Jump to content
Not connected, Your IP: 18.206.13.39
Staff

Eddie 2.16beta released

Recommended Posts

Hello!

 

We're very glad to inform you that a new Eddie Air client version has been released: 2.16beta. It is ready for public beta testing.

 

How to test our experimental release:

  • Go to download page of your OS
  • Click on Other versions

    client-experimental-howto-1.png

  • Click on Experimental

    client-experimental-howto-2.png

  • Look at the changelog if you wish
  • Download and install
Please see the changelog:

https://eddie.website/changelog/?software=client&format=html

Share this post


Link to post

Strange, now all of a sudden I can close Eddie in openSUSE Leap 15.
Bit confusing, forget my messages for now.
Keep an eye on it.
Thanks for the beta!
And sorry for my messy messages.

 

GJ

 

 

edit; shutdown eddie problem not solved.

it hangs in the shutdown progress.

 

! 2018.07.15 08:37:27 - Session terminated.
. 2018.07.15 08:37:33 - Shutdown in progress

 

edit; did upgrade to openSUSE Tumbleweed, still same problem.

 

edit 27-07: https://airvpn.org/topic/28866-eddie-on-opensuse-linux-leap-15-or-tumbleweed/

Share this post


Link to post

That's it, I installed mono-utils.

If you have problems with it under Ubuntu/Linux Mint, do the following and enter it in the terminal:

Install Howto

    Update the package index:

    # sudo apt-get update

    Install mono-utils deb package:

    # sudo apt-get install mono-utils

then you can install the beta.

Share this post


Link to post
Guest

Someone really messed up. You can't keep pushing stuff with different digital signatures and expect me to trust them without even announcing it. I install this beta and go ahead to run and find a new tool running with someones else digital signature in it. Don't you think if eddie has new dependencies you should make me aware in the changelog so i don't freak out when i see a software that can also be used in ssh software?

 

dJvPDaF.png

Share this post


Link to post

Someone really messed up. You can't keep pushing stuff with different digital signatures and expect me to trust them without even announcing it. I install this beta and go ahead to run and find a new tool running with someones else digital signature in it. Don't you think if eddie has new dependencies you should make me aware in the changelog so i don't freak out when i see a software that can also be used in ssh software?

 

Hello!

 

Probably we're missing something here so we will leave the discussion to the developers with an invitation to clarify in the meantime: since plink.exe has been included in Eddie package for Windows since many years ago with its MIT license, with the correct digital signature (Simon Tatham is the author https://www.chiark.greenend.org.uk/~sgtatham/) what is the change that's causing any issue?

 

Kind regards

 

 

 

dJvPDaF.png

Share this post


Link to post

Hi, and thanks for the new version.

 

However, some user interface problems persist. The tray icon still does not work and the "UI Main Font" button in UI settings does not work either. Also, in the same window with the broken font button, "on't show bootstrap failure window" should probably read "Don't show bootstrap failure window".

 

Xubuntu 16.04 LTS x86

 

Thanks again.

Share this post


Link to post
Guest

 

Someone really messed up. You can't keep pushing stuff with different digital signatures and expect me to trust them without even announcing it. I install this beta and go ahead to run and find a new tool running with someones else digital signature in it. Don't you think if eddie has new dependencies you should make me aware in the changelog so i don't freak out when i see a software that can also be used in ssh software?

 

Hello!

 

Probably we're missing something here so we will leave the discussion to the developers with an invitation to clarify in the meantime: since plink.exe has been included in Eddie package for Windows since many years ago with its MIT license, with the correct digital signature (Simon Tatham is the author https://www.chiark.greenend.org.uk/~sgtatham/) what is the change that's causing any issue?

 

Kind regards

 

 

 

 

The file used to be signed with airvpn digital signature so i know it was added there by you. Now there was a change from AIR DI PAOLO BRINI (airvpn digital signature) to the developer digital signature (i assume) which none talked about. That reduces security as i can't be sure what that file does when if i use one signed by you guys i can know it's legit assuming you keep your digital signature safe. 

An easy sad example is ccleaner issue with their software being signed but failing to properly secure their digital signature process. You get the idea. Your digital signature is safer than that guys digital signature.

 

Anw all in all regardless if you decide to change who is signing what, we need to know.

 

2X14LSM.png

Share this post


Link to post

The file used to be signed with airvpn digital signature so i know it was added there by you. Now there was a change from AIR DI PAOLO BRINI (airvpn digital signature) to the developer digital signature (i assume) which none talked about.

 

 

Hello,

 

now it's very clear, thank you. Notifications on the issue will be sent shortly.

 

Kind regards

Share this post


Link to post

Seems to work fine on 10.11.6 El Capitan, but still no luck connecting to an IPv6 server.  Logs attached in case you want a look.

 

