Staff 9972 Posted ... Hello! We're very glad to inform you that a new Eddie Air client version has been released: 2.16beta. It is ready for public beta testing. How to test our experimental release:Go to download page of your OSClick on Other versionsClick on ExperimentalLook at the changelog if you wishDownload and installPlease see the changelog: https://eddie.website/changelog/?software=client&format=html 2 keikari and spinmaster reacted to this Share this post Link to post
colorman 26 Posted ... Strange, now all of a sudden I can close Eddie in openSUSE Leap 15.Bit confusing, forget my messages for now.Keep an eye on it.Thanks for the beta!And sorry for my messy messages. GJ edit; shutdown eddie problem not solved.it hangs in the shutdown progress. ! 2018.07.15 08:37:27 - Session terminated.. 2018.07.15 08:37:33 - Shutdown in progress edit; did upgrade to openSUSE Tumbleweed, still same problem. edit 27-07: https://airvpn.org/topic/28866-eddie-on-opensuse-linux-leap-15-or-tumbleweed/ Share this post Link to post
strykenKN 0 Posted ... HelloUnfortunately it does not work under Linux Mint 19. Eddie complains about Mono!- Dependency is not satisfiable: mono-utils Share this post Link to post
strykenKN 0 Posted ... That's it, I installed mono-utils.If you have problems with it under Ubuntu/Linux Mint, do the following and enter it in the terminal:Install Howto Update the package index: # sudo apt-get update Install mono-utils deb package: # sudo apt-get install mono-utilsthen you can install the beta. Share this post Link to post
Guest Posted ... Someone really messed up. You can't keep pushing stuff with different digital signatures and expect me to trust them without even announcing it. I install this beta and go ahead to run and find a new tool running with someones else digital signature in it. Don't you think if eddie has new dependencies you should make me aware in the changelog so i don't freak out when i see a software that can also be used in ssh software? Share this post Link to post
Staff 9972 Posted ... Someone really messed up. You can't keep pushing stuff with different digital signatures and expect me to trust them without even announcing it. I install this beta and go ahead to run and find a new tool running with someones else digital signature in it. Don't you think if eddie has new dependencies you should make me aware in the changelog so i don't freak out when i see a software that can also be used in ssh software? Hello! Probably we're missing something here so we will leave the discussion to the developers with an invitation to clarify in the meantime: since plink.exe has been included in Eddie package for Windows since many years ago with its MIT license, with the correct digital signature (Simon Tatham is the author https://www.chiark.greenend.org.uk/~sgtatham/) what is the change that's causing any issue? Kind regards Share this post Link to post
user972512 2 Posted ... Hi, and thanks for the new version. However, some user interface problems persist. The tray icon still does not work and the "UI Main Font" button in UI settings does not work either. Also, in the same window with the broken font button, "on't show bootstrap failure window" should probably read "Don't show bootstrap failure window". Xubuntu 16.04 LTS x86 Thanks again. Share this post Link to post
Guest Posted ... Someone really messed up. You can't keep pushing stuff with different digital signatures and expect me to trust them without even announcing it. I install this beta and go ahead to run and find a new tool running with someones else digital signature in it. Don't you think if eddie has new dependencies you should make me aware in the changelog so i don't freak out when i see a software that can also be used in ssh software? Hello! Probably we're missing something here so we will leave the discussion to the developers with an invitation to clarify in the meantime: since plink.exe has been included in Eddie package for Windows since many years ago with its MIT license, with the correct digital signature (Simon Tatham is the author https://www.chiark.greenend.org.uk/~sgtatham/) what is the change that's causing any issue? Kind regards The file used to be signed with airvpn digital signature so i know it was added there by you. Now there was a change from AIR DI PAOLO BRINI (airvpn digital signature) to the developer digital signature (i assume) which none talked about. That reduces security as i can't be sure what that file does when if i use one signed by you guys i can know it's legit assuming you keep your digital signature safe. An easy sad example is ccleaner issue with their software being signed but failing to properly secure their digital signature process. You get the idea. Your digital signature is safer than that guys digital signature. Anw all in all regardless if you decide to change who is signing what, we need to know. Share this post Link to post
Staff 9972 Posted ... The file used to be signed with airvpn digital signature so i know it was added there by you. Now there was a change from AIR DI PAOLO BRINI (airvpn digital signature) to the developer digital signature (i assume) which none talked about. Hello, now it's very clear, thank you. Notifications on the issue will be sent shortly. Kind regards Share this post Link to post
madrat 19 Posted ... Seems to work fine on 10.11.6 El Capitan, but still no luck connecting to an IPv6 server. Logs attached in case you want a look. . 2018.07.15 10:01:50 - Eddie version: 2.16.1 / macos_x64, System: MacOS, Name: 10.11.6, Version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Thu Jun 21 20:07:40 PDT 2018; root:xnu-3248.73.11~1/RELEASE_X86_64 x86_64, Mono/.Net: v4.0.30319. 2018.07.15 10:01:50 - Reading options from /Users/madrat/.airvpn/default.xml. 2018.07.15 10:01:51 - Command line arguments (0):. 2018.07.15 10:01:51 - Profile path: /Users/madrat/.airvpn/default.xml. 2018.07.15 10:01:54 - OpenVPN Driver - Expected. 2018.07.15 10:01:54 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn). 2018.07.15 10:01:54 - SSH - Version: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh). 2018.07.15 10:01:54 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel). 2018.07.15 10:01:54 - curl - Version: 7.43.0 (/usr/bin/curl). 2018.07.15 10:01:54 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem! 2018.07.15 10:01:54 - Activation of Network Lock - macOS - PF. 2018.07.15 10:01:54 - macOS - PF rules updated, reloading. 2018.07.15 10:01:55 - Updating systems & servers data .... 2018.07.15 10:01:55 - macOS - PF rules updated, reloadingI 2018.07.15 10:01:56 - Session starting.. 2018.07.15 10:01:57 - Systems & servers data update completedI 2018.07.15 10:02:07 - Checking authorization .... 2018.07.15 10:02:08 - IPv6 disabled on network adapter (SAMSUNG Modem). 2018.07.15 10:02:08 - IPv6 disabled on network adapter (Ethernet). 2018.07.15 10:02:08 - IPv6 disabled on network adapter (FireWire). 2018.07.15 10:02:08 - IPv6 disabled on network adapter (Wi-Fi)! 2018.07.15 10:02:08 - Connecting to Cynosura (Canada, Vancouver). 2018.07.15 10:02:08 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018. 2018.07.15 10:02:08 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.07.15 10:02:08 - Connection to OpenVPN Management Interface. 2018.07.15 10:02:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.07.15 10:02:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:02:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:02:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443. 2018.07.15 10:02:08 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2018.07.15 10:02:09 - OpenVPN > UDP link local: (not bound). 2018.07.15 10:02:09 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443. 2018.07.15 10:02:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.07.15 10:02:09 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=6140bf11 e7bde297. 2018.07.15 10:02:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.07.15 10:02:09 - OpenVPN > VERIFY KU OK. 2018.07.15 10:02:09 - OpenVPN > Validating certificate extended key usage. 2018.07.15 10:02:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.07.15 10:02:09 - OpenVPN > VERIFY EKU OK. 2018.07.15 10:02:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org. 2018.07.15 10:02:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.07.15 10:02:09 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]71.19.252.21:443. 2018.07.15 10:02:10 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1). 2018.07.15 10:02:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.16.1,route-gateway 10.15.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.16.136 255.255.255.0,peer-id 5,cipher AES-256-GCM'. 2018.07.15 10:02:10 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.07.15 10:02:10 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.07.15 10:02:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.15 10:02:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.15 10:02:10 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae. 2018.07.15 10:02:10 - OpenVPN > Opened utun device utun0. 2018.07.15 10:02:10 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.07.15 10:02:10 - OpenVPN > /sbin/ifconfig utun0 delete. 2018.07.15 10:02:10 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2018.07.15 10:02:10 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2018.07.15 10:02:10 - OpenVPN > /sbin/ifconfig utun0 10.15.16.136 10.15.16.136 netmask 255.255.255.0 mtu 1500 up. 2018.07.15 10:02:10 - OpenVPN > /sbin/route add -net 10.15.16.0 10.15.16.136 255.255.255.0. 2018.07.15 10:02:10 - OpenVPN > add net 10.15.16.0: gateway 10.15.16.136. 2018.07.15 10:02:10 - OpenVPN > /sbin/route add -net 71.19.252.21 192.168.1.254 255.255.255.255. 2018.07.15 10:02:10 - OpenVPN > add net 71.19.252.21: gateway 192.168.1.254. 2018.07.15 10:02:10 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:02:10 - OpenVPN > add net 0.0.0.0: gateway 10.15.16.1. 2018.07.15 10:02:10 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:02:10 - OpenVPN > add net 128.0.0.0: gateway 10.15.16.1. 2018.07.15 10:02:11 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.16.1). 