 2018.05.31 13:26:10 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.50.0.1). 2018.05.31 13:26:10 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.50.0.1). 2018.05.31 13:26:10 - Flushing DNS. 2018.05.31 13:26:10 - OS X - PF rules updated, reloadingI 2018.05.31 13:26:10 - Checking routeI 2018.05.31 13:26:15 - Checking DNS! 2018.05.31 13:26:17 - Connected.. 2018.05.31 13:26:17 - OpenVPN > Initialization Sequence Completed. 2018.05.31 13:27:06 - SSL > 2018.05.31 13:27:06 LOG6[cron]: Executing cron jobs. 2018.05.31 13:27:06 - SSL > 2018.05.31 13:27:06 LOG6[cron]: Cron jobs completed in 0 seconds. 2018.05.31 13:29:03 - OS X - PF rules updated, reloading! 2018.05.31 13:29:03 - Disconnecting. 2018.05.31 13:29:03 - Sending management termination signal. 2018.05.31 13:29:03 - Management - Send 'signal SIGTERM'. 2018.05.31 13:29:13 - Sending soft termination signal. 2018.05.31 13:29:13 - Connection terminated.. 2018.05.31 13:29:13 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic). 2018.05.31 13:29:14 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic). 2018.05.31 13:29:14 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)I 2018.05.31 13:29:14 - Checking authorization ...! 2018.05.31 13:29:14 - Connecting to Ran (United States, Dallas, Texas). 2018.05.31 13:29:14 - SSL > 2018.05.31 13:29:14 LOG5[ui]: stunnel 5.40 on x86_64-apple-darwin16.3.0 platform. 2018.05.31 13:29:14 - SSL > 2018.05.31 13:29:14 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k 26 Jan 2017. 2018.05.31 13:29:15 - SSL > 2018.05.31 13:29:14 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2018.05.31 13:29:15 - SSL > 2018.05.31 13:29:14 LOG5[ui]: Reading configuration from file /Users/apple/.airvpn/07f59ab55aa938c130ae8ff8d34fcc8e17129ef5d440ca96b51b02e971785b86.tmp.ssl. 2018.05.31 13:29:15 - SSL > 2018.05.31 13:29:14 LOG5[ui]: UTF-8 byte order mark not detected. 2018.05.31 13:29:15 - SSL > 2018.05.31 13:29:14 LOG6[ui]: Initializing service [openvpn]. 2018.05.31 13:29:15 - SSL > 2018.05.31 13:29:14 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks. 2018.05.31 13:29:15 - SSL > 2018.05.31 13:29:14 LOG5[ui]: Configuration successful. 2018.05.31 13:29:15 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017. 2018.05.31 13:29:15 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.31 13:29:15 - Connection to OpenVPN Management Interface. 2018.05.31 13:29:15 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.31 13:29:15 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:29:15 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:29:15 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:49605. 2018.05.31 13:29:15 - OpenVPN > Socket Buffers: R=[131072->262144] S=[131072->262144]. 2018.05.31 13:29:15 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:49605 [nonblock]. 2018.05.31 13:29:15 - SSL > 2018.05.31 13:29:15 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:56362. 2018.05.31 13:29:15 - SSL > 2018.05.31 13:29:15 LOG6[0]: s_connect: connecting 199.249.230.28:443. 2018.05.31 13:29:15 - SSL > 2018.05.31 13:29:15 LOG5[0]: s_connect: connected 199.249.230.28:443. 2018.05.31 13:29:15 - SSL > 2018.05.31 13:29:15 LOG5[0]: Service [openvpn] connected remote server from 172.20.110.55:56363. 2018.05.31 13:29:15 - SSL > 2018.05.31 13:29:15 LOG6[0]: SNI: sending servername: 199.249.230.28. 2018.05.31 13:29:15 - SSL > 2018.05.31 13:29:15 LOG6[0]: Peer certificate not required. 2018.05.31 13:29:15 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.31 13:29:15 - SSL > 2018.05.31 13:29:15 LOG6[0]: Certificate verification disabled. 2018.05.31 13:29:15 - SSL > 2018.05.31 13:29:15 LOG6[0]: Client certificate not requested. 2018.05.31 13:29:15 - SSL > 2018.05.31 13:29:15 LOG6[0]: TLS connected: new session negotiated. 2018.05.31 13:29:15 - SSL > 2018.05.31 13:29:15 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption). 2018.05.31 13:29:16 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:49605. 2018.05.31 13:29:16 - OpenVPN > TCP_CLIENT link local: (not bound). 2018.05.31 13:29:16 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:49605. 2018.05.31 13:29:16 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:49605, sid=2f5edcb4 69ff4f09. 2018.05.31 13:29:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.31 13:29:16 - OpenVPN > VERIFY KU OK. 2018.05.31 13:29:16 - OpenVPN > Validating certificate extended key usage. 2018.05.31 13:29:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.31 13:29:16 - OpenVPN > VERIFY EKU OK. 2018.05.31 13:29:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ran, emailAddress=info@airvpn.org. 2018.05.31 13:29:16 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.31 13:29:16 - OpenVPN > [Ran] Peer Connection Initiated with [AF_INET]127.0.0.1:49605. 2018.05.31 13:29:17 - OpenVPN > SENT CONTROL [Ran]: 'PUSH_REQUEST' (status=1). 2018.05.31 13:29:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.90 255.255.0.0,peer-id 0,cipher AES-256-GCM'. 2018.05.31 13:29:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.31 13:29:17 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.31 13:29:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.31 13:29:17 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.31 13:29:17 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.31 13:29:17 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.31 13:29:17 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.05.31 13:29:17 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627. 2018.05.31 13:29:17 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.05.31 13:29:17 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.05.31 13:29:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.05.31 13:29:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.05.31 13:29:17 - OpenVPN > ROUTE_GATEWAY 172.20.110.1/255.255.252.0 IFACE=en0 HWADDR=9c:f3:87:a2:8f:08. 2018.05.31 13:29:17 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2018.05.31 13:29:17 - OpenVPN > Opened utun device utun1. 2018.05.31 13:29:17 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.31 13:29:17 - OpenVPN > /sbin/ifconfig utun1 delete. 