. 2018.07.15 10:01:50 - Eddie version: 2.16.1 / macos_x64, System: MacOS, Name: 10.11.6, Version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Thu Jun 21 20:07:40 PDT 2018; root:xnu-3248.73.11~1/RELEASE_X86_64 x86_64, Mono/.Net: v4.0.30319
. 2018.07.15 10:01:50 - Reading options from /Users/madrat/.airvpn/default.xml
. 2018.07.15 10:01:51 - Command line arguments (0):
. 2018.07.15 10:01:51 - Profile path: /Users/madrat/.airvpn/default.xml
. 2018.07.15 10:01:54 - OpenVPN Driver - Expected
. 2018.07.15 10:01:54 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)
. 2018.07.15 10:01:54 - SSH - Version: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)
. 2018.07.15 10:01:54 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)
. 2018.07.15 10:01:54 - curl - Version: 7.43.0 (/usr/bin/curl)
. 2018.07.15 10:01:54 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem
! 2018.07.15 10:01:54 - Activation of Network Lock - macOS - PF
. 2018.07.15 10:01:54 - macOS - PF rules updated, reloading
. 2018.07.15 10:01:55 - Updating systems & servers data ...
. 2018.07.15 10:01:55 - macOS - PF rules updated, reloading
I 2018.07.15 10:01:56 - Session starting.
. 2018.07.15 10:01:57 - Systems & servers data update completed
I 2018.07.15 10:02:07 - Checking authorization ...
. 2018.07.15 10:02:08 - IPv6 disabled on network adapter (SAMSUNG Modem)
. 2018.07.15 10:02:08 - IPv6 disabled on network adapter (Ethernet)
. 2018.07.15 10:02:08 - IPv6 disabled on network adapter (FireWire)
. 2018.07.15 10:02:08 - IPv6 disabled on network adapter (Wi-Fi)
! 2018.07.15 10:02:08 - Connecting to Cynosura (Canada, Vancouver)
. 2018.07.15 10:02:08 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018
. 2018.07.15 10:02:08 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.07.15 10:02:08 - Connection to OpenVPN Management Interface
. 2018.07.15 10:02:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.07.15 10:02:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:02:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:02:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443
. 2018.07.15 10:02:08 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2018.07.15 10:02:09 - OpenVPN > UDP link local: (not bound)
. 2018.07.15 10:02:09 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443
. 2018.07.15 10:02:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.07.15 10:02:09 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=6140bf11 e7bde297
. 2018.07.15 10:02:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.15 10:02:09 - OpenVPN > VERIFY KU OK
. 2018.07.15 10:02:09 - OpenVPN > Validating certificate extended key usage
. 2018.07.15 10:02:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.15 10:02:09 - OpenVPN > VERIFY EKU OK
. 2018.07.15 10:02:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org
. 2018.07.15 10:02:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.15 10:02:09 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]71.19.252.21:443
. 2018.07.15 10:02:10 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1)
. 2018.07.15 10:02:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.16.1,route-gateway 10.15.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.16.136 255.255.255.0,peer-id 5,cipher AES-256-GCM'
. 2018.07.15 10:02:10 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.07.15 10:02:10 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.07.15 10:02:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.07.15 10:02:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.07.15 10:02:10 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2018.07.15 10:02:10 - OpenVPN > Opened utun device utun0
. 2018.07.15 10:02:10 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.07.15 10:02:10 - OpenVPN > /sbin/ifconfig utun0 delete
. 2018.07.15 10:02:10 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.07.15 10:02:10 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.07.15 10:02:10 - OpenVPN > /sbin/ifconfig utun0 10.15.16.136 10.15.16.136 netmask 255.255.255.0 mtu 1500 up
. 2018.07.15 10:02:10 - OpenVPN > /sbin/route add -net 10.15.16.0 10.15.16.136 255.255.255.0
. 2018.07.15 10:02:10 - OpenVPN > add net 10.15.16.0: gateway 10.15.16.136
. 2018.07.15 10:02:10 - OpenVPN > /sbin/route add -net 71.19.252.21 192.168.1.254 255.255.255.255
. 2018.07.15 10:02:10 - OpenVPN > add net 71.19.252.21: gateway 192.168.1.254
. 2018.07.15 10:02:10 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:02:10 - OpenVPN > add net 0.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:02:10 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:02:10 - OpenVPN > add net 128.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:02:11 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.16.1)
. 2018.07.15 10:02:11 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.16.1)
. 2018.07.15 10:02:11 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.16.1)
. 2018.07.15 10:02:11 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.16.1)
. 2018.07.15 10:02:11 - Routes, added a new route, 71.19.252.22 for gateway 10.15.16.1
. 2018.07.15 10:02:11 - Flushing DNS
. 2018.07.15 10:02:12 - macOS - PF rules updated, reloading
I 2018.07.15 10:02:12 - Checking route IPv4
I 2018.07.15 10:02:13 - Checking DNS
! 2018.07.15 10:02:13 - Connected.
. 2018.07.15 10:02:14 - OpenVPN > Initialization Sequence Completed
. 2018.07.15 10:03:03 - macOS - PF rules updated, reloading
! 2018.07.15 10:03:03 - Disconnecting
. 2018.07.15 10:03:03 - Routes, removed a route previously added, 71.19.252.22 for gateway 10.15.16.1
. 2018.07.15 10:03:03 - Sending management termination signal
. 2018.07.15 10:03:03 - Management - Send 'signal SIGTERM'
. 2018.07.15 10:03:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.15 10:03:04 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.15 10:03:08 - OpenVPN > /sbin/route delete -net 71.19.252.21 192.168.1.254 255.255.255.255
. 2018.07.15 10:03:08 - OpenVPN > delete net 71.19.252.21: gateway 192.168.1.254
. 2018.07.15 10:03:08 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:03:08 - OpenVPN > delete net 0.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:03:08 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:03:08 - OpenVPN > delete net 128.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:03:08 - OpenVPN > Closing TUN/TAP interface
. 2018.07.15 10:03:08 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.15 10:03:08 - Connection terminated.
. 2018.07.15 10:03:08 - IPv6 restored on network adapter (SAMSUNG Modem)
. 2018.07.15 10:03:08 - IPv6 restored on network adapter (Ethernet)
. 2018.07.15 10:03:08 - IPv6 restored on network adapter (FireWire)
. 2018.07.15 10:03:08 - IPv6 restored on network adapter (Wi-Fi)
. 2018.07.15 10:03:08 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)
. 2018.07.15 10:03:08 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.07.15 10:03:08 - DNS of a network adapter restored to original settings (FireWire, to 10.4.0.1)
. 2018.07.15 10:03:08 - DNS of a network adapter restored to original settings (Wi-Fi, to 10.4.0.1)
I 2018.07.15 10:03:08 - Checking authorization ...
! 2018.07.15 10:03:09 - Connecting to Cephei (Canada, Toronto, Ontario)
. 2018.07.15 10:03:10 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018
. 2018.07.15 10:03:10 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.07.15 10:03:10 - Connection to OpenVPN Management Interface
. 2018.07.15 10:03:10 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.07.15 10:03:10 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:03:10 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:03:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2606:6080:1001:c:fab7:78e8:4f3a:6eda:443
. 2018.07.15 10:03:10 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2018.07.15 10:03:10 - OpenVPN > UDPv6 link local: (not bound)
. 2018.07.15 10:03:10 - OpenVPN > UDPv6 link remote: [AF_INET6]2606:6080:1001:c:fab7:78e8:4f3a:6eda:443
. 2018.07.15 10:03:10 - OpenVPN > write UDPv6: No route to host (code=65)
. 2018.07.15 10:03:10 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.07.15 10:03:11 - OpenVPN > write UDPv6: No route to host (code=65)
. 2018.07.15 10:03:41 - Above log line repeated 3 times more
. 2018.07.15 10:03:41 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting
. 2018.07.15 10:03:41 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.15 10:03:46 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2018.07.15 10:03:46 - Disconnecting
. 2018.07.15 10:03:47 - Connection terminated.
I 2018.07.15 10:03:50 - Checking authorization ...
. 2018.07.15 10:03:51 - IPv6 disabled on network adapter (SAMSUNG Modem)
. 2018.07.15 10:03:51 - IPv6 disabled on network adapter (Ethernet)
. 2018.07.15 10:03:51 - IPv6 disabled on network adapter (FireWire)
. 2018.07.15 10:03:51 - IPv6 disabled on network adapter (Wi-Fi)
! 2018.07.15 10:03:51 - Connecting to Cynosura (Canada, Vancouver)
. 2018.07.15 10:03:51 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018
. 2018.07.15 10:03:51 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.07.15 10:03:51 - Connection to OpenVPN Management Interface
. 2018.07.15 10:03:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.07.15 10:03:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:03:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:03:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443
. 2018.07.15 10:03:51 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2018.07.15 10:03:51 - OpenVPN > UDP link local: (not bound)
. 2018.07.15 10:03:51 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443
. 2018.07.15 10:03:51 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.07.15 10:03:51 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=dcf12fc3 ff4d6a80
. 2018.07.15 10:03:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.15 10:03:52 - OpenVPN > VERIFY KU OK
. 2018.07.15 10:03:52 - OpenVPN > Validating certificate extended key usage
. 2018.07.15 10:03:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.15 10:03:52 - OpenVPN > VERIFY EKU OK
. 2018.07.15 10:03:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org
. 2018.07.15 10:03:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.15 10:03:52 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]71.19.252.21:443
. 2018.07.15 10:03:53 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1)
. 2018.07.15 10:03:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.16.1,route-gateway 10.15.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.16.136 255.255.255.0,peer-id 5,cipher AES-256-GCM'
. 2018.07.15 10:03:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.07.15 10:03:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.07.15 10:03:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.07.15 10:03:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.07.15 10:03:53 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2018.07.15 10:03:53 - OpenVPN > Opened utun device utun0
. 2018.07.15 10:03:53 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.07.15 10:03:53 - OpenVPN > /sbin/ifconfig utun0 delete
. 2018.07.15 10:03:53 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.07.15 10:03:53 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.07.15 10:03:53 - OpenVPN > /sbin/ifconfig utun0 10.15.16.136 10.15.16.136 netmask 255.255.255.0 mtu 1500 up
. 2018.07.15 10:03:53 - OpenVPN > /sbin/route add -net 10.15.16.0 10.15.16.136 255.255.255.0
. 2018.07.15 10:03:53 - OpenVPN > add net 10.15.16.0: gateway 10.15.16.136
. 2018.07.15 10:03:53 - OpenVPN > /sbin/route add -net 71.19.252.21 192.168.1.254 255.255.255.255
. 2018.07.15 10:03:53 - OpenVPN > add net 71.19.252.21: gateway 192.168.1.254
. 2018.07.15 10:03:53 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:03:53 - OpenVPN > add net 0.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:03:53 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:03:53 - OpenVPN > add net 128.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:03:53 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.16.1)
. 2018.07.15 10:03:54 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.16.1)
. 2018.07.15 10:03:54 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.16.1)
. 2018.07.15 10:03:54 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.16.1)
. 2018.07.15 10:03:54 - Routes, added a new route, 71.19.252.22 for gateway 10.15.16.1
. 2018.07.15 10:03:54 - Flushing DNS
. 2018.07.15 10:03:54 - macOS - PF rules updated, reloading
I 2018.07.15 10:03:55 - Checking route IPv4
I 2018.07.15 10:03:56 - Checking DNS
! 2018.07.15 10:03:56 - Connected.
. 2018.07.15 10:03:56 - OpenVPN > Initialization Sequence Completed
. 2018.07.15 10:04:34 - macOS - PF rules updated, reloading
! 2018.07.15 10:04:35 - Disconnecting
. 2018.07.15 10:04:35 - Routes, removed a route previously added, 71.19.252.22 for gateway 10.15.16.1
. 2018.07.15 10:04:35 - Sending management termination signal
. 2018.07.15 10:04:35 - Management - Send 'signal SIGTERM'
. 2018.07.15 10:04:35 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.15 10:04:35 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.15 10:04:40 - OpenVPN > /sbin/route delete -net 71.19.252.21 192.168.1.254 255.255.255.255
. 2018.07.15 10:04:40 - OpenVPN > delete net 71.19.252.21: gateway 192.168.1.254
. 2018.07.15 10:04:40 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:04:40 - OpenVPN > delete net 0.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:04:40 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:04:40 - OpenVPN > delete net 128.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:04:40 - OpenVPN > Closing TUN/TAP interface
