Jump to content
Not connected, Your IP: 3.144.40.90

Recommended Posts

Posted ... (edited)

Just got a new modem/router. Ran tests on IPleak.net. My MacBook Pro connecting via WiFi passes the ipv6 tests just fine but my iMac, using ethernet, does not. Any suggestions? Log can be posted if necessary.

 

 

OK, here is my log:

. 2019.02.10 15:14:54 - Eddie version: 2.17.2 / macos_x64, System: MacOS, Name: 10.11.6, Version: Darwin madrat.local 15.6.0 Darwin Kernel Version 15.6.0: Thu Jun 21 20:07:40 PDT 2018; root:xnu-3248.73.11~1/RELEASE_X86_64 x86_64, Mono/.Net: v4.0.30319
. 2019.02.10 15:14:56 - Reading options from /Users/madrat/.airvpn/default.xml
. 2019.02.10 15:15:03 - Command line arguments (0):
. 2019.02.10 15:15:05 - Profile path: /Users/madrat/.airvpn/default.xml
. 2019.02.10 15:15:17 - OpenVPN Driver - Expected
. 2019.02.10 15:15:17 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)
. 2019.02.10 15:15:17 - SSH - Version: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)
. 2019.02.10 15:15:17 - SSL - Version: stunnel 5.48 (/Applications/Eddie.app/Contents/MacOS/stunnel)
. 2019.02.10 15:15:17 - curl - Version: 7.43.0 (/usr/bin/curl)
. 2019.02.10 15:15:17 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem
. 2019.02.10 15:15:18 - Recovery. Unexpected crash?
. 2019.02.10 15:15:18 - Routes, added a new route, 192.30.89.62 for gateway 192.168.1.254
. 2019.02.10 15:15:18 - Routes, added a new route, 192.30.89.59 for gateway 10.20.75.1
. 2019.02.10 15:15:18 - Routes, added a new route, 2606:9580:100:d:2bd7:c37b:24c2:c069 for gateway fde6:7a:7d20:104b::1
! 2019.02.10 15:15:18 - Activation of Network Lock - macOS - PF
. 2019.02.10 15:15:18 - macOS - PF rules updated, reloading
. 2019.02.10 15:15:21 - Above log line repeated 1 times more
I 2019.02.10 15:15:21 - Ready
I 2019.02.10 15:15:21 - Session starting.
. 2019.02.10 15:15:21 - Collect information about providers ...
. 2019.02.10 15:15:22 - Collect information about AirVPN completed
I 2019.02.10 15:15:35 - Checking authorization ...
! 2019.02.10 15:15:36 - Connecting to Pisces (Canada, Vancouver)
. 2019.02.10 15:15:36 - Routes, added a new route, 192.30.89.145 for gateway 192.168.1.254
. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: stunnel 5.48 on x86_64-apple-darwin17.6.0 platform
. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: Compiled/running with OpenSSL 1.0.2o  27 Mar 2018
. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: Reading configuration from file /Users/madrat/.airvpn/1904f759113dfa396f0740cce3d1cf1e4af1043b869ca307ec83e5c63034bea8.tmp.ssl
. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: UTF-8 byte order mark detected
. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG6[ui]: Initializing service [openvpn]
. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks
. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: Configuration successful
. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG6[ui]: Service [openvpn] (FD=6) bound to 127.0.0.1:49293
. 2019.02.10 15:15:36 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Jul 29 2018
. 2019.02.10 15:15:36 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2019.02.10 15:15:36 - Connection to OpenVPN Management Interface
. 2019.02.10 15:15:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.02.10 15:15:36 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.02.10 15:15:36 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.02.10 15:15:36 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.02.10 15:15:36 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.02.10 15:15:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:49293
. 2019.02.10 15:15:36 - OpenVPN > Socket Buffers: R=[131072->262144] S=[131072->262144]
. 2019.02.10 15:15:36 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:49293 [nonblock]
. 2019.02.10 15:15:36 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:49293
. 2019.02.10 15:15:36 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2019.02.10 15:15:36 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:49293
. 2019.02.10 15:15:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:49216
. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: s_connect: connecting 192.30.89.145:443
. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG5[0]: s_connect: connected 192.30.89.145:443
. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.64:49218
. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: SNI: sending servername: 192.30.89.145
. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: Peer certificate not required
. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: Certificate verification disabled
. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: Client certificate not requested
. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:37 LOG6[0]: TLS connected: new session negotiated
. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:37 LOG6[0]: TLSv1.2 ciphersuite: ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2019.02.10 15:15:37 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:49293, sid=ae1b4ca3 68a8738a
. 2019.02.10 15:15:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.10 15:15:37 - OpenVPN > VERIFY KU OK
. 2019.02.10 15:15:37 - OpenVPN > Validating certificate extended key usage
. 2019.02.10 15:15:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.10 15:15:37 - OpenVPN > VERIFY EKU OK
. 2019.02.10 15:15:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.10 15:15:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.10 15:15:37 - OpenVPN > [Pisces] Peer Connection Initiated with [AF_INET]127.0.0.1:49293
. 2019.02.10 15:15:38 - OpenVPN > SENT CONTROL [Pisces]: 'PUSH_REQUEST' (status=1)
. 2019.02.10 15:15:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.227.1,dhcp-option DNS6 fde6:7a:7d20:be3::1,tun-ipv6,route-gateway 10.15.227.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:be3::101a/64 fde6:7a:7d20:be3::1,ifconfig 10.15.227.28 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2019.02.10 15:15:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627
. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2019.02.10 15:15:38 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2019.02.10 15:15:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 15:15:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 15:15:38 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2019.02.10 15:15:38 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2019.02.10 15:15:38 - OpenVPN > ROUTE6_GATEWAY fe80::9e1e:95ff:fed2:4590 IFACE=en0
. 2019.02.10 15:15:38 - OpenVPN > Opened utun device utun0
. 2019.02.10 15:15:39 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2019.02.10 15:15:39 - OpenVPN > /sbin/ifconfig utun0 delete
. 2019.02.10 15:15:39 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2019.02.10 15:15:39 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2019.02.10 15:15:39 - OpenVPN > /sbin/ifconfig utun0 10.15.227.28 10.15.227.28 netmask 255.255.255.0 mtu 1500 up
. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -net 10.15.227.0 10.15.227.28 255.255.255.0
. 2019.02.10 15:15:39 - OpenVPN > add net 10.15.227.0: gateway 10.15.227.28
. 2019.02.10 15:15:39 - OpenVPN > /sbin/ifconfig utun0 inet6 fde6:7a:7d20:be3::101a/64
. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(fde6:7a:7d20:be3::/64 -> fde6:7a:7d20:be3::101a metric 0) dev utun0
. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 fde6:7a:7d20:be3:: -prefixlen 64 -iface utun0
. 2019.02.10 15:15:39 - OpenVPN > route: writing to routing socket: File exists
. 2019.02.10 15:15:39 - OpenVPN > add net fde6:7a:7d20:be3::: gateway utun0: File exists
. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -net 127.0.0.1 192.168.1.254 255.255.255.255
. 2019.02.10 15:15:39 - OpenVPN > add net 127.0.0.1: gateway 192.168.1.254
. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.227.1 128.0.0.0
. 2019.02.10 15:15:39 - OpenVPN > add net 0.0.0.0: gateway 10.15.227.1
. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.227.1 128.0.0.0
. 2019.02.10 15:15:39 - OpenVPN > add net 128.0.0.0: gateway 10.15.227.1
. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:be3::1 metric -1) dev utun0
. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 :: -prefixlen 3 -iface utun0
. 2019.02.10 15:15:39 - OpenVPN > add net ::: gateway utun0
. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:be3::1 metric -1) dev utun0
. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 2000:: -prefixlen 4 -iface utun0
. 2019.02.10 15:15:39 - OpenVPN > add net 2000::: gateway utun0
. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:be3::1 metric -1) dev utun0
. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 3000:: -prefixlen 4 -iface utun0
. 2019.02.10 15:15:39 - OpenVPN > add net 3000::: gateway utun0
. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:be3::1 metric -1) dev utun0
. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 fc00:: -prefixlen 7 -iface utun0
. 2019.02.10 15:15:39 - OpenVPN > add net fc00::: gateway utun0
. 2019.02.10 15:15:39 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.227.1, fde6:7a:7d20:be3::1)
. 2019.02.10 15:15:39 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.227.1, fde6:7a:7d20:be3::1)
. 2019.02.10 15:15:40 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.227.1, fde6:7a:7d20:be3::1)
. 2019.02.10 15:15:40 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.227.1, fde6:7a:7d20:be3::1)
. 2019.02.10 15:15:40 - Routes, added a new route, 192.30.89.142 for gateway 10.15.227.1
. 2019.02.10 15:15:40 - Routes, added a new route, 2606:9580:100:a:ee16:9283:a03e:5f18 for gateway fde6:7a:7d20:be3::1
. 2019.02.10 15:15:40 - Flushing DNS
. 2019.02.10 15:15:40 - macOS - PF rules updated, reloading
I 2019.02.10 15:15:42 - Checking route IPv4
I 2019.02.10 15:15:42 - Checking route IPv6
I 2019.02.10 15:15:43 - Checking DNS
! 2019.02.10 15:15:44 - Connected.
. 2019.02.10 15:15:44 - OpenVPN > Initialization Sequence Completed
. 2019.02.10 15:16:36 - SSL > 2019.02.10 15:16:36 LOG6[cron]: Executing cron jobs
. 2019.02.10 15:16:36 - SSL > 2019.02.10 15:16:36 LOG6[cron]: Cron jobs completed in 0 seconds
. 2019.02.10 15:45:26 - Collect information about AirVPN completed
. 2019.02.10 16:15:37 - Above log line repeated 1 times more
. 2019.02.10 16:15:37 - OpenVPN > TLS: soft reset sec=0 bytes=33901532/-1 pkts=64984/0
. 2019.02.10 16:15:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.10 16:15:37 - OpenVPN > VERIFY KU OK
. 2019.02.10 16:15:37 - OpenVPN > Validating certificate extended key usage
. 2019.02.10 16:15:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.10 16:15:37 - OpenVPN > VERIFY EKU OK
. 2019.02.10 16:15:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.10 16:15:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 16:15:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 16:15:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.10 16:45:33 - Collect information about AirVPN completed
. 2019.02.10 17:05:33 - macOS - PF rules updated, reloading
. 2019.02.10 17:15:36 - Collect information about AirVPN completed
. 2019.02.10 17:15:37 - OpenVPN > TLS: soft reset sec=0 bytes=25042350/-1 pkts=45420/0
. 2019.02.10 17:15:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.10 17:15:37 - OpenVPN > VERIFY KU OK
. 2019.02.10 17:15:37 - OpenVPN > Validating certificate extended key usage
. 2019.02.10 17:15:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.10 17:15:37 - OpenVPN > VERIFY EKU OK
. 2019.02.10 17:15:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.10 17:15:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 17:15:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 17:15:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.10 17:45:39 - Collect information about AirVPN completed
. 2019.02.10 18:15:37 - OpenVPN > TLS: soft reset sec=0 bytes=53370209/-1 pkts=76612/0
. 2019.02.10 18:15:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.10 18:15:37 - OpenVPN > VERIFY KU OK
. 2019.02.10 18:15:37 - OpenVPN > Validating certificate extended key usage
. 2019.02.10 18:15:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.10 18:15:37 - OpenVPN > VERIFY EKU OK
. 2019.02.10 18:15:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.10 18:15:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 18:15:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 18:15:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.10 18:15:44 - Collect information about AirVPN completed
. 2019.02.10 19:15:37 - Above log line repeated 1 times more
. 2019.02.10 19:15:37 - Renewing TLS key
. 2019.02.10 19:15:37 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.02.10 19:15:38 - OpenVPN > TLS: soft reset sec=0 bytes=44320495/-1 pkts=62553/0
. 2019.02.10 19:15:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.10 19:15:38 - OpenVPN > VERIFY KU OK
. 2019.02.10 19:15:38 - OpenVPN > Validating certificate extended key usage
. 2019.02.10 19:15:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.10 19:15:38 - OpenVPN > VERIFY EKU OK
. 2019.02.10 19:15:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.10 19:15:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 19:15:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 19:15:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.10 19:15:51 - Collect information about AirVPN completed
. 2019.02.10 20:15:38 - Above log line repeated 1 times more
. 2019.02.10 20:15:38 - Renewing TLS key
. 2019.02.10 20:15:38 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.02.10 20:15:39 - OpenVPN > TLS: soft reset sec=0 bytes=62520637/-1 pkts=95955/0
. 2019.02.10 20:15:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.10 20:15:39 - OpenVPN > VERIFY KU OK
. 2019.02.10 20:15:39 - OpenVPN > Validating certificate extended key usage
. 2019.02.10 20:15:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.10 20:15:39 - OpenVPN > VERIFY EKU OK
. 2019.02.10 20:15:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.10 20:15:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 20:15:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 20:15:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.10 20:15:56 - Collect information about AirVPN completed
. 2019.02.10 21:15:39 - Above log line repeated 1 times more
. 2019.02.10 21:15:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.10 21:15:39 - OpenVPN > VERIFY KU OK
. 2019.02.10 21:15:39 - OpenVPN > Validating certificate extended key usage
. 2019.02.10 21:15:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.10 21:15:39 - OpenVPN > VERIFY EKU OK
. 2019.02.10 21:15:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.10 21:15:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 21:15:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 21:15:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.10 21:16:03 - Collect information about AirVPN completed
. 2019.02.10 22:15:41 - Above log line repeated 1 times more
. 2019.02.10 22:15:41 - Renewing TLS key
. 2019.02.10 22:15:41 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.02.10 22:15:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.10 22:15:41 - OpenVPN > VERIFY KU OK
. 2019.02.10 22:15:41 - OpenVPN > Validating certificate extended key usage
. 2019.02.10 22:15:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.10 22:15:41 - OpenVPN > VERIFY EKU OK
. 2019.02.10 22:15:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.10 22:15:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 22:15:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 22:15:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.10 22:16:23 - Collect information about AirVPN completed
. 2019.02.10 23:15:56 - Above log line repeated 1 times more
. 2019.02.10 23:15:56 - OpenVPN > TLS: soft reset sec=0 bytes=807836511/-1 pkts=1346319/0
. 2019.02.10 23:15:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.10 23:15:56 - OpenVPN > VERIFY KU OK
. 2019.02.10 23:15:56 - OpenVPN > Validating certificate extended key usage
. 2019.02.10 23:15:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.10 23:15:56 - OpenVPN > VERIFY EKU OK
. 2019.02.10 23:15:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.10 23:15:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 23:15:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 23:15:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.10 23:16:39 - Collect information about AirVPN completed
. 2019.02.11 00:15:39 - Above log line repeated 1 times more
. 2019.02.11 00:15:39 - OpenVPN > TLS: soft reset sec=0 bytes=105877702/-1 pkts=316886/0
. 2019.02.11 00:15:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.11 00:15:39 - OpenVPN > VERIFY KU OK
. 2019.02.11 00:15:39 - OpenVPN > Validating certificate extended key usage
. 2019.02.11 00:15:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.11 00:15:39 - OpenVPN > VERIFY EKU OK
. 2019.02.11 00:15:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.11 00:15:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 00:15:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 00:15:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.11 00:16:54 - Collect information about AirVPN completed
. 2019.02.11 01:15:52 - Above log line repeated 1 times more
. 2019.02.11 01:15:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.11 01:15:52 - OpenVPN > VERIFY KU OK
. 2019.02.11 01:15:52 - OpenVPN > Validating certificate extended key usage
. 2019.02.11 01:15:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.11 01:15:52 - OpenVPN > VERIFY EKU OK
. 2019.02.11 01:15:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.11 01:15:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 01:15:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 01:15:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.11 01:17:23 - Collect information about AirVPN completed
. 2019.02.11 02:15:54 - Above log line repeated 1 times more
. 2019.02.11 02:15:54 - OpenVPN > TLS: soft reset sec=0 bytes=6345530/-1 pkts=28324/0
. 2019.02.11 02:15:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.11 02:15:54 - OpenVPN > VERIFY KU OK
. 2019.02.11 02:15:54 - OpenVPN > Validating certificate extended key usage
. 2019.02.11 02:15:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.11 02:15:54 - OpenVPN > VERIFY EKU OK
. 2019.02.11 02:15:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.11 02:15:54 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 02:15:54 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 02:15:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.11 02:17:37 - Collect information about AirVPN completed
. 2019.02.11 02:17:56 - macOS - PF rules updated, reloading
. 2019.02.11 02:47:43 - Collect information about AirVPN completed
. 2019.02.11 03:15:55 - OpenVPN > TLS: soft reset sec=0 bytes=7025610/-1 pkts=30229/0
. 2019.02.11 03:15:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.11 03:15:55 - OpenVPN > VERIFY KU OK
. 2019.02.11 03:15:55 - OpenVPN > Validating certificate extended key usage
. 2019.02.11 03:15:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.11 03:15:55 - OpenVPN > VERIFY EKU OK
. 2019.02.11 03:15:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.11 03:15:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 03:15:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 03:15:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.11 03:17:43 - Collect information about AirVPN completed
. 2019.02.11 04:15:57 - Above log line repeated 1 times more
. 2019.02.11 04:15:57 - OpenVPN > TLS: soft reset sec=0 bytes=7306290/-1 pkts=31474/0
. 2019.02.11 04:15:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.11 04:15:57 - OpenVPN > VERIFY KU OK
. 2019.02.11 04:15:57 - OpenVPN > Validating certificate extended key usage
. 2019.02.11 04:15:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.11 04:15:57 - OpenVPN > VERIFY EKU OK
. 2019.02.11 04:15:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.11 04:15:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 04:15:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 04:15:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.11 04:17:43 - Collect information about AirVPN completed
. 2019.02.11 05:15:59 - Above log line repeated 1 times more
. 2019.02.11 05:15:59 - OpenVPN > TLS: soft reset sec=0 bytes=10408363/-1 pkts=35413/0
. 2019.02.11 05:15:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.11 05:15:59 - OpenVPN > VERIFY KU OK
. 2019.02.11 05:15:59 - OpenVPN > Validating certificate extended key usage
. 2019.02.11 05:15:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.11 05:15:59 - OpenVPN > VERIFY EKU OK
. 2019.02.11 05:15:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.11 05:15:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 05:15:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 05:15:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.11 05:18:02 - Collect information about AirVPN completed
. 2019.02.11 06:15:40 - Above log line repeated 1 times more
. 2019.02.11 06:15:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.11 06:15:40 - OpenVPN > VERIFY KU OK
. 2019.02.11 06:15:40 - OpenVPN > Validating certificate extended key usage
. 2019.02.11 06:15:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.11 06:15:40 - OpenVPN > VERIFY EKU OK
. 2019.02.11 06:15:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.11 06:15:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 06:15:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 06:15:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.11 06:18:02 - Collect information about AirVPN completed
. 2019.02.11 07:15:39 - Above log line repeated 1 times more
. 2019.02.11 07:15:39 - OpenVPN > TLS: soft reset sec=0 bytes=21970673/-1 pkts=57358/0
. 2019.02.11 07:15:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.11 07:15:39 - OpenVPN > VERIFY KU OK
. 2019.02.11 07:15:39 - OpenVPN > Validating certificate extended key usage
. 2019.02.11 07:15:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.11 07:15:39 - OpenVPN > VERIFY EKU OK
. 2019.02.11 07:15:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.11 07:15:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 07:15:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 07:15:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.11 07:18:07 - Collect information about AirVPN completed

Edited ... by giganerd
Made it readable without scrolling too much

Share this post


Link to post
Posted ... (edited)
On 2/11/2019 at 12:56 AM, madrat said:

Just got a new modem/router. Ran tests on IPleak.net. My MacBook Pro connecting via WiFi passes the ipv6 tests just fine but my iMac, using ethernet, does not. Any suggestions? Log can be posted if necessary.