2018.07.15 10:02:11 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.16.1). 2018.07.15 10:02:11 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.16.1). 2018.07.15 10:02:11 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.16.1). 2018.07.15 10:02:11 - Routes, added a new route, 71.19.252.22 for gateway 10.15.16.1. 2018.07.15 10:02:11 - Flushing DNS. 2018.07.15 10:02:12 - macOS - PF rules updated, reloadingI 2018.07.15 10:02:12 - Checking route IPv4I 2018.07.15 10:02:13 - Checking DNS! 2018.07.15 10:02:13 - Connected.. 2018.07.15 10:02:14 - OpenVPN > Initialization Sequence Completed. 2018.07.15 10:03:03 - macOS - PF rules updated, reloading! 2018.07.15 10:03:03 - Disconnecting. 2018.07.15 10:03:03 - Routes, removed a route previously added, 71.19.252.22 for gateway 10.15.16.1. 2018.07.15 10:03:03 - Sending management termination signal. 2018.07.15 10:03:03 - Management - Send 'signal SIGTERM'. 2018.07.15 10:03:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.07.15 10:03:04 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.07.15 10:03:08 - OpenVPN > /sbin/route delete -net 71.19.252.21 192.168.1.254 255.255.255.255. 2018.07.15 10:03:08 - OpenVPN > delete net 71.19.252.21: gateway 192.168.1.254. 2018.07.15 10:03:08 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:03:08 - OpenVPN > delete net 0.0.0.0: gateway 10.15.16.1. 2018.07.15 10:03:08 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:03:08 - OpenVPN > delete net 128.0.0.0: gateway 10.15.16.1. 2018.07.15 10:03:08 - OpenVPN > Closing TUN/TAP interface. 2018.07.15 10:03:08 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.07.15 10:03:08 - Connection terminated.. 2018.07.15 10:03:08 - IPv6 restored on network adapter (SAMSUNG Modem). 2018.07.15 10:03:08 - IPv6 restored on network adapter (Ethernet). 2018.07.15 10:03:08 - IPv6 restored on network adapter (FireWire). 2018.07.15 10:03:08 - IPv6 restored on network adapter (Wi-Fi). 2018.07.15 10:03:08 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic). 2018.07.15 10:03:08 - DNS of a network adapter restored to original settings (Ethernet, to Automatic). 2018.07.15 10:03:08 - DNS of a network adapter restored to original settings (FireWire, to 10.4.0.1). 2018.07.15 10:03:08 - DNS of a network adapter restored to original settings (Wi-Fi, to 10.4.0.1)I 2018.07.15 10:03:08 - Checking authorization ...! 2018.07.15 10:03:09 - Connecting to Cephei (Canada, Toronto, Ontario). 2018.07.15 10:03:10 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018. 2018.07.15 10:03:10 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.07.15 10:03:10 - Connection to OpenVPN Management Interface. 2018.07.15 10:03:10 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.07.15 10:03:10 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:03:10 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:03:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2606:6080:1001:c:fab7:78e8:4f3a:6eda:443. 2018.07.15 10:03:10 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2018.07.15 10:03:10 - OpenVPN > UDPv6 link local: (not bound). 2018.07.15 10:03:10 - OpenVPN > UDPv6 link remote: [AF_INET6]2606:6080:1001:c:fab7:78e8:4f3a:6eda:443. 2018.07.15 10:03:10 - OpenVPN > write UDPv6: No route to host (code=65). 2018.07.15 10:03:10 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.07.15 10:03:11 - OpenVPN > write UDPv6: No route to host (code=65). 2018.07.15 10:03:41 - Above log line repeated 3 times more. 2018.07.15 10:03:41 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2018.07.15 10:03:41 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.07.15 10:03:46 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2018.07.15 10:03:46 - Disconnecting. 2018.07.15 10:03:47 - Connection terminated.I 2018.07.15 10:03:50 - Checking authorization .... 2018.07.15 10:03:51 - IPv6 disabled on network adapter (SAMSUNG Modem). 2018.07.15 10:03:51 - IPv6 disabled on network adapter (Ethernet). 2018.07.15 10:03:51 - IPv6 disabled on network adapter (FireWire). 2018.07.15 10:03:51 - IPv6 disabled on network adapter (Wi-Fi)! 2018.07.15 10:03:51 - Connecting to Cynosura (Canada, Vancouver). 2018.07.15 10:03:51 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018. 2018.07.15 10:03:51 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.07.15 10:03:51 - Connection to OpenVPN Management Interface. 2018.07.15 10:03:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.07.15 10:03:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:03:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:03:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443. 2018.07.15 10:03:51 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2018.07.15 10:03:51 - OpenVPN > UDP link local: (not bound). 2018.07.15 10:03:51 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443. 2018.07.15 10:03:51 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.07.15 10:03:51 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=dcf12fc3 ff4d6a80. 2018.07.15 10:03:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.07.15 10:03:52 - OpenVPN > VERIFY KU OK. 2018.07.15 10:03:52 - OpenVPN > Validating certificate extended key usage. 2018.07.15 10:03:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.07.15 10:03:52 - OpenVPN > VERIFY EKU OK. 2018.07.15 10:03:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org. 2018.07.15 10:03:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.07.15 10:03:52 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]71.19.252.21:443. 2018.07.15 10:03:53 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1). 2018.07.15 10:03:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.16.1,route-gateway 10.15.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.16.136 255.255.255.0,peer-id 5,cipher AES-256-GCM'. 2018.07.15 10:03:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.07.15 10:03:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.07.15 10:03:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.15 10:03:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.15 10:03:53 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae. 2018.07.15 10:03:53 - OpenVPN > Opened utun device utun0. 2018.07.15 10:03:53 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.07.15 10:03:53 - OpenVPN > /sbin/ifconfig utun0 delete. 2018.07.15 10:03:53 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2018.07.15 10:03:53 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2018.07.15 10:03:53 - OpenVPN > /sbin/ifconfig utun0 10.15.16.136 10.15.16.136 netmask 255.255.255.0 mtu 1500 up. 2018.07.15 10:03:53 - OpenVPN > /sbin/route add -net 10.15.16.0 10.15.16.136 255.255.255.0. 2018.07.15 10:03:53 - OpenVPN > add net 10.15.16.0: gateway 10.15.16.136. 2018.07.15 10:03:53 - OpenVPN > /sbin/route add -net 71.19.252.21 192.168.1.254 255.255.255.255. 2018.07.15 10:03:53 - OpenVPN > add net 71.19.252.21: gateway 192.168.1.254. 2018.07.15 10:03:53 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:03:53 - OpenVPN > add net 0.0.0.0: gateway 10.15.16.1. 2018.07.15 10:03:53 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:03:53 - OpenVPN > add net 128.0.0.0: gateway 10.15.16.1. 2018.07.15 10:03:53 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.16.1). 2018.07.15 10:03:54 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.16.1). 2018.07.15 10:03:54 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.16.1). 2018.07.15 10:03:54 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.16.1). 2018.07.15 10:03:54 - Routes, added a new route, 71.19.252.22 for gateway 10.15.16.1. 2018.07.15 10:03:54 - Flushing DNS. 2018.07.15 10:03:54 - macOS - PF rules updated, reloadingI 2018.07.15 10:03:55 - Checking route IPv4I 2018.07.15 10:03:56 - Checking DNS! 2018.07.15 10:03:56 - Connected.. 2018.07.15 10:03:56 - OpenVPN > Initialization Sequence Completed. 2018.07.15 10:04:34 - macOS - PF rules updated, reloading! 2018.07.15 10:04:35 - Disconnecting. 2018.07.15 10:04:35 - Routes, removed a route previously added, 71.19.252.22 for gateway 10.15.16.1. 2018.07.15 10:04:35 - Sending management termination signal. 2018.07.15 10:04:35 - Management - Send 'signal SIGTERM'. 2018.07.15 10:04:35 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.07.15 10:04:35 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.07.15 10:04:40 - OpenVPN > /sbin/route delete -net 71.19.252.21 192.168.1.254 255.255.255.255. 2018.07.15 10:04:40 - OpenVPN > delete net 71.19.252.21: gateway 192.168.1.254. 2018.07.15 10:04:40 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:04:40 - OpenVPN > delete net 0.0.0.0: gateway 10.15.16.1. 2018.07.15 10:04:40 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:04:40 - OpenVPN > delete net 128.0.0.0: gateway 10.15.16.1. 2018.07.15 10:04:40 - OpenVPN > Closing TUN/TAP interface. 2018.07.15 10:04:40 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.07.15 10:04:40 - Connection terminated.. 2018.07.15 10:04:40 - IPv6 restored on network adapter (SAMSUNG Modem). 2018.07.15 10:04:40 - IPv6 restored on network adapter (Ethernet). 2018.07.15 10:04:40 - IPv6 restored on network adapter (FireWire). 2018.07.15 10:04:40 - IPv6 restored on network adapter (Wi-Fi). 2018.07.15 10:04:40 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic). 2018.07.15 10:04:40 - DNS of a network adapter restored to original settings (Ethernet, to Automatic). 2018.07.15 10:04:40 - DNS of a network adapter restored to original settings (FireWire, to 10.4.0.1). 2018.07.15 10:04:40 - DNS of a network adapter restored to original settings (Wi-Fi, to 10.4.0.1)I 2018.07.15 10:04:40 - Checking authorization ...! 2018.07.15 10:04:41 - Connecting to Rana (Canada, Toronto, Ontario). 2018.07.15 10:04:41 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018. 2018.07.15 10:04:41 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.07.15 10:04:41 - Connection to OpenVPN Management Interface. 2018.07.15 10:04:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.07.15 10:04:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:04:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:04:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443. 2018.07.15 10:04:41 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2018.07.15 10:04:41 - OpenVPN > UDPv6 link local: (not bound). 