. 2018.07.15 10:04:40 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.15 10:04:40 - Connection terminated.
. 2018.07.15 10:04:40 - IPv6 restored on network adapter (SAMSUNG Modem)
. 2018.07.15 10:04:40 - IPv6 restored on network adapter (Ethernet)
. 2018.07.15 10:04:40 - IPv6 restored on network adapter (FireWire)
. 2018.07.15 10:04:40 - IPv6 restored on network adapter (Wi-Fi)
. 2018.07.15 10:04:40 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)
. 2018.07.15 10:04:40 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.07.15 10:04:40 - DNS of a network adapter restored to original settings (FireWire, to 10.4.0.1)
. 2018.07.15 10:04:40 - DNS of a network adapter restored to original settings (Wi-Fi, to 10.4.0.1)
I 2018.07.15 10:04:40 - Checking authorization ...
! 2018.07.15 10:04:41 - Connecting to Rana (Canada, Toronto, Ontario)
. 2018.07.15 10:04:41 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018
. 2018.07.15 10:04:41 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.07.15 10:04:41 - Connection to OpenVPN Management Interface
. 2018.07.15 10:04:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.07.15 10:04:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:04:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:04:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443
. 2018.07.15 10:04:41 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2018.07.15 10:04:41 - OpenVPN > UDPv6 link local: (not bound)
. 2018.07.15 10:04:41 - OpenVPN > UDPv6 link remote: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443
. 2018.07.15 10:04:41 - OpenVPN > write UDPv6: No route to host (code=65)
. 2018.07.15 10:04:42 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.07.15 10:04:44 - OpenVPN > write UDPv6: No route to host (code=65)
. 2018.07.15 10:05:13 - Above log line repeated 3 times more
. 2018.07.15 10:05:13 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting
. 2018.07.15 10:05:13 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.15 10:05:18 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2018.07.15 10:05:18 - Disconnecting
. 2018.07.15 10:05:18 - Connection terminated.
I 2018.07.15 10:05:21 - Checking authorization ...
. 2018.07.15 10:05:22 - IPv6 disabled on network adapter (SAMSUNG Modem)
. 2018.07.15 10:05:22 - IPv6 disabled on network adapter (Ethernet)
. 2018.07.15 10:05:22 - IPv6 disabled on network adapter (FireWire)
. 2018.07.15 10:05:22 - IPv6 disabled on network adapter (Wi-Fi)
! 2018.07.15 10:05:22 - Connecting to Cynosura (Canada, Vancouver)
. 2018.07.15 10:05:22 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018
. 2018.07.15 10:05:22 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.07.15 10:05:22 - Connection to OpenVPN Management Interface
. 2018.07.15 10:05:22 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.07.15 10:05:22 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:05:22 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:05:22 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443
. 2018.07.15 10:05:22 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2018.07.15 10:05:22 - OpenVPN > UDP link local: (not bound)
. 2018.07.15 10:05:22 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443
. 2018.07.15 10:05:22 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.07.15 10:05:22 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=b74c8b2f af4b383b
. 2018.07.15 10:05:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.15 10:05:22 - OpenVPN > VERIFY KU OK
. 2018.07.15 10:05:22 - OpenVPN > Validating certificate extended key usage
. 2018.07.15 10:05:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.15 10:05:22 - OpenVPN > VERIFY EKU OK
. 2018.07.15 10:05:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org
. 2018.07.15 10:05:23 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.15 10:05:23 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]71.19.252.21:443
. 2018.07.15 10:05:24 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1)
. 2018.07.15 10:05:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.16.1,route-gateway 10.15.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.16.136 255.255.255.0,peer-id 5,cipher AES-256-GCM'
. 2018.07.15 10:05:24 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.07.15 10:05:24 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.07.15 10:05:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.07.15 10:05:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.07.15 10:05:24 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2018.07.15 10:05:24 - OpenVPN > Opened utun device utun0
. 2018.07.15 10:05:24 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.07.15 10:05:24 - OpenVPN > /sbin/ifconfig utun0 delete
. 2018.07.15 10:05:24 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.07.15 10:05:24 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.07.15 10:05:24 - OpenVPN > /sbin/ifconfig utun0 10.15.16.136 10.15.16.136 netmask 255.255.255.0 mtu 1500 up
. 2018.07.15 10:05:24 - OpenVPN > /sbin/route add -net 10.15.16.0 10.15.16.136 255.255.255.0
. 2018.07.15 10:05:24 - OpenVPN > add net 10.15.16.0: gateway 10.15.16.136
. 2018.07.15 10:05:24 - OpenVPN > /sbin/route add -net 71.19.252.21 192.168.1.254 255.255.255.255
. 2018.07.15 10:05:24 - OpenVPN > add net 71.19.252.21: gateway 192.168.1.254
. 2018.07.15 10:05:24 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:05:24 - OpenVPN > add net 0.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:05:24 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:05:24 - OpenVPN > add net 128.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:05:24 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.16.1)
. 2018.07.15 10:05:25 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.16.1)
. 2018.07.15 10:05:25 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.16.1)
. 2018.07.15 10:05:25 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.16.1)
. 2018.07.15 10:05:25 - Routes, added a new route, 71.19.252.22 for gateway 10.15.16.1
. 2018.07.15 10:05:25 - Flushing DNS
. 2018.07.15 10:05:25 - macOS - PF rules updated, reloading
I 2018.07.15 10:05:26 - Checking route IPv4
I 2018.07.15 10:05:27 - Checking DNS
! 2018.07.15 10:05:27 - Connected.
. 2018.07.15 10:05:27 - OpenVPN > Initialization Sequence Completed
. 2018.07.15 10:06:08 - macOS - PF rules updated, reloading
! 2018.07.15 10:06:09 - Disconnecting
. 2018.07.15 10:06:09 - Routes, removed a route previously added, 71.19.252.22 for gateway 10.15.16.1
. 2018.07.15 10:06:09 - Sending management termination signal
. 2018.07.15 10:06:09 - Management - Send 'signal SIGTERM'
. 2018.07.15 10:06:09 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.15 10:06:09 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.15 10:06:14 - OpenVPN > /sbin/route delete -net 71.19.252.21 192.168.1.254 255.255.255.255
. 2018.07.15 10:06:14 - OpenVPN > delete net 71.19.252.21: gateway 192.168.1.254
. 2018.07.15 10:06:14 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:06:14 - OpenVPN > delete net 0.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:06:14 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:06:14 - OpenVPN > delete net 128.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:06:14 - OpenVPN > Closing TUN/TAP interface
. 2018.07.15 10:06:14 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.15 10:06:14 - Connection terminated.
. 2018.07.15 10:06:14 - IPv6 restored on network adapter (SAMSUNG Modem)
. 2018.07.15 10:06:14 - IPv6 restored on network adapter (Ethernet)
. 2018.07.15 10:06:14 - IPv6 restored on network adapter (FireWire)
. 2018.07.15 10:06:14 - IPv6 restored on network adapter (Wi-Fi)
. 2018.07.15 10:06:14 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)
. 2018.07.15 10:06:14 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.07.15 10:06:14 - DNS of a network adapter restored to original settings (FireWire, to 10.4.0.1)
. 2018.07.15 10:06:14 - DNS of a network adapter restored to original settings (Wi-Fi, to 10.4.0.1)
I 2018.07.15 10:06:14 - Checking authorization ...
! 2018.07.15 10:06:15 - Connecting to Rana (Canada, Toronto, Ontario)
. 2018.07.15 10:06:19 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018
. 2018.07.15 10:06:19 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.07.15 10:06:19 - Connection to OpenVPN Management Interface
. 2018.07.15 10:06:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.07.15 10:06:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:06:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:06:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443
. 2018.07.15 10:06:19 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2018.07.15 10:06:19 - OpenVPN > UDPv6 link local: (not bound)
. 2018.07.15 10:06:19 - OpenVPN > UDPv6 link remote: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443
. 2018.07.15 10:06:19 - OpenVPN > write UDPv6: No route to host (code=65)
. 2018.07.15 10:06:19 - Above log line repeated 1 times more
. 2018.07.15 10:06:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.07.15 10:06:22 - OpenVPN > write UDPv6: No route to host (code=65)
. 2018.07.15 10:06:47 - Above log line repeated 1 times more
. 2018.07.15 10:06:47 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting
. 2018.07.15 10:06:47 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.15 10:06:47 - OpenVPN > write UDPv6: No route to host (code=65)
. 2018.07.15 10:06:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2018.07.15 10:06:52 - Disconnecting
. 2018.07.15 10:06:52 - Connection terminated.
I 2018.07.15 10:06:55 - Checking authorization ...
. 2018.07.15 10:06:56 - IPv6 disabled on network adapter (SAMSUNG Modem)
. 2018.07.15 10:06:56 - IPv6 disabled on network adapter (Ethernet)
. 2018.07.15 10:06:56 - IPv6 disabled on network adapter (FireWire)
. 2018.07.15 10:06:56 - IPv6 disabled on network adapter (Wi-Fi)
! 2018.07.15 10:06:56 - Connecting to Cynosura (Canada, Vancouver)
. 2018.07.15 10:06:56 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018
. 2018.07.15 10:06:56 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.07.15 10:06:56 - Connection to OpenVPN Management Interface
. 2018.07.15 10:06:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.07.15 10:06:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:06:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:06:56 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443
. 2018.07.15 10:06:56 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2018.07.15 10:06:56 - OpenVPN > UDP link local: (not bound)
. 2018.07.15 10:06:56 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443
. 2018.07.15 10:06:56 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.07.15 10:06:56 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=aa80bbb3 ab01f459
. 2018.07.15 10:06:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.15 10:06:57 - OpenVPN > VERIFY KU OK
. 2018.07.15 10:06:57 - OpenVPN > Validating certificate extended key usage
. 2018.07.15 10:06:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.15 10:06:57 - OpenVPN > VERIFY EKU OK
. 2018.07.15 10:06:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org
. 2018.07.15 10:06:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.15 10:06:57 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]71.19.252.21:443
. 2018.07.15 10:06:58 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1)
. 2018.07.15 10:06:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.16.1,route-gateway 10.15.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.16.136 255.255.255.0,peer-id 5,cipher AES-256-GCM'
. 2018.07.15 10:06:58 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.07.15 10:06:58 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.07.15 10:06:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.07.15 10:06:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.07.15 10:06:58 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2018.07.15 10:06:58 - OpenVPN > Opened utun device utun0
. 2018.07.15 10:06:58 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.07.15 10:06:58 - OpenVPN > /sbin/ifconfig utun0 delete
. 2018.07.15 10:06:58 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.07.15 10:06:58 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.07.15 10:06:58 - OpenVPN > /sbin/ifconfig utun0 10.15.16.136 10.15.16.136 netmask 255.255.255.0 mtu 1500 up
. 2018.07.15 10:06:58 - OpenVPN > /sbin/route add -net 10.15.16.0 10.15.16.136 255.255.255.0
. 2018.07.15 10:06:58 - OpenVPN > add net 10.15.16.0: gateway 10.15.16.136
. 2018.07.15 10:06:58 - OpenVPN > /sbin/route add -net 71.19.252.21 192.168.1.254 255.255.255.255
. 2018.07.15 10:06:58 - OpenVPN > add net 71.19.252.21: gateway 192.168.1.254
. 2018.07.15 10:06:58 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:06:58 - OpenVPN > add net 0.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:06:58 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:06:58 - OpenVPN > add net 128.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:06:58 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.16.1)
. 2018.07.15 10:06:58 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.16.1)
. 2018.07.15 10:06:59 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.16.1)
. 2018.07.15 10:06:59 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.16.1)
. 2018.07.15 10:06:59 - Routes, added a new route, 71.19.252.22 for gateway 10.15.16.1
. 2018.07.15 10:06:59 - Flushing DNS
. 2018.07.15 10:06:59 - macOS - PF rules updated, reloading
I 2018.07.15 10:07:00 - Checking route IPv4
I 2018.07.15 10:07:00 - Checking DNS
! 2018.07.15 10:07:01 - Connected.
. 2018.07.15 10:07:01 - OpenVPN > Initialization Sequence Completed