2018.05.31 13:29:17 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2018.05.31 13:29:17 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2018.05.31 13:29:17 - OpenVPN > /sbin/ifconfig utun1 10.50.1.90 10.50.1.90 netmask 255.255.0.0 mtu 1500 up. 2018.05.31 13:29:17 - OpenVPN > /sbin/route add -net 10.50.0.0 10.50.1.90 255.255.0.0. 2018.05.31 13:29:17 - OpenVPN > add net 10.50.0.0: gateway 10.50.1.90. 2018.05.31 13:29:17 - OpenVPN > /sbin/route add -net 127.0.0.1 172.20.110.1 255.255.255.255. 2018.05.31 13:29:17 - OpenVPN > add net 127.0.0.1: gateway 172.20.110.1. 2018.05.31 13:29:17 - OpenVPN > /sbin/route add -net 0.0.0.0 10.50.0.1 128.0.0.0. 2018.05.31 13:29:17 - OpenVPN > add net 0.0.0.0: gateway 10.50.0.1. 2018.05.31 13:29:17 - OpenVPN > /sbin/route add -net 128.0.0.0 10.50.0.1 128.0.0.0. 2018.05.31 13:29:17 - OpenVPN > add net 128.0.0.0: gateway 10.50.0.1. 2018.05.31 13:29:17 - OpenVPN > /sbin/route add -net 199.249.230.28 172.20.110.1 255.255.255.255. 2018.05.31 13:29:17 - OpenVPN > add net 199.249.230.28: gateway 172.20.110.1. 2018.05.31 13:29:18 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.50.0.1). 2018.05.31 13:29:18 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.50.0.1). 2018.05.31 13:29:18 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.50.0.1). 2018.05.31 13:29:18 - Flushing DNS. 2018.05.31 13:29:18 - OS X - PF rules updated, reloadingI 2018.05.31 13:29:18 - Checking routeI 2018.05.31 13:29:19 - Checking DNS! 2018.05.31 13:29:22 - Connected.. 2018.05.31 13:29:22 - OpenVPN > Initialization Sequence Completed. 2018.05.31 13:30:14 - SSL > 2018.05.31 13:30:14 LOG6[cron]: Executing cron jobs. 2018.05.31 13:30:14 - SSL > 2018.05.31 13:30:14 LOG6[cron]: Cron jobs completed in 0 seconds. 2018.05.31 13:38:04 - SSL > 2018.05.31 13:38:03 LOG6[0]: TLS closed (SSL_read). 2018.05.31 13:38:04 - SSL > 2018.05.31 13:38:03 LOG3[0]: transfer: s_poll_wait: TIMEOUTclose exceeded: closing. 2018.05.31 13:38:04 - SSL > 2018.05.31 13:38:03 LOG5[0]: Connection closed: 2892543 byte(s) sent to TLS, 35611845 byte(s) sent to socket. 2018.05.31 13:38:04 - OpenVPN > Connection reset, restarting [0]. 2018.05.31 13:38:04 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting. 2018.05.31 13:38:04 - OpenVPN > Restart pause, 5 second(s). 2018.05.31 13:38:04 - OS X - PF rules updated, reloading! 2018.05.31 13:38:04 - Disconnecting. 2018.05.31 13:38:04 - Sending management termination signal. 2018.05.31 13:38:04 - Management - Send 'signal SIGTERM'. 2018.05.31 13:38:05 - Updating systems & servers data .... 2018.05.31 13:38:06 - OS X - PF rules updated, reloading. 2018.05.31 13:38:06 - Systems & servers data update completed. 2018.05.31 13:38:13 - Sending soft termination signal. 2018.05.31 13:38:13 - Connection terminated.. 2018.05.31 13:38:13 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic). 2018.05.31 13:38:13 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic). 2018.05.31 13:38:13 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)I 2018.05.31 13:38:16 - Checking authorization ...! 2018.05.31 13:38:17 - Connecting to Octans (United States, Atlanta, Georgia). 2018.05.31 13:38:17 - SSL > 2018.05.31 13:38:17 LOG5[ui]: stunnel 5.40 on x86_64-apple-darwin16.3.0 platform. 2018.05.31 13:38:17 - SSL > 2018.05.31 13:38:17 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k 26 Jan 2017. 2018.05.31 13:38:17 - SSL > 2018.05.31 13:38:17 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2018.05.31 13:38:17 - SSL > 2018.05.31 13:38:17 LOG5[ui]: Reading configuration from file /Users/apple/.airvpn/a186d39a2fc58391ac526f4c28631f42c74100508b289c93f6795b2cc95dc630.tmp.ssl. 2018.05.31 13:38:17 - SSL > 2018.05.31 13:38:17 LOG5[ui]: UTF-8 byte order mark not detected. 2018.05.31 13:38:17 - SSL > 2018.05.31 13:38:17 LOG6[ui]: Initializing service [openvpn]. 2018.05.31 13:38:17 - SSL > 2018.05.31 13:38:17 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks. 2018.05.31 13:38:17 - SSL > 2018.05.31 13:38:17 LOG5[ui]: Configuration successful. 2018.05.31 13:38:17 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017. 2018.05.31 13:38:17 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.31 13:38:17 - Connection to OpenVPN Management Interface. 2018.05.31 13:38:17 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.31 13:38:17 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:38:17 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:38:17 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:46872. 2018.05.31 13:38:17 - OpenVPN > Socket Buffers: R=[131072->262144] S=[131072->262144]. 2018.05.31 13:38:17 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:46872 [nonblock]. 2018.05.31 13:38:17 - SSL > 2018.05.31 13:38:17 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:57573. 2018.05.31 13:38:17 - SSL > 2018.05.31 13:38:17 LOG6[0]: s_connect: connecting 108.62.228.188:443. 2018.05.31 13:38:17 - SSL > 2018.05.31 13:38:17 LOG5[0]: s_connect: connected 108.62.228.188:443. 2018.05.31 13:38:17 - SSL > 2018.05.31 13:38:17 LOG5[0]: Service [openvpn] connected remote server from 172.20.110.55:57574. 2018.05.31 13:38:17 - SSL > 2018.05.31 13:38:17 LOG6[0]: SNI: sending servername: 108.62.228.188. 2018.05.31 13:38:17 - SSL > 2018.05.31 13:38:17 LOG6[0]: Peer certificate not required. 2018.05.31 13:38:17 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.31 13:38:17 - SSL > 2018.05.31 13:38:17 LOG6[0]: Certificate verification disabled. 2018.05.31 13:38:17 - SSL > 2018.05.31 13:38:17 LOG6[0]: Client certificate not requested. 2018.05.31 13:38:17 - SSL > 2018.05.31 13:38:17 LOG6[0]: TLS connected: new session negotiated. 2018.05.31 13:38:17 - SSL > 2018.05.31 13:38:17 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption). 2018.05.31 13:38:18 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:46872. 2018.05.31 13:38:18 - OpenVPN > TCP_CLIENT link local: (not bound). 2018.05.31 13:38:18 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:46872. 2018.05.31 13:38:18 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:46872, sid=312d3f84 063c527b. 2018.05.31 13:38:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.31 13:38:18 - OpenVPN > VERIFY KU OK. 2018.05.31 13:38:19 - OpenVPN > Validating certificate extended key usage. 