2018.07.15 10:04:41 - OpenVPN > UDPv6 link remote: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443. 2018.07.15 10:04:41 - OpenVPN > write UDPv6: No route to host (code=65). 2018.07.15 10:04:42 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.07.15 10:04:44 - OpenVPN > write UDPv6: No route to host (code=65). 2018.07.15 10:05:13 - Above log line repeated 3 times more. 2018.07.15 10:05:13 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2018.07.15 10:05:13 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.07.15 10:05:18 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2018.07.15 10:05:18 - Disconnecting. 2018.07.15 10:05:18 - Connection terminated.I 2018.07.15 10:05:21 - Checking authorization .... 2018.07.15 10:05:22 - IPv6 disabled on network adapter (SAMSUNG Modem). 2018.07.15 10:05:22 - IPv6 disabled on network adapter (Ethernet). 2018.07.15 10:05:22 - IPv6 disabled on network adapter (FireWire). 2018.07.15 10:05:22 - IPv6 disabled on network adapter (Wi-Fi)! 2018.07.15 10:05:22 - Connecting to Cynosura (Canada, Vancouver). 2018.07.15 10:05:22 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018. 2018.07.15 10:05:22 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.07.15 10:05:22 - Connection to OpenVPN Management Interface. 2018.07.15 10:05:22 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.07.15 10:05:22 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:05:22 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:05:22 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443. 2018.07.15 10:05:22 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2018.07.15 10:05:22 - OpenVPN > UDP link local: (not bound). 2018.07.15 10:05:22 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443. 2018.07.15 10:05:22 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.07.15 10:05:22 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=b74c8b2f af4b383b. 2018.07.15 10:05:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.07.15 10:05:22 - OpenVPN > VERIFY KU OK. 2018.07.15 10:05:22 - OpenVPN > Validating certificate extended key usage. 2018.07.15 10:05:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.07.15 10:05:22 - OpenVPN > VERIFY EKU OK. 2018.07.15 10:05:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org. 2018.07.15 10:05:23 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.07.15 10:05:23 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]71.19.252.21:443. 2018.07.15 10:05:24 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1). 2018.07.15 10:05:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.16.1,route-gateway 10.15.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.16.136 255.255.255.0,peer-id 5,cipher AES-256-GCM'. 2018.07.15 10:05:24 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.07.15 10:05:24 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.07.15 10:05:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.15 10:05:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.15 10:05:24 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae. 2018.07.15 10:05:24 - OpenVPN > Opened utun device utun0. 2018.07.15 10:05:24 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.07.15 10:05:24 - OpenVPN > /sbin/ifconfig utun0 delete. 2018.07.15 10:05:24 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2018.07.15 10:05:24 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2018.07.15 10:05:24 - OpenVPN > /sbin/ifconfig utun0 10.15.16.136 10.15.16.136 netmask 255.255.255.0 mtu 1500 up. 2018.07.15 10:05:24 - OpenVPN > /sbin/route add -net 10.15.16.0 10.15.16.136 255.255.255.0. 2018.07.15 10:05:24 - OpenVPN > add net 10.15.16.0: gateway 10.15.16.136. 2018.07.15 10:05:24 - OpenVPN > /sbin/route add -net 71.19.252.21 192.168.1.254 255.255.255.255. 2018.07.15 10:05:24 - OpenVPN > add net 71.19.252.21: gateway 192.168.1.254. 2018.07.15 10:05:24 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:05:24 - OpenVPN > add net 0.0.0.0: gateway 10.15.16.1. 2018.07.15 10:05:24 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:05:24 - OpenVPN > add net 128.0.0.0: gateway 10.15.16.1. 2018.07.15 10:05:24 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.16.1). 2018.07.15 10:05:25 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.16.1). 2018.07.15 10:05:25 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.16.1). 2018.07.15 10:05:25 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.16.1). 2018.07.15 10:05:25 - Routes, added a new route, 71.19.252.22 for gateway 10.15.16.1. 2018.07.15 10:05:25 - Flushing DNS. 2018.07.15 10:05:25 - macOS - PF rules updated, reloadingI 2018.07.15 10:05:26 - Checking route IPv4I 2018.07.15 10:05:27 - Checking DNS! 2018.07.15 10:05:27 - Connected.. 2018.07.15 10:05:27 - OpenVPN > Initialization Sequence Completed. 2018.07.15 10:06:08 - macOS - PF rules updated, reloading! 2018.07.15 10:06:09 - Disconnecting. 2018.07.15 10:06:09 - Routes, removed a route previously added, 71.19.252.22 for gateway 10.15.16.1. 2018.07.15 10:06:09 - Sending management termination signal. 2018.07.15 10:06:09 - Management - Send 'signal SIGTERM'. 2018.07.15 10:06:09 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.07.15 10:06:09 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.07.15 10:06:14 - OpenVPN > /sbin/route delete -net 71.19.252.21 192.168.1.254 255.255.255.255. 2018.07.15 10:06:14 - OpenVPN > delete net 71.19.252.21: gateway 192.168.1.254. 2018.07.15 10:06:14 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:06:14 - OpenVPN > delete net 0.0.0.0: gateway 10.15.16.1. 2018.07.15 10:06:14 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:06:14 - OpenVPN > delete net 128.0.0.0: gateway 10.15.16.1. 2018.07.15 10:06:14 - OpenVPN > Closing TUN/TAP interface. 2018.07.15 10:06:14 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.07.15 10:06:14 - Connection terminated.. 2018.07.15 10:06:14 - IPv6 restored on network adapter (SAMSUNG Modem). 2018.07.15 10:06:14 - IPv6 restored on network adapter (Ethernet). 2018.07.15 10:06:14 - IPv6 restored on network adapter (FireWire). 2018.07.15 10:06:14 - IPv6 restored on network adapter (Wi-Fi). 2018.07.15 10:06:14 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic). 2018.07.15 10:06:14 - DNS of a network adapter restored to original settings (Ethernet, to Automatic). 2018.07.15 10:06:14 - DNS of a network adapter restored to original settings (FireWire, to 10.4.0.1). 2018.07.15 10:06:14 - DNS of a network adapter restored to original settings (Wi-Fi, to 10.4.0.1)I 2018.07.15 10:06:14 - Checking authorization ...! 2018.07.15 10:06:15 - Connecting to Rana (Canada, Toronto, Ontario). 2018.07.15 10:06:19 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018. 2018.07.15 10:06:19 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.07.15 10:06:19 - Connection to OpenVPN Management Interface. 2018.07.15 10:06:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.07.15 10:06:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:06:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:06:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443. 2018.07.15 10:06:19 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2018.07.15 10:06:19 - OpenVPN > UDPv6 link local: (not bound). 2018.07.15 10:06:19 - OpenVPN > UDPv6 link remote: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443. 2018.07.15 10:06:19 - OpenVPN > write UDPv6: No route to host (code=65). 2018.07.15 10:06:19 - Above log line repeated 1 times more. 2018.07.15 10:06:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.07.15 10:06:22 - OpenVPN > write UDPv6: No route to host (code=65). 2018.07.15 10:06:47 - Above log line repeated 1 times more. 2018.07.15 10:06:47 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2018.07.15 10:06:47 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.07.15 10:06:47 - OpenVPN > write UDPv6: No route to host (code=65). 2018.07.15 10:06:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2018.07.15 10:06:52 - Disconnecting. 2018.07.15 10:06:52 - Connection terminated.I 2018.07.15 10:06:55 - Checking authorization .... 2018.07.15 10:06:56 - IPv6 disabled on network adapter (SAMSUNG Modem). 2018.07.15 10:06:56 - IPv6 disabled on network adapter (Ethernet). 2018.07.15 10:06:56 - IPv6 disabled on network adapter (FireWire). 2018.07.15 10:06:56 - IPv6 disabled on network adapter (Wi-Fi)! 2018.07.15 10:06:56 - Connecting to Cynosura (Canada, Vancouver). 2018.07.15 10:06:56 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018. 2018.07.15 10:06:56 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.07.15 10:06:56 - Connection to OpenVPN Management Interface. 2018.07.15 10:06:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.07.15 10:06:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:06:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:06:56 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443. 2018.07.15 10:06:56 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2018.07.15 10:06:56 - OpenVPN > UDP link local: (not bound). 2018.07.15 10:06:56 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443. 2018.07.15 10:06:56 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.07.15 10:06:56 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=aa80bbb3 ab01f459. 2018.07.15 10:06:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.07.15 10:06:57 - OpenVPN > VERIFY KU OK. 2018.07.15 10:06:57 - OpenVPN > Validating certificate extended key usage. 2018.07.15 10:06:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.07.15 10:06:57 - OpenVPN > VERIFY EKU OK. 2018.07.15 10:06:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org. 2018.07.15 10:06:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.07.15 10:06:57 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]71.19.252.21:443. 2018.07.15 10:06:58 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1). 2018.07.15 10:06:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.16.1,route-gateway 10.15.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.16.136 255.255.255.0,peer-id 5,cipher AES-256-GCM'. 