 

System Log:

Eddie System/Environment Report - 7/15/2018 5:12 PM UTC

Eddie version: 2.16.1
Eddie OS build: macos_x64
Eddie architecture: x64
OS type: MacOS
OS name: 10.11.6
OS version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Thu Jun 21 20:07:40 PDT 2018; root:xnu-3248.73.11~1/RELEASE_X86_64 x86_64
OS architecture: x64
Mono /.Net Framework: v4.0.30319
OpenVPN driver: Expected
OpenVPN: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)
SSH: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)
SSL: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)
curl: 7.43.0 (/usr/bin/curl)
Profile path: /Users/madrat/.airvpn/default.xml
Data path: /Users/madrat/.airvpn
Application path: /Applications/Eddie.app/Contents/MacOS
Executable path: /Applications/Eddie.app/Contents/MacOS/Eddie
Command line arguments: (0 args)
Network Lock Active: Yes, macOS - PF
Connected to VPN: Yes, Cynosura
Detected DNS: 10.15.16.1
Test DNS IPv4: Ok
Test DNS IPv6: Ok
Test Ping IPv4: 55 ms
Test Ping IPv6: -1 ms
Test HTTP IPv4: Ok
Test HTTP IPv6: Error:curl: (7) Couldn't connect to server
Test HTTPS: Ok
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
connect: True
netlock: True
network.entry.iplayer: ipv6-ipv4
openvpn.management_port: 3101

----------------------------
Logs:

. 2018.07.15 10:01:50 - Eddie version: 2.16.1 / macos_x64, System: MacOS, Name: 10.11.6, Version: Darwin madrat.home 15.6.0 Darwin Kernel Version 15.6.0: Thu Jun 21 20:07:40 PDT 2018; root:xnu-3248.73.11~1/RELEASE_X86_64 x86_64, Mono/.Net: v4.0.30319
. 2018.07.15 10:01:50 - Reading options from /Users/madrat/.airvpn/default.xml
. 2018.07.15 10:01:51 - Command line arguments (0):
. 2018.07.15 10:01:51 - Profile path: /Users/madrat/.airvpn/default.xml
. 2018.07.15 10:01:54 - OpenVPN Driver - Expected
. 2018.07.15 10:01:54 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)
. 2018.07.15 10:01:54 - SSH - Version: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)
. 2018.07.15 10:01:54 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)
. 2018.07.15 10:01:54 - curl - Version: 7.43.0 (/usr/bin/curl)
. 2018.07.15 10:01:54 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem
! 2018.07.15 10:01:54 - Activation of Network Lock - macOS - PF
. 2018.07.15 10:01:54 - macOS - PF rules updated, reloading
. 2018.07.15 10:01:55 - Updating systems & servers data ...
. 2018.07.15 10:01:55 - macOS - PF rules updated, reloading
I 2018.07.15 10:01:56 - Session starting.
. 2018.07.15 10:01:57 - Systems & servers data update completed
I 2018.07.15 10:02:07 - Checking authorization ...
. 2018.07.15 10:02:08 - IPv6 disabled on network adapter (SAMSUNG Modem)
. 2018.07.15 10:02:08 - IPv6 disabled on network adapter (Ethernet)
. 2018.07.15 10:02:08 - IPv6 disabled on network adapter (FireWire)
. 2018.07.15 10:02:08 - IPv6 disabled on network adapter (Wi-Fi)
! 2018.07.15 10:02:08 - Connecting to Cynosura (Canada, Vancouver)
. 2018.07.15 10:02:08 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018
. 2018.07.15 10:02:08 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.07.15 10:02:08 - Connection to OpenVPN Management Interface
. 2018.07.15 10:02:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.07.15 10:02:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:02:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:02:08 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443
. 2018.07.15 10:02:08 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2018.07.15 10:02:09 - OpenVPN > UDP link local: (not bound)
. 2018.07.15 10:02:09 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443
. 2018.07.15 10:02:09 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.07.15 10:02:09 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=6140bf11 e7bde297
. 2018.07.15 10:02:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.15 10:02:09 - OpenVPN > VERIFY KU OK
. 2018.07.15 10:02:09 - OpenVPN > Validating certificate extended key usage
. 2018.07.15 10:02:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.15 10:02:09 - OpenVPN > VERIFY EKU OK
. 2018.07.15 10:02:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org
. 2018.07.15 10:02:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.15 10:02:09 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]71.19.252.21:443
. 2018.07.15 10:02:10 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1)
. 2018.07.15 10:02:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.16.1,route-gateway 10.15.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.16.136 255.255.255.0,peer-id 5,cipher AES-256-GCM'
. 2018.07.15 10:02:10 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.07.15 10:02:10 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.07.15 10:02:10 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.07.15 10:02:10 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.07.15 10:02:10 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.07.15 10:02:10 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2018.07.15 10:02:10 - OpenVPN > Opened utun device utun0
. 2018.07.15 10:02:10 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.07.15 10:02:10 - OpenVPN > /sbin/ifconfig utun0 delete
. 2018.07.15 10:02:10 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.07.15 10:02:10 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.07.15 10:02:10 - OpenVPN > /sbin/ifconfig utun0 10.15.16.136 10.15.16.136 netmask 255.255.255.0 mtu 1500 up
. 2018.07.15 10:02:10 - OpenVPN > /sbin/route add -net 10.15.16.0 10.15.16.136 255.255.255.0
. 2018.07.15 10:02:10 - OpenVPN > add net 10.15.16.0: gateway 10.15.16.136
. 2018.07.15 10:02:10 - OpenVPN > /sbin/route add -net 71.19.252.21 192.168.1.254 255.255.255.255
. 2018.07.15 10:02:10 - OpenVPN > add net 71.19.252.21: gateway 192.168.1.254
. 2018.07.15 10:02:10 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:02:10 - OpenVPN > add net 0.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:02:10 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:02:10 - OpenVPN > add net 128.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:02:11 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.16.1)
. 2018.07.15 10:02:11 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.16.1)
. 2018.07.15 10:02:11 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.16.1)
. 2018.07.15 10:02:11 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.16.1)
. 2018.07.15 10:02:11 - Routes, added a new route, 71.19.252.22 for gateway 10.15.16.1
. 2018.07.15 10:02:11 - Flushing DNS
. 2018.07.15 10:02:12 - macOS - PF rules updated, reloading
I 2018.07.15 10:02:12 - Checking route IPv4
I 2018.07.15 10:02:13 - Checking DNS
! 2018.07.15 10:02:13 - Connected.
. 2018.07.15 10:02:14 - OpenVPN > Initialization Sequence Completed
. 2018.07.15 10:03:03 - macOS - PF rules updated, reloading
! 2018.07.15 10:03:03 - Disconnecting
. 2018.07.15 10:03:03 - Routes, removed a route previously added, 71.19.252.22 for gateway 10.15.16.1
. 2018.07.15 10:03:03 - Sending management termination signal
. 2018.07.15 10:03:03 - Management - Send 'signal SIGTERM'
. 2018.07.15 10:03:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.15 10:03:04 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.15 10:03:08 - OpenVPN > /sbin/route delete -net 71.19.252.21 192.168.1.254 255.255.255.255
. 2018.07.15 10:03:08 - OpenVPN > delete net 71.19.252.21: gateway 192.168.1.254
. 2018.07.15 10:03:08 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:03:08 - OpenVPN > delete net 0.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:03:08 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:03:08 - OpenVPN > delete net 128.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:03:08 - OpenVPN > Closing TUN/TAP interface
. 2018.07.15 10:03:08 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.15 10:03:08 - Connection terminated.
. 2018.07.15 10:03:08 - IPv6 restored on network adapter (SAMSUNG Modem)
. 2018.07.15 10:03:08 - IPv6 restored on network adapter (Ethernet)
. 2018.07.15 10:03:08 - IPv6 restored on network adapter (FireWire)
. 2018.07.15 10:03:08 - IPv6 restored on network adapter (Wi-Fi)
. 2018.07.15 10:03:08 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)
. 2018.07.15 10:03:08 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.07.15 10:03:08 - DNS of a network adapter restored to original settings (FireWire, to 10.4.0.1)
. 2018.07.15 10:03:08 - DNS of a network adapter restored to original settings (Wi-Fi, to 10.4.0.1)
I 2018.07.15 10:03:08 - Checking authorization ...
! 2018.07.15 10:03:09 - Connecting to Cephei (Canada, Toronto, Ontario)
. 2018.07.15 10:03:10 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018
. 2018.07.15 10:03:10 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.07.15 10:03:10 - Connection to OpenVPN Management Interface
. 2018.07.15 10:03:10 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.07.15 10:03:10 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:03:10 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:03:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2606:6080:1001:c:fab7:78e8:4f3a:6eda:443
. 2018.07.15 10:03:10 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2018.07.15 10:03:10 - OpenVPN > UDPv6 link local: (not bound)
. 2018.07.15 10:03:10 - OpenVPN > UDPv6 link remote: [AF_INET6]2606:6080:1001:c:fab7:78e8:4f3a:6eda:443
. 2018.07.15 10:03:10 - OpenVPN > write UDPv6: No route to host (code=65)
. 2018.07.15 10:03:10 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.07.15 10:03:11 - OpenVPN > write UDPv6: No route to host (code=65)
. 2018.07.15 10:03:41 - Above log line repeated 3 times more
. 2018.07.15 10:03:41 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting
. 2018.07.15 10:03:41 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.15 10:03:46 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2018.07.15 10:03:46 - Disconnecting
. 2018.07.15 10:03:47 - Connection terminated.
I 2018.07.15 10:03:50 - Checking authorization ...
. 2018.07.15 10:03:51 - IPv6 disabled on network adapter (SAMSUNG Modem)
. 2018.07.15 10:03:51 - IPv6 disabled on network adapter (Ethernet)
. 2018.07.15 10:03:51 - IPv6 disabled on network adapter (FireWire)
. 2018.07.15 10:03:51 - IPv6 disabled on network adapter (Wi-Fi)
! 2018.07.15 10:03:51 - Connecting to Cynosura (Canada, Vancouver)
. 2018.07.15 10:03:51 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018
. 2018.07.15 10:03:51 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.07.15 10:03:51 - Connection to OpenVPN Management Interface
. 2018.07.15 10:03:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.07.15 10:03:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:03:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:03:51 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443
. 2018.07.15 10:03:51 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2018.07.15 10:03:51 - OpenVPN > UDP link local: (not bound)
. 2018.07.15 10:03:51 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443
. 2018.07.15 10:03:51 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.07.15 10:03:51 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=dcf12fc3 ff4d6a80
. 2018.07.15 10:03:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.15 10:03:52 - OpenVPN > VERIFY KU OK
. 2018.07.15 10:03:52 - OpenVPN > Validating certificate extended key usage
. 2018.07.15 10:03:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.15 10:03:52 - OpenVPN > VERIFY EKU OK
. 2018.07.15 10:03:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org
. 2018.07.15 10:03:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.15 10:03:52 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]71.19.252.21:443
. 2018.07.15 10:03:53 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1)
. 2018.07.15 10:03:53 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.16.1,route-gateway 10.15.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.16.136 255.255.255.0,peer-id 5,cipher AES-256-GCM'
. 2018.07.15 10:03:53 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.07.15 10:03:53 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.07.15 10:03:53 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.07.15 10:03:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.07.15 10:03:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.07.15 10:03:53 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2018.07.15 10:03:53 - OpenVPN > Opened utun device utun0
. 2018.07.15 10:03:53 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.07.15 10:03:53 - OpenVPN > /sbin/ifconfig utun0 delete
. 2018.07.15 10:03:53 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.07.15 10:03:53 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.07.15 10:03:53 - OpenVPN > /sbin/ifconfig utun0 10.15.16.136 10.15.16.136 netmask 255.255.255.0 mtu 1500 up
. 2018.07.15 10:03:53 - OpenVPN > /sbin/route add -net 10.15.16.0 10.15.16.136 255.255.255.0
. 2018.07.15 10:03:53 - OpenVPN > add net 10.15.16.0: gateway 10.15.16.136
. 2018.07.15 10:03:53 - OpenVPN > /sbin/route add -net 71.19.252.21 192.168.1.254 255.255.255.255
. 2018.07.15 10:03:53 - OpenVPN > add net 71.19.252.21: gateway 192.168.1.254
. 2018.07.15 10:03:53 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:03:53 - OpenVPN > add net 0.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:03:53 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:03:53 - OpenVPN > add net 128.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:03:53 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.16.1)
. 2018.07.15 10:03:54 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.16.1)
. 2018.07.15 10:03:54 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.16.1)
. 2018.07.15 10:03:54 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.16.1)
. 2018.07.15 10:03:54 - Routes, added a new route, 71.19.252.22 for gateway 10.15.16.1
. 2018.07.15 10:03:54 - Flushing DNS
. 2018.07.15 10:03:54 - macOS - PF rules updated, reloading
I 2018.07.15 10:03:55 - Checking route IPv4
I 2018.07.15 10:03:56 - Checking DNS
! 2018.07.15 10:03:56 - Connected.
. 2018.07.15 10:03:56 - OpenVPN > Initialization Sequence Completed
. 2018.07.15 10:04:34 - macOS - PF rules updated, reloading
! 2018.07.15 10:04:35 - Disconnecting
. 2018.07.15 10:04:35 - Routes, removed a route previously added, 71.19.252.22 for gateway 10.15.16.1
. 2018.07.15 10:04:35 - Sending management termination signal
. 2018.07.15 10:04:35 - Management - Send 'signal SIGTERM'
. 2018.07.15 10:04:35 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.15 10:04:35 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.15 10:04:40 - OpenVPN > /sbin/route delete -net 71.19.252.21 192.168.1.254 255.255.255.255
. 2018.07.15 10:04:40 - OpenVPN > delete net 71.19.252.21: gateway 192.168.1.254
. 2018.07.15 10:04:40 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:04:40 - OpenVPN > delete net 0.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:04:40 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:04:40 - OpenVPN > delete net 128.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:04:40 - OpenVPN > Closing TUN/TAP interface
. 2018.07.15 10:04:40 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.15 10:04:40 - Connection terminated.
. 2018.07.15 10:04:40 - IPv6 restored on network adapter (SAMSUNG Modem)