2018.05.31 13:38:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.31 13:38:19 - OpenVPN > VERIFY EKU OK. 2018.05.31 13:38:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Octans, emailAddress=info@airvpn.org. 2018.05.31 13:38:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.31 13:38:19 - OpenVPN > [Octans] Peer Connection Initiated with [AF_INET]127.0.0.1:46872. 2018.05.31 13:38:20 - OpenVPN > SENT CONTROL [Octans]: 'PUSH_REQUEST' (status=1). 2018.05.31 13:38:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.92 255.255.0.0,peer-id 0,cipher AES-256-GCM'. 2018.05.31 13:38:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.31 13:38:20 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.31 13:38:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.31 13:38:20 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.31 13:38:20 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.31 13:38:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.31 13:38:20 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.05.31 13:38:20 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627. 2018.05.31 13:38:20 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.05.31 13:38:20 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.05.31 13:38:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.05.31 13:38:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.05.31 13:38:20 - OpenVPN > ROUTE_GATEWAY 172.20.110.1/255.255.252.0 IFACE=en0 HWADDR=9c:f3:87:a2:8f:08. 2018.05.31 13:38:20 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2018.05.31 13:38:20 - OpenVPN > Opened utun device utun1. 2018.05.31 13:38:20 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.31 13:38:20 - OpenVPN > /sbin/ifconfig utun1 delete. 2018.05.31 13:38:20 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2018.05.31 13:38:20 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2018.05.31 13:38:20 - OpenVPN > /sbin/ifconfig utun1 10.50.0.92 10.50.0.92 netmask 255.255.0.0 mtu 1500 up. 2018.05.31 13:38:20 - OpenVPN > /sbin/route add -net 10.50.0.0 10.50.0.92 255.255.0.0. 2018.05.31 13:38:20 - OpenVPN > add net 10.50.0.0: gateway 10.50.0.92. 2018.05.31 13:38:20 - OpenVPN > /sbin/route add -net 127.0.0.1 172.20.110.1 255.255.255.255. 2018.05.31 13:38:20 - OpenVPN > add net 127.0.0.1: gateway 172.20.110.1. 2018.05.31 13:38:20 - OpenVPN > /sbin/route add -net 0.0.0.0 10.50.0.1 128.0.0.0. 2018.05.31 13:38:20 - OpenVPN > add net 0.0.0.0: gateway 10.50.0.1. 2018.05.31 13:38:20 - OpenVPN > /sbin/route add -net 128.0.0.0 10.50.0.1 128.0.0.0. 2018.05.31 13:38:20 - OpenVPN > add net 128.0.0.0: gateway 10.50.0.1. 2018.05.31 13:38:20 - OpenVPN > /sbin/route add -net 108.62.228.188 172.20.110.1 255.255.255.255. 2018.05.31 13:38:20 - OpenVPN > add net 108.62.228.188: gateway 172.20.110.1. 2018.05.31 13:38:20 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.50.0.1). 2018.05.31 13:38:20 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.50.0.1). 2018.05.31 13:38:20 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.50.0.1). 2018.05.31 13:38:20 - Flushing DNS. 2018.05.31 13:38:21 - OS X - PF rules updated, reloadingI 2018.05.31 13:38:21 - Checking routeI 2018.05.31 13:38:22 - Checking DNS! 2018.05.31 13:38:23 - Connected.. 2018.05.31 13:38:23 - OpenVPN > Initialization Sequence Completed. 2018.05.31 13:39:13 - OS X - PF rules updated, reloading! 2018.05.31 13:39:14 - Disconnecting. 2018.05.31 13:39:14 - Sending management termination signal. 2018.05.31 13:39:14 - Management - Send 'signal SIGTERM'. 2018.05.31 13:39:23 - Sending soft termination signal. 2018.05.31 13:39:23 - Connection terminated.. 2018.05.31 13:39:23 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic). 2018.05.31 13:39:23 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic). 2018.05.31 13:39:23 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)I 2018.05.31 13:39:23 - Checking authorization ...! 2018.05.31 13:39:24 - Connecting to Ran (United States, Dallas, Texas). 2018.05.31 13:39:24 - SSL > 2018.05.31 13:39:24 LOG5[ui]: stunnel 5.40 on x86_64-apple-darwin16.3.0 platform. 2018.05.31 13:39:24 - SSL > 2018.05.31 13:39:24 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k 26 Jan 2017. 2018.05.31 13:39:24 - SSL > 2018.05.31 13:39:24 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2018.05.31 13:39:24 - SSL > 2018.05.31 13:39:24 LOG5[ui]: Reading configuration from file /Users/apple/.airvpn/ef68e2a418c16bee5afa59b6792d73ad8f465e58dadd8bf58dc129f6f45b23f0.tmp.ssl. 2018.05.31 13:39:24 - SSL > 2018.05.31 13:39:24 LOG5[ui]: UTF-8 byte order mark not detected. 2018.05.31 13:39:24 - SSL > 2018.05.31 13:39:24 LOG6[ui]: Initializing service [openvpn]. 2018.05.31 13:39:24 - SSL > 2018.05.31 13:39:24 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks. 2018.05.31 13:39:24 - SSL > 2018.05.31 13:39:24 LOG5[ui]: Configuration successful. 2018.05.31 13:39:24 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017. 2018.05.31 13:39:24 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.31 13:39:24 - Connection to OpenVPN Management Interface. 2018.05.31 13:39:24 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.31 13:39:24 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:39:24 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:39:24 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:22036. 2018.05.31 13:39:24 - OpenVPN > Socket Buffers: R=[131072->262144] S=[131072->262144]. 2018.05.31 13:39:24 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:22036 [nonblock]. 2018.05.31 13:39:24 - SSL > 2018.05.31 13:39:24 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:57601. 2018.05.31 13:39:24 - SSL > 2018.05.31 13:39:24 LOG6[0]: s_connect: connecting 199.249.230.28:443. 2018.05.31 13:39:24 - SSL > 2018.05.31 13:39:24 LOG5[0]: s_connect: connected 199.249.230.28:443. 2018.05.31 13:39:24 - SSL > 2018.05.31 13:39:24 LOG5[0]: Service [openvpn] connected remote server from 172.20.110.55:57602. 2018.05.31 13:39:24 - SSL > 2018.05.31 13:39:24 LOG6[0]: SNI: sending servername: 199.249.230.28. 