2018.07.15 10:06:58 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.07.15 10:06:58 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.07.15 10:06:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.15 10:06:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.15 10:06:58 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae. 2018.07.15 10:06:58 - OpenVPN > Opened utun device utun0. 2018.07.15 10:06:58 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.07.15 10:06:58 - OpenVPN > /sbin/ifconfig utun0 delete. 2018.07.15 10:06:58 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2018.07.15 10:06:58 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2018.07.15 10:06:58 - OpenVPN > /sbin/ifconfig utun0 10.15.16.136 10.15.16.136 netmask 255.255.255.0 mtu 1500 up. 2018.07.15 10:06:58 - OpenVPN > /sbin/route add -net 10.15.16.0 10.15.16.136 255.255.255.0. 2018.07.15 10:06:58 - OpenVPN > add net 10.15.16.0: gateway 10.15.16.136. 2018.07.15 10:06:58 - OpenVPN > /sbin/route add -net 71.19.252.21 192.168.1.254 255.255.255.255. 2018.07.15 10:06:58 - OpenVPN > add net 71.19.252.21: gateway 192.168.1.254. 2018.07.15 10:06:58 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:06:58 - OpenVPN > add net 0.0.0.0: gateway 10.15.16.1. 2018.07.15 10:06:58 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:06:58 - OpenVPN > add net 128.0.0.0: gateway 10.15.16.1. 2018.07.15 10:06:58 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.16.1). 2018.07.15 10:06:58 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.16.1). 2018.07.15 10:06:59 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.16.1). 2018.07.15 10:06:59 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.16.1). 2018.07.15 10:06:59 - Routes, added a new route, 71.19.252.22 for gateway 10.15.16.1. 2018.07.15 10:06:59 - Flushing DNS. 2018.07.15 10:06:59 - macOS - PF rules updated, reloadingI 2018.07.15 10:07:00 - Checking route IPv4I 2018.07.15 10:07:00 - Checking DNS! 2018.07.15 10:07:01 - Connected.. 2018.07.15 10:07:01 - OpenVPN > Initialization Sequence Completed System Log:Eddie System/Environment Report - 7/15/2018 5:12 PM UTCEddie version: 2.16.1Eddie OS build: macos_x64Eddie architecture: x64OS type: MacOSOS name: 10.11.6OS version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Thu Jun 21 20:07:40 PDT 2018; root:xnu-3248.73.11~1/RELEASE_X86_64 x86_64OS architecture: x64Mono /.Net Framework: v4.0.30319OpenVPN driver: ExpectedOpenVPN: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)SSH: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)SSL: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)curl: 7.43.0 (/usr/bin/curl)Profile path: /Users/madrat/.airvpn/default.xmlData path: /Users/madrat/.airvpnApplication path: /Applications/Eddie.app/Contents/MacOSExecutable path: /Applications/Eddie.app/Contents/MacOS/EddieCommand line arguments: (0 args)Network Lock Active: Yes, macOS - PFConnected to VPN: Yes, CynosuraDetected DNS: 10.15.16.1Test DNS IPv4: OkTest DNS IPv6: OkTest Ping IPv4: 55 msTest Ping IPv6: -1 msTest HTTP IPv4: OkTest HTTP IPv6: Error:curl: (7) Couldn't connect to serverTest HTTPS: Ok----------------------------Important options not at defaults:login: (omissis)password: (omissis)remember: Trueconnect: Truenetlock: Truenetwork.entry.iplayer: ipv6-ipv4openvpn.management_port: 3101----------------------------Logs:. 2018.07.15 10:01:50 - Eddie version: 2.16.1 / macos_x64, System: MacOS, Name: 10.11.6, Version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Thu Jun 21 20:07:40 PDT 2018; root:xnu-3248.73.11~1/RELEASE_X86_64 x86_64, Mono/.Net: v4.0.30319. 2018.07.15 10:01:50 - Reading options from /Users/madrat/.airvpn/default.xml. 2018.07.15 10:01:51 - Command line arguments (0):. 2018.07.15 10:01:51 - Profile path: /Users/madrat/.airvpn/default.xml. 2018.07.15 10:01:54 - OpenVPN Driver - Expected. 2018.07.15 10:01:54 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn). 2018.07.15 10:01:54 - SSH - Version: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh). 2018.07.15 10:01:54 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel). 2018.07.15 10:01:54 - curl - Version: 7.43.0 (/usr/bin/curl). 2018.07.15 10:01:54 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem! 2018.07.15 10:01:54 - Activation of Network Lock - macOS - PF. 2018.07.15 10:01:54 - macOS - PF rules updated, reloading. 2018.07.15 10:01:55 - Updating systems & servers data .... 2018.07.15 10:01:55 - macOS - PF rules updated, reloadingI 2018.07.15 10:01:56 - Session starting.. 2018.07.15 10:01:57 - Systems & servers data update completedI 2018.07.15 10:02:07 - Checking authorization .... 2018.07.15 10:02:08 - IPv6 disabled on network adapter (SAMSUNG Modem). 2018.07.15 10:02:08 - IPv6 disabled on network adapter (Ethernet). 2018.07.15 10:02:08 - IPv6 disabled on network adapter (FireWire). 2018.07.15 10:02:08 - IPv6 disabled on network adapter (Wi-Fi)! 2018.07.15 10:02:08 - Connecting to Cynosura (Canada, Vancouver). 2018.07.15 10:02:08 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018. 2018.07.15 10:02:08 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.07.15 10:02:08 - Connection to OpenVPN Management Interface. 2018.07.15 10:02:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.07.15 10:02:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:02:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:02:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443. 2018.07.15 10:02:08 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2018.07.15 10:02:09 - OpenVPN > UDP link local: (not bound). 2018.07.15 10:02:09 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443. 2018.07.15 10:02:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.07.15 10:02:09 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=6140bf11 e7bde297. 2018.07.15 10:02:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.07.15 10:02:09 - OpenVPN > VERIFY KU OK. 2018.07.15 10:02:09 - OpenVPN > Validating certificate extended key usage. 2018.07.15 10:02:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.07.15 10:02:09 - OpenVPN > VERIFY EKU OK. 2018.07.15 10:02:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org. 2018.07.15 10:02:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.07.15 10:02:09 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]71.19.252.21:443. 2018.07.15 10:02:10 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1). 2018.07.15 10:02:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.16.1,route-gateway 10.15.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.16.136 255.255.255.0,peer-id 5,cipher AES-256-GCM'. 2018.07.15 10:02:10 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.07.15 10:02:10 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.07.15 10:02:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.15 10:02:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.15 10:02:10 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae. 2018.07.15 10:02:10 - OpenVPN > Opened utun device utun0. 2018.07.15 10:02:10 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.07.15 10:02:10 - OpenVPN > /sbin/ifconfig utun0 delete. 2018.07.15 10:02:10 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2018.07.15 10:02:10 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2018.07.15 10:02:10 - OpenVPN > /sbin/ifconfig utun0 10.15.16.136 10.15.16.136 netmask 255.255.255.0 mtu 1500 up. 2018.07.15 10:02:10 - OpenVPN > /sbin/route add -net 10.15.16.0 10.15.16.136 255.255.255.0. 2018.07.15 10:02:10 - OpenVPN > add net 10.15.16.0: gateway 10.15.16.136. 2018.07.15 10:02:10 - OpenVPN > /sbin/route add -net 71.19.252.21 192.168.1.254 255.255.255.255. 2018.07.15 10:02:10 - OpenVPN > add net 71.19.252.21: gateway 192.168.1.254. 2018.07.15 10:02:10 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:02:10 - OpenVPN > add net 0.0.0.0: gateway 10.15.16.1. 2018.07.15 10:02:10 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:02:10 - OpenVPN > add net 128.0.0.0: gateway 10.15.16.1. 2018.07.15 10:02:11 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.16.1). 2018.07.15 10:02:11 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.16.1). 2018.07.15 10:02:11 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.16.1). 2018.07.15 10:02:11 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.16.1). 2018.07.15 10:02:11 - Routes, added a new route, 71.19.252.22 for gateway 10.15.16.1. 2018.07.15 10:02:11 - Flushing DNS. 2018.07.15 10:02:12 - macOS - PF rules updated, reloadingI 2018.07.15 10:02:12 - Checking route IPv4I 2018.07.15 10:02:13 - Checking DNS! 2018.07.15 10:02:13 - Connected.. 2018.07.15 10:02:14 - OpenVPN > Initialization Sequence Completed. 2018.07.15 10:03:03 - macOS - PF rules updated, reloading! 2018.07.15 10:03:03 - Disconnecting. 2018.07.15 10:03:03 - Routes, removed a route previously added, 71.19.252.22 for gateway 10.15.16.1. 2018.07.15 10:03:03 - Sending management termination signal. 2018.07.15 10:03:03 - Management - Send 'signal SIGTERM'. 2018.07.15 10:03:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.07.15 10:03:04 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.07.15 10:03:08 - OpenVPN > /sbin/route delete -net 71.19.252.21 192.168.1.254 255.255.255.255. 2018.07.15 10:03:08 - OpenVPN > delete net 71.19.252.21: gateway 192.168.1.254. 2018.07.15 10:03:08 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:03:08 - OpenVPN > delete net 0.0.0.0: gateway 10.15.16.1. 2018.07.15 10:03:08 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:03:08 - OpenVPN > delete net 128.0.0.0: gateway 10.15.16.1. 2018.07.15 10:03:08 - OpenVPN > Closing TUN/TAP interface. 2018.07.15 10:03:08 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.07.15 10:03:08 - Connection terminated.. 2018.07.15 10:03:08 - IPv6 restored on network adapter (SAMSUNG Modem). 2018.07.15 10:03:08 - IPv6 restored on network adapter (Ethernet). 2018.07.15 10:03:08 - IPv6 restored on network adapter (FireWire). 2018.07.15 10:03:08 - IPv6 restored on network adapter (Wi-Fi). 2018.07.15 10:03:08 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic). 2018.07.15 10:03:08 - DNS of a network adapter restored to original settings (Ethernet, to Automatic). 2018.07.15 10:03:08 - DNS of a network adapter restored to original settings (FireWire, to 10.4.0.1). 