. 2018.07.15 10:04:40 - IPv6 restored on network adapter (Ethernet)
. 2018.07.15 10:04:40 - IPv6 restored on network adapter (FireWire)
. 2018.07.15 10:04:40 - IPv6 restored on network adapter (Wi-Fi)
. 2018.07.15 10:04:40 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)
. 2018.07.15 10:04:40 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.07.15 10:04:40 - DNS of a network adapter restored to original settings (FireWire, to 10.4.0.1)
. 2018.07.15 10:04:40 - DNS of a network adapter restored to original settings (Wi-Fi, to 10.4.0.1)
I 2018.07.15 10:04:40 - Checking authorization ...
! 2018.07.15 10:04:41 - Connecting to Rana (Canada, Toronto, Ontario)
. 2018.07.15 10:04:41 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018
. 2018.07.15 10:04:41 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.07.15 10:04:41 - Connection to OpenVPN Management Interface
. 2018.07.15 10:04:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.07.15 10:04:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:04:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:04:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443
. 2018.07.15 10:04:41 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2018.07.15 10:04:41 - OpenVPN > UDPv6 link local: (not bound)
. 2018.07.15 10:04:41 - OpenVPN > UDPv6 link remote: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443
. 2018.07.15 10:04:41 - OpenVPN > write UDPv6: No route to host (code=65)
. 2018.07.15 10:04:42 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.07.15 10:04:44 - OpenVPN > write UDPv6: No route to host (code=65)
. 2018.07.15 10:05:13 - Above log line repeated 3 times more
. 2018.07.15 10:05:13 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting
. 2018.07.15 10:05:13 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.15 10:05:18 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2018.07.15 10:05:18 - Disconnecting
. 2018.07.15 10:05:18 - Connection terminated.
I 2018.07.15 10:05:21 - Checking authorization ...
. 2018.07.15 10:05:22 - IPv6 disabled on network adapter (SAMSUNG Modem)
. 2018.07.15 10:05:22 - IPv6 disabled on network adapter (Ethernet)
. 2018.07.15 10:05:22 - IPv6 disabled on network adapter (FireWire)
. 2018.07.15 10:05:22 - IPv6 disabled on network adapter (Wi-Fi)
! 2018.07.15 10:05:22 - Connecting to Cynosura (Canada, Vancouver)
. 2018.07.15 10:05:22 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018
. 2018.07.15 10:05:22 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.07.15 10:05:22 - Connection to OpenVPN Management Interface
. 2018.07.15 10:05:22 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.07.15 10:05:22 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:05:22 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:05:22 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443
. 2018.07.15 10:05:22 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2018.07.15 10:05:22 - OpenVPN > UDP link local: (not bound)
. 2018.07.15 10:05:22 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443
. 2018.07.15 10:05:22 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.07.15 10:05:22 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=b74c8b2f af4b383b
. 2018.07.15 10:05:22 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.15 10:05:22 - OpenVPN > VERIFY KU OK
. 2018.07.15 10:05:22 - OpenVPN > Validating certificate extended key usage
. 2018.07.15 10:05:22 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.15 10:05:22 - OpenVPN > VERIFY EKU OK
. 2018.07.15 10:05:22 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org
. 2018.07.15 10:05:23 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.15 10:05:23 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]71.19.252.21:443
. 2018.07.15 10:05:24 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1)
. 2018.07.15 10:05:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.16.1,route-gateway 10.15.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.16.136 255.255.255.0,peer-id 5,cipher AES-256-GCM'
. 2018.07.15 10:05:24 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.07.15 10:05:24 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.07.15 10:05:24 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.07.15 10:05:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.07.15 10:05:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.07.15 10:05:24 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2018.07.15 10:05:24 - OpenVPN > Opened utun device utun0
. 2018.07.15 10:05:24 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.07.15 10:05:24 - OpenVPN > /sbin/ifconfig utun0 delete
. 2018.07.15 10:05:24 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.07.15 10:05:24 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.07.15 10:05:24 - OpenVPN > /sbin/ifconfig utun0 10.15.16.136 10.15.16.136 netmask 255.255.255.0 mtu 1500 up
. 2018.07.15 10:05:24 - OpenVPN > /sbin/route add -net 10.15.16.0 10.15.16.136 255.255.255.0
. 2018.07.15 10:05:24 - OpenVPN > add net 10.15.16.0: gateway 10.15.16.136
. 2018.07.15 10:05:24 - OpenVPN > /sbin/route add -net 71.19.252.21 192.168.1.254 255.255.255.255
. 2018.07.15 10:05:24 - OpenVPN > add net 71.19.252.21: gateway 192.168.1.254
. 2018.07.15 10:05:24 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:05:24 - OpenVPN > add net 0.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:05:24 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:05:24 - OpenVPN > add net 128.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:05:24 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.16.1)
. 2018.07.15 10:05:25 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.16.1)
. 2018.07.15 10:05:25 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.16.1)
. 2018.07.15 10:05:25 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.16.1)
. 2018.07.15 10:05:25 - Routes, added a new route, 71.19.252.22 for gateway 10.15.16.1
. 2018.07.15 10:05:25 - Flushing DNS
. 2018.07.15 10:05:25 - macOS - PF rules updated, reloading
I 2018.07.15 10:05:26 - Checking route IPv4
I 2018.07.15 10:05:27 - Checking DNS
! 2018.07.15 10:05:27 - Connected.
. 2018.07.15 10:05:27 - OpenVPN > Initialization Sequence Completed
. 2018.07.15 10:06:08 - macOS - PF rules updated, reloading
! 2018.07.15 10:06:09 - Disconnecting
. 2018.07.15 10:06:09 - Routes, removed a route previously added, 71.19.252.22 for gateway 10.15.16.1
. 2018.07.15 10:06:09 - Sending management termination signal
. 2018.07.15 10:06:09 - Management - Send 'signal SIGTERM'
. 2018.07.15 10:06:09 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.07.15 10:06:09 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.15 10:06:14 - OpenVPN > /sbin/route delete -net 71.19.252.21 192.168.1.254 255.255.255.255
. 2018.07.15 10:06:14 - OpenVPN > delete net 71.19.252.21: gateway 192.168.1.254
. 2018.07.15 10:06:14 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:06:14 - OpenVPN > delete net 0.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:06:14 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:06:14 - OpenVPN > delete net 128.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:06:14 - OpenVPN > Closing TUN/TAP interface
. 2018.07.15 10:06:14 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.07.15 10:06:14 - Connection terminated.
. 2018.07.15 10:06:14 - IPv6 restored on network adapter (SAMSUNG Modem)
. 2018.07.15 10:06:14 - IPv6 restored on network adapter (Ethernet)
. 2018.07.15 10:06:14 - IPv6 restored on network adapter (FireWire)
. 2018.07.15 10:06:14 - IPv6 restored on network adapter (Wi-Fi)
. 2018.07.15 10:06:14 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)
. 2018.07.15 10:06:14 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
. 2018.07.15 10:06:14 - DNS of a network adapter restored to original settings (FireWire, to 10.4.0.1)
. 2018.07.15 10:06:14 - DNS of a network adapter restored to original settings (Wi-Fi, to 10.4.0.1)
I 2018.07.15 10:06:14 - Checking authorization ...
! 2018.07.15 10:06:15 - Connecting to Rana (Canada, Toronto, Ontario)
. 2018.07.15 10:06:19 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018
. 2018.07.15 10:06:19 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.07.15 10:06:19 - Connection to OpenVPN Management Interface
. 2018.07.15 10:06:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.07.15 10:06:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:06:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:06:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443
. 2018.07.15 10:06:19 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2018.07.15 10:06:19 - OpenVPN > UDPv6 link local: (not bound)
. 2018.07.15 10:06:19 - OpenVPN > UDPv6 link remote: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443
. 2018.07.15 10:06:19 - OpenVPN > write UDPv6: No route to host (code=65)
. 2018.07.15 10:06:19 - Above log line repeated 1 times more
. 2018.07.15 10:06:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.07.15 10:06:22 - OpenVPN > write UDPv6: No route to host (code=65)
. 2018.07.15 10:06:47 - Above log line repeated 1 times more
. 2018.07.15 10:06:47 - OpenVPN > [uNDEF] Inactivity timeout (--ping-exit), exiting
. 2018.07.15 10:06:47 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.07.15 10:06:47 - OpenVPN > write UDPv6: No route to host (code=65)
. 2018.07.15 10:06:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
! 2018.07.15 10:06:52 - Disconnecting
. 2018.07.15 10:06:52 - Connection terminated.
I 2018.07.15 10:06:55 - Checking authorization ...
. 2018.07.15 10:06:56 - IPv6 disabled on network adapter (SAMSUNG Modem)
. 2018.07.15 10:06:56 - IPv6 disabled on network adapter (Ethernet)
. 2018.07.15 10:06:56 - IPv6 disabled on network adapter (FireWire)
. 2018.07.15 10:06:56 - IPv6 disabled on network adapter (Wi-Fi)
! 2018.07.15 10:06:56 - Connecting to Cynosura (Canada, Vancouver)
. 2018.07.15 10:06:56 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.5.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Apr 27 2018
. 2018.07.15 10:06:56 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.07.15 10:06:56 - Connection to OpenVPN Management Interface
. 2018.07.15 10:06:56 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101
. 2018.07.15 10:06:56 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:06:56 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.07.15 10:06:56 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443
. 2018.07.15 10:06:56 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2018.07.15 10:06:56 - OpenVPN > UDP link local: (not bound)
. 2018.07.15 10:06:56 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443
. 2018.07.15 10:06:56 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101
. 2018.07.15 10:06:56 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=aa80bbb3 ab01f459
. 2018.07.15 10:06:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.07.15 10:06:57 - OpenVPN > VERIFY KU OK
. 2018.07.15 10:06:57 - OpenVPN > Validating certificate extended key usage
. 2018.07.15 10:06:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.07.15 10:06:57 - OpenVPN > VERIFY EKU OK
. 2018.07.15 10:06:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org
. 2018.07.15 10:06:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.07.15 10:06:57 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]71.19.252.21:443
. 2018.07.15 10:06:58 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1)
. 2018.07.15 10:06:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.15.16.1,route-gateway 10.15.16.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.15.16.136 255.255.255.0,peer-id 5,cipher AES-256-GCM'
. 2018.07.15 10:06:58 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.07.15 10:06:58 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.07.15 10:06:58 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.07.15 10:06:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.07.15 10:06:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.07.15 10:06:58 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2018.07.15 10:06:58 - OpenVPN > Opened utun device utun0
. 2018.07.15 10:06:58 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.07.15 10:06:58 - OpenVPN > /sbin/ifconfig utun0 delete
. 2018.07.15 10:06:58 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2018.07.15 10:06:58 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2018.07.15 10:06:58 - OpenVPN > /sbin/ifconfig utun0 10.15.16.136 10.15.16.136 netmask 255.255.255.0 mtu 1500 up
. 2018.07.15 10:06:58 - OpenVPN > /sbin/route add -net 10.15.16.0 10.15.16.136 255.255.255.0
. 2018.07.15 10:06:58 - OpenVPN > add net 10.15.16.0: gateway 10.15.16.136
. 2018.07.15 10:06:58 - OpenVPN > /sbin/route add -net 71.19.252.21 192.168.1.254 255.255.255.255
. 2018.07.15 10:06:58 - OpenVPN > add net 71.19.252.21: gateway 192.168.1.254
. 2018.07.15 10:06:58 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:06:58 - OpenVPN > add net 0.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:06:58 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.16.1 128.0.0.0
. 2018.07.15 10:06:58 - OpenVPN > add net 128.0.0.0: gateway 10.15.16.1
. 2018.07.15 10:06:58 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.16.1)
. 2018.07.15 10:06:58 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.16.1)
. 2018.07.15 10:06:59 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.16.1)
. 2018.07.15 10:06:59 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.16.1)
. 2018.07.15 10:06:59 - Routes, added a new route, 71.19.252.22 for gateway 10.15.16.1
. 2018.07.15 10:06:59 - Flushing DNS
. 2018.07.15 10:06:59 - macOS - PF rules updated, reloading
I 2018.07.15 10:07:00 - Checking route IPv4
I 2018.07.15 10:07:00 - Checking DNS
! 2018.07.15 10:07:01 - Connected.
. 2018.07.15 10:07:01 - OpenVPN > Initialization Sequence Completed
. 2018.07.15 10:12:04 - Updating systems & servers data ...
. 2018.07.15 10:12:06 - Systems & servers data update completed