2018.05.31 13:39:24 - SSL > 2018.05.31 13:39:24 LOG6[0]: Peer certificate not required. 2018.05.31 13:39:24 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.31 13:39:25 - SSL > 2018.05.31 13:39:24 LOG6[0]: Certificate verification disabled. 2018.05.31 13:39:25 - SSL > 2018.05.31 13:39:24 LOG6[0]: Client certificate not requested. 2018.05.31 13:39:25 - SSL > 2018.05.31 13:39:24 LOG6[0]: TLS connected: new session negotiated. 2018.05.31 13:39:25 - SSL > 2018.05.31 13:39:24 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption). 2018.05.31 13:39:25 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:22036. 2018.05.31 13:39:25 - OpenVPN > TCP_CLIENT link local: (not bound). 2018.05.31 13:39:25 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:22036. 2018.05.31 13:39:25 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:22036, sid=39d05592 f17690e6. 2018.05.31 13:39:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.31 13:39:25 - OpenVPN > VERIFY KU OK. 2018.05.31 13:39:25 - OpenVPN > Validating certificate extended key usage. 2018.05.31 13:39:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.31 13:39:25 - OpenVPN > VERIFY EKU OK. 2018.05.31 13:39:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ran, emailAddress=info@airvpn.org. 2018.05.31 13:39:26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.31 13:39:26 - OpenVPN > [Ran] Peer Connection Initiated with [AF_INET]127.0.0.1:22036. 2018.05.31 13:39:27 - OpenVPN > SENT CONTROL [Ran]: 'PUSH_REQUEST' (status=1). 2018.05.31 13:39:27 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.90 255.255.0.0,peer-id 0,cipher AES-256-GCM'. 2018.05.31 13:39:27 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.31 13:39:27 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.31 13:39:27 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.31 13:39:27 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.31 13:39:27 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.31 13:39:27 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.31 13:39:27 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.05.31 13:39:27 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627. 2018.05.31 13:39:27 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.05.31 13:39:27 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.05.31 13:39:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.05.31 13:39:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.05.31 13:39:27 - OpenVPN > ROUTE_GATEWAY 172.20.110.1/255.255.252.0 IFACE=en0 HWADDR=9c:f3:87:a2:8f:08. 2018.05.31 13:39:27 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2018.05.31 13:39:27 - OpenVPN > Opened utun device utun1. 2018.05.31 13:39:27 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.31 13:39:27 - OpenVPN > /sbin/ifconfig utun1 delete. 2018.05.31 13:39:27 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2018.05.31 13:39:27 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2018.05.31 13:39:27 - OpenVPN > /sbin/ifconfig utun1 10.50.1.90 10.50.1.90 netmask 255.255.0.0 mtu 1500 up. 2018.05.31 13:39:27 - OpenVPN > /sbin/route add -net 10.50.0.0 10.50.1.90 255.255.0.0. 2018.05.31 13:39:27 - OpenVPN > add net 10.50.0.0: gateway 10.50.1.90. 2018.05.31 13:39:27 - OpenVPN > /sbin/route add -net 127.0.0.1 172.20.110.1 255.255.255.255. 2018.05.31 13:39:27 - OpenVPN > add net 127.0.0.1: gateway 172.20.110.1. 2018.05.31 13:39:27 - OpenVPN > /sbin/route add -net 0.0.0.0 10.50.0.1 128.0.0.0. 2018.05.31 13:39:27 - OpenVPN > add net 0.0.0.0: gateway 10.50.0.1. 2018.05.31 13:39:27 - OpenVPN > /sbin/route add -net 128.0.0.0 10.50.0.1 128.0.0.0. 2018.05.31 13:39:27 - OpenVPN > add net 128.0.0.0: gateway 10.50.0.1. 2018.05.31 13:39:27 - OpenVPN > /sbin/route add -net 199.249.230.28 172.20.110.1 255.255.255.255. 2018.05.31 13:39:27 - OpenVPN > add net 199.249.230.28: gateway 172.20.110.1. 2018.05.31 13:39:27 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.50.0.1). 2018.05.31 13:39:27 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.50.0.1). 2018.05.31 13:39:28 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.50.0.1). 2018.05.31 13:39:28 - Flushing DNS. 2018.05.31 13:39:28 - OS X - PF rules updated, reloadingI 2018.05.31 13:39:28 - Checking routeI 2018.05.31 13:39:29 - Checking DNS! 2018.05.31 13:39:31 - Connected.. 2018.05.31 13:39:31 - OpenVPN > Initialization Sequence Completed. 2018.05.31 13:40:24 - SSL > 2018.05.31 13:40:24 LOG6[cron]: Executing cron jobs. 2018.05.31 13:40:24 - SSL > 2018.05.31 13:40:24 LOG6[cron]: Cron jobs completed in 0 seconds. 2018.05.31 13:41:21 - SSL > 2018.05.31 13:41:21 LOG3[0]: SSL_read: Connection reset by peer (54). 2018.05.31 13:41:21 - SSL > 2018.05.31 13:41:21 LOG5[0]: Connection reset: 394805 byte(s) sent to TLS, 8479369 byte(s) sent to socket. 2018.05.31 13:41:21 - OpenVPN > Connection reset, restarting [-1]. 2018.05.31 13:41:21 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting. 2018.05.31 13:41:21 - OpenVPN > Restart pause, 5 second(s). 2018.05.31 13:41:21 - OS X - PF rules updated, reloading! 2018.05.31 13:41:21 - Disconnecting. 2018.05.31 13:41:21 - Sending management termination signal. 2018.05.31 13:41:21 - Management - Send 'signal SIGTERM'. 2018.05.31 13:41:31 - Sending soft termination signal. 2018.05.31 13:41:31 - Connection terminated.. 2018.05.31 13:41:31 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic). 2018.05.31 13:41:31 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic). 2018.05.31 13:41:31 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)I 2018.05.31 13:41:34 - Checking authorization ...! 2018.05.31 13:41:35 - Connecting to Octans (United States, Atlanta, Georgia). 2018.05.31 13:41:35 - SSL > 2018.05.31 13:41:35 LOG5[ui]: stunnel 5.40 on x86_64-apple-darwin16.3.0 platform. 2018.05.31 13:41:35 - SSL > 2018.05.31 13:41:35 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k 26 Jan 2017. 2018.05.31 13:41:35 - SSL > 2018.05.31 13:41:35 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2018.05.31 13:41:35 - SSL > 2018.05.31 13:41:35 LOG5[ui]: Reading configuration from file /Users/apple/.airvpn/ca63ed50fce69e6512a8a61a68648ccf9cd43a5ce2f6b644ac4c15bb1b28ef25.tmp.ssl. 2018.05.31 13:41:35 - SSL > 2018.05.31 13:41:35 LOG5[ui]: UTF-8 byte order mark not detected. 