 

 

OK, here is my log:

. 2019.02.10 15:14:54 - Eddie version: 2.17.2 / macos_x64, System: MacOS, Name: 10.11.6, Version: Darwin madrat.local 15.6.0 Darwin Kernel Version 15.6.0: Thu Jun 21 20:07:40 PDT 2018; root:xnu-3248.73.11~1/RELEASE_X86_64 x86_64, Mono/.Net: v4.0.30319

. 2019.02.10 15:14:56 - Reading options from /Users/madrat/.airvpn/default.xml

. 2019.02.10 15:15:03 - Command line arguments (0):

. 2019.02.10 15:15:05 - Profile path: /Users/madrat/.airvpn/default.xml

. 2019.02.10 15:15:17 - OpenVPN Driver - Expected

. 2019.02.10 15:15:17 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

. 2019.02.10 15:15:17 - SSH - Version: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)

. 2019.02.10 15:15:17 - SSL - Version: stunnel 5.48 (/Applications/Eddie.app/Contents/MacOS/stunnel)

. 2019.02.10 15:15:17 - curl - Version: 7.43.0 (/usr/bin/curl)

. 2019.02.10 15:15:17 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem

. 2019.02.10 15:15:18 - Recovery. Unexpected crash?

. 2019.02.10 15:15:18 - Routes, added a new route, 192.30.89.62 for gateway 192.168.1.254

. 2019.02.10 15:15:18 - Routes, added a new route, 192.30.89.59 for gateway 10.20.75.1

. 2019.02.10 15:15:18 - Routes, added a new route, 2606:9580:100:d:2bd7:c37b:24c2:c069 for gateway fde6:7a:7d20:104b::1

! 2019.02.10 15:15:18 - Activation of Network Lock - macOS - PF

. 2019.02.10 15:15:18 - macOS - PF rules updated, reloading

. 2019.02.10 15:15:21 - Above log line repeated 1 times more

I 2019.02.10 15:15:21 - Ready

I 2019.02.10 15:15:21 - Session starting.

. 2019.02.10 15:15:21 - Collect information about providers ...

. 2019.02.10 15:15:22 - Collect information about AirVPN completed

I 2019.02.10 15:15:35 - Checking authorization ...

! 2019.02.10 15:15:36 - Connecting to Pisces (Canada, Vancouver)

. 2019.02.10 15:15:36 - Routes, added a new route, 192.30.89.145 for gateway 192.168.1.254

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: stunnel 5.48 on x86_64-apple-darwin17.6.0 platform

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: Compiled/running with OpenSSL 1.0.2o  27 Mar 2018

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,OCSP,PSK,SNI

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: Reading configuration from file /Users/madrat/.airvpn/1904f759113dfa396f0740cce3d1cf1e4af1043b869ca307ec83e5c63034bea8.tmp.ssl

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: UTF-8 byte order mark detected

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG6[ui]: Initializing service [openvpn]

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: Configuration successful

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG6[ui]: Service [openvpn] (FD=6) bound to 127.0.0.1:49293

. 2019.02.10 15:15:36 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Jul 29 2018

. 2019.02.10 15:15:36 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10

. 2019.02.10 15:15:36 - Connection to OpenVPN Management Interface

. 2019.02.10 15:15:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2019.02.10 15:15:36 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key

. 2019.02.10 15:15:36 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication

. 2019.02.10 15:15:36 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key

. 2019.02.10 15:15:36 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication

. 2019.02.10 15:15:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:49293

. 2019.02.10 15:15:36 - OpenVPN > Socket Buffers: R=[131072->262144] S=[131072->262144]

. 2019.02.10 15:15:36 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:49293 [nonblock]

. 2019.02.10 15:15:36 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:49293

. 2019.02.10 15:15:36 - OpenVPN > TCP_CLIENT link local: (not bound)

. 2019.02.10 15:15:36 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:49293

. 2019.02.10 15:15:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:49216

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: s_connect: connecting 192.30.89.145:443

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG5[0]: s_connect: connected 192.30.89.145:443

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.64:49218

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: SNI: sending servername: 192.30.89.145

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: Peer certificate not required

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: Certificate verification disabled

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: Client certificate not requested

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:37 LOG6[0]: TLS connected: new session negotiated

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:37 LOG6[0]: TLSv1.2 ciphersuite: ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)

. 2019.02.10 15:15:37 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:49293, sid=ae1b4ca3 68a8738a

. 2019.02.10 15:15:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 15:15:37 - OpenVPN > VERIFY KU OK

. 2019.02.10 15:15:37 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 15:15:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 15:15:37 - OpenVPN > VERIFY EKU OK

. 2019.02.10 15:15:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 15:15:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 15:15:37 - OpenVPN > [Pisces] Peer Connection Initiated with [AF_INET]127.0.0.1:49293

. 2019.02.10 15:15:38 - OpenVPN > SENT CONTROL [Pisces]: 'PUSH_REQUEST' (status=1)

. 2019.02.10 15:15:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.227.1,dhcp-option DNS6 fde6:7a:7d20:be3::1,tun-ipv6,route-gateway 10.15.227.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:be3::101a/64 fde6:7a:7d20:be3::1,ifconfig 10.15.227.28 255.255.255.0,peer-id 0,cipher AES-256-GCM'

. 2019.02.10 15:15:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2019.02.10 15:15:38 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2019.02.10 15:15:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 15:15:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 15:15:38 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2019.02.10 15:15:38 - OpenVPN > GDG6: remote_host_ipv6=n/a

. 2019.02.10 15:15:38 - OpenVPN > ROUTE6_GATEWAY fe80::9e1e:95ff:fed2:4590 IFACE=en0

. 2019.02.10 15:15:38 - OpenVPN > Opened utun device utun0

. 2019.02.10 15:15:39 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1

. 2019.02.10 15:15:39 - OpenVPN > /sbin/ifconfig utun0 delete

. 2019.02.10 15:15:39 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2019.02.10 15:15:39 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2019.02.10 15:15:39 - OpenVPN > /sbin/ifconfig utun0 10.15.227.28 10.15.227.28 netmask 255.255.255.0 mtu 1500 up

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -net 10.15.227.0 10.15.227.28 255.255.255.0

. 2019.02.10 15:15:39 - OpenVPN > add net 10.15.227.0: gateway 10.15.227.28

. 2019.02.10 15:15:39 - OpenVPN > /sbin/ifconfig utun0 inet6 fde6:7a:7d20:be3::101a/64

. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(fde6:7a:7d20:be3::/64 -> fde6:7a:7d20:be3::101a metric 0) dev utun0

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 fde6:7a:7d20:be3:: -prefixlen 64 -iface utun0

. 2019.02.10 15:15:39 - OpenVPN > route: writing to routing socket: File exists

. 2019.02.10 15:15:39 - OpenVPN > add net fde6:7a:7d20:be3::: gateway utun0: File exists

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -net 127.0.0.1 192.168.1.254 255.255.255.255

. 2019.02.10 15:15:39 - OpenVPN > add net 127.0.0.1: gateway 192.168.1.254

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.227.1 128.0.0.0

. 2019.02.10 15:15:39 - OpenVPN > add net 0.0.0.0: gateway 10.15.227.1

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.227.1 128.0.0.0

. 2019.02.10 15:15:39 - OpenVPN > add net 128.0.0.0: gateway 10.15.227.1

. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:be3::1 metric -1) dev utun0

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 :: -prefixlen 3 -iface utun0

. 2019.02.10 15:15:39 - OpenVPN > add net ::: gateway utun0

. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:be3::1 metric -1) dev utun0

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 2000:: -prefixlen 4 -iface utun0

. 2019.02.10 15:15:39 - OpenVPN > add net 2000::: gateway utun0

. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:be3::1 metric -1) dev utun0

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 3000:: -prefixlen 4 -iface utun0

. 2019.02.10 15:15:39 - OpenVPN > add net 3000::: gateway utun0

. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:be3::1 metric -1) dev utun0

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 fc00:: -prefixlen 7 -iface utun0

. 2019.02.10 15:15:39 - OpenVPN > add net fc00::: gateway utun0

. 2019.02.10 15:15:39 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.227.1, fde6:7a:7d20:be3::1)

. 2019.02.10 15:15:39 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.227.1, fde6:7a:7d20:be3::1)

. 2019.02.10 15:15:40 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.227.1, fde6:7a:7d20:be3::1)

. 2019.02.10 15:15:40 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.227.1, fde6:7a:7d20:be3::1)

. 2019.02.10 15:15:40 - Routes, added a new route, 192.30.89.142 for gateway 10.15.227.1

. 2019.02.10 15:15:40 - Routes, added a new route, 2606:9580:100:a:ee16:9283:a03e:5f18 for gateway fde6:7a:7d20:be3::1

. 2019.02.10 15:15:40 - Flushing DNS

. 2019.02.10 15:15:40 - macOS - PF rules updated, reloading

I 2019.02.10 15:15:42 - Checking route IPv4

I 2019.02.10 15:15:42 - Checking route IPv6

I 2019.02.10 15:15:43 - Checking DNS

! 2019.02.10 15:15:44 - Connected.

. 2019.02.10 15:15:44 - OpenVPN > Initialization Sequence Completed

. 2019.02.10 15:16:36 - SSL > 2019.02.10 15:16:36 LOG6[cron]: Executing cron jobs

. 2019.02.10 15:16:36 - SSL > 2019.02.10 15:16:36 LOG6[cron]: Cron jobs completed in 0 seconds

. 2019.02.10 15:45:26 - Collect information about AirVPN completed

. 2019.02.10 16:15:37 - Above log line repeated 1 times more

. 2019.02.10 16:15:37 - OpenVPN > TLS: soft reset sec=0 bytes=33901532/-1 pkts=64984/0

. 2019.02.10 16:15:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 16:15:37 - OpenVPN > VERIFY KU OK

. 2019.02.10 16:15:37 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 16:15:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 16:15:37 - OpenVPN > VERIFY EKU OK

. 2019.02.10 16:15:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 16:15:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 16:15:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 16:15:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 16:45:33 - Collect information about AirVPN completed

. 2019.02.10 17:05:33 - macOS - PF rules updated, reloading

. 2019.02.10 17:15:36 - Collect information about AirVPN completed

. 2019.02.10 17:15:37 - OpenVPN > TLS: soft reset sec=0 bytes=25042350/-1 pkts=45420/0

. 2019.02.10 17:15:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 17:15:37 - OpenVPN > VERIFY KU OK

. 2019.02.10 17:15:37 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 17:15:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 17:15:37 - OpenVPN > VERIFY EKU OK

. 2019.02.10 17:15:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 17:15:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 17:15:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 17:15:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 17:45:39 - Collect information about AirVPN completed

. 2019.02.10 18:15:37 - OpenVPN > TLS: soft reset sec=0 bytes=53370209/-1 pkts=76612/0

. 2019.02.10 18:15:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 18:15:37 - OpenVPN > VERIFY KU OK

. 2019.02.10 18:15:37 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 18:15:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 18:15:37 - OpenVPN > VERIFY EKU OK

. 2019.02.10 18:15:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 18:15:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 18:15:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 18:15:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 18:15:44 - Collect information about AirVPN completed

. 2019.02.10 19:15:37 - Above log line repeated 1 times more

. 2019.02.10 19:15:37 - Renewing TLS key

. 2019.02.10 19:15:37 - OpenVPN > TLS: tls_process: killed expiring key

. 2019.02.10 19:15:38 - OpenVPN > TLS: soft reset sec=0 bytes=44320495/-1 pkts=62553/0

. 2019.02.10 19:15:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 19:15:38 - OpenVPN > VERIFY KU OK

. 2019.02.10 19:15:38 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 19:15:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 19:15:38 - OpenVPN > VERIFY EKU OK

. 2019.02.10 19:15:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 19:15:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 19:15:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 19:15:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 19:15:51 - Collect information about AirVPN completed

. 2019.02.10 20:15:38 - Above log line repeated 1 times more

. 2019.02.10 20:15:38 - Renewing TLS key

. 2019.02.10 20:15:38 - OpenVPN > TLS: tls_process: killed expiring key

. 2019.02.10 20:15:39 - OpenVPN > TLS: soft reset sec=0 bytes=62520637/-1 pkts=95955/0

. 2019.02.10 20:15:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 20:15:39 - OpenVPN > VERIFY KU OK

. 2019.02.10 20:15:39 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 20:15:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 20:15:39 - OpenVPN > VERIFY EKU OK

. 2019.02.10 20:15:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 20:15:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 20:15:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 20:15:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 20:15:56 - Collect information about AirVPN completed

. 2019.02.10 21:15:39 - Above log line repeated 1 times more

. 2019.02.10 21:15:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 21:15:39 - OpenVPN > VERIFY KU OK

. 2019.02.10 21:15:39 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 21:15:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 21:15:39 - OpenVPN > VERIFY EKU OK

. 2019.02.10 21:15:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 21:15:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 21:15:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 21:15:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 21:16:03 - Collect information about AirVPN completed

. 2019.02.10 22:15:41 - Above log line repeated 1 times more

. 2019.02.10 22:15:41 - Renewing TLS key

. 2019.02.10 22:15:41 - OpenVPN > TLS: tls_process: killed expiring key

. 2019.02.10 22:15:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 22:15:41 - OpenVPN > VERIFY KU OK

. 2019.02.10 22:15:41 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 22:15:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 22:15:41 - OpenVPN > VERIFY EKU OK

. 2019.02.10 22:15:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 22:15:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 22:15:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 22:15:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 22:16:23 - Collect information about AirVPN completed

. 2019.02.10 23:15:56 - Above log line repeated 1 times more

. 2019.02.10 23:15:56 - OpenVPN > TLS: soft reset sec=0 bytes=807836511/-1 pkts=1346319/0

. 2019.02.10 23:15:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 23:15:56 - OpenVPN > VERIFY KU OK

. 2019.02.10 23:15:56 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 23:15:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 23:15:56 - OpenVPN > VERIFY EKU OK

. 2019.02.10 23:15:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 23:15:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 23:15:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 23:15:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 23:16:39 - Collect information about AirVPN completed

. 2019.02.11 00:15:39 - Above log line repeated 1 times more

. 2019.02.11 00:15:39 - OpenVPN > TLS: soft reset sec=0 bytes=105877702/-1 pkts=316886/0

. 2019.02.11 00:15:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 00:15:39 - OpenVPN > VERIFY KU OK

. 2019.02.11 00:15:39 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 00:15:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 00:15:39 - OpenVPN > VERIFY EKU OK

. 2019.02.11 00:15:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 00:15:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 00:15:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 00:15:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 00:16:54 - Collect information about AirVPN completed

. 2019.02.11 01:15:52 - Above log line repeated 1 times more

. 2019.02.11 01:15:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 01:15:52 - OpenVPN > VERIFY KU OK

. 2019.02.11 01:15:52 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 01:15:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 01:15:52 - OpenVPN > VERIFY EKU OK

. 2019.02.11 01:15:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 01:15:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 01:15:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 01:15:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 01:17:23 - Collect information about AirVPN completed

. 2019.02.11 02:15:54 - Above log line repeated 1 times more

. 2019.02.11 02:15:54 - OpenVPN > TLS: soft reset sec=0 bytes=6345530/-1 pkts=28324/0

. 2019.02.11 02:15:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 02:15:54 - OpenVPN > VERIFY KU OK

. 2019.02.11 02:15:54 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 02:15:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 02:15:54 - OpenVPN > VERIFY EKU OK

. 2019.02.11 02:15:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 02:15:54 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 02:15:54 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 02:15:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 02:17:37 - Collect information about AirVPN completed

. 2019.02.11 02:17:56 - macOS - PF rules updated, reloading

. 2019.02.11 02:47:43 - Collect information about AirVPN completed

. 2019.02.11 03:15:55 - OpenVPN > TLS: soft reset sec=0 bytes=7025610/-1 pkts=30229/0

. 2019.02.11 03:15:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 03:15:55 - OpenVPN > VERIFY KU OK

. 2019.02.11 03:15:55 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 03:15:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 03:15:55 - OpenVPN > VERIFY EKU OK

. 2019.02.11 03:15:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 03:15:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 03:15:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 03:15:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 03:17:43 - Collect information about AirVPN completed

. 2019.02.11 04:15:57 - Above log line repeated 1 times more

. 2019.02.11 04:15:57 - OpenVPN > TLS: soft reset sec=0 bytes=7306290/-1 pkts=31474/0

. 2019.02.11 04:15:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 04:15:57 - OpenVPN > VERIFY KU OK

. 2019.02.11 04:15:57 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 04:15:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 04:15:57 - OpenVPN > VERIFY EKU OK

. 2019.02.11 04:15:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 04:15:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 04:15:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 04:15:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 04:17:43 - Collect information about AirVPN completed

. 2019.02.11 05:15:59 - Above log line repeated 1 times more

. 2019.02.11 05:15:59 - OpenVPN > TLS: soft reset sec=0 bytes=10408363/-1 pkts=35413/0

. 2019.02.11 05:15:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 05:15:59 - OpenVPN > VERIFY KU OK

. 2019.02.11 05:15:59 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 05:15:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 05:15:59 - OpenVPN > VERIFY EKU OK

. 2019.02.11 05:15:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 05:15:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 05:15:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 05:15:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 05:18:02 - Collect information about AirVPN completed

. 2019.02.11 06:15:40 - Above log line repeated 1 times more

. 2019.02.11 06:15:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 06:15:40 - OpenVPN > VERIFY KU OK

. 2019.02.11 06:15:40 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 06:15:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 06:15:40 - OpenVPN > VERIFY EKU OK

. 2019.02.11 06:15:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 06:15:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 06:15:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 06:15:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 06:18:02 - Collect information about AirVPN completed

. 2019.02.11 07:15:39 - Above log line repeated 1 times more

. 2019.02.11 07:15:39 - OpenVPN > TLS: soft reset sec=0 bytes=21970673/-1 pkts=57358/0

. 2019.02.11 07:15:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 07:15:39 - OpenVPN > VERIFY KU OK

. 2019.02.11 07:15:39 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 07:15:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 07:15:39 - OpenVPN > VERIFY EKU OK

. 2019.02.11 07:15:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 07:15:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 07:15:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 07:15:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 07:18:07 - Collect information about AirVPN completed

 

This is part of what my system log reports, so I'm not exactly sure why ipleak is showing a fail?