2018.07.15 10:03:08 - DNS of a network adapter restored to original settings (Wi-Fi, to 10.4.0.1)I 2018.07.15 10:03:08 - Checking authorization ...! 2018.07.15 10:03:09 - Connecting to Cephei (Canada, Toronto, Ontario). 2018.07.15 10:03:10 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018. 2018.07.15 10:03:10 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.07.15 10:03:10 - Connection to OpenVPN Management Interface. 2018.07.15 10:03:10 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.07.15 10:03:10 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:03:10 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:03:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2606:6080:1001:c:fab7:78e8:4f3a:6eda:443. 2018.07.15 10:03:10 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2018.07.15 10:03:10 - OpenVPN > UDPv6 link local: (not bound). 2018.07.15 10:03:10 - OpenVPN > UDPv6 link remote: [AF_INET6]2606:6080:1001:c:fab7:78e8:4f3a:6eda:443. 2018.07.15 10:03:10 - OpenVPN > write UDPv6: No route to host (code=65). 2018.07.15 10:03:10 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.07.15 10:03:11 - OpenVPN > write UDPv6: No route to host (code=65). 2018.07.15 10:03:41 - Above log line repeated 3 times more. 2018.07.15 10:03:41 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2018.07.15 10:03:41 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.07.15 10:03:46 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2018.07.15 10:03:46 - Disconnecting. 2018.07.15 10:03:47 - Connection terminated.I 2018.07.15 10:03:50 - Checking authorization .... 2018.07.15 10:03:51 - IPv6 disabled on network adapter (SAMSUNG Modem). 2018.07.15 10:03:51 - IPv6 disabled on network adapter (Ethernet). 2018.07.15 10:03:51 - IPv6 disabled on network adapter (FireWire). 2018.07.15 10:03:51 - IPv6 disabled on network adapter (Wi-Fi)! 2018.07.15 10:03:51 - Connecting to Cynosura (Canada, Vancouver). 2018.07.15 10:03:51 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018. 2018.07.15 10:03:51 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.07.15 10:03:51 - Connection to OpenVPN Management Interface. 2018.07.15 10:03:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.07.15 10:03:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:03:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:03:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443. 2018.07.15 10:03:51 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2018.07.15 10:03:51 - OpenVPN > UDP link local: (not bound). 2018.07.15 10:03:51 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443. 2018.07.15 10:03:51 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.07.15 10:03:51 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=dcf12fc3 ff4d6a80. 2018.07.15 10:03:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.07.15 10:03:52 - OpenVPN > VERIFY KU OK. 2018.07.15 10:03:52 - OpenVPN > Validating certificate extended key usage. 2018.07.15 10:03:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.07.15 10:03:52 - OpenVPN > VERIFY EKU OK. 2018.07.15 10:03:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org. 2018.07.15 10:03:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.07.15 10:03:52 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]71.19.252.21:443. 2018.07.15 10:03:53 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1). 2018.07.15 10:03:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.16.1,route-gateway 10.15.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.16.136 255.255.255.0,peer-id 5,cipher AES-256-GCM'. 2018.07.15 10:03:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.07.15 10:03:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.07.15 10:03:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.15 10:03:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.15 10:03:53 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae. 2018.07.15 10:03:53 - OpenVPN > Opened utun device utun0. 2018.07.15 10:03:53 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.07.15 10:03:53 - OpenVPN > /sbin/ifconfig utun0 delete. 2018.07.15 10:03:53 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2018.07.15 10:03:53 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2018.07.15 10:03:53 - OpenVPN > /sbin/ifconfig utun0 10.15.16.136 10.15.16.136 netmask 255.255.255.0 mtu 1500 up. 2018.07.15 10:03:53 - OpenVPN > /sbin/route add -net 10.15.16.0 10.15.16.136 255.255.255.0. 2018.07.15 10:03:53 - OpenVPN > add net 10.15.16.0: gateway 10.15.16.136. 2018.07.15 10:03:53 - OpenVPN > /sbin/route add -net 71.19.252.21 192.168.1.254 255.255.255.255. 2018.07.15 10:03:53 - OpenVPN > add net 71.19.252.21: gateway 192.168.1.254. 2018.07.15 10:03:53 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:03:53 - OpenVPN > add net 0.0.0.0: gateway 10.15.16.1. 2018.07.15 10:03:53 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:03:53 - OpenVPN > add net 128.0.0.0: gateway 10.15.16.1. 2018.07.15 10:03:53 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.16.1). 2018.07.15 10:03:54 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.16.1). 2018.07.15 10:03:54 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.16.1). 2018.07.15 10:03:54 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.16.1). 2018.07.15 10:03:54 - Routes, added a new route, 71.19.252.22 for gateway 10.15.16.1. 2018.07.15 10:03:54 - Flushing DNS. 2018.07.15 10:03:54 - macOS - PF rules updated, reloadingI 2018.07.15 10:03:55 - Checking route IPv4I 2018.07.15 10:03:56 - Checking DNS! 2018.07.15 10:03:56 - Connected.. 2018.07.15 10:03:56 - OpenVPN > Initialization Sequence Completed. 2018.07.15 10:04:34 - macOS - PF rules updated, reloading! 2018.07.15 10:04:35 - Disconnecting. 2018.07.15 10:04:35 - Routes, removed a route previously added, 71.19.252.22 for gateway 10.15.16.1. 2018.07.15 10:04:35 - Sending management termination signal. 2018.07.15 10:04:35 - Management - Send 'signal SIGTERM'. 2018.07.15 10:04:35 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.07.15 10:04:35 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.07.15 10:04:40 - OpenVPN > /sbin/route delete -net 71.19.252.21 192.168.1.254 255.255.255.255. 2018.07.15 10:04:40 - OpenVPN > delete net 71.19.252.21: gateway 192.168.1.254. 2018.07.15 10:04:40 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:04:40 - OpenVPN > delete net 0.0.0.0: gateway 10.15.16.1. 2018.07.15 10:04:40 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:04:40 - OpenVPN > delete net 128.0.0.0: gateway 10.15.16.1. 2018.07.15 10:04:40 - OpenVPN > Closing TUN/TAP interface. 2018.07.15 10:04:40 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.07.15 10:04:40 - Connection terminated.. 2018.07.15 10:04:40 - IPv6 restored on network adapter (SAMSUNG Modem). 2018.07.15 10:04:40 - IPv6 restored on network adapter (Ethernet). 2018.07.15 10:04:40 - IPv6 restored on network adapter (FireWire). 2018.07.15 10:04:40 - IPv6 restored on network adapter (Wi-Fi). 2018.07.15 10:04:40 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic). 2018.07.15 10:04:40 - DNS of a network adapter restored to original settings (Ethernet, to Automatic). 2018.07.15 10:04:40 - DNS of a network adapter restored to original settings (FireWire, to 10.4.0.1). 2018.07.15 10:04:40 - DNS of a network adapter restored to original settings (Wi-Fi, to 10.4.0.1)I 2018.07.15 10:04:40 - Checking authorization ...! 2018.07.15 10:04:41 - Connecting to Rana (Canada, Toronto, Ontario). 2018.07.15 10:04:41 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018. 2018.07.15 10:04:41 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.07.15 10:04:41 - Connection to OpenVPN Management Interface. 2018.07.15 10:04:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.07.15 10:04:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:04:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:04:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443. 2018.07.15 10:04:41 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2018.07.15 10:04:41 - OpenVPN > UDPv6 link local: (not bound). 2018.07.15 10:04:41 - OpenVPN > UDPv6 link remote: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443. 2018.07.15 10:04:41 - OpenVPN > write UDPv6: No route to host (code=65). 2018.07.15 10:04:42 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.07.15 10:04:44 - OpenVPN > write UDPv6: No route to host (code=65). 2018.07.15 10:05:13 - Above log line repeated 3 times more. 2018.07.15 10:05:13 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2018.07.15 10:05:13 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.07.15 10:05:18 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2018.07.15 10:05:18 - Disconnecting. 2018.07.15 10:05:18 - Connection terminated.I 2018.07.15 10:05:21 - Checking authorization .... 2018.07.15 10:05:22 - IPv6 disabled on network adapter (SAMSUNG Modem). 2018.07.15 10:05:22 - IPv6 disabled on network adapter (Ethernet). 2018.07.15 10:05:22 - IPv6 disabled on network adapter (FireWire). 2018.07.15 10:05:22 - IPv6 disabled on network adapter (Wi-Fi)! 2018.07.15 10:05:22 - Connecting to Cynosura (Canada, Vancouver). 2018.07.15 10:05:22 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018. 2018.07.15 10:05:22 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.07.15 10:05:22 - Connection to OpenVPN Management Interface. 2018.07.15 10:05:22 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.07.15 10:05:22 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:05:22 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:05:22 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443. 2018.07.15 10:05:22 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2018.07.15 10:05:22 - OpenVPN > UDP link local: (not bound). 2018.07.15 10:05:22 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443. 2018.07.15 10:05:22 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.07.15 10:05:22 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=b74c8b2f af4b383b. 2018.07.15 10:05:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.07.15 10:05:22 - OpenVPN > VERIFY KU OK. 2018.07.15 10:05:22 - OpenVPN > Validating certificate extended key usage. 