----------------------------
Network Interfaces and Routes:

{
    "support_ipv4": true,
    "support_ipv6": true,
    "routes": [
        {
            "address": "0.0.0.0\/1",
            "gateway": "10.15.16.1",
            "flags": "UGSc",
            "refs": "5",
            "use": "1",
            "mtu": "1500",
            "interface": "utun0"
        },
        {
            "address": "0.0.0.0\/0",
            "gateway": "192.168.1.254",
            "flags": "UGSc",
            "refs": "1",
            "use": "1371",
            "mtu": "1500",
            "interface": "en0"
        },
        {
            "address": "10.15.0.16\/24",
            "gateway": "10.15.16.136",
            "flags": "UGSc",
            "refs": "3",
            "use": "0",
            "mtu": "1500",
            "interface": "utun0"
        },
        {
            "address": "10.15.16.136",
            "gateway": "10.15.16.136",
            "flags": "UH",
            "refs": "2",
            "use": "5",
            "mtu": "1500",
            "interface": "utun0"
        },
        {
            "address": "71.19.252.21",
            "gateway": "192.168.1.254",
            "flags": "UGSc",
            "refs": "1",
            "use": "0",
            "mtu": "1500",
            "interface": "en0"
        },
        {
            "address": "71.19.252.22",
            "gateway": "10.15.16.1",
            "flags": "UGHS",
            "refs": "0",
            "use": "32",
            "mtu": "1500",
            "interface": "utun0"
        },
        {
            "address": "0.0.0.127",
            "gateway": "127.0.0.1",
            "flags": "UCS",
            "refs": "0",
            "use": "0",
            "mtu": "16384",
            "interface": "lo0"
        },
        {
            "address": "127.0.0.1",
            "gateway": "127.0.0.1",
            "flags": "UH",
            "refs": "3",
            "use": "707478",
            "mtu": "16384",
            "interface": "lo0"
        },
        {
            "address": "128.0.0.0\/1",
            "gateway": "10.15.16.1",
            "flags": "UGSc",
            "refs": "5",
            "use": "0",
            "mtu": "1500",
            "interface": "utun0"
        },
        {
            "address": "169.0.0.254",
            "gateway": "link#4",
            "flags": "UCS",
            "refs": "0",
            "use": "0",
            "mtu": "1500",
            "interface": "en0"
        },
        {
            "address": "192.168.0.1",
            "gateway": "link#4",
            "flags": "UCS",
            "refs": "1",
            "use": "0",
            "mtu": "1500",
            "interface": "en0"
        },
        {
            "address": "192.168.1.65",
            "gateway": "link#4",
            "flags": "UCS",
            "refs": "1",
            "use": "0",
            "mtu": "1500",
            "interface": "en0"
        },
        {
            "address": "192.168.1.65",
            "gateway": "0:23:df:8c:a0:ae",
            "flags": "UHLWI",
            "refs": "0",
            "use": "40",
            "mtu": "16384",
            "interface": "lo0"
        },
        {
            "address": "192.168.1.254",
            "gateway": "link#4",
            "flags": "UCS",
            "refs": "1",
            "use": "0",
            "mtu": "1500",
            "interface": "en0"
        },
        {
            "address": "192.168.1.254",
            "gateway": "1c:af:f7:d9:72:db",
            "flags": "UHLWIir",
            "refs": "4",
            "use": "4868",
            "mtu": "1500",
            "interface": "en0",
            "expire": "1176"
        },
        {
            "address": "192.168.1.255",
            "gateway": "ff:ff:ff:ff:ff:ff",
            "flags": "UHLWbI",
            "refs": "0",
            "use": "37",
            "mtu": "1500",
            "interface": "en0"
        },
        {
            "address": "224.0.0.0",
            "gateway": "link#4",
            "flags": "UmCS",
            "refs": "2",
            "use": "0",
            "mtu": "1500",
            "interface": "en0"
        },
        {
            "address": "224.0.0.1",
            "gateway": "1:0:5e:0:0:1",
            "flags": "UHmLWI",
            "refs": "0",
            "use": "62648",
            "mtu": "1500",
            "interface": "en0"
        },
        {
            "address": "224.0.0.251",
            "gateway": "1:0:5e:0:0:fb",
            "flags": "UHmLWI",
            "refs": "0",
            "use": "0",
            "mtu": "1500",
            "interface": "en0"
        },
        {
            "address": "255.255.255.255",
            "gateway": "link#4",
            "flags": "UCS",
            "refs": "0",
            "use": "0",
            "mtu": "1500",
            "interface": "en0"
        },
        {
            "address": "::1",
            "gateway": "::1",
            "flags": "UHL",
            "refs": "0",
            "use": "0",
            "mtu": "16384",
            "interface": "lo0"
        },
        {
            "address": "fe80::",
            "gateway": "fe80::1%lo0",
            "flags": "UcI",
            "refs": "1",
            "use": "0",
            "mtu": "16384",
            "interface": "lo0"
        },
        {
            "address": "fe80::1",
            "gateway": "link#1",
            "flags": "UHLI",
            "refs": "1",
            "use": "0",
            "mtu": "16384",
            "interface": "lo0"
        },
        {
            "address": "ff01::",
            "gateway": "::1",
            "flags": "UmCI",
            "refs": "0",
            "use": "0",
            "mtu": "16384",
            "interface": "lo0"
        },
        {
            "address": "ff02::",
            "gateway": "::1",
            "flags": "UmCI",
            "refs": "0",
            "use": "0",
            "mtu": "16384",
            "interface": "lo0"
        }
    ],
    "interfaces": [
        {
            "friendly": "lo0",
            "id": "lo0",
            "name": "lo0",
            "description": "lo0",
            "type": "Loopback",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "::1",
                "127.0.0.1",
                "fe80::1"
            ],
            "gateways": [
                "127.0.0.1",
                "::1",
                "fe80::1"
            ],
            "bind": true
        },
        {
            "friendly": "gif0",
            "id": "gif0",
            "name": "gif0",
            "description": "gif0",
            "type": "Unknown",
            "status": "Unknown",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [],
            "gateways": [],
            "bind": false
        },
        {
            "friendly": "stf0",
            "id": "stf0",
            "name": "stf0",
            "description": "stf0",
            "type": "Unknown",
            "status": "Unknown",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [],
            "gateways": [],
            "bind": false
        },
        {
            "friendly": "Ethernet",
            "id": "en0",
            "name": "en0",
            "description": "en0",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": false,
            "ips": [
                "192.168.1.65"
            ],
            "gateways": [
                "192.168.1.254"
            ],
            "bind": true
        },
        {
            "friendly": "Wi-Fi",
            "id": "en1",
            "name": "en1",
            "description": "en1",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": false,
            "ips": [],
            "gateways": [],
            "bind": false
        },
        {
            "friendly": "FireWire",
            "id": "fw0",
            "name": "fw0",
            "description": "fw0",
            "type": "Unknown",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": false,
            "ips": [],
            "gateways": [],
            "bind": false
        },
        {
            "friendly": "p2p0",
            "id": "p2p0",
            "name": "p2p0",
            "description": "p2p0",
            "type": "Ethernet",
            "status": "Unknown",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [],
            "gateways": [],
            "bind": false
        },
        {
            "friendly": "utun0",
            "id": "utun0",
            "name": "utun0",
            "description": "utun0",
            "type": "Unknown",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "10.15.16.136"
            ],
            "gateways": [
                "10.15.16.1",
                "10.15.16.136"
            ],
            "bind": true
        }
    ],
    "ipv4-default-gateway": "192.168.1.254",
    "ipv4-default-interface": "en0"
}
----------------------------
ifconfig:

lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
    options=3<RXCSUM,TXCSUM>
    inet6 ::1 prefixlen 128
    inet 127.0.0.1 netmask 0xff000000
    inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1
    nd6 options=1<PERFORMNUD>
gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280
stf0: flags=0<> mtu 1280
en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
    options=27<RXCSUM,TXCSUM,VLAN_MTU,TSO4>
    ether 00:23:df:8c:a0:ae
    inet 192.168.1.65 netmask 0xffffff00 broadcast 192.168.1.255
    nd6 options=1<PERFORMNUD>
    media: autoselect (100baseTX <full-duplex,flow-control>)
    status: active
en1: flags=8823<UP,BROADCAST,SMART,SIMPLEX,MULTICAST> mtu 1500
    ether 00:1f:f3:bd:82:25
    nd6 options=1<PERFORMNUD>
    media: autoselect (<unknown type>)
    status: inactive
fw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 4078
    lladdr 00:23:df:ff:fe:8c:a0:ae
    nd6 options=1<PERFORMNUD>
    media: autoselect <full-duplex>
    status: inactive
p2p0: flags=8802<BROADCAST,SIMPLEX,MULTICAST> mtu 2304
    ether 02:1f:f3:bd:82:25
    media: autoselect
    status: inactive
utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500
    inet 10.15.16.136 --> 10.15.16.136 netmask 0xffffff00

Share this post


Link to post

madrat - check your network preferences and make sure you're getting an IPv6 address from your router to begin with. Ever since I started using it when we had a couple servers they were testing, my Mac likes to turn it off on its own at random times. And even if I set it back to 'Automatically' grab one, it won't get a new one until I turn off my network adapter, and restart it and connect to my router again. 2 of the three servers here in LA are now IPv6 and I like to use it just because its available. Out of nowhere it will just drop my address while Im connected, and the server just goes dead and stops responding to me. I have to restart the network adapter (I use my AirPort card since Im too far to plug in ethernet), before it will reconnect to any of the gen 2 servers (it will connect to an IPv4 only server though). I switched my Eddie preferences from using IPv6,IPv4 back to IPv4,IPv6 and its actually been connected to Sabik here in LA for a few days I think now. So maybe that's the key. I don't think it has anything to do with Eddie, its an issue strictly with macOS. Even if you tell Eddie to use IPv6, if the Mac doesnt have IPv6 turned on, it won't work. Eddie won't turn it on for you, even if the Mac decides to turn it back off again. I thought maybe this was a High Sierra issue, but Ive found posts in the Apple Discussion Forums from other people with the same issue on various versions of OS X and macOS so its just something Apple hasn't really gotten done 100% it seems. 

Share this post


Link to post

@madrat

 

Thanks so much for the heads up! First thing I did was go to System Preferences and set configure IPv6 to automatic (it always reverted back to off after a failed connection to an IPv6 server). Opened Eddie's Preferences and changed Network settings from IPv6, IPv4 to IPv4, IPv6 as you suggested. Saved settings and connected to Rana (Toronto) and voila - success. Have no idea why this would make a difference, but it worked. Will see if it stays connected. So far so good. I did notice, when I went back to check my Mac/System Preferences, the configure setting, which was set to Automatically, had changed to "Link-local only". Not sure if that is a good thing or not, but at least I'm connected to IPv6 for the first time. Thanks again!

Share this post


Link to post

I still have a wish for you. It would be nice if Eddie is made simpler and more modern. It's a bit complicated, especially for beginners, as it can lead to difficulties.

The client "Eddie", which you have to load onto the computer, does not make it better visually: Again, no improvement has been made to the user interface nor is there a different look and feel in the starting blocks.

It would be nice to refresh the client and make it easier. Since very fast, wrong settings can be made.

This is just a factual criticism, are just things that I wish :-)

Share this post


Link to post

@madrat

 

Unfortunately, just checked IPleak.com, and IPv6 tests failed??