 

"Network Lock Active: Yes, macOS - PF

Connected to VPN: Yes, Telescopium

Detected DNS: 10.19.3.1, fde6:7a:7d20:f03::1

Test DNS IPv4: Ok

Test DNS IPv6: Ok

Test Ping IPv4: 171 ms

Test Ping IPv6: 152 ms

Test HTTP IPv4: Ok

Test HTTP IPv6: Ok

Test HTTPS: Ok"

Edited ... by giganerd
Made it readable without scrolling too much

Share this post


Link to post
Posted ... (edited)
On 2/11/2019 at 10:48 PM, madrat said:

 

On 2/11/2019 at 12:56 AM, madrat said:

Just got a new modem/router. Ran tests on IPleak.net. My MacBook Pro connecting via WiFi passes the ipv6 tests just fine but my iMac, using ethernet, does not. Any suggestions? Log can be posted if necessary.

 

 

OK, here is my log:

. 2019.02.10 15:14:54 - Eddie version: 2.17.2 / macos_x64, System: MacOS, Name: 10.11.6, Version: Darwin madrat.local 15.6.0 Darwin Kernel Version 15.6.0: Thu Jun 21 20:07:40 PDT 2018; root:xnu-3248.73.11~1/RELEASE_X86_64 x86_64, Mono/.Net: v4.0.30319

. 2019.02.10 15:14:56 - Reading options from /Users/madrat/.airvpn/default.xml

. 2019.02.10 15:15:03 - Command line arguments (0):

. 2019.02.10 15:15:05 - Profile path: /Users/madrat/.airvpn/default.xml

. 2019.02.10 15:15:17 - OpenVPN Driver - Expected

. 2019.02.10 15:15:17 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

. 2019.02.10 15:15:17 - SSH - Version: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)

. 2019.02.10 15:15:17 - SSL - Version: stunnel 5.48 (/Applications/Eddie.app/Contents/MacOS/stunnel)

. 2019.02.10 15:15:17 - curl - Version: 7.43.0 (/usr/bin/curl)

. 2019.02.10 15:15:17 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem

. 2019.02.10 15:15:18 - Recovery. Unexpected crash?

. 2019.02.10 15:15:18 - Routes, added a new route, 192.30.89.62 for gateway 192.168.1.254

. 2019.02.10 15:15:18 - Routes, added a new route, 192.30.89.59 for gateway 10.20.75.1

. 2019.02.10 15:15:18 - Routes, added a new route, 2606:9580:100:d:2bd7:c37b:24c2:c069 for gateway fde6:7a:7d20:104b::1

! 2019.02.10 15:15:18 - Activation of Network Lock - macOS - PF

. 2019.02.10 15:15:18 - macOS - PF rules updated, reloading

. 2019.02.10 15:15:21 - Above log line repeated 1 times more

I 2019.02.10 15:15:21 - Ready

I 2019.02.10 15:15:21 - Session starting.

. 2019.02.10 15:15:21 - Collect information about providers ...

. 2019.02.10 15:15:22 - Collect information about AirVPN completed

I 2019.02.10 15:15:35 - Checking authorization ...

! 2019.02.10 15:15:36 - Connecting to Pisces (Canada, Vancouver)

. 2019.02.10 15:15:36 - Routes, added a new route, 192.30.89.145 for gateway 192.168.1.254

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: stunnel 5.48 on x86_64-apple-darwin17.6.0 platform

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: Compiled/running with OpenSSL 1.0.2o  27 Mar 2018

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,OCSP,PSK,SNI

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: Reading configuration from file /Users/madrat/.airvpn/1904f759113dfa396f0740cce3d1cf1e4af1043b869ca307ec83e5c63034bea8.tmp.ssl

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: UTF-8 byte order mark detected

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG6[ui]: Initializing service [openvpn]

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: Configuration successful

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG6[ui]: Service [openvpn] (FD=6) bound to 127.0.0.1:49293

. 2019.02.10 15:15:36 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Jul 29 2018

. 2019.02.10 15:15:36 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10

. 2019.02.10 15:15:36 - Connection to OpenVPN Management Interface

. 2019.02.10 15:15:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2019.02.10 15:15:36 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key

. 2019.02.10 15:15:36 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication

. 2019.02.10 15:15:36 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key

. 2019.02.10 15:15:36 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication

. 2019.02.10 15:15:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:49293

. 2019.02.10 15:15:36 - OpenVPN > Socket Buffers: R=[131072->262144] S=[131072->262144]

. 2019.02.10 15:15:36 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:49293 [nonblock]

. 2019.02.10 15:15:36 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:49293

. 2019.02.10 15:15:36 - OpenVPN > TCP_CLIENT link local: (not bound)

. 2019.02.10 15:15:36 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:49293

. 2019.02.10 15:15:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:49216

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: s_connect: connecting 192.30.89.145:443

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG5[0]: s_connect: connected 192.30.89.145:443

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.64:49218

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: SNI: sending servername: 192.30.89.145

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: Peer certificate not required

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: Certificate verification disabled

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: Client certificate not requested

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:37 LOG6[0]: TLS connected: new session negotiated

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:37 LOG6[0]: TLSv1.2 ciphersuite: ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)

. 2019.02.10 15:15:37 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:49293, sid=ae1b4ca3 68a8738a

. 2019.02.10 15:15:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 15:15:37 - OpenVPN > VERIFY KU OK

. 2019.02.10 15:15:37 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 15:15:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 15:15:37 - OpenVPN > VERIFY EKU OK

. 2019.02.10 15:15:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 15:15:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 15:15:37 - OpenVPN > [Pisces] Peer Connection Initiated with [AF_INET]127.0.0.1:49293

. 2019.02.10 15:15:38 - OpenVPN > SENT CONTROL [Pisces]: 'PUSH_REQUEST' (status=1)

. 2019.02.10 15:15:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.227.1,dhcp-option DNS6 fde6:7a:7d20:be3::1,tun-ipv6,route-gateway 10.15.227.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:be3::101a/64 fde6:7a:7d20:be3::1,ifconfig 10.15.227.28 255.255.255.0,peer-id 0,cipher AES-256-GCM'

. 2019.02.10 15:15:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2019.02.10 15:15:38 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2019.02.10 15:15:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 15:15:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 15:15:38 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2019.02.10 15:15:38 - OpenVPN > GDG6: remote_host_ipv6=n/a

. 2019.02.10 15:15:38 - OpenVPN > ROUTE6_GATEWAY fe80::9e1e:95ff:fed2:4590 IFACE=en0

. 2019.02.10 15:15:38 - OpenVPN > Opened utun device utun0

. 2019.02.10 15:15:39 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1

. 2019.02.10 15:15:39 - OpenVPN > /sbin/ifconfig utun0 delete

. 2019.02.10 15:15:39 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2019.02.10 15:15:39 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2019.02.10 15:15:39 - OpenVPN > /sbin/ifconfig utun0 10.15.227.28 10.15.227.28 netmask 255.255.255.0 mtu 1500 up

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -net 10.15.227.0 10.15.227.28 255.255.255.0

. 2019.02.10 15:15:39 - OpenVPN > add net 10.15.227.0: gateway 10.15.227.28

. 2019.02.10 15:15:39 - OpenVPN > /sbin/ifconfig utun0 inet6 fde6:7a:7d20:be3::101a/64

. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(fde6:7a:7d20:be3::/64 -> fde6:7a:7d20:be3::101a metric 0) dev utun0

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 fde6:7a:7d20:be3:: -prefixlen 64 -iface utun0

. 2019.02.10 15:15:39 - OpenVPN > route: writing to routing socket: File exists

. 2019.02.10 15:15:39 - OpenVPN > add net fde6:7a:7d20:be3::: gateway utun0: File exists

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -net 127.0.0.1 192.168.1.254 255.255.255.255

. 2019.02.10 15:15:39 - OpenVPN > add net 127.0.0.1: gateway 192.168.1.254

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.227.1 128.0.0.0

. 2019.02.10 15:15:39 - OpenVPN > add net 0.0.0.0: gateway 10.15.227.1

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.227.1 128.0.0.0

. 2019.02.10 15:15:39 - OpenVPN > add net 128.0.0.0: gateway 10.15.227.1

. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:be3::1 metric -1) dev utun0

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 :: -prefixlen 3 -iface utun0

. 2019.02.10 15:15:39 - OpenVPN > add net ::: gateway utun0

. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:be3::1 metric -1) dev utun0

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 2000:: -prefixlen 4 -iface utun0

. 2019.02.10 15:15:39 - OpenVPN > add net 2000::: gateway utun0

. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:be3::1 metric -1) dev utun0

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 3000:: -prefixlen 4 -iface utun0

. 2019.02.10 15:15:39 - OpenVPN > add net 3000::: gateway utun0

. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:be3::1 metric -1) dev utun0

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 fc00:: -prefixlen 7 -iface utun0

. 2019.02.10 15:15:39 - OpenVPN > add net fc00::: gateway utun0

. 2019.02.10 15:15:39 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.227.1, fde6:7a:7d20:be3::1)

. 2019.02.10 15:15:39 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.227.1, fde6:7a:7d20:be3::1)

. 2019.02.10 15:15:40 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.227.1, fde6:7a:7d20:be3::1)

. 2019.02.10 15:15:40 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.227.1, fde6:7a:7d20:be3::1)

. 2019.02.10 15:15:40 - Routes, added a new route, 192.30.89.142 for gateway 10.15.227.1

. 2019.02.10 15:15:40 - Routes, added a new route, 2606:9580:100:a:ee16:9283:a03e:5f18 for gateway fde6:7a:7d20:be3::1

. 2019.02.10 15:15:40 - Flushing DNS

. 2019.02.10 15:15:40 - macOS - PF rules updated, reloading

I 2019.02.10 15:15:42 - Checking route IPv4

I 2019.02.10 15:15:42 - Checking route IPv6

I 2019.02.10 15:15:43 - Checking DNS

! 2019.02.10 15:15:44 - Connected.

. 2019.02.10 15:15:44 - OpenVPN > Initialization Sequence Completed

. 2019.02.10 15:16:36 - SSL > 2019.02.10 15:16:36 LOG6[cron]: Executing cron jobs

. 2019.02.10 15:16:36 - SSL > 2019.02.10 15:16:36 LOG6[cron]: Cron jobs completed in 0 seconds

. 2019.02.10 15:45:26 - Collect information about AirVPN completed

. 2019.02.10 16:15:37 - Above log line repeated 1 times more

. 2019.02.10 16:15:37 - OpenVPN > TLS: soft reset sec=0 bytes=33901532/-1 pkts=64984/0

. 2019.02.10 16:15:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 16:15:37 - OpenVPN > VERIFY KU OK

. 2019.02.10 16:15:37 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 16:15:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 16:15:37 - OpenVPN > VERIFY EKU OK

. 2019.02.10 16:15:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 16:15:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 16:15:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 16:15:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 16:45:33 - Collect information about AirVPN completed

. 2019.02.10 17:05:33 - macOS - PF rules updated, reloading

. 2019.02.10 17:15:36 - Collect information about AirVPN completed

. 2019.02.10 17:15:37 - OpenVPN > TLS: soft reset sec=0 bytes=25042350/-1 pkts=45420/0

. 2019.02.10 17:15:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 17:15:37 - OpenVPN > VERIFY KU OK

. 2019.02.10 17:15:37 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 17:15:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 17:15:37 - OpenVPN > VERIFY EKU OK

. 2019.02.10 17:15:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 17:15:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 17:15:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 17:15:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 17:45:39 - Collect information about AirVPN completed

. 2019.02.10 18:15:37 - OpenVPN > TLS: soft reset sec=0 bytes=53370209/-1 pkts=76612/0

. 2019.02.10 18:15:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 18:15:37 - OpenVPN > VERIFY KU OK

. 2019.02.10 18:15:37 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 18:15:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 18:15:37 - OpenVPN > VERIFY EKU OK

. 2019.02.10 18:15:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 18:15:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 18:15:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 18:15:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 18:15:44 - Collect information about AirVPN completed

. 2019.02.10 19:15:37 - Above log line repeated 1 times more

. 2019.02.10 19:15:37 - Renewing TLS key

. 2019.02.10 19:15:37 - OpenVPN > TLS: tls_process: killed expiring key

. 2019.02.10 19:15:38 - OpenVPN > TLS: soft reset sec=0 bytes=44320495/-1 pkts=62553/0

. 2019.02.10 19:15:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 19:15:38 - OpenVPN > VERIFY KU OK

. 2019.02.10 19:15:38 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 19:15:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 19:15:38 - OpenVPN > VERIFY EKU OK

. 2019.02.10 19:15:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 19:15:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 19:15:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 19:15:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 19:15:51 - Collect information about AirVPN completed

. 2019.02.10 20:15:38 - Above log line repeated 1 times more

. 2019.02.10 20:15:38 - Renewing TLS key

. 2019.02.10 20:15:38 - OpenVPN > TLS: tls_process: killed expiring key

. 2019.02.10 20:15:39 - OpenVPN > TLS: soft reset sec=0 bytes=62520637/-1 pkts=95955/0

. 2019.02.10 20:15:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 20:15:39 - OpenVPN > VERIFY KU OK

. 2019.02.10 20:15:39 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 20:15:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 20:15:39 - OpenVPN > VERIFY EKU OK

. 2019.02.10 20:15:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 20:15:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 20:15:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 20:15:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 20:15:56 - Collect information about AirVPN completed

. 2019.02.10 21:15:39 - Above log line repeated 1 times more

. 2019.02.10 21:15:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 21:15:39 - OpenVPN > VERIFY KU OK

. 2019.02.10 21:15:39 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 21:15:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 21:15:39 - OpenVPN > VERIFY EKU OK

. 2019.02.10 21:15:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 21:15:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 21:15:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 21:15:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 21:16:03 - Collect information about AirVPN completed

. 2019.02.10 22:15:41 - Above log line repeated 1 times more

. 2019.02.10 22:15:41 - Renewing TLS key

. 2019.02.10 22:15:41 - OpenVPN > TLS: tls_process: killed expiring key

. 2019.02.10 22:15:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 22:15:41 - OpenVPN > VERIFY KU OK

. 2019.02.10 22:15:41 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 22:15:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 22:15:41 - OpenVPN > VERIFY EKU OK

. 2019.02.10 22:15:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 22:15:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 22:15:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 22:15:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 22:16:23 - Collect information about AirVPN completed

. 2019.02.10 23:15:56 - Above log line repeated 1 times more

. 2019.02.10 23:15:56 - OpenVPN > TLS: soft reset sec=0 bytes=807836511/-1 pkts=1346319/0

. 2019.02.10 23:15:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 23:15:56 - OpenVPN > VERIFY KU OK

. 2019.02.10 23:15:56 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 23:15:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 23:15:56 - OpenVPN > VERIFY EKU OK

. 2019.02.10 23:15:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 23:15:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 23:15:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 23:15:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 23:16:39 - Collect information about AirVPN completed

. 2019.02.11 00:15:39 - Above log line repeated 1 times more

. 2019.02.11 00:15:39 - OpenVPN > TLS: soft reset sec=0 bytes=105877702/-1 pkts=316886/0

. 2019.02.11 00:15:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 00:15:39 - OpenVPN > VERIFY KU OK

. 2019.02.11 00:15:39 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 00:15:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 00:15:39 - OpenVPN > VERIFY EKU OK

. 2019.02.11 00:15:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 00:15:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 00:15:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 00:15:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 00:16:54 - Collect information about AirVPN completed

. 2019.02.11 01:15:52 - Above log line repeated 1 times more

. 2019.02.11 01:15:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 01:15:52 - OpenVPN > VERIFY KU OK

. 2019.02.11 01:15:52 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 01:15:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 01:15:52 - OpenVPN > VERIFY EKU OK

. 2019.02.11 01:15:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 01:15:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 01:15:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 01:15:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 01:17:23 - Collect information about AirVPN completed

. 2019.02.11 02:15:54 - Above log line repeated 1 times more

. 2019.02.11 02:15:54 - OpenVPN > TLS: soft reset sec=0 bytes=6345530/-1 pkts=28324/0

. 2019.02.11 02:15:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 02:15:54 - OpenVPN > VERIFY KU OK

. 2019.02.11 02:15:54 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 02:15:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 02:15:54 - OpenVPN > VERIFY EKU OK

. 2019.02.11 02:15:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 02:15:54 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 02:15:54 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 02:15:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 02:17:37 - Collect information about AirVPN completed

. 2019.02.11 02:17:56 - macOS - PF rules updated, reloading

. 2019.02.11 02:47:43 - Collect information about AirVPN completed

. 2019.02.11 03:15:55 - OpenVPN > TLS: soft reset sec=0 bytes=7025610/-1 pkts=30229/0

. 2019.02.11 03:15:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 03:15:55 - OpenVPN > VERIFY KU OK

. 2019.02.11 03:15:55 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 03:15:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 03:15:55 - OpenVPN > VERIFY EKU OK

. 2019.02.11 03:15:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 03:15:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 03:15:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 03:15:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 03:17:43 - Collect information about AirVPN completed

. 2019.02.11 04:15:57 - Above log line repeated 1 times more

. 2019.02.11 04:15:57 - OpenVPN > TLS: soft reset sec=0 bytes=7306290/-1 pkts=31474/0

. 2019.02.11 04:15:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 04:15:57 - OpenVPN > VERIFY KU OK

. 2019.02.11 04:15:57 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 04:15:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 04:15:57 - OpenVPN > VERIFY EKU OK

. 2019.02.11 04:15:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 04:15:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 04:15:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 04:15:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 04:17:43 - Collect information about AirVPN completed

. 2019.02.11 05:15:59 - Above log line repeated 1 times more

. 2019.02.11 05:15:59 - OpenVPN > TLS: soft reset sec=0 bytes=10408363/-1 pkts=35413/0

. 2019.02.11 05:15:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 05:15:59 - OpenVPN > VERIFY KU OK

. 2019.02.11 05:15:59 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 05:15:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 05:15:59 - OpenVPN > VERIFY EKU OK

. 2019.02.11 05:15:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 05:15:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 05:15:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 05:15:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 05:18:02 - Collect information about AirVPN completed

. 2019.02.11 06:15:40 - Above log line repeated 1 times more

. 2019.02.11 06:15:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 06:15:40 - OpenVPN > VERIFY KU OK

. 2019.02.11 06:15:40 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 06:15:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 06:15:40 - OpenVPN > VERIFY EKU OK

. 2019.02.11 06:15:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 06:15:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 06:15:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 06:15:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 06:18:02 - Collect information about AirVPN completed

. 2019.02.11 07:15:39 - Above log line repeated 1 times more

. 2019.02.11 07:15:39 - OpenVPN > TLS: soft reset sec=0 bytes=21970673/-1 pkts=57358/0

. 2019.02.11 07:15:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 07:15:39 - OpenVPN > VERIFY KU OK

. 2019.02.11 07:15:39 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 07:15:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 07:15:39 - OpenVPN > VERIFY EKU OK

. 2019.02.11 07:15:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 07:15:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 07:15:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 07:15:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 07:18:07 - Collect information about AirVPN completed

 

This is part of what my system log reports, so I'm not exactly sure why ipleak is showing a fail?