2018.07.15 10:05:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.07.15 10:05:22 - OpenVPN > VERIFY EKU OK. 2018.07.15 10:05:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org. 2018.07.15 10:05:23 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.07.15 10:05:23 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]71.19.252.21:443. 2018.07.15 10:05:24 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1). 2018.07.15 10:05:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.16.1,route-gateway 10.15.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.16.136 255.255.255.0,peer-id 5,cipher AES-256-GCM'. 2018.07.15 10:05:24 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.07.15 10:05:24 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.07.15 10:05:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.15 10:05:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.15 10:05:24 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae. 2018.07.15 10:05:24 - OpenVPN > Opened utun device utun0. 2018.07.15 10:05:24 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.07.15 10:05:24 - OpenVPN > /sbin/ifconfig utun0 delete. 2018.07.15 10:05:24 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2018.07.15 10:05:24 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2018.07.15 10:05:24 - OpenVPN > /sbin/ifconfig utun0 10.15.16.136 10.15.16.136 netmask 255.255.255.0 mtu 1500 up. 2018.07.15 10:05:24 - OpenVPN > /sbin/route add -net 10.15.16.0 10.15.16.136 255.255.255.0. 2018.07.15 10:05:24 - OpenVPN > add net 10.15.16.0: gateway 10.15.16.136. 2018.07.15 10:05:24 - OpenVPN > /sbin/route add -net 71.19.252.21 192.168.1.254 255.255.255.255. 2018.07.15 10:05:24 - OpenVPN > add net 71.19.252.21: gateway 192.168.1.254. 2018.07.15 10:05:24 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:05:24 - OpenVPN > add net 0.0.0.0: gateway 10.15.16.1. 2018.07.15 10:05:24 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:05:24 - OpenVPN > add net 128.0.0.0: gateway 10.15.16.1. 2018.07.15 10:05:24 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.16.1). 2018.07.15 10:05:25 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.16.1). 2018.07.15 10:05:25 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.16.1). 2018.07.15 10:05:25 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.16.1). 2018.07.15 10:05:25 - Routes, added a new route, 71.19.252.22 for gateway 10.15.16.1. 2018.07.15 10:05:25 - Flushing DNS. 2018.07.15 10:05:25 - macOS - PF rules updated, reloadingI 2018.07.15 10:05:26 - Checking route IPv4I 2018.07.15 10:05:27 - Checking DNS! 2018.07.15 10:05:27 - Connected.. 2018.07.15 10:05:27 - OpenVPN > Initialization Sequence Completed. 2018.07.15 10:06:08 - macOS - PF rules updated, reloading! 2018.07.15 10:06:09 - Disconnecting. 2018.07.15 10:06:09 - Routes, removed a route previously added, 71.19.252.22 for gateway 10.15.16.1. 2018.07.15 10:06:09 - Sending management termination signal. 2018.07.15 10:06:09 - Management - Send 'signal SIGTERM'. 2018.07.15 10:06:09 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2018.07.15 10:06:09 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.07.15 10:06:14 - OpenVPN > /sbin/route delete -net 71.19.252.21 192.168.1.254 255.255.255.255. 2018.07.15 10:06:14 - OpenVPN > delete net 71.19.252.21: gateway 192.168.1.254. 2018.07.15 10:06:14 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:06:14 - OpenVPN > delete net 0.0.0.0: gateway 10.15.16.1. 2018.07.15 10:06:14 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:06:14 - OpenVPN > delete net 128.0.0.0: gateway 10.15.16.1. 2018.07.15 10:06:14 - OpenVPN > Closing TUN/TAP interface. 2018.07.15 10:06:14 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2018.07.15 10:06:14 - Connection terminated.. 2018.07.15 10:06:14 - IPv6 restored on network adapter (SAMSUNG Modem). 2018.07.15 10:06:14 - IPv6 restored on network adapter (Ethernet). 2018.07.15 10:06:14 - IPv6 restored on network adapter (FireWire). 2018.07.15 10:06:14 - IPv6 restored on network adapter (Wi-Fi). 2018.07.15 10:06:14 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic). 2018.07.15 10:06:14 - DNS of a network adapter restored to original settings (Ethernet, to Automatic). 2018.07.15 10:06:14 - DNS of a network adapter restored to original settings (FireWire, to 10.4.0.1). 2018.07.15 10:06:14 - DNS of a network adapter restored to original settings (Wi-Fi, to 10.4.0.1)I 2018.07.15 10:06:14 - Checking authorization ...! 2018.07.15 10:06:15 - Connecting to Rana (Canada, Toronto, Ontario). 2018.07.15 10:06:19 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018. 2018.07.15 10:06:19 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.07.15 10:06:19 - Connection to OpenVPN Management Interface. 2018.07.15 10:06:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.07.15 10:06:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:06:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:06:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443. 2018.07.15 10:06:19 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2018.07.15 10:06:19 - OpenVPN > UDPv6 link local: (not bound). 2018.07.15 10:06:19 - OpenVPN > UDPv6 link remote: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443. 2018.07.15 10:06:19 - OpenVPN > write UDPv6: No route to host (code=65). 2018.07.15 10:06:19 - Above log line repeated 1 times more. 2018.07.15 10:06:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.07.15 10:06:22 - OpenVPN > write UDPv6: No route to host (code=65). 2018.07.15 10:06:47 - Above log line repeated 1 times more. 2018.07.15 10:06:47 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting. 2018.07.15 10:06:47 - OpenVPN > SIGTERM received, sending exit notification to peer. 2018.07.15 10:06:47 - OpenVPN > write UDPv6: No route to host (code=65). 2018.07.15 10:06:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting! 2018.07.15 10:06:52 - Disconnecting. 2018.07.15 10:06:52 - Connection terminated.I 2018.07.15 10:06:55 - Checking authorization .... 2018.07.15 10:06:56 - IPv6 disabled on network adapter (SAMSUNG Modem). 2018.07.15 10:06:56 - IPv6 disabled on network adapter (Ethernet). 2018.07.15 10:06:56 - IPv6 disabled on network adapter (FireWire). 2018.07.15 10:06:56 - IPv6 disabled on network adapter (Wi-Fi)! 2018.07.15 10:06:56 - Connecting to Cynosura (Canada, Vancouver). 2018.07.15 10:06:56 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018. 2018.07.15 10:06:56 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10. 2018.07.15 10:06:56 - Connection to OpenVPN Management Interface. 2018.07.15 10:06:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2018.07.15 10:06:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:06:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2018.07.15 10:06:56 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443. 2018.07.15 10:06:56 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]. 2018.07.15 10:06:56 - OpenVPN > UDP link local: (not bound). 2018.07.15 10:06:56 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443. 2018.07.15 10:06:56 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101. 2018.07.15 10:06:56 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=aa80bbb3 ab01f459. 2018.07.15 10:06:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2018.07.15 10:06:57 - OpenVPN > VERIFY KU OK. 2018.07.15 10:06:57 - OpenVPN > Validating certificate extended key usage. 2018.07.15 10:06:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2018.07.15 10:06:57 - OpenVPN > VERIFY EKU OK. 2018.07.15 10:06:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org. 2018.07.15 10:06:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2018.07.15 10:06:57 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]71.19.252.21:443. 2018.07.15 10:06:58 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1). 2018.07.15 10:06:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.16.1,route-gateway 10.15.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.16.136 255.255.255.0,peer-id 5,cipher AES-256-GCM'. 2018.07.15 10:06:58 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: compression parms modified. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: peer-id set. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified. 2018.07.15 10:06:58 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'. 2018.07.15 10:06:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.15 10:06:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key. 2018.07.15 10:06:58 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae. 2018.07.15 10:06:58 - OpenVPN > Opened utun device utun0. 2018.07.15 10:06:58 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0. 2018.07.15 10:06:58 - OpenVPN > /sbin/ifconfig utun0 delete. 2018.07.15 10:06:58 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2018.07.15 10:06:58 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2018.07.15 10:06:58 - OpenVPN > /sbin/ifconfig utun0 10.15.16.136 10.15.16.136 netmask 255.255.255.0 mtu 1500 up. 2018.07.15 10:06:58 - OpenVPN > /sbin/route add -net 10.15.16.0 10.15.16.136 255.255.255.0. 2018.07.15 10:06:58 - OpenVPN > add net 10.15.16.0: gateway 10.15.16.136. 2018.07.15 10:06:58 - OpenVPN > /sbin/route add -net 71.19.252.21 192.168.1.254 255.255.255.255. 2018.07.15 10:06:58 - OpenVPN > add net 71.19.252.21: gateway 192.168.1.254. 2018.07.15 10:06:58 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:06:58 - OpenVPN > add net 0.0.0.0: gateway 10.15.16.1. 2018.07.15 10:06:58 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.16.1 128.0.0.0. 2018.07.15 10:06:58 - OpenVPN > add net 128.0.0.0: gateway 10.15.16.1. 2018.07.15 10:06:58 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.16.1). 2018.07.15 10:06:58 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.16.1). 2018.07.15 10:06:59 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.16.1). 2018.07.15 10:06:59 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.16.1). 2018.07.15 10:06:59 - Routes, added a new route, 71.19.252.22 for gateway 10.15.16.1. 2018.07.15 10:06:59 - Flushing DNS. 2018.07.15 10:06:59 - macOS - PF rules updated, reloadingI 2018.07.15 10:07:00 - Checking route IPv4I 2018.07.15 10:07:00 - Checking DNS! 2018.07.15 10:07:01 - Connected.. 