 

Hahaha and go figure, I just checked IPleak when I saw your post, and I got NO IPv4 address, but I got an IPv6 address, and the browser is using IPv6 and didn't fallback to IPv4 hahaha. I checked ipv6-test.com right after, and passed with 18/20 just fine for both IPv6 and IPv4. The only thing it didn't get was the hostname for IPv6, but it always does that. So far switching the connection has fixed the disconnection issue. I checked ipv6-test.com the other day and noticed the Mac IS still randomly dropping the address though. But at least my connection stays working now because its using IPv4 first now. If it works that way, and I can still pass the browser tests, Im good for now.

Share this post


Link to post

Hi, and thanks for the new version.

 

However, some user interface problems persist. The tray icon still does not work and the "UI Main Font" button in UI settings does not work either. Also, in the same window with the broken font button, "on't show bootstrap failure window" should probably read "Don't show bootstrap failure window".

 

Xubuntu 16.04 LTS x86

 

Thanks again.

This issues with Xubuntu will be fixed in the next 2.16.2 release, please wait. Thanks for the feedback.

Share this post


Link to post

Seems to work fine on 10.11.6 El Capitan, but still no luck connecting to an IPv6 server.  Logs attached in case you want a look.

Hi, you have en0 (Ethernet) with IPv6 disabled, from your system log:
{
            "friendly": "Ethernet",
            "id": "en0",
            "name": "en0",
            "description": "en0",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": false,
            "ips": [
                "192.168.1.65"
            ],
            "gateways": [
                "192.168.1.254"
            ],
            "bind": true
        },
AND

you have in Settings -> Networking -> Internet protocol used for connection -> IPv6, IPv4 (not the default).

 

So, when you try to connect to a server that support IPv6, due to the option above it try to reach over IPv6, but fail because you have IPv6 disabled on en0 adapter.

. 2018.07.15 10:06:19 - OpenVPN > UDPv6 link remote: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443
. 2018.07.15 10:06:19 - OpenVPN > write UDPv6: No route to host (code=65)
"How" to reach our server (via IPv4 or IPv6, the option above) is not really correlated to obtain an IPv6 tunnel.

 

With Settings -> Networking -> Internet protocol used for connection -> IPv4, IPv6

you connect to Air server via IPv4, but still obtain a IPv4 AND IPv6 tunnel.

Share this post


Link to post

 

Seems to work fine on 10.11.6 El Capitan, but still no luck connecting to an IPv6 server.  Logs attached in case you want a look.

Hi, you have en0 (Ethernet) with IPv6 disabled, from your system log:
{
            "friendly": "Ethernet",
            "id": "en0",
            "name": "en0",
            "description": "en0",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": false,
            "ips": [
                "192.168.1.65"
            ],
            "gateways": [
                "192.168.1.254"
            ],
            "bind": true
        },
AND

you have in Settings -> Networking -> Internet protocol used for connection -> IPv6, IPv4 (not the default).

 

So, when you try to connect to a server that support IPv6, due to the option above it try to reach over IPv6, but fail because you have IPv6 disabled on en0 adapter.

. 2018.07.15 10:06:19 - OpenVPN > UDPv6 link remote: [AF_INET6]2604:6880:c713:5e84:45b1:390b:9c7e:9838:443
. 2018.07.15 10:06:19 - OpenVPN > write UDPv6: No route to host (code=65)
"How" to reach our server (via IPv4 or IPv6, the option above) is not really correlated to obtain an IPv6 tunnel.

 

With Settings -> Networking -> Internet protocol used for connection -> IPv4, IPv6

you connect to Air server via IPv4, but still obtain a IPv4 AND IPv6 tunnel.

 

Thanks so much for the info. I have very limited knowledge of this stuff, but I will be taking the info you gave me, and searching the info you provided, in order to try and learn what you are talking about. In the meantime, despite not being able to connect to IPv6, Eddie is running just fine and I have been happy with it for several years now. Great support, not only from staff, but from users as well.

Share this post


Link to post

The file used to be signed with airvpn digital signature so i know it was added there by you. Now there was a change from AIR DI PAOLO BRINI (airvpn digital signature) to the developer digital signature (i assume) which none talked about. That reduces security as i can't be sure what that file does when if i use one signed by you guys i can know it's legit assuming you keep your digital signature safe. 

 

An easy sad example is ccleaner issue with their software being signed but failing to properly secure their digital signature process. You get the idea. Your digital signature is safer than that guys digital signature.

 

I can second that. A change of signature is not by it's nature a problem. But it should be announced because otherwise we as users have no way to know whether the change of signature is legit or if someone managed to smuggle a bogus piece of software onto your servers. This has happened multiple times in the past (e.g. the already mentioned CCleaner or even Linux Mint). After all a VPN client is security related software and should by all means be treated like that so we, the users, can actually trust it.

Share this post


Link to post
Guest

I still have a wish for you. It would be nice if Eddie is made simpler and more modern. It's a bit complicated, especially for beginners, as it can lead to difficulties.

 

The client "Eddie", which you have to load onto the computer, does not make it better visually: Again, no improvement has been made to the user interface nor is there a different look and feel in the starting blocks.

 

It would be nice to refresh the client and make it easier. Since very fast, wrong settings can be made.

 

This is just a factual criticism, are just things that I wish :-)

 

I guess you're the type who also wants websites to 'pop' and 'flash' whatever those words mean. Eddie is pretty decent already, it's not absolutely beginner friendly, but it's mostly put in username/password, choose a server and click connect. If you're messing with the settings you should have some clue what you're doing.

 

I don't really understand what you're proposing here, if you're messing with settings you have no clue about that's not Eddie's fault.

Share this post


Link to post

So could any of the Mac users explain how to fix the following problem, that was pointed out to me by staff? I've done several Google searches, but just can't figure it out myself.

 

Hi, you have en0 (Ethernet) with IPv6 disabled, from your system log: {
"friendly": "Ethernet",
"id": "en0",
"name": "en0",
"description": "en0",
"type": "Ethernet",
"status": "Up",
"bytes_received": "0",
"bytes_sent": "0",
"support_ipv4": true,
"support_ipv6": false,
"ips": [
"192.168.1.65"
],
"gateways": [
"192.168.1.254"
],
"bind": true
},

Share this post


Link to post

Thanks so much for the info. I have very limited knowledge of this stuff, but I will be taking the info you gave me, and searching the info you provided, in order to try and learn what you are talking about. In the meantime, despite not being able to connect to IPv6, Eddie is running just fine and I have been happy with it for several years now. Great support, not only from staff, but from users as well.

I try to re-explain.

 

You can connect to AirVPN servers via IPv4 OR IPv6. This is controlled by the option "Settings -> Networking -> Internet protocol used for connection".

To connect via IPv6, you need to have IPv6 enabled on your network adapter, and your ISP support it (so, you need to have IPv6 connectivity WITHOUT the VPN here: http://ipv6-test.com/).

But you have also IPv6 disabled on your network adapter, so try to run in terminal

networksetup -getinfo Ethernet
and if report "IPv6: Off", try to run
networksetup -setv6automatic Ethernet
to re-enable it.

 

I suggest to leave "Settings -> Networking -> Internet protocol used for connection" at "IPv4, IPv6" (the default).

Share this post


Link to post

 

Thanks so much for the info. I have very limited knowledge of this stuff, but I will be taking the info you gave me, and searching the info you provided, in order to try and learn what you are talking about. In the meantime, despite not being able to connect to IPv6, Eddie is running just fine and I have been happy with it for several years now. Great support, not only from staff, but from users as well.

I try to re-explain.

 

You can connect to AirVPN servers via IPv4 OR IPv6. This is controlled by the option "Settings -> Networking -> Internet protocol used for connection".

To connect via IPv6, you need to have IPv6 enabled on your network adapter, and your ISP support it (so, you need to have IPv6 connectivity WITHOUT the VPN here: http://ipv6-test.com/).

But you have also IPv6 disabled on your network adapter, so try to run in terminal

networksetup -getinfo Ethernet
and if report "IPv6: Off", try to run
networksetup -setv6automatic Ethernet
to re-enable it.

 

I suggest to leave "Settings -> Networking -> Internet protocol used for connection" at "IPv4, IPv6" (the default).

 

Unfortunately, I think the problem may be that my router does not support ipv6. This is the result from terminal:

DHCP Configuration

IP address: 192.168.1.65

Subnet mask: 255.255.255.0

Router: 192.168.1.254

Client ID:

IPv6: Automatic

IPv6 IP address: none

IPv6 Router: none

Ethernet Address: 00:23:df:8c:a0:ae

Share this post


Link to post

Sign in to the router and check its address settings from your ISP. Im on Spectrum/Time Warner and they do full IPv6. You should see it all listed where it shows you the address/DNS/etc the router gets from the ISP. IPv6 is usually a separate page aside from the IPv4 DHCP stuff, at least it is in my router. It won't let me do static IPv6 though which would really help with the Mac dropping its address at random heh.

 

There used to be a setting in Eddie 2.13 that enabled/disabled IPv6. The setting was removed in 2.14, but is still in the config file. By default it was disabled as well, so it may still be set like that from back when you were using 2.13 (we didn't have IPv6 servers yet). I found this out when I began testing the 'new' gen 2 server Castor, and couldn't figure out why it wasn't working with the 2.14 beta. Eddie just won't turn it on no matter what if that setting is disabled in the config.

 

EDIT: Also, what did you run in the terminal to show you the IP info??? I know about ifconfig, but I want something simple and easy thats more like Windows IPConfig hehe. ifconfig shows me all kinds of crap I don't care about when I just wanna see my addresses!

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...