 

"Network Lock Active: Yes, macOS - PF

Connected to VPN: Yes, Telescopium

Detected DNS: 10.19.3.1, fde6:7a:7d20:f03::1

Test DNS IPv4: Ok

Test DNS IPv6: Ok

Test Ping IPv4: 171 ms

Test Ping IPv6: 152 ms

Test HTTP IPv4: Ok

Test HTTP IPv6: Ok

Test HTTPS: Ok"

 

Since I don't seem to be getting any ideas, hear is my full System log. Someone who can read these may be able to spot something:

 

Eddie System/Environment Report - 2/14/2019 3:58 PM UTC

 

Eddie version: 2.17.2

Eddie OS build: macos_x64

Eddie architecture: x64

OS type: MacOS

OS name: 10.11.6

OS version: Darwin madrat.local 15.6.0 Darwin Kernel Version 15.6.0: Thu Jun 21 20:07:40 PDT 2018; root:xnu-3248.73.11~1/RELEASE_X86_64 x86_64

OS architecture: x64

Mono /.Net Framework: v4.0.30319

OpenVPN driver: Expected

OpenVPN: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

SSH: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)

SSL: stunnel 5.48 (/Applications/Eddie.app/Contents/MacOS/stunnel)

curl: 7.43.0 (/usr/bin/curl)

Profile path: /Users/madrat/.airvpn/default.xml

Data path: /Users/madrat/.airvpn

Application path: /Applications/Eddie.app/Contents/MacOS

Executable path: /Applications/Eddie.app/Contents/MacOS/Eddie

Command line arguments: (0 args)

Network Lock Active: Yes, macOS - PF

Connected to VPN: Yes, Pisces

Detected DNS: 10.15.226.1, fde6:7a:7d20:be2::1

Test DNS IPv4: Ok

Test DNS IPv6: Ok

Test Ping IPv4: 172 ms

Test Ping IPv6: 153 ms

Test HTTP IPv4: Ok

Test HTTP IPv6: Ok

Test HTTPS: Ok

----------------------------

Important options not at defaults:

 

login: (omissis)

password: (omissis)

remember: True

connect: True

netlock: True

areas.whitelist: ca

routes.custom: 192.168.1.254,out,

ui.skip.provider.manifest.failed: True

 

----------------------------

Logs:

 

. 2019.02.14 07:54:45 - Eddie version: 2.17.2 / macos_x64, System: MacOS, Name: 10.11.6, Version: Darwin madrat.local 15.6.0 Darwin Kernel Version 15.6.0: Thu Jun 21 20:07:40 PDT 2018; root:xnu-3248.73.11~1/RELEASE_X86_64 x86_64, Mono/.Net: v4.0.30319

. 2019.02.14 07:54:56 - Reading options from /Users/madrat/.airvpn/default.xml

. 2019.02.14 07:55:07 - Command line arguments (0):

. 2019.02.14 07:55:07 - Profile path: /Users/madrat/.airvpn/default.xml

. 2019.02.14 07:55:19 - OpenVPN Driver - Expected

. 2019.02.14 07:55:19 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

. 2019.02.14 07:55:19 - SSH - Version: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)

. 2019.02.14 07:55:19 - SSL - Version: stunnel 5.48 (/Applications/Eddie.app/Contents/MacOS/stunnel)

. 2019.02.14 07:55:19 - curl - Version: 7.43.0 (/usr/bin/curl)

. 2019.02.14 07:55:19 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem

. 2019.02.14 07:55:19 - Recovery. Unexpected crash?

. 2019.02.14 07:55:19 - Routes, removed an existing route, 192.30.89.62 for gateway 192.168.1.254

. 2019.02.14 07:55:19 - Routes, removed an existing route, 192.30.89.59 for gateway 10.20.75.1

! 2019.02.14 07:55:19 - Activation of Network Lock - macOS - PF

. 2019.02.14 07:55:20 - macOS - PF rules updated, reloading

. 2019.02.14 07:55:24 - Above log line repeated 1 times more

I 2019.02.14 07:55:24 - Ready

I 2019.02.14 07:55:24 - Session starting.

. 2019.02.14 07:55:24 - Collect information about providers ...

. 2019.02.14 07:55:25 - Collect information about AirVPN completed

I 2019.02.14 07:55:38 - Checking authorization ...

! 2019.02.14 07:55:39 - Connecting to Pisces (Canada, Vancouver)

W 2019.02.14 07:55:39 - Routes, add 192.168.1.254 for gateway 192.168.1.254 failed: route: writing to routing socket: Can't assign requested address

. 2019.02.14 07:55:39 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Jul 29 2018

. 2019.02.14 07:55:39 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10

. 2019.02.14 07:55:39 - Connection to OpenVPN Management Interface

. 2019.02.14 07:55:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2019.02.14 07:55:39 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key

. 2019.02.14 07:55:39 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication

. 2019.02.14 07:55:39 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key

. 2019.02.14 07:55:39 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication

. 2019.02.14 07:55:39 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.144:443

. 2019.02.14 07:55:39 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2019.02.14 07:55:39 - OpenVPN > UDP link local: (not bound)

. 2019.02.14 07:55:39 - OpenVPN > UDP link remote: [AF_INET]192.30.89.144:443

. 2019.02.14 07:55:39 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2019.02.14 07:55:39 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.144:443, sid=8448f456 5eaa0836

. 2019.02.14 07:55:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.14 07:55:39 - OpenVPN > VERIFY KU OK

. 2019.02.14 07:55:39 - OpenVPN > Validating certificate extended key usage

. 2019.02.14 07:55:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.14 07:55:39 - OpenVPN > VERIFY EKU OK

. 2019.02.14 07:55:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.14 07:55:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.14 07:55:40 - OpenVPN > [Pisces] Peer Connection Initiated with [AF_INET]192.30.89.144:443

. 2019.02.14 07:55:41 - OpenVPN > SENT CONTROL [Pisces]: 'PUSH_REQUEST' (status=1)

. 2019.02.14 07:55:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.226.1,dhcp-option DNS6 fde6:7a:7d20:be2::1,tun-ipv6,route-gateway 10.15.226.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:be2::10f5/64 fde6:7a:7d20:be2::1,ifconfig 10.15.226.247 255.255.255.0,peer-id 1,cipher AES-256-GCM'

. 2019.02.14 07:55:41 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'

. 2019.02.14 07:55:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2019.02.14 07:55:41 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2019.02.14 07:55:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2019.02.14 07:55:41 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2019.02.14 07:55:41 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2019.02.14 07:55:41 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2019.02.14 07:55:41 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2019.02.14 07:55:41 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2019.02.14 07:55:41 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2019.02.14 07:55:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.14 07:55:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.14 07:55:41 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2019.02.14 07:55:41 - OpenVPN > GDG6: remote_host_ipv6=n/a

. 2019.02.14 07:55:41 - OpenVPN > ROUTE6_GATEWAY fe80::9e1e:95ff:fed2:4590 IFACE=en0

. 2019.02.14 07:55:41 - OpenVPN > Opened utun device utun0

. 2019.02.14 07:55:41 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1

. 2019.02.14 07:55:41 - OpenVPN > /sbin/ifconfig utun0 delete

. 2019.02.14 07:55:41 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2019.02.14 07:55:41 - OpenVPN > route: writing to routing socket: File exists

. 2019.02.14 07:55:41 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2019.02.14 07:55:41 - OpenVPN > /sbin/ifconfig utun0 10.15.226.247 10.15.226.247 netmask 255.255.255.0 mtu 1500 up

. 2019.02.14 07:55:41 - OpenVPN > /sbin/route add -net 10.15.226.0 10.15.226.247 255.255.255.0

. 2019.02.14 07:55:41 - OpenVPN > add net 10.15.226.0: gateway 10.15.226.247

. 2019.02.14 07:55:41 - OpenVPN > /sbin/ifconfig utun0 inet6 fde6:7a:7d20:be2::10f5/64

. 2019.02.14 07:55:41 - OpenVPN > add_route_ipv6(fde6:7a:7d20:be2::/64 -> fde6:7a:7d20:be2::10f5 metric 0) dev utun0

. 2019.02.14 07:55:41 - OpenVPN > /sbin/route add -inet6 fde6:7a:7d20:be2:: -prefixlen 64 -iface utun0

. 2019.02.14 07:55:41 - OpenVPN > add net fde6:7a:7d20:be2::: gateway utun0: File exists

. 2019.02.14 07:55:41 - OpenVPN > /sbin/route add -net 192.30.89.144 192.168.1.254 255.255.255.255

. 2019.02.14 07:55:41 - OpenVPN > add net 192.30.89.144: gateway 192.168.1.254

. 2019.02.14 07:55:41 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.226.1 128.0.0.0

. 2019.02.14 07:55:41 - OpenVPN > add net 0.0.0.0: gateway 10.15.226.1

. 2019.02.14 07:55:41 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.226.1 128.0.0.0

. 2019.02.14 07:55:41 - OpenVPN > add net 128.0.0.0: gateway 10.15.226.1

. 2019.02.14 07:55:41 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:be2::1 metric -1) dev utun0

. 2019.02.14 07:55:41 - OpenVPN > /sbin/route add -inet6 :: -prefixlen 3 -iface utun0

. 2019.02.14 07:55:41 - OpenVPN > add net ::: gateway utun0

. 2019.02.14 07:55:41 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:be2::1 metric -1) dev utun0

. 2019.02.14 07:55:41 - OpenVPN > /sbin/route add -inet6 2000:: -prefixlen 4 -iface utun0

. 2019.02.14 07:55:41 - OpenVPN > add net 2000::: gateway utun0

. 2019.02.14 07:55:41 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:be2::1 metric -1) dev utun0

. 2019.02.14 07:55:41 - OpenVPN > /sbin/route add -inet6 3000:: -prefixlen 4 -iface utun0

. 2019.02.14 07:55:41 - OpenVPN > add net 3000::: gateway utun0

. 2019.02.14 07:55:41 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:be2::1 metric -1) dev utun0

. 2019.02.14 07:55:41 - OpenVPN > /sbin/route add -inet6 fc00:: -prefixlen 7 -iface utun0

. 2019.02.14 07:55:42 - OpenVPN > add net fc00::: gateway utun0

. 2019.02.14 07:55:42 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.226.1, fde6:7a:7d20:be2::1)

. 2019.02.14 07:55:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.226.1, fde6:7a:7d20:be2::1)

. 2019.02.14 07:55:42 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.226.1, fde6:7a:7d20:be2::1)

. 2019.02.14 07:55:42 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.226.1, fde6:7a:7d20:be2::1)

. 2019.02.14 07:55:42 - Routes, added a new route, 192.30.89.142 for gateway 10.15.226.1

. 2019.02.14 07:55:42 - Routes, added a new route, 2606:9580:100:a:ee16:9283:a03e:5f18 for gateway fde6:7a:7d20:be2::1

. 2019.02.14 07:55:42 - Flushing DNS

. 2019.02.14 07:55:43 - macOS - PF rules updated, reloading

I 2019.02.14 07:55:45 - Checking route IPv4

I 2019.02.14 07:55:46 - Checking route IPv6

I 2019.02.14 07:55:46 - Checking DNS

! 2019.02.14 07:55:47 - Connected.

. 2019.02.14 07:55:47 - OpenVPN > Initialization Sequence Completed

 

----------------------------

Network Interfaces and Routes:

 

{

    "support_ipv4": true,

    "support_ipv6": true,

    "routes": [

        {

            "address": "0.0.0.0\/1",

            "gateway": "10.15.226.1",

            "flags": "UGSc",

            "refs": "176",

            "use": "37",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "0.0.0.0\/0",

            "gateway": "192.168.1.254",

            "flags": "UGSc",

            "refs": "1",

            "use": "225",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "10.15.0.226\/24",

            "gateway": "10.15.226.247",

            "flags": "UGSc",

            "refs": "31",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "10.15.226.247",

            "gateway": "10.15.226.247",

            "flags": "UH",

            "refs": "2",

            "use": "25",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "0.0.0.127",

            "gateway": "127.0.0.1",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "127.0.0.1",

            "gateway": "127.0.0.1",

            "flags": "UH",

            "refs": "3",

            "use": "630",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "128.0.0.0\/1",

            "gateway": "10.15.226.1",

            "flags": "UGSc",

            "refs": "91",

            "use": "1",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "169.0.0.254",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.30.89.142",

            "gateway": "10.15.226.1",

            "flags": "UGHS",

            "refs": "0",

            "use": "31",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "192.30.89.144",

            "gateway": "192.168.1.254",

            "flags": "UGSc",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.0.1",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.1.64",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.1.64",

            "gateway": "0:23:df:8c:a0:ae",

            "flags": "UHLWI",

            "refs": "0",

            "use": "2",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "192.168.1.254",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.1.254",

            "gateway": "9c:1e:95:d2:45:90",

            "flags": "UHLWIir",

            "refs": "3",

            "use": "186",

            "mtu": "1500",

            "interface": "en0",

            "expire": "1163"

        },

        {

            "address": "192.168.1.255",

            "gateway": "ff:ff:ff:ff:ff:ff",

            "flags": "UHLWbI",

            "refs": "0",

            "use": "26",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "224.0.0.0",

            "gateway": "link#4",

            "flags": "UmCS",

            "refs": "2",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "224.0.0.1",

            "gateway": "1:0:5e:0:0:1",

            "flags": "UHmLWI",

            "refs": "0",

            "use": "32",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "224.0.0.251",

            "gateway": "1:0:5e:0:0:fb",

            "flags": "UHmLWI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "255.255.255.255",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "::\/3",

            "gateway": "utun0",

            "flags": "USc",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "::\/0",

            "gateway": "fe80::9e1e:95ff:fed2:4590%en0",

            "flags": "UGc",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "::1",

            "gateway": "::1",

            "flags": "UHL",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "2000::\/4",

            "gateway": "utun0",

            "flags": "USc",

            "refs": "37",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "2001:569:7053:cc00::\/64",

            "gateway": "link#4",

            "flags": "UC",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "2001:569:7053:cc00:223:dfff:fe8c:a0ae",

            "gateway": "0:23:df:8c:a0:ae",

            "flags": "UHL",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "2001:569:7053:cc00:3dc5:ed42:de5a:afa1",

            "gateway": "0:23:df:8c:a0:ae",

            "flags": "UHL",

            "refs": "0",

            "use": "36",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "2606:9580:100:a:ee16:9283:a03e:5f18",

            "gateway": "fde6:7a:7d20:be2::1",

            "flags": "UGHS",

            "refs": "0",

            "use": "15",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "3000::\/4",

            "gateway": "utun0",

            "flags": "USc",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "fc00::\/7",

            "gateway": "utun0",

            "flags": "USc",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "fde6:7a:7d20:be2::\/64",

            "gateway": "fe80::223:dfff:fe8c:a0ae%utun0",

            "flags": "Uc",

            "refs": "2",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "fde6:7a:7d20:be2::10f5",

            "gateway": "link#8",

            "flags": "UHL",

            "refs": "0",

            "use": "1",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::",

            "gateway": "fe80::1%lo0",

            "flags": "UcI",

            "refs": "1",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::1",

            "gateway": "link#1",

            "flags": "UHLI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::",

            "gateway": "link#4",

            "flags": "UCI",

            "refs": "2",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "fe80::223:dfff:fe8c:a0ae",

            "gateway": "0:23:df:8c:a0:ae",

            "flags": "UHLI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::9e1e:95ff:fed2:4590",

            "gateway": "9c:1e:95:d2:45:90",

            "flags": "UHLWIir",

            "refs": "2",

            "use": "7",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "fe80::",

            "gateway": "fe80::223:dfff:fe8c:a0ae%utun0",

            "flags": "UcI",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "fe80::223:dfff:fe8c:a0ae",

            "gateway": "link#8",

            "flags": "UHLI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "ff01::",

            "gateway": "::1",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "ff01::",

            "gateway": "link#4",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "ff01::",

            "gateway": "fe80::223:dfff:fe8c:a0ae%utun0",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "ff02::",

            "gateway": "::1",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "ff02::",

            "gateway": "link#4",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "ff02::",

            "gateway": "fe80::223:dfff:fe8c:a0ae%utun0",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        }

    ],

    "interfaces": [

        {

            "friendly": "lo0",

            "id": "lo0",

            "name": "lo0",

            "description": "lo0",

            "type": "Loopback",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [

                "::1",

                "127.0.0.1",

                "fe80::1"