2018.05.31 13:41:35 - SSL > 2018.05.31 13:41:35 LOG6[ui]: Initializing service [openvpn]. 2018.05.31 13:41:35 - SSL > 2018.05.31 13:41:35 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks. 2018.05.31 13:41:35 - SSL > 2018.05.31 13:41:35 LOG5[ui]: Configuration successful! 2018.05.31 13:41:35 - Disconnecting. 2018.05.31 13:41:35 - Sending soft termination signal. 2018.05.31 13:41:36 - Connection terminated.I 2018.05.31 13:41:39 - Checking authorization ...! 2018.05.31 13:41:39 - Connecting to Cursa (United States, Miami). 2018.05.31 13:41:39 - SSL > 2018.05.31 13:41:39 LOG5[ui]: stunnel 5.40 on x86_64-apple-darwin16.3.0 platform. 2018.05.31 13:41:39 - SSL > 2018.05.31 13:41:39 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k 26 Jan 2017. 2018.05.31 13:41:40 - SSL > 2018.05.31 13:41:39 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2018.05.31 13:41:40 - SSL > 2018.05.31 13:41:39 LOG5[ui]: Reading configuration from file /Users/apple/.airvpn/b36458af2cab0814294e0103730915480ee37111a4151af6896af64751455a7e.tmp.ssl. 2018.05.31 13:41:40 - SSL > 2018.05.31 13:41:39 LOG5[ui]: UTF-8 byte order mark not detected. 2018.05.31 13:41:40 - SSL > 2018.05.31 13:41:39 LOG6[ui]: Initializing service [openvpn]. 2018.05.31 13:41:40 - SSL > 2018.05.31 13:41:39 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks. 2018.05.31 13:41:40 - SSL > 2018.05.31 13:41:39 LOG5[ui]: Configuration successful. 2018.05.31 13:41:40 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017. 2018.05.31 13:41:40 - SSL > 2018.05.31 13:41:40 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:57641. 2018.05.31 13:41:40 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.31 13:41:40 - SSL > 2018.05.31 13:41:40 LOG6[0]: s_connect: connecting 96.47.229.60:443. 2018.05.31 13:41:40 - Connection to OpenVPN Management Interface. 2018.05.31 13:41:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.31 13:41:40 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:41:40 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:41:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:48723. 2018.05.31 13:41:40 - OpenVPN > Socket Buffers: R=[131072->262144] S=[131072->262144]. 2018.05.31 13:41:40 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:48723 [nonblock]. 2018.05.31 13:41:40 - SSL > 2018.05.31 13:41:40 LOG5[0]: s_connect: connected 96.47.229.60:443. 2018.05.31 13:41:40 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.31 13:41:40 - SSL > 2018.05.31 13:41:40 LOG5[0]: Service [openvpn] connected remote server from 172.20.110.55:57642. 2018.05.31 13:41:40 - SSL > 2018.05.31 13:41:40 LOG6[0]: SNI: sending servername: 96.47.229.60. 2018.05.31 13:41:40 - SSL > 2018.05.31 13:41:40 LOG6[0]: Peer certificate not required. 2018.05.31 13:41:40 - SSL > 2018.05.31 13:41:40 LOG6[0]: Certificate verification disabled. 2018.05.31 13:41:40 - SSL > 2018.05.31 13:41:40 LOG6[0]: Client certificate not requested. 2018.05.31 13:41:41 - SSL > 2018.05.31 13:41:40 LOG6[0]: TLS connected: new session negotiated. 2018.05.31 13:41:41 - SSL > 2018.05.31 13:41:40 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption). 2018.05.31 13:41:41 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:48723. 2018.05.31 13:41:41 - OpenVPN > TCP_CLIENT link local: (not bound). 2018.05.31 13:41:41 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:48723. 2018.05.31 13:41:41 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:48723, sid=7341237f f2b7be15. 2018.05.31 13:41:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.31 13:41:41 - OpenVPN > VERIFY KU OK. 2018.05.31 13:41:41 - OpenVPN > Validating certificate extended key usage. 2018.05.31 13:41:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.31 13:41:42 - OpenVPN > VERIFY EKU OK. 2018.05.31 13:41:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2018.05.31 13:41:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.31 13:41:42 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:48723. 2018.05.31 13:41:43 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2018.05.31 13:41:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.79 255.255.0.0'. 2018.05.31 13:41:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.31 13:41:43 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.31 13:41:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.31 13:41:43 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.31 13:41:43 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.31 13:41:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.31 13:41:43 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.31 13:41:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:41:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2018.05.31 13:41:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:41:44 - OpenVPN > ROUTE_GATEWAY 172.20.110.1/255.255.252.0 IFACE=en0 HWADDR=9c:f3:87:a2:8f:08. 2018.05.31 13:41:44 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2018.05.31 13:41:44 - OpenVPN > Opened utun device utun1. 2018.05.31 13:41:44 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.31 13:41:44 - OpenVPN > /sbin/ifconfig utun1 delete. 2018.05.31 13:41:44 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2018.05.31 13:41:44 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2018.05.31 13:41:44 - OpenVPN > /sbin/ifconfig utun1 10.50.1.79 10.50.1.79 netmask 255.255.0.0 mtu 1500 up. 2018.05.31 13:41:44 - OpenVPN > /sbin/route add -net 10.50.0.0 10.50.1.79 255.255.0.0. 2018.05.31 13:41:44 - OpenVPN > add net 10.50.0.0: gateway 10.50.1.79. 2018.05.31 13:41:44 - OpenVPN > /sbin/route add -net 127.0.0.1 172.20.110.1 255.255.255.255. 2018.05.31 13:41:44 - OpenVPN > add net 127.0.0.1: gateway 172.20.110.1. 2018.05.31 13:41:44 - OpenVPN > /sbin/route add -net 0.0.0.0 10.50.0.1 128.0.0.0. 2018.05.31 13:41:44 - OpenVPN > add net 0.0.0.0: gateway 10.50.0.1. 2018.05.31 13:41:44 - OpenVPN > /sbin/route add -net 128.0.0.0 10.50.0.1 128.0.0.0. 2018.05.31 13:41:44 - OpenVPN > add net 128.0.0.0: gateway 10.50.0.1. 