2018.07.15 10:07:01 - OpenVPN > Initialization Sequence Completed. 2018.07.15 10:12:04 - Updating systems & servers data .... 2018.07.15 10:12:06 - Systems & servers data update completed----------------------------Network Interfaces and Routes:{ "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/1", "gateway": "10.15.16.1", "flags": "UGSc", "refs": "5", "use": "1", "mtu": "1500", "interface": "utun0" }, { "address": "0.0.0.0\/0", "gateway": "192.168.1.254", "flags": "UGSc", "refs": "1", "use": "1371", "mtu": "1500", "interface": "en0" }, { "address": "10.15.0.16\/24", "gateway": "10.15.16.136", "flags": "UGSc", "refs": "3", "use": "0", "mtu": "1500", "interface": "utun0" }, { "address": "10.15.16.136", "gateway": "10.15.16.136", "flags": "UH", "refs": "2", "use": "5", "mtu": "1500", "interface": "utun0" }, { "address": "71.19.252.21", "gateway": "192.168.1.254", "flags": "UGSc", "refs": "1", "use": "0", "mtu": "1500", "interface": "en0" }, { "address": "71.19.252.22", "gateway": "10.15.16.1", "flags": "UGHS", "refs": "0", "use": "32", "mtu": "1500", "interface": "utun0" }, { "address": "0.0.0.127", "gateway": "127.0.0.1", "flags": "UCS", "refs": "0", "use": "0", "mtu": "16384", "interface": "lo0" }, { "address": "127.0.0.1", "gateway": "127.0.0.1", "flags": "UH", "refs": "3", "use": "707478", "mtu": "16384", "interface": "lo0" }, { "address": "128.0.0.0\/1", "gateway": "10.15.16.1", "flags": "UGSc", "refs": "5", "use": "0", "mtu": "1500", "interface": "utun0" }, { "address": "169.0.0.254", "gateway": "link#4", "flags": "UCS", "refs": "0", "use": "0", "mtu": "1500", "interface": "en0" }, { "address": "192.168.0.1", "gateway": "link#4", "flags": "UCS", "refs": "1", "use": "0", "mtu": "1500", "interface": "en0" }, { "address": "192.168.1.65", "gateway": "link#4", "flags": "UCS", "refs": "1", "use": "0", "mtu": "1500", "interface": "en0" }, { "address": "192.168.1.65", "gateway": "0:23:df:8c:a0:ae", "flags": "UHLWI", "refs": "0", "use": "40", "mtu": "16384", "interface": "lo0" }, { "address": "192.168.1.254", "gateway": "link#4", "flags": "UCS", "refs": "1", "use": "0", "mtu": "1500", "interface": "en0" }, { "address": "192.168.1.254", "gateway": "1c:af:f7:d9:72:db", "flags": "UHLWIir", "refs": "4", "use": "4868", "mtu": "1500", "interface": "en0", "expire": "1176" }, { "address": "192.168.1.255", "gateway": "ff:ff:ff:ff:ff:ff", "flags": "UHLWbI", "refs": "0", "use": "37", "mtu": "1500", "interface": "en0" }, { "address": "224.0.0.0", "gateway": "link#4", "flags": "UmCS", "refs": "2", "use": "0", "mtu": "1500", "interface": "en0" }, { "address": "224.0.0.1", "gateway": "1:0:5e:0:0:1", "flags": "UHmLWI", "refs": "0", "use": "62648", "mtu": "1500", "interface": "en0" }, { "address": "224.0.0.251", "gateway": "1:0:5e:0:0:fb", "flags": "UHmLWI", "refs": "0", "use": "0", "mtu": "1500", "interface": "en0" }, { "address": "255.255.255.255", "gateway": "link#4", "flags": "UCS", "refs": "0", "use": "0", "mtu": "1500", "interface": "en0" }, { "address": "::1", "gateway": "::1", "flags": "UHL", "refs": "0", "use": "0", "mtu": "16384", "interface": "lo0" }, { "address": "fe80::", "gateway": "fe80::1%lo0", "flags": "UcI", "refs": "1", "use": "0", "mtu": "16384", "interface": "lo0" }, { "address": "fe80::1", "gateway": "link#1", "flags": "UHLI", "refs": "1", "use": "0", "mtu": "16384", "interface": "lo0" }, { "address": "ff01::", "gateway": "::1", "flags": "UmCI", "refs": "0", "use": "0", "mtu": "16384", "interface": "lo0" }, { "address": "ff02::", "gateway": "::1", "flags": "UmCI", "refs": "0", "use": "0", "mtu": "16384", "interface": "lo0" } ], "interfaces": [ { "friendly": "lo0", "id": "lo0", "name": "lo0", "description": "lo0", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1", "fe80::1" ], "gateways": [ "127.0.0.1", "::1", "fe80::1" ], "bind": true }, { "friendly": "gif0", "id": "gif0", "name": "gif0", "description": "gif0", "type": "Unknown", "status": "Unknown", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "gateways": [], "bind": false }, { "friendly": "stf0", "id": "stf0", "name": "stf0", "description": "stf0", "type": "Unknown", "status": "Unknown", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "gateways": [], "bind": false }, { "friendly": "Ethernet", "id": "en0", "name": "en0", "description": "en0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "192.168.1.65" ], "gateways": [ "192.168.1.254" ], "bind": true }, { "friendly": "Wi-Fi", "id": "en1", "name": "en1", "description": "en1", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [], "gateways": [], "bind": false }, { "friendly": "FireWire", "id": "fw0", "name": "fw0", "description": "fw0", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [], "gateways": [], "bind": false }, { "friendly": "p2p0", "id": "p2p0", "name": "p2p0", "description": "p2p0", "type": "Ethernet", "status": "Unknown", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "gateways": [], "bind": false }, { "friendly": "utun0", "id": "utun0", "name": "utun0", "description": "utun0", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "10.15.16.136" ], "gateways": [ "10.15.16.1", "10.15.16.136" ], "bind": true } ], "ipv4-default-gateway": "192.168.1.254", "ipv4-default-interface": "en0"}----------------------------ifconfig:lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384 options=3<RXCSUM,TXCSUM> inet6 ::1 prefixlen 128 inet 127.0.0.1 netmask 0xff000000 inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1 nd6 options=1<PERFORMNUD>gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280stf0: flags=0<> mtu 1280en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=27<RXCSUM,TXCSUM,VLAN_MTU,TSO4> ether 00:23:df:8c:a0:ae inet 192.168.1.65 netmask 0xffffff00 broadcast 192.168.1.255 nd6 options=1<PERFORMNUD> media: autoselect (100baseTX <full-duplex,flow-control>) status: activeen1: flags=8823<UP,BROADCAST,SMART,SIMPLEX,MULTICAST> mtu 1500 ether 00:1f:f3:bd:82:25 nd6 options=1<PERFORMNUD> media: autoselect (<unknown type>) status: inactivefw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 4078 lladdr 00:23:df:ff:fe:8c:a0:ae nd6 options=1<PERFORMNUD> media: autoselect <full-duplex> status: inactivep2p0: flags=8802<BROADCAST,SIMPLEX,MULTICAST> mtu 2304 ether 02:1f:f3:bd:82:25 media: autoselect status: inactiveutun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500 inet 10.15.16.136 --> 10.15.16.136 netmask 0xffffff00 Share this post Link to post
Monotremata 22 Posted ... madrat - check your network preferences and make sure you're getting an IPv6 address from your router to begin with. Ever since I started using it when we had a couple servers they were testing, my Mac likes to turn it off on its own at random times. And even if I set it back to 'Automatically' grab one, it won't get a new one until I turn off my network adapter, and restart it and connect to my router again. 2 of the three servers here in LA are now IPv6 and I like to use it just because its available. Out of nowhere it will just drop my address while Im connected, and the server just goes dead and stops responding to me. I have to restart the network adapter (I use my AirPort card since Im too far to plug in ethernet), before it will reconnect to any of the gen 2 servers (it will connect to an IPv4 only server though). I switched my Eddie preferences from using IPv6,IPv4 back to IPv4,IPv6 and its actually been connected to Sabik here in LA for a few days I think now. So maybe that's the key. I don't think it has anything to do with Eddie, its an issue strictly with macOS. Even if you tell Eddie to use IPv6, if the Mac doesnt have IPv6 turned on, it won't work. Eddie won't turn it on for you, even if the Mac decides to turn it back off again. I thought maybe this was a High Sierra issue, but Ive found posts in the Apple Discussion Forums from other people with the same issue on various versions of OS X and macOS so its just something Apple hasn't really gotten done 100% it seems. Share this post Link to post
madrat 19 Posted ... @madrat Thanks so much for the heads up! First thing I did was go to System Preferences and set configure IPv6 to automatic (it always reverted back to off after a failed connection to an IPv6 server). Opened Eddie's Preferences and changed Network settings from IPv6, IPv4 to IPv4, IPv6 as you suggested. Saved settings and connected to Rana (Toronto) and voila - success. Have no idea why this would make a difference, but it worked. Will see if it stays connected. So far so good. I did notice, when I went back to check my Mac/System Preferences, the configure setting, which was set to Automatically, had changed to "Link-local only". Not sure if that is a good thing or not, but at least I'm connected to IPv6 for the first time. Thanks again! Share this post Link to post
madrat 19 Posted ... @madrat Unfortunately, just checked IPleak.com, and IPv6 tests failed?? Share this post Link to post
strykenKN 0 Posted ... I still have a wish for you. It would be nice if Eddie is made simpler and more modern. It's a bit complicated, especially for beginners, as it can lead to difficulties.The client "Eddie", which you have to load onto the computer, does not make it better visually: Again, no improvement has been made to the user interface nor is there a different look and feel in the starting blocks.It would be nice to refresh the client and make it easier. Since very fast, wrong settings can be made.This is just a factual criticism, are just things that I wish :-) Share this post Link to post
harold.lewis 22 Posted ... Eddie 2.16.1 Portable_64 works well on my Manjaro Plasma (but ipv6 disable system wide) Share this post Link to post
Monotremata 22 Posted ... @madrat Unfortunately, just checked IPleak.com, and IPv6 tests failed?? Hahaha and go figure, I just checked IPleak when I saw your post, and I got NO IPv4 address, but I got an IPv6 address, and the browser is using IPv6 and didn't fallback to IPv4 hahaha. I checked ipv6-test.com right after, and passed with 18/20 just fine for both IPv6 and IPv4. The only thing it didn't get was the hostname for IPv6, but it always does that. So far switching the connection has fixed the disconnection issue. I checked ipv6-test.com the other day and noticed the Mac IS still randomly dropping the address though. But at least my connection stays working now because its using IPv4 first now. If it works that way, and I can still pass the browser tests, Im good for now. 1 madrat reacted to this Share this post Link to post