            ],

            "gateways": [

                "127.0.0.1",

                "::1",

                "fe80::1"

            ],

            "bind": true

        },

        {

            "friendly": "gif0",

            "id": "gif0",

            "name": "gif0",

            "description": "gif0",

            "type": "Unknown",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "stf0",

            "id": "stf0",

            "name": "stf0",

            "description": "stf0",

            "type": "Unknown",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "Ethernet",

            "id": "en0",

            "name": "en0",

            "description": "en0",

            "type": "Ethernet",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [

                "fe80::223:dfff:fe8c:a0ae",

                "2001:569:7053:cc00:223:dfff:fe8c:a0ae",

                "2001:569:7053:cc00:3dc5:ed42:de5a:afa1",

                "192.168.1.64"

            ],

            "gateways": [

                "192.168.1.254",

                "fe80::9e1e:95ff:fed2:4590"

            ],

            "bind": true

        },

        {

            "friendly": "Wi-Fi",

            "id": "en1",

            "name": "en1",

            "description": "en1",

            "type": "Ethernet",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "FireWire",

            "id": "fw0",

            "name": "fw0",

            "description": "fw0",

            "type": "Unknown",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "p2p0",

            "id": "p2p0",

            "name": "p2p0",

            "description": "p2p0",

            "type": "Ethernet",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "utun0",

            "id": "utun0",

            "name": "utun0",

            "description": "utun0",

            "type": "Unknown",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [

                "10.15.226.247",

                "fe80::223:dfff:fe8c:a0ae",

                "fde6:7a:7d20:be2::10f5"

            ],

            "gateways": [

                "10.15.226.1",

                "10.15.226.247",

                "fde6:7a:7d20:be2::1",

                "fe80::223:dfff:fe8c:a0ae"

            ],

            "bind": true

        }

    ],

    "ipv4-default-gateway": "192.168.1.254",

    "ipv4-default-interface": "en0",

    "ipv6-default-gateway": "fe80::9e1e:95ff:fed2:4590",

    "ipv6-default-interface": "en0"

}

----------------------------

ifconfig:

 

lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384

    options=3<RXCSUM,TXCSUM>

    inet6 ::1 prefixlen 128

    inet 127.0.0.1 netmask 0xff000000

    inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1

    nd6 options=1<PERFORMNUD>

gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280

stf0: flags=0<> mtu 1280

en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500

    options=27<RXCSUM,TXCSUM,VLAN_MTU,TSO4>

    ether 00:23:df:8c:a0:ae

    inet6 fe80::223:dfff:fe8c:a0ae%en0 prefixlen 64 scopeid 0x4

    inet6 2001:569:7053:cc00:223:dfff:fe8c:a0ae prefixlen 64 autoconf

    inet6 2001:569:7053:cc00:3dc5:ed42:de5a:afa1 prefixlen 64 autoconf temporary

    inet 192.168.1.64 netmask 0xffffff00 broadcast 192.168.1.255

    nd6 options=1<PERFORMNUD>

    media: autoselect (1000baseT <full-duplex,flow-control>)

    status: active

en1: flags=8823<UP,BROADCAST,SMART,SIMPLEX,MULTICAST> mtu 1500

    ether 00:1f:f3:bd:82:25

    nd6 options=1<PERFORMNUD>

    media: autoselect (<unknown type>)

    status: inactive

fw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 4078

    lladdr 00:23:df:ff:fe:8c:a0:ae

    nd6 options=1<PERFORMNUD>

    media: autoselect <full-duplex>

    status: inactive

p2p0: flags=8802<BROADCAST,SIMPLEX,MULTICAST> mtu 2304

    ether 02:1f:f3:bd:82:25

    media: autoselect

    status: inactive

utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500

    inet 10.15.226.247 --> 10.15.226.247 netmask 0xffffff00

    inet6 fe80::223:dfff:fe8c:a0ae%utun0 prefixlen 64 scopeid 0x8

    inet6 fde6:7a:7d20:be2::10f5 prefixlen 64

    nd6 options=1<PERFORMNUD>

Edited ... by giganerd
Made it readable without scrolling too much

Share this post


Link to post
Posted ... (edited)
On 2/14/2019 at 5:06 PM, madrat said:

 

On 2/11/2019 at 10:48 PM, madrat said:

 

On 2/11/2019 at 12:56 AM, madrat said:

Just got a new modem/router. Ran tests on IPleak.net. My MacBook Pro connecting via WiFi passes the ipv6 tests just fine but my iMac, using ethernet, does not. Any suggestions? Log can be posted if necessary.

 

 

OK, here is my log:

. 2019.02.10 15:14:54 - Eddie version: 2.17.2 / macos_x64, System: MacOS, Name: 10.11.6, Version: Darwin madrat.local 15.6.0 Darwin Kernel Version 15.6.0: Thu Jun 21 20:07:40 PDT 2018; root:xnu-3248.73.11~1/RELEASE_X86_64 x86_64, Mono/.Net: v4.0.30319

. 2019.02.10 15:14:56 - Reading options from /Users/

. 2019.02.10 15:15:03 - Command line arguments (0):

. 2019.02.10 15:15:05 - Profile path:

. 2019.02.10 15:15:17 - OpenVPN Driver - Expected

. 2019.02.10 15:15:17 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

. 2019.02.10 15:15:17 - SSH - Version: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)

. 2019.02.10 15:15:17 - SSL - Version: stunnel 5.48 (/Applications/Eddie.app/Contents/MacOS/stunnel)

. 2019.02.10 15:15:17 - curl - Version: 7.43.0 (/usr/bin/curl)

. 2019.02.10 15:15:17 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem

. 2019.02.10 15:15:18 - Recovery. Unexpected crash?

. 2019.02.10 15:15:18 - Routes, added a new route, 192.30.89.62 for gateway 192.168.1.254

. 2019.02.10 15:15:18 - Routes, added a new route, 192.30.89.59 for gateway 10.20.75.1

. 2019.02.10 15:15:18 - Routes, added a new route, 2606:9580:100:d:2bd7:c37b:24c2:c069 for gateway fde6:7a:7d20:104b::1

! 2019.02.10 15:15:18 - Activation of Network Lock - macOS - PF

. 2019.02.10 15:15:18 - macOS - PF rules updated, reloading

. 2019.02.10 15:15:21 - Above log line repeated 1 times more

I 2019.02.10 15:15:21 - Ready

I 2019.02.10 15:15:21 - Session starting.

. 2019.02.10 15:15:21 - Collect information about providers ...

. 2019.02.10 15:15:22 - Collect information about AirVPN completed

I 2019.02.10 15:15:35 - Checking authorization ...

! 2019.02.10 15:15:36 - Connecting to Pisces (Canada, Vancouver)

. 2019.02.10 15:15:36 - Routes, added a new route, 192.30.89.145 for gateway 192.168.1.254

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: stunnel 5.48 on x86_64-apple-darwin17.6.0 platform

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: Compiled/running with OpenSSL 1.0.2o  27 Mar 2018

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,OCSP,PSK,SNI

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: Reading configuration from file /Users/madrat/.airvpn/1904f759113dfa396f0740cce3d1cf1e4af1043b869ca307ec83e5c63034bea8.tmp.ssl

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: UTF-8 byte order mark detected

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG6[ui]: Initializing service [openvpn]

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: Configuration successful

. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG6[ui]: Service [openvpn] (FD=6) bound to 127.0.0.1:49293

. 2019.02.10 15:15:36 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Jul 29 2018

. 2019.02.10 15:15:36 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10

. 2019.02.10 15:15:36 - Connection to OpenVPN Management Interface

. 2019.02.10 15:15:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2019.02.10 15:15:36 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key

. 2019.02.10 15:15:36 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication

. 2019.02.10 15:15:36 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key

. 2019.02.10 15:15:36 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication

. 2019.02.10 15:15:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:49293

. 2019.02.10 15:15:36 - OpenVPN > Socket Buffers: R=[131072->262144] S=[131072->262144]

. 2019.02.10 15:15:36 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:49293 [nonblock]

. 2019.02.10 15:15:36 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:49293

. 2019.02.10 15:15:36 - OpenVPN > TCP_CLIENT link local: (not bound)

. 2019.02.10 15:15:36 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:49293

. 2019.02.10 15:15:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:49216

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: s_connect: connecting 192.30.89.145:443

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG5[0]: s_connect: connected 192.30.89.145:443

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.64:49218

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: SNI: sending servername: 192.30.89.145

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: Peer certificate not required

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: Certificate verification disabled

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: Client certificate not requested

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:37 LOG6[0]: TLS connected: new session negotiated

. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:37 LOG6[0]: TLSv1.2 ciphersuite: ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)

. 2019.02.10 15:15:37 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:49293, sid=ae1b4ca3 68a8738a

. 2019.02.10 15:15:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 15:15:37 - OpenVPN > VERIFY KU OK

. 2019.02.10 15:15:37 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 15:15:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 15:15:37 - OpenVPN > VERIFY EKU OK

. 2019.02.10 15:15:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 15:15:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 15:15:37 - OpenVPN > [Pisces] Peer Connection Initiated with [AF_INET]127.0.0.1:49293

. 2019.02.10 15:15:38 - OpenVPN > SENT CONTROL [Pisces]: 'PUSH_REQUEST' (status=1)

. 2019.02.10 15:15:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.227.1,dhcp-option DNS6 fde6:7a:7d20:be3::1,tun-ipv6,route-gateway 10.15.227.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:be3::101a/64 fde6:7a:7d20:be3::1,ifconfig 10.15.227.28 255.255.255.0,peer-id 0,cipher AES-256-GCM'

. 2019.02.10 15:15:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627

. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2019.02.10 15:15:38 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2019.02.10 15:15:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 15:15:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 15:15:38 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2019.02.10 15:15:38 - OpenVPN > GDG6: remote_host_ipv6=n/a

. 2019.02.10 15:15:38 - OpenVPN > ROUTE6_GATEWAY fe80::9e1e:95ff:fed2:4590 IFACE=en0

. 2019.02.10 15:15:38 - OpenVPN > Opened utun device utun0

. 2019.02.10 15:15:39 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1

. 2019.02.10 15:15:39 - OpenVPN > /sbin/ifconfig utun0 delete

. 2019.02.10 15:15:39 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2019.02.10 15:15:39 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2019.02.10 15:15:39 - OpenVPN > /sbin/ifconfig utun0 10.15.227.28 10.15.227.28 netmask 255.255.255.0 mtu 1500 up

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -net 10.15.227.0 10.15.227.28 255.255.255.0

. 2019.02.10 15:15:39 - OpenVPN > add net 10.15.227.0: gateway 10.15.227.28

. 2019.02.10 15:15:39 - OpenVPN > /sbin/ifconfig utun0 inet6 fde6:7a:7d20:be3::101a/64

. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(fde6:7a:7d20:be3::/64 -> fde6:7a:7d20:be3::101a metric 0) dev utun0

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 fde6:7a:7d20:be3:: -prefixlen 64 -iface utun0

. 2019.02.10 15:15:39 - OpenVPN > route: writing to routing socket: File exists

. 2019.02.10 15:15:39 - OpenVPN > add net fde6:7a:7d20:be3::: gateway utun0: File exists

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -net 127.0.0.1 192.168.1.254 255.255.255.255

. 2019.02.10 15:15:39 - OpenVPN > add net 127.0.0.1: gateway 192.168.1.254

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.227.1 128.0.0.0

. 2019.02.10 15:15:39 - OpenVPN > add net 0.0.0.0: gateway 10.15.227.1

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.227.1 128.0.0.0

. 2019.02.10 15:15:39 - OpenVPN > add net 128.0.0.0: gateway 10.15.227.1

. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:be3::1 metric -1) dev utun0

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 :: -prefixlen 3 -iface utun0

. 2019.02.10 15:15:39 - OpenVPN > add net ::: gateway utun0

. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:be3::1 metric -1) dev utun0

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 2000:: -prefixlen 4 -iface utun0

. 2019.02.10 15:15:39 - OpenVPN > add net 2000::: gateway utun0

. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:be3::1 metric -1) dev utun0

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 3000:: -prefixlen 4 -iface utun0

. 2019.02.10 15:15:39 - OpenVPN > add net 3000::: gateway utun0

. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:be3::1 metric -1) dev utun0

. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 fc00:: -prefixlen 7 -iface utun0

. 2019.02.10 15:15:39 - OpenVPN > add net fc00::: gateway utun0

. 2019.02.10 15:15:39 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.227.1, fde6:7a:7d20:be3::1)

. 2019.02.10 15:15:39 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.227.1, fde6:7a:7d20:be3::1)

. 2019.02.10 15:15:40 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.227.1, fde6:7a:7d20:be3::1)

. 2019.02.10 15:15:40 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.227.1, fde6:7a:7d20:be3::1)

. 2019.02.10 15:15:40 - Routes, added a new route, 192.30.89.142 for gateway 10.15.227.1

. 2019.02.10 15:15:40 - Routes, added a new route, 2606:9580:100:a:ee16:9283:a03e:5f18 for gateway fde6:7a:7d20:be3::1

. 2019.02.10 15:15:40 - Flushing DNS

. 2019.02.10 15:15:40 - macOS - PF rules updated, reloading

I 2019.02.10 15:15:42 - Checking route IPv4

I 2019.02.10 15:15:42 - Checking route IPv6

I 2019.02.10 15:15:43 - Checking DNS

! 2019.02.10 15:15:44 - Connected.

. 2019.02.10 15:15:44 - OpenVPN > Initialization Sequence Completed

. 2019.02.10 15:16:36 - SSL > 2019.02.10 15:16:36 LOG6[cron]: Executing cron jobs

. 2019.02.10 15:16:36 - SSL > 2019.02.10 15:16:36 LOG6[cron]: Cron jobs completed in 0 seconds

. 2019.02.10 15:45:26 - Collect information about AirVPN completed

. 2019.02.10 16:15:37 - Above log line repeated 1 times more

. 2019.02.10 16:15:37 - OpenVPN > TLS: soft reset sec=0 bytes=33901532/-1 pkts=64984/0

. 2019.02.10 16:15:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 16:15:37 - OpenVPN > VERIFY KU OK

. 2019.02.10 16:15:37 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 16:15:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 16:15:37 - OpenVPN > VERIFY EKU OK

. 2019.02.10 16:15:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 16:15:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 16:15:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 16:15:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 16:45:33 - Collect information about AirVPN completed

. 2019.02.10 17:05:33 - macOS - PF rules updated, reloading

. 2019.02.10 17:15:36 - Collect information about AirVPN completed

. 2019.02.10 17:15:37 - OpenVPN > TLS: soft reset sec=0 bytes=25042350/-1 pkts=45420/0

. 2019.02.10 17:15:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 17:15:37 - OpenVPN > VERIFY KU OK

. 2019.02.10 17:15:37 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 17:15:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 17:15:37 - OpenVPN > VERIFY EKU OK

. 2019.02.10 17:15:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 17:15:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 17:15:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 17:15:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 17:45:39 - Collect information about AirVPN completed

. 2019.02.10 18:15:37 - OpenVPN > TLS: soft reset sec=0 bytes=53370209/-1 pkts=76612/0

. 2019.02.10 18:15:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 18:15:37 - OpenVPN > VERIFY KU OK

. 2019.02.10 18:15:37 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 18:15:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 18:15:37 - OpenVPN > VERIFY EKU OK

. 2019.02.10 18:15:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 18:15:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 18:15:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 18:15:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 18:15:44 - Collect information about AirVPN completed

. 2019.02.10 19:15:37 - Above log line repeated 1 times more

. 2019.02.10 19:15:37 - Renewing TLS key

. 2019.02.10 19:15:37 - OpenVPN > TLS: tls_process: killed expiring key

. 2019.02.10 19:15:38 - OpenVPN > TLS: soft reset sec=0 bytes=44320495/-1 pkts=62553/0

. 2019.02.10 19:15:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 19:15:38 - OpenVPN > VERIFY KU OK

. 2019.02.10 19:15:38 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 19:15:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 19:15:38 - OpenVPN > VERIFY EKU OK

. 2019.02.10 19:15:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 19:15:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 19:15:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 19:15:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 19:15:51 - Collect information about AirVPN completed

. 2019.02.10 20:15:38 - Above log line repeated 1 times more

. 2019.02.10 20:15:38 - Renewing TLS key

. 2019.02.10 20:15:38 - OpenVPN > TLS: tls_process: killed expiring key

. 2019.02.10 20:15:39 - OpenVPN > TLS: soft reset sec=0 bytes=62520637/-1 pkts=95955/0

. 2019.02.10 20:15:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 20:15:39 - OpenVPN > VERIFY KU OK

. 2019.02.10 20:15:39 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 20:15:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 20:15:39 - OpenVPN > VERIFY EKU OK

. 2019.02.10 20:15:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 20:15:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 20:15:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 20:15:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 20:15:56 - Collect information about AirVPN completed

. 2019.02.10 21:15:39 - Above log line repeated 1 times more

. 2019.02.10 21:15:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 21:15:39 - OpenVPN > VERIFY KU OK

. 2019.02.10 21:15:39 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 21:15:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 21:15:39 - OpenVPN > VERIFY EKU OK

. 2019.02.10 21:15:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 21:15:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 21:15:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 21:15:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 21:16:03 - Collect information about AirVPN completed

. 2019.02.10 22:15:41 - Above log line repeated 1 times more

. 2019.02.10 22:15:41 - Renewing TLS key

. 2019.02.10 22:15:41 - OpenVPN > TLS: tls_process: killed expiring key

. 2019.02.10 22:15:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 22:15:41 - OpenVPN > VERIFY KU OK

. 2019.02.10 22:15:41 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 22:15:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 22:15:41 - OpenVPN > VERIFY EKU OK

. 2019.02.10 22:15:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 22:15:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 22:15:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 22:15:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 22:16:23 - Collect information about AirVPN completed

. 2019.02.10 23:15:56 - Above log line repeated 1 times more

. 2019.02.10 23:15:56 - OpenVPN > TLS: soft reset sec=0 bytes=807836511/-1 pkts=1346319/0

. 2019.02.10 23:15:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.10 23:15:56 - OpenVPN > VERIFY KU OK

. 2019.02.10 23:15:56 - OpenVPN > Validating certificate extended key usage

. 2019.02.10 23:15:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.10 23:15:56 - OpenVPN > VERIFY EKU OK

. 2019.02.10 23:15:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.10 23:15:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 23:15:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.10 23:15:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.10 23:16:39 - Collect information about AirVPN completed