2018.05.31 13:41:44 - OpenVPN > /sbin/route add -net 96.47.229.60 172.20.110.1 255.255.255.255. 2018.05.31 13:41:44 - OpenVPN > add net 96.47.229.60: gateway 172.20.110.1. 2018.05.31 13:41:44 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.50.0.1). 2018.05.31 13:41:44 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.50.0.1). 2018.05.31 13:41:45 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.50.0.1). 2018.05.31 13:41:45 - Flushing DNS. 2018.05.31 13:41:45 - OS X - PF rules updated, reloadingI 2018.05.31 13:41:45 - Checking routeI 2018.05.31 13:41:46 - Checking DNS! 2018.05.31 13:41:47 - Connected.. 2018.05.31 13:41:47 - OpenVPN > Initialization Sequence Completed. 2018.05.31 13:42:39 - SSL > 2018.05.31 13:42:39 LOG6[cron]: Executing cron jobs. 2018.05.31 13:42:39 - SSL > 2018.05.31 13:42:39 LOG6[cron]: Cron jobs completed in 0 seconds. 2018.05.31 13:45:51 - SSL > 2018.05.31 13:45:51 LOG3[0]: SSL_read: Connection reset by peer (54). 2018.05.31 13:45:51 - SSL > 2018.05.31 13:45:51 LOG5[0]: Connection reset: 1115782 byte(s) sent to TLS, 11302150 byte(s) sent to socket. 2018.05.31 13:45:51 - OpenVPN > Connection reset, restarting [-1]. 2018.05.31 13:45:51 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting. 2018.05.31 13:45:51 - OpenVPN > Restart pause, 5 second(s). 2018.05.31 13:45:51 - OS X - PF rules updated, reloading! 2018.05.31 13:45:51 - Disconnecting. 2018.05.31 13:45:51 - Sending management termination signal. 2018.05.31 13:45:51 - Management - Send 'signal SIGTERM'. 2018.05.31 13:46:01 - Sending soft termination signal. 2018.05.31 13:46:01 - Connection terminated.. 2018.05.31 13:46:01 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic). 2018.05.31 13:46:01 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic). 2018.05.31 13:46:01 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)I 2018.05.31 13:46:04 - Checking authorization ...! 2018.05.31 13:46:09 - Connecting to Sagittarius (United States, Atlanta, Georgia). 2018.05.31 13:46:09 - SSL > 2018.05.31 13:46:09 LOG5[ui]: stunnel 5.40 on x86_64-apple-darwin16.3.0 platform. 2018.05.31 13:46:09 - SSL > 2018.05.31 13:46:09 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k 26 Jan 2017. 2018.05.31 13:46:09 - SSL > 2018.05.31 13:46:09 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2018.05.31 13:46:09 - SSL > 2018.05.31 13:46:09 LOG5[ui]: Reading configuration from file /Users/apple/.airvpn/8eeba9ee3c1042ba121abdf7bdb8ddc4fc39f1693e2b0870505e62efb480395a.tmp.ssl. 2018.05.31 13:46:09 - SSL > 2018.05.31 13:46:09 LOG5[ui]: UTF-8 byte order mark not detected. 2018.05.31 13:46:09 - SSL > 2018.05.31 13:46:09 LOG6[ui]: Initializing service [openvpn]. 2018.05.31 13:46:09 - SSL > 2018.05.31 13:46:09 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks. 2018.05.31 13:46:09 - SSL > 2018.05.31 13:46:09 LOG5[ui]: Configuration successful. 2018.05.31 13:46:09 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017. 2018.05.31 13:46:09 - SSL > 2018.05.31 13:46:09 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:57745. 2018.05.31 13:46:09 - SSL > 2018.05.31 13:46:09 LOG6[0]: s_connect: connecting 108.177.134.76:443. 2018.05.31 13:46:09 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.31 13:46:09 - Connection to OpenVPN Management Interface. 2018.05.31 13:46:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.31 13:46:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:46:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:46:09 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:34812. 2018.05.31 13:46:09 - OpenVPN > Socket Buffers: R=[131072->262144] S=[131072->262144]. 2018.05.31 13:46:09 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:34812 [nonblock]. 2018.05.31 13:46:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.31 13:46:09 - SSL > 2018.05.31 13:46:09 LOG5[0]: s_connect: connected 108.177.134.76:443. 2018.05.31 13:46:09 - SSL > 2018.05.31 13:46:09 LOG5[0]: Service [openvpn] connected remote server from 172.20.110.55:57746. 2018.05.31 13:46:09 - SSL > 2018.05.31 13:46:09 LOG6[0]: SNI: sending servername: 108.177.134.76. 2018.05.31 13:46:09 - SSL > 2018.05.31 13:46:09 LOG6[0]: Peer certificate not required. 2018.05.31 13:46:09 - SSL > 2018.05.31 13:46:09 LOG6[0]: Certificate verification disabled. 2018.05.31 13:46:09 - SSL > 2018.05.31 13:46:09 LOG6[0]: Client certificate not requested. 2018.05.31 13:46:09 - SSL > 2018.05.31 13:46:09 LOG6[0]: TLS connected: new session negotiated. 2018.05.31 13:46:09 - SSL > 2018.05.31 13:46:09 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption). 2018.05.31 13:46:10 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:34812. 2018.05.31 13:46:10 - OpenVPN > TCP_CLIENT link local: (not bound). 2018.05.31 13:46:10 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:34812. 2018.05.31 13:46:10 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:34812, sid=767f6b9f 322ed7b6. 2018.05.31 13:46:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.31 13:46:10 - OpenVPN > VERIFY KU OK. 2018.05.31 13:46:10 - OpenVPN > Validating certificate extended key usage. 2018.05.31 13:46:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.31 13:46:10 - OpenVPN > VERIFY EKU OK. 2018.05.31 13:46:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sagittarius, emailAddress=info@airvpn.org. 2018.05.31 13:46:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.31 13:46:10 - OpenVPN > [sagittarius] Peer Connection Initiated with [AF_INET]127.0.0.1:34812. 2018.05.31 13:46:11 - OpenVPN > SENT CONTROL [sagittarius]: 'PUSH_REQUEST' (status=1). 2018.05.31 13:46:12 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.34 255.255.0.0,peer-id 0,cipher AES-256-GCM'. 2018.05.31 13:46:12 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.31 13:46:12 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.31 13:46:12 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.31 13:46:12 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.31 13:46:12 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.31 13:46:12 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.31 13:46:12 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.05.31 13:46:12 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627. 