Clodo 176 Posted ... Hi, and thanks for the new version. However, some user interface problems persist. The tray icon still does not work and the "UI Main Font" button in UI settings does not work either. Also, in the same window with the broken font button, "on't show bootstrap failure window" should probably read "Don't show bootstrap failure window". Xubuntu 16.04 LTS x86 Thanks again.This issues with Xubuntu will be fixed in the next 2.16.2 release, please wait. Thanks for the feedback. Share this post Link to post
Clodo 176 Posted ... Seems to work fine on 10.11.6 El Capitan, but still no luck connecting to an IPv6 server. Logs attached in case you want a look.Hi, you have en0 (Ethernet) with IPv6 disabled, from your system log:{ "friendly": "Ethernet", "id": "en0", "name": "en0", "description": "en0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "192.168.1.65" ], "gateways": [ "192.168.1.254" ], "bind": true }, ANDyou have in Settings -> Networking -> Internet protocol used for connection -> IPv6, IPv4 (not the default). So, when you try to connect to a server that support IPv6, due to the option above it try to reach over IPv6, but fail because you have IPv6 disabled on en0 adapter.. 2018.07.15 10:06:19 - OpenVPN > UDPv6 link remote: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443 . 2018.07.15 10:06:19 - OpenVPN > write UDPv6: No route to host (code=65) "How" to reach our server (via IPv4 or IPv6, the option above) is not really correlated to obtain an IPv6 tunnel. With Settings -> Networking -> Internet protocol used for connection -> IPv4, IPv6you connect to Air server via IPv4, but still obtain a IPv4 AND IPv6 tunnel. 1 madrat reacted to this Share this post Link to post
madrat 19 Posted ... Seems to work fine on 10.11.6 El Capitan, but still no luck connecting to an IPv6 server. Logs attached in case you want a look.Hi, you have en0 (Ethernet) with IPv6 disabled, from your system log: { "friendly": "Ethernet", "id": "en0", "name": "en0", "description": "en0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": false, "ips": [ "192.168.1.65" ], "gateways": [ "192.168.1.254" ], "bind": true }, ANDyou have in Settings -> Networking -> Internet protocol used for connection -> IPv6, IPv4 (not the default). So, when you try to connect to a server that support IPv6, due to the option above it try to reach over IPv6, but fail because you have IPv6 disabled on en0 adapter. . 2018.07.15 10:06:19 - OpenVPN > UDPv6 link remote: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443 . 2018.07.15 10:06:19 - OpenVPN > write UDPv6: No route to host (code=65) "How" to reach our server (via IPv4 or IPv6, the option above) is not really correlated to obtain an IPv6 tunnel. With Settings -> Networking -> Internet protocol used for connection -> IPv4, IPv6you connect to Air server via IPv4, but still obtain a IPv4 AND IPv6 tunnel. Thanks so much for the info. I have very limited knowledge of this stuff, but I will be taking the info you gave me, and searching the info you provided, in order to try and learn what you are talking about. In the meantime, despite not being able to connect to IPv6, Eddie is running just fine and I have been happy with it for several years now. Great support, not only from staff, but from users as well. Share this post Link to post
altae 22 Posted ... The file used to be signed with airvpn digital signature so i know it was added there by you. Now there was a change from AIR DI PAOLO BRINI (airvpn digital signature) to the developer digital signature (i assume) which none talked about. That reduces security as i can't be sure what that file does when if i use one signed by you guys i can know it's legit assuming you keep your digital signature safe. An easy sad example is ccleaner issue with their software being signed but failing to properly secure their digital signature process. You get the idea. Your digital signature is safer than that guys digital signature. I can second that. A change of signature is not by it's nature a problem. But it should be announced because otherwise we as users have no way to know whether the change of signature is legit or if someone managed to smuggle a bogus piece of software onto your servers. This has happened multiple times in the past (e.g. the already mentioned CCleaner or even Linux Mint). After all a VPN client is security related software and should by all means be treated like that so we, the users, can actually trust it. Share this post Link to post
Guest Posted ... I still have a wish for you. It would be nice if Eddie is made simpler and more modern. It's a bit complicated, especially for beginners, as it can lead to difficulties. The client "Eddie", which you have to load onto the computer, does not make it better visually: Again, no improvement has been made to the user interface nor is there a different look and feel in the starting blocks. It would be nice to refresh the client and make it easier. Since very fast, wrong settings can be made. This is just a factual criticism, are just things that I wish :-) I guess you're the type who also wants websites to 'pop' and 'flash' whatever those words mean. Eddie is pretty decent already, it's not absolutely beginner friendly, but it's mostly put in username/password, choose a server and click connect. If you're messing with the settings you should have some clue what you're doing. I don't really understand what you're proposing here, if you're messing with settings you have no clue about that's not Eddie's fault. Share this post Link to post
madrat 19 Posted ... So could any of the Mac users explain how to fix the following problem, that was pointed out to me by staff? I've done several Google searches, but just can't figure it out myself. Hi, you have en0 (Ethernet) with IPv6 disabled, from your system log: {"friendly": "Ethernet","id": "en0","name": "en0","description": "en0","type": "Ethernet","status": "Up","bytes_received": "0","bytes_sent": "0","support_ipv4": true,"support_ipv6": false,"ips": ["192.168.1.65"],"gateways": ["192.168.1.254"],"bind": true}, Share this post Link to post
Clodo 176 Posted ... Thanks so much for the info. I have very limited knowledge of this stuff, but I will be taking the info you gave me, and searching the info you provided, in order to try and learn what you are talking about. In the meantime, despite not being able to connect to IPv6, Eddie is running just fine and I have been happy with it for several years now. Great support, not only from staff, but from users as well.I try to re-explain. You can connect to AirVPN servers via IPv4 OR IPv6. This is controlled by the option "Settings -> Networking -> Internet protocol used for connection". To connect via IPv6, you need to have IPv6 enabled on your network adapter, and your ISP support it (so, you need to have IPv6 connectivity WITHOUT the VPN here: http://ipv6-test.com/). But you have also IPv6 disabled on your network adapter, so try to run in terminalnetworksetup -getinfo Ethernetand if report "IPv6: Off", try to runnetworksetup -setv6automatic Ethernetto re-enable it. I suggest to leave "Settings -> Networking -> Internet protocol used for connection" at "IPv4, IPv6" (the default). Share this post Link to post
madrat 19 Posted ... Thanks so much for the info. I have very limited knowledge of this stuff, but I will be taking the info you gave me, and searching the info you provided, in order to try and learn what you are talking about. In the meantime, despite not being able to connect to IPv6, Eddie is running just fine and I have been happy with it for several years now. Great support, not only from staff, but from users as well.I try to re-explain. You can connect to AirVPN servers via IPv4 OR IPv6. This is controlled by the option "Settings -> Networking -> Internet protocol used for connection".To connect via IPv6, you need to have IPv6 enabled on your network adapter, and your ISP support it (so, you need to have IPv6 connectivity WITHOUT the VPN here: http://ipv6-test.com/).But you have also IPv6 disabled on your network adapter, so try to run in terminal networksetup -getinfo Ethernetand if report "IPv6: Off", try to run networksetup -setv6automatic Ethernetto re-enable it. I suggest to leave "Settings -> Networking -> Internet protocol used for connection" at "IPv4, IPv6" (the default). Unfortunately, I think the problem may be that my router does not support ipv6. This is the result from terminal:DHCP ConfigurationIP address: 192.168.1.65Subnet mask: 255.255.255.0Router: 192.168.1.254Client ID:IPv6: AutomaticIPv6 IP address: noneIPv6 Router: noneEthernet Address: 00:23:df:8c:a0:ae Share this post Link to post
Monotremata 22 Posted ... Sign in to the router and check its address settings from your ISP. Im on Spectrum/Time Warner and they do full IPv6. You should see it all listed where it shows you the address/DNS/etc the router gets from the ISP. IPv6 is usually a separate page aside from the IPv4 DHCP stuff, at least it is in my router. It won't let me do static IPv6 though which would really help with the Mac dropping its address at random heh. There used to be a setting in Eddie 2.13 that enabled/disabled IPv6. The setting was removed in 2.14, but is still in the config file. By default it was disabled as well, so it may still be set like that from back when you were using 2.13 (we didn't have IPv6 servers yet). I found this out when I began testing the 'new' gen 2 server Castor, and couldn't figure out why it wasn't working with the 2.14 beta. Eddie just won't turn it on no matter what if that setting is disabled in the config. EDIT: Also, what did you run in the terminal to show you the IP info??? I know about ifconfig, but I want something simple and easy thats more like Windows IPConfig hehe. ifconfig shows me all kinds of crap I don't care about when I just wanna see my addresses! Share this post Link to post