. 2019.02.11 00:15:39 - Above log line repeated 1 times more

. 2019.02.11 00:15:39 - OpenVPN > TLS: soft reset sec=0 bytes=105877702/-1 pkts=316886/0

. 2019.02.11 00:15:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 00:15:39 - OpenVPN > VERIFY KU OK

. 2019.02.11 00:15:39 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 00:15:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 00:15:39 - OpenVPN > VERIFY EKU OK

. 2019.02.11 00:15:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 00:15:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 00:15:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 00:15:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 00:16:54 - Collect information about AirVPN completed

. 2019.02.11 01:15:52 - Above log line repeated 1 times more

. 2019.02.11 01:15:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 01:15:52 - OpenVPN > VERIFY KU OK

. 2019.02.11 01:15:52 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 01:15:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 01:15:52 - OpenVPN > VERIFY EKU OK

. 2019.02.11 01:15:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 01:15:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 01:15:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 01:15:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 01:17:23 - Collect information about AirVPN completed

. 2019.02.11 02:15:54 - Above log line repeated 1 times more

. 2019.02.11 02:15:54 - OpenVPN > TLS: soft reset sec=0 bytes=6345530/-1 pkts=28324/0

. 2019.02.11 02:15:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 02:15:54 - OpenVPN > VERIFY KU OK

. 2019.02.11 02:15:54 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 02:15:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 02:15:54 - OpenVPN > VERIFY EKU OK

. 2019.02.11 02:15:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 02:15:54 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 02:15:54 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 02:15:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 02:17:37 - Collect information about AirVPN completed

. 2019.02.11 02:17:56 - macOS - PF rules updated, reloading

. 2019.02.11 02:47:43 - Collect information about AirVPN completed

. 2019.02.11 03:15:55 - OpenVPN > TLS: soft reset sec=0 bytes=7025610/-1 pkts=30229/0

. 2019.02.11 03:15:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 03:15:55 - OpenVPN > VERIFY KU OK

. 2019.02.11 03:15:55 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 03:15:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 03:15:55 - OpenVPN > VERIFY EKU OK

. 2019.02.11 03:15:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 03:15:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 03:15:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 03:15:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 03:17:43 - Collect information about AirVPN completed

. 2019.02.11 04:15:57 - Above log line repeated 1 times more

. 2019.02.11 04:15:57 - OpenVPN > TLS: soft reset sec=0 bytes=7306290/-1 pkts=31474/0

. 2019.02.11 04:15:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 04:15:57 - OpenVPN > VERIFY KU OK

. 2019.02.11 04:15:57 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 04:15:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 04:15:57 - OpenVPN > VERIFY EKU OK

. 2019.02.11 04:15:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 04:15:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 04:15:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 04:15:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 04:17:43 - Collect information about AirVPN completed

. 2019.02.11 05:15:59 - Above log line repeated 1 times more

. 2019.02.11 05:15:59 - OpenVPN > TLS: soft reset sec=0 bytes=10408363/-1 pkts=35413/0

. 2019.02.11 05:15:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 05:15:59 - OpenVPN > VERIFY KU OK

. 2019.02.11 05:15:59 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 05:15:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 05:15:59 - OpenVPN > VERIFY EKU OK

. 2019.02.11 05:15:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 05:15:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 05:15:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 05:15:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 05:18:02 - Collect information about AirVPN completed

. 2019.02.11 06:15:40 - Above log line repeated 1 times more

. 2019.02.11 06:15:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 06:15:40 - OpenVPN > VERIFY KU OK

. 2019.02.11 06:15:40 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 06:15:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 06:15:40 - OpenVPN > VERIFY EKU OK

. 2019.02.11 06:15:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 06:15:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 06:15:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 06:15:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 06:18:02 - Collect information about AirVPN completed

. 2019.02.11 07:15:39 - Above log line repeated 1 times more

. 2019.02.11 07:15:39 - OpenVPN > TLS: soft reset sec=0 bytes=21970673/-1 pkts=57358/0

. 2019.02.11 07:15:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.11 07:15:39 - OpenVPN > VERIFY KU OK

. 2019.02.11 07:15:39 - OpenVPN > Validating certificate extended key usage

. 2019.02.11 07:15:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.11 07:15:39 - OpenVPN > VERIFY EKU OK

. 2019.02.11 07:15:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.11 07:15:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 07:15:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.11 07:15:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.11 07:18:07 - Collect information about AirVPN completed

 

This is part of what my system log reports, so I'm not exactly sure why ipleak is showing a fail?

 

"Network Lock Active: Yes, macOS - PF

Connected to VPN: Yes, Telescopium

Detected DNS: 10.19.3.1, fde6:7a:7d20:f03::1

Test DNS IPv4: Ok

Test DNS IPv6: Ok

Test Ping IPv4: 171 ms

Test Ping IPv6: 152 ms

Test HTTP IPv4: Ok

Test HTTP IPv6: Ok

Test HTTPS: Ok"

 

Since I don't seem to be getting any ideas, hear is my full System log. Someone who can read these may be able to spot something:

 

Eddie System/Environment Report - 2/14/2019 3:58 PM UTC

 

Eddie version: 2.17.2

Eddie OS build: macos_x64

Eddie architecture: x64

OS type: MacOS

OS name: 10.11.6

OS version: Darwin madrat.local 15.6.0 Darwin Kernel Version 15.6.0: Thu Jun 21 20:07:40 PDT 2018; root:xnu-3248.73.11~1/RELEASE_X86_64 x86_64

OS architecture: x64

Mono /.Net Framework: v4.0.30319

OpenVPN driver: Expected

OpenVPN: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

SSH: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)

SSL: stunnel 5.48 (/Applications/Eddie.app/Contents/MacOS/stunnel)

curl: 7.43.0 (/usr/bin/curl)

Profile path: /Users/madrat/.airvpn/default.xml

Data path: /Users/madrat/.airvpn

Application path: /Applications/Eddie.app/Contents/MacOS

Executable path: /Applications/Eddie.app/Contents/MacOS/Eddie

Command line arguments: (0 args)

Network Lock Active: Yes, macOS - PF

Connected to VPN: Yes, Pisces

Detected DNS: 10.15.226.1, fde6:7a:7d20:be2::1

Test DNS IPv4: Ok

Test DNS IPv6: Ok

Test Ping IPv4: 172 ms

Test Ping IPv6: 153 ms

Test HTTP IPv4: Ok

Test HTTP IPv6: Ok

Test HTTPS: Ok

----------------------------

Important options not at defaults:

 

login: (omissis)

password: (omissis)

remember: True

connect: True

netlock: True

areas.whitelist: ca

routes.custom: 192.168.1.254,out,

ui.skip.provider.manifest.failed: True

 

----------------------------

Logs:

 

. 2019.02.14 07:54:45 - Eddie version: 2.17.2 / macos_x64, System: MacOS, Name: 10.11.6, Version: Darwin madrat.local 15.6.0 Darwin Kernel Version 15.6.0: Thu Jun 21 20:07:40 PDT 2018; root:xnu-3248.73.11~1/RELEASE_X86_64 x86_64, Mono/.Net: v4.0.30319

. 2019.02.14 07:54:56 - Reading options from /Users/madrat/.airvpn/default.xml

. 2019.02.14 07:55:07 - Command line arguments (0):

. 2019.02.14 07:55:07 - Profile path: /Users/madrat/.airvpn/default.xml

. 2019.02.14 07:55:19 - OpenVPN Driver - Expected

. 2019.02.14 07:55:19 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

. 2019.02.14 07:55:19 - SSH - Version: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)

. 2019.02.14 07:55:19 - SSL - Version: stunnel 5.48 (/Applications/Eddie.app/Contents/MacOS/stunnel)

. 2019.02.14 07:55:19 - curl - Version: 7.43.0 (/usr/bin/curl)

. 2019.02.14 07:55:19 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem

. 2019.02.14 07:55:19 - Recovery. Unexpected crash?

. 2019.02.14 07:55:19 - Routes, removed an existing route, 192.30.89.62 for gateway 192.168.1.254

. 2019.02.14 07:55:19 - Routes, removed an existing route, 192.30.89.59 for gateway 10.20.75.1

! 2019.02.14 07:55:19 - Activation of Network Lock - macOS - PF

. 2019.02.14 07:55:20 - macOS - PF rules updated, reloading

. 2019.02.14 07:55:24 - Above log line repeated 1 times more

I 2019.02.14 07:55:24 - Ready

I 2019.02.14 07:55:24 - Session starting.

. 2019.02.14 07:55:24 - Collect information about providers ...

. 2019.02.14 07:55:25 - Collect information about AirVPN completed

I 2019.02.14 07:55:38 - Checking authorization ...

! 2019.02.14 07:55:39 - Connecting to Pisces (Canada, Vancouver)

W 2019.02.14 07:55:39 - Routes, add 192.168.1.254 for gateway 192.168.1.254 failed: route: writing to routing socket: Can't assign requested address

. 2019.02.14 07:55:39 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Jul 29 2018

. 2019.02.14 07:55:39 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10

. 2019.02.14 07:55:39 - Connection to OpenVPN Management Interface

. 2019.02.14 07:55:39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2019.02.14 07:55:39 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key

. 2019.02.14 07:55:39 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication

. 2019.02.14 07:55:39 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key

. 2019.02.14 07:55:39 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication

. 2019.02.14 07:55:39 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.144:443

. 2019.02.14 07:55:39 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2019.02.14 07:55:39 - OpenVPN > UDP link local: (not bound)

. 2019.02.14 07:55:39 - OpenVPN > UDP link remote: [AF_INET]192.30.89.144:443

. 2019.02.14 07:55:39 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2019.02.14 07:55:39 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.144:443, sid=8448f456 5eaa0836

. 2019.02.14 07:55:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.14 07:55:39 - OpenVPN > VERIFY KU OK

. 2019.02.14 07:55:39 - OpenVPN > Validating certificate extended key usage

. 2019.02.14 07:55:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.14 07:55:39 - OpenVPN > VERIFY EKU OK

. 2019.02.14 07:55:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org

. 2019.02.14 07:55:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.14 07:55:40 - OpenVPN > [Pisces] Peer Connection Initiated with [AF_INET]192.30.89.144:443

. 2019.02.14 07:55:41 - OpenVPN > SENT CONTROL [Pisces]: 'PUSH_REQUEST' (status=1)

. 2019.02.14 07:55:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.226.1,dhcp-option DNS6 fde6:7a:7d20:be2::1,tun-ipv6,route-gateway 10.15.226.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:be2::10f5/64 fde6:7a:7d20:be2::1,ifconfig 10.15.226.247 255.255.255.0,peer-id 1,cipher AES-256-GCM'

. 2019.02.14 07:55:41 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'

. 2019.02.14 07:55:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2019.02.14 07:55:41 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2019.02.14 07:55:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2019.02.14 07:55:41 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2019.02.14 07:55:41 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2019.02.14 07:55:41 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2019.02.14 07:55:41 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2019.02.14 07:55:41 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2019.02.14 07:55:41 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2019.02.14 07:55:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.14 07:55:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.14 07:55:41 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2019.02.14 07:55:41 - OpenVPN > GDG6: remote_host_ipv6=n/a

. 2019.02.14 07:55:41 - OpenVPN > ROUTE6_GATEWAY fe80::9e1e:95ff:fed2:4590 IFACE=en0

. 2019.02.14 07:55:41 - OpenVPN > Opened utun device utun0

. 2019.02.14 07:55:41 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1

. 2019.02.14 07:55:41 - OpenVPN > /sbin/ifconfig utun0 delete

. 2019.02.14 07:55:41 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2019.02.14 07:55:41 - OpenVPN > route: writing to routing socket: File exists

. 2019.02.14 07:55:41 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2019.02.14 07:55:41 - OpenVPN > /sbin/ifconfig utun0 10.15.226.247 10.15.226.247 netmask 255.255.255.0 mtu 1500 up

. 2019.02.14 07:55:41 - OpenVPN > /sbin/route add -net 10.15.226.0 10.15.226.247 255.255.255.0

. 2019.02.14 07:55:41 - OpenVPN > add net 10.15.226.0: gateway 10.15.226.247

. 2019.02.14 07:55:41 - OpenVPN > /sbin/ifconfig utun0 inet6 fde6:7a:7d20:be2::10f5/64

. 2019.02.14 07:55:41 - OpenVPN > add_route_ipv6(fde6:7a:7d20:be2::/64 -> fde6:7a:7d20:be2::10f5 metric 0) dev utun0

. 2019.02.14 07:55:41 - OpenVPN > /sbin/route add -inet6 fde6:7a:7d20:be2:: -prefixlen 64 -iface utun0

. 2019.02.14 07:55:41 - OpenVPN > add net fde6:7a:7d20:be2::: gateway utun0: File exists

. 2019.02.14 07:55:41 - OpenVPN > /sbin/route add -net 192.30.89.144 192.168.1.254 255.255.255.255

. 2019.02.14 07:55:41 - OpenVPN > add net 192.30.89.144: gateway 192.168.1.254

. 2019.02.14 07:55:41 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.226.1 128.0.0.0

. 2019.02.14 07:55:41 - OpenVPN > add net 0.0.0.0: gateway 10.15.226.1

. 2019.02.14 07:55:41 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.226.1 128.0.0.0

. 2019.02.14 07:55:41 - OpenVPN > add net 128.0.0.0: gateway 10.15.226.1

. 2019.02.14 07:55:41 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:be2::1 metric -1) dev utun0

. 2019.02.14 07:55:41 - OpenVPN > /sbin/route add -inet6 :: -prefixlen 3 -iface utun0

. 2019.02.14 07:55:41 - OpenVPN > add net ::: gateway utun0

. 2019.02.14 07:55:41 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:be2::1 metric -1) dev utun0

. 2019.02.14 07:55:41 - OpenVPN > /sbin/route add -inet6 2000:: -prefixlen 4 -iface utun0

. 2019.02.14 07:55:41 - OpenVPN > add net 2000::: gateway utun0

. 2019.02.14 07:55:41 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:be2::1 metric -1) dev utun0

. 2019.02.14 07:55:41 - OpenVPN > /sbin/route add -inet6 3000:: -prefixlen 4 -iface utun0

. 2019.02.14 07:55:41 - OpenVPN > add net 3000::: gateway utun0

. 2019.02.14 07:55:41 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:be2::1 metric -1) dev utun0

. 2019.02.14 07:55:41 - OpenVPN > /sbin/route add -inet6 fc00:: -prefixlen 7 -iface utun0

. 2019.02.14 07:55:42 - OpenVPN > add net fc00::: gateway utun0

. 2019.02.14 07:55:42 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.226.1, fde6:7a:7d20:be2::1)

. 2019.02.14 07:55:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.226.1, fde6:7a:7d20:be2::1)

. 2019.02.14 07:55:42 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.226.1, fde6:7a:7d20:be2::1)

. 2019.02.14 07:55:42 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.226.1, fde6:7a:7d20:be2::1)

. 2019.02.14 07:55:42 - Routes, added a new route, 192.30.89.142 for gateway 10.15.226.1

. 2019.02.14 07:55:42 - Routes, added a new route, 2606:9580:100:a:ee16:9283:a03e:5f18 for gateway fde6:7a:7d20:be2::1

. 2019.02.14 07:55:42 - Flushing DNS

. 2019.02.14 07:55:43 - macOS - PF rules updated, reloading

I 2019.02.14 07:55:45 - Checking route IPv4

I 2019.02.14 07:55:46 - Checking route IPv6

I 2019.02.14 07:55:46 - Checking DNS

! 2019.02.14 07:55:47 - Connected.

. 2019.02.14 07:55:47 - OpenVPN > Initialization Sequence Completed

 

----------------------------

Network Interfaces and Routes:

 

{

    "support_ipv4": true,

    "support_ipv6": true,

    "routes": [

        {

            "address": "0.0.0.0\/1",

            "gateway": "10.15.226.1",

            "flags": "UGSc",

            "refs": "176",

            "use": "37",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "0.0.0.0\/0",

            "gateway": "192.168.1.254",

            "flags": "UGSc",

            "refs": "1",

            "use": "225",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "10.15.0.226\/24",

            "gateway": "10.15.226.247",

            "flags": "UGSc",

            "refs": "31",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "10.15.226.247",

            "gateway": "10.15.226.247",

            "flags": "UH",

            "refs": "2",

            "use": "25",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "0.0.0.127",

            "gateway": "127.0.0.1",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "127.0.0.1",

            "gateway": "127.0.0.1",

            "flags": "UH",

            "refs": "3",

            "use": "630",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "128.0.0.0\/1",

            "gateway": "10.15.226.1",

            "flags": "UGSc",

            "refs": "91",

            "use": "1",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "169.0.0.254",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.30.89.142",

            "gateway": "10.15.226.1",

            "flags": "UGHS",

            "refs": "0",

            "use": "31",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "192.30.89.144",

            "gateway": "192.168.1.254",

            "flags": "UGSc",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.0.1",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.1.64",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.1.64",

            "gateway": "0:23:df:8c:a0:ae",

            "flags": "UHLWI",

            "refs": "0",

            "use": "2",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "192.168.1.254",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "192.168.1.254",

            "gateway": "9c:1e:95:d2:45:90",

            "flags": "UHLWIir",

            "refs": "3",

            "use": "186",

            "mtu": "1500",

            "interface": "en0",

            "expire": "1163"

        },

        {

            "address": "192.168.1.255",

            "gateway": "ff:ff:ff:ff:ff:ff",

            "flags": "UHLWbI",

            "refs": "0",

            "use": "26",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "224.0.0.0",

            "gateway": "link#4",

            "flags": "UmCS",

            "refs": "2",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "224.0.0.1",

            "gateway": "1:0:5e:0:0:1",

            "flags": "UHmLWI",

            "refs": "0",

            "use": "32",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "224.0.0.251",

            "gateway": "1:0:5e:0:0:fb",

            "flags": "UHmLWI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "255.255.255.255",

            "gateway": "link#4",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "::\/3",

            "gateway": "utun0",

            "flags": "USc",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "::\/0",

            "gateway": "fe80::9e1e:95ff:fed2:4590%en0",

            "flags": "UGc",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "::1",

            "gateway": "::1",

            "flags": "UHL",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "2000::\/4",

            "gateway": "utun0",

            "flags": "USc",

            "refs": "37",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "2001:569:7053:cc00::\/64",

            "gateway": "link#4",

            "flags": "UC",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "2001:569:7053:cc00:223:dfff:fe8c:a0ae",