2018.05.31 13:46:12 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.05.31 13:46:12 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.05.31 13:46:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.05.31 13:46:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.05.31 13:46:12 - OpenVPN > ROUTE_GATEWAY 172.20.110.1/255.255.252.0 IFACE=en0 HWADDR=9c:f3:87:a2:8f:08. 2018.05.31 13:46:12 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2018.05.31 13:46:12 - OpenVPN > Opened utun device utun1. 2018.05.31 13:46:12 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.05.31 13:46:12 - OpenVPN > /sbin/ifconfig utun1 delete. 2018.05.31 13:46:12 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2018.05.31 13:46:12 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2018.05.31 13:46:12 - OpenVPN > /sbin/ifconfig utun1 10.50.0.34 10.50.0.34 netmask 255.255.0.0 mtu 1500 up. 2018.05.31 13:46:12 - OpenVPN > /sbin/route add -net 10.50.0.0 10.50.0.34 255.255.0.0. 2018.05.31 13:46:12 - OpenVPN > add net 10.50.0.0: gateway 10.50.0.34. 2018.05.31 13:46:12 - OpenVPN > /sbin/route add -net 127.0.0.1 172.20.110.1 255.255.255.255. 2018.05.31 13:46:12 - OpenVPN > add net 127.0.0.1: gateway 172.20.110.1. 2018.05.31 13:46:12 - OpenVPN > /sbin/route add -net 0.0.0.0 10.50.0.1 128.0.0.0. 2018.05.31 13:46:12 - OpenVPN > add net 0.0.0.0: gateway 10.50.0.1. 2018.05.31 13:46:12 - OpenVPN > /sbin/route add -net 128.0.0.0 10.50.0.1 128.0.0.0. 2018.05.31 13:46:12 - OpenVPN > add net 128.0.0.0: gateway 10.50.0.1. 2018.05.31 13:46:12 - OpenVPN > /sbin/route add -net 108.177.134.76 172.20.110.1 255.255.255.255. 2018.05.31 13:46:12 - OpenVPN > add net 108.177.134.76: gateway 172.20.110.1. 2018.05.31 13:46:12 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.50.0.1). 2018.05.31 13:46:12 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.50.0.1). 2018.05.31 13:46:12 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.50.0.1). 2018.05.31 13:46:12 - Flushing DNS. 2018.05.31 13:46:12 - OS X - PF rules updated, reloadingI 2018.05.31 13:46:12 - Checking routeI 2018.05.31 13:46:13 - Checking DNS! 2018.05.31 13:46:14 - Connected.. 2018.05.31 13:46:14 - OpenVPN > Initialization Sequence Completed. 2018.05.31 13:47:09 - SSL > 2018.05.31 13:47:09 LOG6[cron]: Executing cron jobs. 2018.05.31 13:47:09 - SSL > 2018.05.31 13:47:09 LOG6[cron]: Cron jobs completed in 0 seconds. 2018.05.31 13:47:37 - SSL > 2018.05.31 13:47:37 LOG3[0]: SSL_read: Connection reset by peer (54). 2018.05.31 13:47:37 - SSL > 2018.05.31 13:47:37 LOG5[0]: Connection reset: 68399 byte(s) sent to TLS, 949338 byte(s) sent to socket. 2018.05.31 13:47:37 - OpenVPN > Connection reset, restarting [-1]. 2018.05.31 13:47:37 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting. 2018.05.31 13:47:37 - OpenVPN > Restart pause, 5 second(s). 2018.05.31 13:47:37 - OS X - PF rules updated, reloading! 2018.05.31 13:47:38 - Disconnecting. 2018.05.31 13:47:38 - Sending management termination signal. 2018.05.31 13:47:38 - Management - Send 'signal SIGTERM'. 2018.05.31 13:47:47 - Sending soft termination signal. 2018.05.31 13:47:47 - Connection terminated.. 2018.05.31 13:47:47 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic). 2018.05.31 13:47:47 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic). 2018.05.31 13:47:47 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)I 2018.05.31 13:47:50 - Checking authorization ...! 2018.05.31 13:47:51 - Connecting to Chamaeleon (United States, Dallas, Texas). 2018.05.31 13:47:51 - SSL > 2018.05.31 13:47:51 LOG5[ui]: stunnel 5.40 on x86_64-apple-darwin16.3.0 platform. 2018.05.31 13:47:51 - SSL > 2018.05.31 13:47:51 LOG5[ui]: Compiled/running with OpenSSL 1.0.2k 26 Jan 2017. 2018.05.31 13:47:51 - SSL > 2018.05.31 13:47:51 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2018.05.31 13:47:51 - SSL > 2018.05.31 13:47:51 LOG5[ui]: Reading configuration from file /Users/apple/.airvpn/8f28937014db4b37fa4c35396bdf0692cbccc801a07a3ef87009d1d0be60089f.tmp.ssl. 2018.05.31 13:47:51 - SSL > 2018.05.31 13:47:51 LOG5[ui]: UTF-8 byte order mark not detected. 2018.05.31 13:47:51 - SSL > 2018.05.31 13:47:51 LOG6[ui]: Initializing service [openvpn]. 2018.05.31 13:47:51 - SSL > 2018.05.31 13:47:51 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks. 2018.05.31 13:47:51 - SSL > 2018.05.31 13:47:51 LOG5[ui]: Configuration successful. 2018.05.31 13:47:51 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017. 2018.05.31 13:47:51 - SSL > 2018.05.31 13:47:51 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:57782. 2018.05.31 13:47:51 - OpenVPN > library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10. 2018.05.31 13:47:51 - Connection to OpenVPN Management Interface. 2018.05.31 13:47:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2018.05.31 13:47:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:47:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.05.31 13:47:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:14912. 2018.05.31 13:47:51 - OpenVPN > Socket Buffers: R=[131072->262144] S=[131072->262144]. 2018.05.31 13:47:51 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:14912 [nonblock]. 2018.05.31 13:47:51 - SSL > 2018.05.31 13:47:51 LOG6[0]: s_connect: connecting 199.249.230.43:443. 2018.05.31 13:47:51 - SSL > 2018.05.31 13:47:51 LOG5[0]: s_connect: connected 199.249.230.43:443. 2018.05.31 13:47:51 - SSL > 2018.05.31 13:47:51 LOG5[0]: Service [openvpn] connected remote server from 172.20.110.55:57783. 2018.05.31 13:47:51 - SSL > 2018.05.31 13:47:51 LOG6[0]: SNI: sending servername: 199.249.230.43. 2018.05.31 13:47:51 - SSL > 2018.05.31 13:47:51 LOG6[0]: Peer certificate not required. 2018.05.31 13:47:51 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2018.05.31 13:47:51 - SSL > 2018.05.31 13:47:51 LOG6[0]: Certificate verification disabled. 2018.05.31 13:47:51 - SSL > 2018.05.31 13:47:51 LOG6[0]: Client certificate not requested. 2018.05.31 13:47:52 - SSL > 2018.05.31 13:47:51 LOG6[0]: TLS connected: new session negotiated. 2018.05.31 13:47:52 - SSL > 2018.05.31 13:47:51 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption). 2018.05.31 13:47:52 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:14912. 2018.05.31 13:47:52 - OpenVPN > TCP_CLIENT link local: (not bound). 2018.05.31 13:47:52 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:14912. 2018.05.31 13:47:59 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:14912, sid=648f3268 270f16a5. 2018.05.31 13:47:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.05.31 13:47:59 - OpenVPN > VERIFY KU OK. 2018.05.31 13:48:00 - OpenVPN > Validating certificate extended key usage. 2018.05.31 13:48:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.05.31 13:48:00 - OpenVPN > VERIFY EKU OK. 2018.05.31 13:48:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Chamaeleon, emailAddress=info@airvpn.org. 2018.05.31 13:48:00 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.05.31 13:48:00 - OpenVPN > [Chamaeleon] Peer Connection Initiated with [AF_INET]127.0.0.1:14912. 2018.05.31 13:48:01 - OpenVPN > SENT CONTROL [Chamaeleon]: 'PUSH_REQUEST' (status=1). 2018.05.31 13:48:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.7.0.1,dhcp-option DNS6 fde6:7a:7d20:7::1,tun-ipv6,route-gateway 10.7.0.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:7::1028/64 fde6:7a:7d20:7::1,ifconfig 10.7.0.42 255.255.0.0,peer-id 0,cipher AES-256-GCM'. 2018.05.31 13:48:01 - OpenVPN > Note: option tun-ipv6 is ignored because modern operating systems do not need special IPv6 tun handling anymore.. 2018.05.31 13:48:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.05.31 13:48:01 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.05.31 13:48:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.05.31 13:48:01 - OpenVPN > OPTIONS IMPORT: route options modified. 2018.05.31 13:48:01 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.05.31 13:48:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.05.31 13:48:01 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.05.31 13:48:01 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627. 2018.05.31 13:48:01 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.05.31 13:48:01 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.05.31 13:48:01 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.05.31 13:48:01 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.05.31 13:48:01 - OpenVPN > ROUTE_GATEWAY 172.20.110.1/255.255.252.0 IFACE=en0 HWADDR=9c:f3:87:a2:8f:08. 2018.05.31 13:48:01 - OpenVPN > GDG6: remote_host_ipv6=n/a. 2018.05.31 13:48:01 - OpenVPN > GDG6: problem writing to routing socket. 2018.05.31 13:48:01 - OpenVPN > ROUTE6: default_gateway=UNDEF. 2018.05.31 13:48:01 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2018.05.31 13:48:01 - OpenVPN > Opened utun device utun1. 2018.05.31 13:48:01 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1. 2018.05.31 13:48:01 - OpenVPN > /sbin/ifconfig utun1 delete. 2018.05.31 13:48:01 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2018.05.31 13:48:01 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2018.05.31 13:48:02 - OpenVPN > /sbin/ifconfig utun1 10.7.0.42 10.7.0.42 netmask 255.255.0.0 mtu 1500 up. 2018.05.31 13:48:02 - OpenVPN > route: writing to routing socket: File exists. 2018.05.31 13:48:02 - OpenVPN > /sbin/route add -net 10.7.0.0 10.7.0.42 255.255.0.0. 2018.05.31 13:48:02 - OpenVPN > add net 10.7.0.0: gateway 10.7.0.42. 2018.05.31 13:48:02 - OpenVPN > /sbin/ifconfig utun1 inet6 fde6:7a:7d20:7::1028/64. 2018.05.31 13:48:02 - OpenVPN > add_route_ipv6(fde6:7a:7d20:7::/64 -> fde6:7a:7d20:7::1028 metric 0) dev utun1. 2018.05.31 13:48:02 - OpenVPN > /sbin/route add -inet6 fde6:7a:7d20:7:: -prefixlen 64 -iface utun1. 2018.05.31 13:48:02 - OpenVPN > add net fde6:7a:7d20:7::: gateway utun1: File exists. 2018.05.31 13:48:02 - OpenVPN > /sbin/route add -net 127.0.0.1 172.20.110.1 255.255.255.255. 2018.05.31 13:48:02 - OpenVPN > add net 127.0.0.1: gateway 172.20.110.1. 2018.05.31 13:48:02 - OpenVPN > /sbin/route add -net 0.0.0.0 10.7.0.1 128.0.0.0. 2018.05.31 13:48:02 - OpenVPN > add net 0.0.0.0: gateway 10.7.0.1. 2018.05.31 13:48:02 - OpenVPN > /sbin/route add -net 128.0.0.0 10.7.0.1 128.0.0.0. 2018.05.31 13:48:02 - OpenVPN > add net 128.0.0.0: gateway 10.7.0.1. 2018.05.31 13:48:02 - OpenVPN > /sbin/route add -net 199.249.230.43 172.20.110.1 255.255.255.255. 2018.05.31 13:48:02 - OpenVPN > add net 199.249.230.43: gateway 172.20.110.1. 2018.05.31 13:48:02 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:7::1 metric -1) dev utun1. 2018.05.31 13:48:02 - OpenVPN > /sbin/route add -inet6 :: -prefixlen 3 -iface utun1. 2018.05.31 13:48:02 - OpenVPN > add net ::: gateway utun1. 2018.05.31 13:48:02 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:7::1 metric -1) dev utun1. 2018.05.31 13:48:02 - OpenVPN > /sbin/route add -inet6 2000:: -prefixlen 4 -iface utun1. 2018.05.31 13:48:02 - OpenVPN > add net 2000::: gateway utun1. 2018.05.31 13:48:02 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:7::1 metric -1) dev utun1. 2018.05.31 13:48:02 - OpenVPN > /sbin/route add -inet6 3000:: -prefixlen 4 -iface utun1. 2018.05.31 13:48:02 - OpenVPN > add net 3000::: gateway utun1. 2018.05.31 13:48:02 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:7::1 metric -1) dev utun1. 2018.05.31 13:48:02 - OpenVPN > /sbin/route add -inet6 fc00:: -prefixlen 7 -iface utun1. 2018.05.31 13:48:02 - OpenVPN > add net fc00::: gateway utun1. 2018.05.31 13:48:02 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.7.0.1, fde6:7a:7d20:7::1). 2018.05.31 13:48:02 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.7.0.1, fde6:7a:7d20:7::1). 2018.05.31 13:48:02 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.7.0.1, fde6:7a:7d20:7::1). 2018.05.31 13:48:02 - Flushing DNS. 2018.05.31 13:48:02 - OS X - PF rules updated, reloadingI 2018.05.31 13:48:02 - Checking routeI 2018.05.31 13:48:04 - Checking DNS! 2018.05.31 13:48:04 - Connected.. 2018.05.31 13:48:04 - OpenVPN > Initialization Sequence Completed. 2018.05.31 13:48:51 - SSL > 2018.05.31 13:48:51 LOG6[cron]: Executing cron jobs. 2018.05.31 13:48:51 - SSL > 2018.05.31 13:48:51 LOG6[cron]: Cron jobs completed in 0 seconds Quote Share this post Link to post