            "gateway": "0:23:df:8c:a0:ae",

            "flags": "UHL",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "2001:569:7053:cc00:3dc5:ed42:de5a:afa1",

            "gateway": "0:23:df:8c:a0:ae",

            "flags": "UHL",

            "refs": "0",

            "use": "36",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "2606:9580:100:a:ee16:9283:a03e:5f18",

            "gateway": "fde6:7a:7d20:be2::1",

            "flags": "UGHS",

            "refs": "0",

            "use": "15",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "3000::\/4",

            "gateway": "utun0",

            "flags": "USc",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "fc00::\/7",

            "gateway": "utun0",

            "flags": "USc",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "fde6:7a:7d20:be2::\/64",

            "gateway": "fe80::223:dfff:fe8c:a0ae%utun0",

            "flags": "Uc",

            "refs": "2",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "fde6:7a:7d20:be2::10f5",

            "gateway": "link#8",

            "flags": "UHL",

            "refs": "0",

            "use": "1",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::",

            "gateway": "fe80::1%lo0",

            "flags": "UcI",

            "refs": "1",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::1",

            "gateway": "link#1",

            "flags": "UHLI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::",

            "gateway": "link#4",

            "flags": "UCI",

            "refs": "2",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "fe80::223:dfff:fe8c:a0ae",

            "gateway": "0:23:df:8c:a0:ae",

            "flags": "UHLI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::9e1e:95ff:fed2:4590",

            "gateway": "9c:1e:95:d2:45:90",

            "flags": "UHLWIir",

            "refs": "2",

            "use": "7",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "fe80::",

            "gateway": "fe80::223:dfff:fe8c:a0ae%utun0",

            "flags": "UcI",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "fe80::223:dfff:fe8c:a0ae",

            "gateway": "link#8",

            "flags": "UHLI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "ff01::",

            "gateway": "::1",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "ff01::",

            "gateway": "link#4",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "ff01::",

            "gateway": "fe80::223:dfff:fe8c:a0ae%utun0",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        },

        {

            "address": "ff02::",

            "gateway": "::1",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "ff02::",

            "gateway": "link#4",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en0"

        },

        {

            "address": "ff02::",

            "gateway": "fe80::223:dfff:fe8c:a0ae%utun0",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "utun0"

        }

    ],

    "interfaces": [

        {

            "friendly": "lo0",

            "id": "lo0",

            "name": "lo0",

            "description": "lo0",

            "type": "Loopback",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [

                "::1",

                "127.0.0.1",

                "fe80::1"

            ],

            "gateways": [

                "127.0.0.1",

                "::1",

                "fe80::1"

            ],

            "bind": true

        },

        {

            "friendly": "gif0",

            "id": "gif0",

            "name": "gif0",

            "description": "gif0",

            "type": "Unknown",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "stf0",

            "id": "stf0",

            "name": "stf0",

            "description": "stf0",

            "type": "Unknown",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "Ethernet",

            "id": "en0",

            "name": "en0",

            "description": "en0",

            "type": "Ethernet",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [

                "fe80::223:dfff:fe8c:a0ae",

                "2001:569:7053:cc00:223:dfff:fe8c:a0ae",

                "2001:569:7053:cc00:3dc5:ed42:de5a:afa1",

                "192.168.1.64"

            ],

            "gateways": [

                "192.168.1.254",

                "fe80::9e1e:95ff:fed2:4590"

            ],

            "bind": true

        },

        {

            "friendly": "Wi-Fi",

            "id": "en1",

            "name": "en1",

            "description": "en1",

            "type": "Ethernet",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "FireWire",

            "id": "fw0",

            "name": "fw0",

            "description": "fw0",

            "type": "Unknown",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "p2p0",

            "id": "p2p0",

            "name": "p2p0",

            "description": "p2p0",

            "type": "Ethernet",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "utun0",

            "id": "utun0",

            "name": "utun0",

            "description": "utun0",

            "type": "Unknown",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [

                "10.15.226.247",

                "fe80::223:dfff:fe8c:a0ae",

                "fde6:7a:7d20:be2::10f5"

            ],

            "gateways": [

                "10.15.226.1",

                "10.15.226.247",

                "fde6:7a:7d20:be2::1",

                "fe80::223:dfff:fe8c:a0ae"

            ],

            "bind": true

        }

    ],

    "ipv4-default-gateway": "192.168.1.254",

    "ipv4-default-interface": "en0",

    "ipv6-default-gateway": "fe80::9e1e:95ff:fed2:4590",

    "ipv6-default-interface": "en0"

}

----------------------------

ifconfig:

 

lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384

    options=3<RXCSUM,TXCSUM>

    inet6 ::1 prefixlen 128

    inet 127.0.0.1 netmask 0xff000000

    inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1

    nd6 options=1<PERFORMNUD>

gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280

stf0: flags=0<> mtu 1280

en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500

    options=27<RXCSUM,TXCSUM,VLAN_MTU,TSO4>

    ether 00:23:df:8c:a0:ae

    inet6 fe80::223:dfff:fe8c:a0ae%en0 prefixlen 64 scopeid 0x4

    inet6 2001:569:7053:cc00:223:dfff:fe8c:a0ae prefixlen 64 autoconf

    inet6 2001:569:7053:cc00:3dc5:ed42:de5a:afa1 prefixlen 64 autoconf temporary

    inet 192.168.1.64 netmask 0xffffff00 broadcast 192.168.1.255

    nd6 options=1<PERFORMNUD>

    media: autoselect (1000baseT <full-duplex,flow-control>)

    status: active

en1: flags=8823<UP,BROADCAST,SMART,SIMPLEX,MULTICAST> mtu 1500

    ether 00:1f:f3:bd:82:25

    nd6 options=1<PERFORMNUD>

    media: autoselect (<unknown type>)

    status: inactive

fw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 4078

    lladdr 00:23:df:ff:fe:8c:a0:ae

    nd6 options=1<PERFORMNUD>

    media: autoselect <full-duplex>

    status: inactive

p2p0: flags=8802<BROADCAST,SIMPLEX,MULTICAST> mtu 2304

    ether 02:1f:f3:bd:82:25

    media: autoselect

    status: inactive

utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500

    inet 10.15.226.247 --> 10.15.226.247 netmask 0xffffff00

    inet6 fe80::223:dfff:fe8c:a0ae%utun0 prefixlen 64 scopeid 0x8

    inet6 fde6:7a:7d20:be2::10f5 prefixlen 64

    nd6 options=1<PERFORMNUD>

 

For comparison, here is my System log from my MacBook Pro, connecting via wifi and passing the ipv6 tests on ipleak.

 

Eddie System/Environment Report - 2019-02-14 5:02 PM UTC

 

Eddie version: 2.17.2

Eddie OS build: macos_x64

Eddie architecture: x64

OS type: MacOS

OS name: 10.13.6

OS version: Darwin Martys-MacBook-Pro.local 17.7.0 Darwin Kernel Version 17.7.0: Wed Oct 10 23:06:14 PDT 2018; root:xnu-4570.71.13~1/RELEASE_X86_64 x86_64

OS architecture: x64

Mono /.Net Framework: v4.0.30319

OpenVPN driver: Expected

OpenVPN: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

SSH: OpenSSH_7.6p1, LibreSSL 2.6.2 (/usr/bin/ssh)

SSL: stunnel 5.48 (/Applications/Eddie.app/Contents/MacOS/stunnel)

curl: 7.54.0 (/usr/bin/curl)

Profile path: /Users/martytaylor/.airvpn/default.xml

Data path: /Users/martytaylor/.airvpn

Application path: /Applications/Eddie.app/Contents/MacOS

Executable path: /Applications/Eddie.app/Contents/MacOS/Eddie

Command line arguments: (0 args)

Network Lock Active: Yes, macOS - PF

Connected to VPN: Yes, Telescopium

Detected DNS: 10.19.2.1, fde6:7a:7d20:f02::1

Test DNS IPv4: Ok

Test DNS IPv6: Ok

Test Ping IPv4: 183 ms

Test Ping IPv6: 167 ms

Test HTTP IPv4: Ok

Test HTTP IPv6: Ok

Test HTTPS: Ok

----------------------------

Important options not at defaults:

 

login: (omissis)

password: (omissis)

remember: True

key: (omissis)

connect: True

netlock: True

mode.protocol: UDP

mode.alt: 2

dns.check: False

netlock.allow_dns: True

ui.skip.provider.manifest.failed: True

 

----------------------------

Logs:

 

. 2019.02.14 08:58:22 - Eddie version: 2.17.2 / macos_x64, System: MacOS, Name: 10.13.6, Version: Darwin Martys-MacBook-Pro.local 17.7.0 Darwin Kernel Version 17.7.0: Wed Oct 10 23:06:14 PDT 2018; root:xnu-4570.71.13~1/RELEASE_X86_64 x86_64, Mono/.Net: v4.0.30319

. 2019.02.14 08:58:22 - Reading options from /Users.airvpn/default.xml

. 2019.02.14 08:58:23 - Command line arguments (0):

. 2019.02.14 08:58:23 - Profile path: /Users/.airvpn/default.xml

. 2019.02.14 08:58:26 - OpenVPN Driver - Expected

. 2019.02.14 08:58:26 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

. 2019.02.14 08:58:26 - SSH - Version: OpenSSH_7.6p1, LibreSSL 2.6.2 (/usr/bin/ssh)

. 2019.02.14 08:58:26 - SSL - Version: stunnel 5.48 (/Applications/Eddie.app/Contents/MacOS/stunnel)

. 2019.02.14 08:58:26 - curl - Version: 7.54.0 (/usr/bin/curl)

. 2019.02.14 08:58:26 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem

! 2019.02.14 08:58:26 - Activation of Network Lock - macOS - PF

. 2019.02.14 08:58:33 - macOS - PF rules updated, reloading

. 2019.02.14 08:58:38 - Above log line repeated 1 times more

I 2019.02.14 08:58:38 - Ready

I 2019.02.14 08:58:38 - Session starting.

. 2019.02.14 08:58:38 - Collect information about providers ...

. 2019.02.14 08:58:39 - Collect information about AirVPN completed

. 2019.02.14 08:58:43 - macOS - PF rules updated, reloading

I 2019.02.14 08:58:54 - Checking authorization ...

! 2019.02.14 08:58:55 - Connecting to Telescopium (Canada, Vancouver)

. 2019.02.14 08:58:55 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Jul 29 2018

. 2019.02.14 08:58:55 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10

. 2019.02.14 08:58:55 - Connection to OpenVPN Management Interface

. 2019.02.14 08:58:55 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2019.02.14 08:58:55 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key

. 2019.02.14 08:58:55 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication

. 2019.02.14 08:58:55 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key

. 2019.02.14 08:58:55 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication

. 2019.02.14 08:58:55 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.53:443

. 2019.02.14 08:58:55 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2019.02.14 08:58:55 - OpenVPN > UDP link local: (not bound)

. 2019.02.14 08:58:55 - OpenVPN > UDP link remote: [AF_INET]192.30.89.53:443

. 2019.02.14 08:58:55 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.53:443, sid=29cf94a4 233c7099

. 2019.02.14 08:58:55 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2019.02.14 08:58:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2019.02.14 08:58:55 - OpenVPN > VERIFY KU OK

. 2019.02.14 08:58:55 - OpenVPN > Validating certificate extended key usage

. 2019.02.14 08:58:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2019.02.14 08:58:55 - OpenVPN > VERIFY EKU OK

. 2019.02.14 08:58:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Telescopium, emailAddress=info@airvpn.org

. 2019.02.14 08:58:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2019.02.14 08:58:56 - OpenVPN > [Telescopium] Peer Connection Initiated with [AF_INET]192.30.89.53:443

. 2019.02.14 08:58:57 - OpenVPN > SENT CONTROL [Telescopium]: 'PUSH_REQUEST' (status=1)

. 2019.02.14 08:58:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.2.1,dhcp-option DNS6 fde6:7a:7d20:f02::1,tun-ipv6,route-gateway 10.19.2.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:f02::10fb/64 fde6:7a:7d20:f02::1,ifconfig 10.19.2.253 255.255.255.0,peer-id 16,cipher AES-256-GCM'

. 2019.02.14 08:58:57 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'

. 2019.02.14 08:58:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2019.02.14 08:58:57 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2019.02.14 08:58:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2019.02.14 08:58:57 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2019.02.14 08:58:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2019.02.14 08:58:57 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2019.02.14 08:58:57 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2019.02.14 08:58:57 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2019.02.14 08:58:57 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2019.02.14 08:58:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.14 08:58:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2019.02.14 08:58:57 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en1 HWADDR=e4:ce:8f:33:33:72

. 2019.02.14 08:58:57 - OpenVPN > GDG6: remote_host_ipv6=n/a

. 2019.02.14 08:58:57 - OpenVPN > ROUTE6_GATEWAY fe80::9e1e:95ff:fed2:4590 IFACE=en1

. 2019.02.14 08:58:57 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

. 2019.02.14 08:58:57 - OpenVPN > Opened utun device utun1

. 2019.02.14 08:58:57 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1

. 2019.02.14 08:58:57 - OpenVPN > /sbin/ifconfig utun1 delete

. 2019.02.14 08:58:57 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2019.02.14 08:58:57 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2019.02.14 08:58:57 - OpenVPN > /sbin/ifconfig utun1 10.19.2.253 10.19.2.253 netmask 255.255.255.0 mtu 1500 up

. 2019.02.14 08:58:57 - OpenVPN > /sbin/route add -net 10.19.2.0 10.19.2.253 255.255.255.0

. 2019.02.14 08:58:57 - OpenVPN > add net 10.19.2.0: gateway 10.19.2.253

. 2019.02.14 08:58:57 - OpenVPN > /sbin/ifconfig utun1 inet6 fde6:7a:7d20:f02::10fb/64

. 2019.02.14 08:58:57 - OpenVPN > add_route_ipv6(fde6:7a:7d20:f02::/64 -> fde6:7a:7d20:f02::10fb metric 0) dev utun1

. 2019.02.14 08:58:57 - OpenVPN > /sbin/route add -inet6 fde6:7a:7d20:f02:: -prefixlen 64 -iface utun1

. 2019.02.14 08:58:57 - OpenVPN > route: writing to routing socket: File exists

. 2019.02.14 08:58:57 - OpenVPN > add net fde6:7a:7d20:f02::: gateway utun1: File exists

. 2019.02.14 08:58:57 - OpenVPN > /sbin/route add -net 192.30.89.53 192.168.1.254 255.255.255.255

. 2019.02.14 08:58:57 - OpenVPN > add net 192.30.89.53: gateway 192.168.1.254

. 2019.02.14 08:58:57 - OpenVPN > /sbin/route add -net 0.0.0.0 10.19.2.1 128.0.0.0

. 2019.02.14 08:58:57 - OpenVPN > add net 0.0.0.0: gateway 10.19.2.1

. 2019.02.14 08:58:57 - OpenVPN > /sbin/route add -net 128.0.0.0 10.19.2.1 128.0.0.0

. 2019.02.14 08:58:57 - OpenVPN > add net 128.0.0.0: gateway 10.19.2.1

. 2019.02.14 08:58:57 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:f02::1 metric -1) dev utun1

. 2019.02.14 08:58:57 - OpenVPN > /sbin/route add -inet6 :: -prefixlen 3 -iface utun1

. 2019.02.14 08:58:57 - OpenVPN > add net ::: gateway utun1

. 2019.02.14 08:58:57 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:f02::1 metric -1) dev utun1

. 2019.02.14 08:58:57 - OpenVPN > /sbin/route add -inet6 2000:: -prefixlen 4 -iface utun1

. 2019.02.14 08:58:57 - OpenVPN > add net 2000::: gateway utun1

. 2019.02.14 08:58:57 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:f02::1 metric -1) dev utun1

. 2019.02.14 08:58:57 - OpenVPN > /sbin/route add -inet6 3000:: -prefixlen 4 -iface utun1

. 2019.02.14 08:58:57 - OpenVPN > add net 3000::: gateway utun1

. 2019.02.14 08:58:57 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:f02::1 metric -1) dev utun1

. 2019.02.14 08:58:57 - OpenVPN > /sbin/route add -inet6 fc00:: -prefixlen 7 -iface utun1

. 2019.02.14 08:58:57 - OpenVPN > add net fc00::: gateway utun1

. 2019.02.14 08:58:57 - DNS of a network adapter forced (Ethernet, from Automatic to 10.19.2.1, fde6:7a:7d20:f02::1)

. 2019.02.14 08:58:57 - DNS of a network adapter forced (FireWire, from Automatic to 10.19.2.1, fde6:7a:7d20:f02::1)

. 2019.02.14 08:58:58 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.19.2.1, fde6:7a:7d20:f02::1)

. 2019.02.14 08:58:58 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.19.2.1, fde6:7a:7d20:f02::1)

. 2019.02.14 08:58:59 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.19.2.1, fde6:7a:7d20:f02::1)

. 2019.02.14 08:58:59 - Routes, added a new route, 192.30.89.51 for gateway 10.19.2.1

. 2019.02.14 08:58:59 - Routes, added a new route, 2606:9580:100:c:8757:8ee:ec9c:991c for gateway fde6:7a:7d20:f02::1

. 2019.02.14 08:58:59 - Flushing DNS

. 2019.02.14 08:59:00 - macOS - PF rules updated, reloading

I 2019.02.14 08:59:02 - Checking route IPv4

I 2019.02.14 08:59:02 - Checking route IPv6

! 2019.02.14 08:59:02 - Connected.

. 2019.02.14 08:59:02 - OpenVPN > Initialization Sequence Completed

 

----------------------------

Network Interfaces and Routes:

 

{

    "support_ipv4": true,

    "support_ipv6": true,

    "routes": [

        {

            "address": "0.0.0.0\/1",

            "gateway": "10.19.2.1",

            "flags": "UGSc",

            "refs": "137",

            "use": "36",

            "mtu": "1500",

            "interface": "utun1"

        },

        {

            "address": "0.0.0.0\/0",

            "gateway": "192.168.1.254",

            "flags": "UGSc",

            "refs": "0",

            "use": "225",

            "mtu": "1500",

            "interface": "en1"

        },

        {

            "address": "10.19.0.2\/24",

            "gateway": "10.19.2.253",

            "flags": "UGSc",

            "refs": "6",

            "use": "0",

            "mtu": "1500",

            "interface": "utun1"

        },

        {

            "address": "10.19.2.253",

            "gateway": "10.19.2.253",

            "flags": "UH",

            "refs": "2",

            "use": "50",

            "mtu": "1500",

            "interface": "utun1"

        },

        {

            "address": "0.0.0.127",

            "gateway": "127.0.0.1",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "127.0.0.1",

            "gateway": "127.0.0.1",

            "flags": "UH",

            "refs": "4",

            "use": "1246",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "128.0.0.0\/1",

            "gateway": "10.19.2.1",

            "flags": "UGSc",

            "refs": "20",

            "use": "1",

            "mtu": "1500",

            "interface": "utun1"

        },

        {

            "address": "169.0.0.254",

            "gateway": "link#7",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en1"

        },

        {

            "address": "192.30.89.51",

            "gateway": "10.19.2.1",

            "flags": "UGHS",

            "refs": "0",

            "use": "20",

            "mtu": "1500",

            "interface": "utun1"

        },

        {

            "address": "192.30.89.53",

            "gateway": "192.168.1.254",

            "flags": "UGSc",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en1"

        },

        {

            "address": "192.168.0.1",

            "gateway": "link#7",

            "flags": "UCS",

            "refs": "2",

            "use": "0",

            "mtu": "1500",

            "interface": "en1"

        },

        {

            "address": "192.168.1.67",

            "gateway": "f4:4b:2a:94:cb:53",

            "flags": "UHLWI",

            "refs": "0",

            "use": "73",

            "mtu": "1500",

            "interface": "en1",

            "expire": "982"

        },

        {

            "address": "192.168.1.68",

            "gateway": "link#7",

            "flags": "UCS",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en1"

        },

        {

            "address": "192.168.1.68",

            "gateway": "e4:ce:8f:33:33:72",

            "flags": "UHLWI",

            "refs": "0",

            "use": "297",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "192.168.1.254",

            "gateway": "link#7",

            "flags": "UCS",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en1"

        },

        {

            "address": "192.168.1.254",

            "gateway": "9c:1e:95:d2:45:90",

            "flags": "UHLWIir",

            "refs": "4",

            "use": "49",

            "mtu": "1500",

            "interface": "en1",

            "expire": "1171"

        },

        {

            "address": "192.168.1.255",

            "gateway": "ff:ff:ff:ff:ff:ff",

            "flags": "UHLWbI",

            "refs": "0",

            "use": "17",

            "mtu": "1500",

            "interface": "en1"

        },

        {

            "address": "224.0.0.0\/4",

            "gateway": "link#7",

            "flags": "UmCS",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en1"

        },

        {

            "address": "224.0.0.251",

            "gateway": "1:0:5e:0:0:fb",

            "flags": "UHmLWI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en1"

        },

        {

            "address": "255.255.255.255",

            "gateway": "link#7",

            "flags": "UCS",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en1"

        },

        {

            "address": "::\/3",

            "gateway": "utun1",

            "flags": "USc",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "utun1"

        },

        {

            "address": "::\/0",

            "gateway": "fe80::9e1e:95ff:fed2:4590%en1",

            "flags": "UGc",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en1"

        },

        {

            "address": "::\/0",

            "gateway": "fe80::%utun0",

            "flags": "UGcI",

            "refs": "0",

            "use": "0",

            "mtu": "2000",

            "interface": "utun0"

        },

        {

            "address": "::1",

            "gateway": "::1",

            "flags": "UHL",

            "refs": "1",

            "use": "43",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "2000::\/4",

            "gateway": "utun1",

            "flags": "USc",

            "refs": "93",

            "use": "0",

            "mtu": "1500",

            "interface": "utun1"

        },

        {

            "address": "2001:569:7053:cc00::\/64",

            "gateway": "link#7",

            "flags": "UC",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "en1"

        },

        {

            "address": "2001:569:7053:cc00:189d:c22a:e210:c69e",

            "gateway": "e4:ce:8f:33:33:72",

            "flags": "UHL",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "2001:569:7053:cc00:d1a4:e236:cb1e:c99d",

            "gateway": "e4:ce:8f:33:33:72",

            "flags": "UHL",

            "refs": "0",

            "use": "138",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "2606:9580:100:c:8757:8ee:ec9c:991c",

            "gateway": "fde6:7a:7d20:f02::1",

            "flags": "UGHS",

            "refs": "0",

            "use": "20",

            "mtu": "1500",

            "interface": "utun1"

        },

        {

            "address": "3000::\/4",

            "gateway": "utun1",

            "flags": "USc",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "utun1"

        },

        {

            "address": "fc00::\/7",

            "gateway": "utun1",

            "flags": "USc",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "utun1"

        },

        {

            "address": "fde6:7a:7d20:f02::\/64",

            "gateway": "fe80::ca2a:14ff:fe4a:9b6b%utun1",

            "flags": "Uc",

            "refs": "3",

            "use": "0",

            "mtu": "1500",

            "interface": "utun1"

        },

        {

            "address": "fde6:7a:7d20:f02::10fb",

            "gateway": "link#13",

            "flags": "UHL",

            "refs": "0",

            "use": "8",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::",

            "gateway": "fe80::1%lo0",

            "flags": "UcI",

            "refs": "1",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::1",

            "gateway": "link#1",

            "flags": "UHLI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::",

            "gateway": "link#7",

            "flags": "UCI",

            "refs": "2",

            "use": "0",

            "mtu": "1500",

            "interface": "en1"

        },

        {

            "address": "fe80::1474:f29d:e783:dbf0",

            "gateway": "e4:ce:8f:33:33:72",

            "flags": "UHLI",

            "refs": "0",

            "use": "1",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::9e1e:95ff:fed2:4590",

            "gateway": "9c:1e:95:d2:45:90",

            "flags": "UHLWIir",

            "refs": "2",

            "use": "14",

            "mtu": "1500",

            "interface": "en1"

        },

        {

            "address": "fe80::",

            "gateway": "fe80::4883:b6d5:74ae:1d4a%utun0",

            "flags": "UcI",

            "refs": "2",

            "use": "0",

            "mtu": "2000",

            "interface": "utun0"

        },

        {

            "address": "fe80::4883:b6d5:74ae:1d4a",

            "gateway": "link#12",

            "flags": "UHLI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "fe80::",

            "gateway": "fe80::ca2a:14ff:fe4a:9b6b%utun1",

            "flags": "UcI",

            "refs": "1",

            "use": "0",

            "mtu": "1500",

            "interface": "utun1"

        },

        {

            "address": "fe80::ca2a:14ff:fe4a:9b6b",

            "gateway": "link#13",

            "flags": "UHLI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "ff01::",

            "gateway": "::1",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "ff01::",

            "gateway": "link#7",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en1"

        },

        {

            "address": "ff01::",

            "gateway": "fe80::4883:b6d5:74ae:1d4a%utun0",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "2000",

            "interface": "utun0"

        },

        {

            "address": "ff01::",

            "gateway": "fe80::ca2a:14ff:fe4a:9b6b%utun1",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "utun1"

        },

        {

            "address": "ff02::",

            "gateway": "::1",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "16384",

            "interface": "lo0"

        },

        {

            "address": "ff02::",

            "gateway": "link#7",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "en1"

        },

        {

            "address": "ff02::",

            "gateway": "fe80::4883:b6d5:74ae:1d4a%utun0",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "2000",

            "interface": "utun0"

        },

        {

            "address": "ff02::",

            "gateway": "fe80::ca2a:14ff:fe4a:9b6b%utun1",

            "flags": "UmCI",

            "refs": "0",

            "use": "0",

            "mtu": "1500",

            "interface": "utun1"

        }

    ],

    "interfaces": [

        {

            "friendly": "lo0",

            "id": "lo0",

            "name": "lo0",

            "description": "lo0",

            "type": "Loopback",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [

                "127.0.0.1",

                "::1",

                "fe80::1"

            ],

            "gateways": [

                "127.0.0.1",

                "::1",

                "fe80::1"

            ],

            "bind": true

        },

        {

            "friendly": "gif0",

            "id": "gif0",

            "name": "gif0",

            "description": "gif0",

            "type": "Unknown",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "stf0",

            "id": "stf0",

            "name": "stf0",

            "description": "stf0",

            "type": "Unknown",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "EHC250",

            "id": "EHC250",

            "name": "EHC250",

            "description": "EHC250",

            "type": "Unknown",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "EHC253",

            "id": "EHC253",

            "name": "EHC253",

            "description": "EHC253",

            "type": "Unknown",

            "status": "Unknown",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "Ethernet",

            "id": "en0",

            "name": "en0",

            "description": "en0",

            "type": "Ethernet",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "Wi-Fi",

            "id": "en1",

            "name": "en1",

            "description": "en1",

            "type": "Ethernet",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [

                "fe80::1474:f29d:e783:dbf0",

                "2001:569:7053:cc00:189d:c22a:e210:c69e",

                "2001:569:7053:cc00:d1a4:e236:cb1e:c99d",

                "192.168.1.68"

            ],

            "gateways": [

                "192.168.1.254",

                "fe80::9e1e:95ff:fed2:4590"

            ],

            "bind": true

        },

        {

            "friendly": "p2p0",

            "id": "p2p0",

            "name": "p2p0",

            "description": "p2p0",

            "type": "Ethernet",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "Thunderbolt 1",

            "id": "en2",

            "name": "en2",

            "description": "en2",

            "type": "Ethernet",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "FireWire",

            "id": "fw0",

            "name": "fw0",

            "description": "fw0",

            "type": "Unknown",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": false,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "Thunderbolt Bridge",

            "id": "bridge0",

            "name": "bridge0",

            "description": "bridge0",

            "type": "Ethernet",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [],

            "gateways": [],

            "bind": false

        },

        {

            "friendly": "utun0",

            "id": "utun0",

            "name": "utun0",

            "description": "utun0",

            "type": "Unknown",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [

                "fe80::4883:b6d5:74ae:1d4a"

            ],

            "gateways": [

                "fe80::",

                "fe80::4883:b6d5:74ae:1d4a"

            ],

            "bind": true

        },

        {

            "friendly": "utun1",

            "id": "utun1",

            "name": "utun1",

            "description": "utun1",

            "type": "Unknown",

            "status": "Up",

            "bytes_received": "0",

            "bytes_sent": "0",

            "support_ipv4": true,

            "support_ipv6": true,

            "ips": [

                "10.19.2.253",

                "fe80::ca2a:14ff:fe4a:9b6b",

                "fde6:7a:7d20:f02::10fb"

            ],

            "gateways": [

                "10.19.2.1",

                "10.19.2.253",

                "fde6:7a:7d20:f02::1",

                "fe80::ca2a:14ff:fe4a:9b6b"

            ],

            "bind": true

        }

    ],

    "ipv4-default-gateway": "192.168.1.254",

    "ipv4-default-interface": "en1",

    "ipv6-default-gateway": "fe80::9e1e:95ff:fed2:4590",

    "ipv6-default-interface": "en1"

}

----------------------------

ifconfig:

 

lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384

    options=1203<RXCSUM,TXCSUM,TXSTATUS,SW_TIMESTAMP>

    inet 127.0.0.1 netmask 0xff000000

    inet6 ::1 prefixlen 128

    inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1

    nd6 options=201<PERFORMNUD,DAD>

gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280

stf0: flags=0<> mtu 1280

EHC250: flags=0<> mtu 0

EHC253: flags=0<> mtu 0

en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500

    options=10b<RXCSUM,TXCSUM,VLAN_HWTAGGING,AV>

    ether c8:2a:14:4a:9b:6b

    media: autoselect (none)

    status: inactive

en1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500

    ether e4:ce:8f:33:33:72

    inet6 fe80::1474:f29d:e783:dbf0%en1 prefixlen 64 secured scopeid 0x7

    inet6 2001:569:7053:cc00:189d:c22a:e210:c69e prefixlen 64 autoconf secured

    inet6 2001:569:7053:cc00:d1a4:e236:cb1e:c99d prefixlen 64 autoconf temporary

    inet 192.168.1.68 netmask 0xffffff00 broadcast 192.168.1.255

    nd6 options=201<PERFORMNUD,DAD>

    media: autoselect

    status: active

p2p0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 2304

    ether 06:ce:8f:33:33:72

    media: autoselect

    status: inactive

en2: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500

    options=60<TSO4,TSO6>

    ether d2:00:1d:13:bd:40

    media: autoselect <full-duplex>

    status: inactive

fw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 4078

    lladdr c8:2a:14:ff:fe:d1:3b:d4

    media: autoselect <full-duplex>

    status: inactive

bridge0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500

    options=63<RXCSUM,TXCSUM,TSO4,TSO6>

    ether d2:00:1d:13:bd:40

    Configuration:

        id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0

        maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200

        root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0

        ipfilter disabled flags 0x2

    member: en2 flags=3<LEARNING,DISCOVER>

            ifmaxaddr 0 port 9 priority 0 path cost 0

    nd6 options=201<PERFORMNUD,DAD>

    media: <unknown type>

    status: inactive

utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 2000

    inet6 fe80::4883:b6d5:74ae:1d4a%utun0 prefixlen 64 scopeid 0xc

    nd6 options=201<PERFORMNUD,DAD>

utun1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500

    inet 10.19.2.253 --> 10.19.2.253 netmask 0xffffff00

    inet6 fe80::ca2a:14ff:fe4a:9b6b%utun1 prefixlen 64 scopeid 0xd

    inet6 fde6:7a:7d20:f02::10fb prefixlen 64

    nd6 options=201<PERFORMNUD,DAD>

Edited ... by giganerd
Made it readable without scrolling too much

Share this post


Link to post

Anyone else on A Telus T3200M router and running OS X and care to share possibly which options to change on the router to fix the problem. I still pass the ipv6 ipleak test through wifi from my MacBook Pro but still fail from my iMac via ethernet. System Preferences/Network/Advanced shows Configure IPv6 automatically. It shows a Router address and below that, it shows 2 ipv6 addresses. Under DNS it shows both ipv4 and ipv6 addresses.

Share this post


Link to post

Anyone else on A Telus T3200M router and running OS X and care to share possibly which options to change on the router to fix the problem. I still pass the ipv6 ipleak test through wifi from my MacBook Pro but still fail from my iMac via ethernet. System Preferences/Network/Advanced shows Configure IPv6 automatically. It shows a Router address and below that, it shows 2 ipv6 addresses. Under DNS it shows both ipv4 and ipv6 addresses.

 

Well, you gotta love a good mystery!

Share this post


Link to post

 

Anyone else on A Telus T3200M router and running OS X and care to share possibly which options to change on the router to fix the problem. I still pass the ipv6 ipleak test through wifi from my MacBook Pro but still fail from my iMac via ethernet. System Preferences/Network/Advanced shows Configure IPv6 automatically. It shows a Router address and below that, it shows 2 ipv6 addresses. Under DNS it shows both ipv4 and ipv6 addresses.

 

Well, you gotta love a good mystery!

 

OK folks, a little update. I ran the IPleak test on my Safari browser and passed the tests no problem. Since I normally run Firefox on both my iMac and MacBook Pro, and the tests pass on my Pro but not my iMac, I'm assuming it has something to do with an add on I have on Firefox on my iMac that I don't have on my MacBook Pro. When I have time, I will compare addons on both computers and see if I can't narrow down which one is the problem. I'll get back to you later.

Share this post


Link to post

 

 

Anyone else on A Telus T3200M router and running OS X and care to share possibly which options to change on the router to fix the problem. I still pass the ipv6 ipleak test through wifi from my MacBook Pro but still fail from my iMac via ethernet. System Preferences/Network/Advanced shows Configure IPv6 automatically. It shows a Router address and below that, it shows 2 ipv6 addresses. Under DNS it shows both ipv4 and ipv6 addresses.

 

Well, you gotta love a good mystery!

 

OK folks, a little update. I ran the IPleak test on my Safari browser and passed the tests no problem. Since I normally run Firefox on both my iMac and MacBook Pro, and the tests pass on my Pro but not my iMac, I'm assuming it has something to do with an add on I have on Firefox on my iMac that I don't have on my MacBook Pro. When I have time, I will compare addons on both computers and see if I can't narrow down which one is the problem. I'll get back to you later.

 

So, apparently NOT to do with the add-ons. I disabled ALL Firefox add-ons on my iMac, shut down and restarted Firefox but IPleak still shows "IPv6 test not reachable. (error)" and "Fallback: Fail (timeout)". Anyone else have any other ideas?

 

Share this post


Link to post

I have never paid the admittance fee to enter the walled garden of maybe addictive poison apples to hang out with mad rats, so ...

Another ip leak test website which may offer more  info is https://www.doileak.com

The best protocol dissection instruments may be https://www.wireshark.org/

which has a "macOS 10.6 and later Intel 64-bit .dmg" for download.

The promo title is "Wireshark · Go Deep.", and you may learn more than you want to know about moving bits.

Share this post


Link to post

 

 

 

Anyone else on A Telus T3200M router and running OS X and care to share possibly which options to change on the router to fix the problem. I still pass the ipv6 ipleak test through wifi from my MacBook Pro but still fail from my iMac via ethernet. System Preferences/Network/Advanced shows Configure IPv6 automatically. It shows a Router address and below that, it shows 2 ipv6 addresses. Under DNS it shows both ipv4 and ipv6 addresses.

 

Well, you gotta love a good mystery!

 

OK folks, a little update. I ran the IPleak test on my Safari browser and passed the tests no problem. Since I normally run Firefox on both my iMac and MacBook Pro, and the tests pass on my Pro but not my iMac, I'm assuming it has something to do with an add on I have on Firefox on my iMac that I don't have on my MacBook Pro. When I have time, I will compare addons on both computers and see if I can't narrow down which one is the problem. I'll get back to you later.

So, apparently NOT to do with the add-ons. I disabled ALL Firefox add-ons on my iMac, shut down and restarted Firefox but IPleak still shows "IPv6 test not reachable. (error)" and "Fallback: Fail (timeout)". Anyone else have any other ideas?

 

 

Success. I was pondering the fact that in the past I'd made a few changes to the configuration of Firefox and wondered if that may be the problem. Apparently, I had only changed it on Firefox on my iMac and not my MacBook Pro, which is the reason the ipv6 tests worked via wifi on my pro, but not via ethernet on my iMac. So typed about:config in my Firefox browser. Searched for ipv6 and presto. I had changed this setting - "network.dns.disableIPv6" to be true. A quick double click of the line changed it to false and bingo - IPv6 tests are now positive.

Share this post


Link to post
Guest
This topic is now closed to further replies.
Sign in to follow this  

×
×
  • Create New...