0day0 0 Posted ... I have been using AirVPN for while, and suddenly stopped and I couldn't connect to any server could you please help ? Quote Share this post Link to post
OpenSourcerer 1441 Posted ... If you use Eddie, try a connection, then click the lifebelt icon in Logs tab and paste or upload the contents here, please. If you choose to paste it, consider using LOG formatting; it's the top left button in the post editor. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
0day0 0 Posted ... (edited) Eddie System/Environment Report - 4/28/2020 4:59 PM UTC Eddie version: 2.16.3 Eddie OS build: macos_x64 Eddie architecture: x64 OS type: MacOS OS name: 10.15.4 OS version: Darwin Ahmeds-MacBook-Pro.local 19.4.0 Darwin Kernel Version 19.4.0: Wed Mar 4 22:28:40 PST 2020; root:xnu-6153.101.6~15/RELEASE_X86_64 x86_64 OS architecture: x64 Mono /.Net Framework: v4.0.30319 OpenVPN driver: Expected OpenVPN: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (/private/var/folders/8g/hnkf2_vd58nc3bvgsgl_n64m0000gn/T/AppTranslocation/59024EA1-02F7-4B61-8AE7-39FBAF3A0610/d/Eddie.app/Contents/MacOS/openvpn) SSH: OpenSSH_8.1p1, LibreSSL 2.7.3 (/usr/bin/ssh) SSL: stunnel 5.48 (/private/var/folders/8g/hnkf2_vd58nc3bvgsgl_n64m0000gn/T/AppTranslocation/59024EA1-02F7-4B61-8AE7-39FBAF3A0610/d/Eddie.app/Contents/MacOS/stunnel) curl: 7.64.1 (/usr/bin/curl) Profile path: /Users/ahmedmoorsi/.airvpn/default.xml Data path: /Users/ahmedmoorsi/.airvpn Application path: /private/var/folders/8g/hnkf2_vd58nc3bvgsgl_n64m0000gn/T/AppTranslocation/59024EA1-02F7-4B61-8AE7-39FBAF3A0610/d/Eddie.app/Contents/MacOS Executable path: /private/var/folders/8g/hnkf2_vd58nc3bvgsgl_n64m0000gn/T/AppTranslocation/59024EA1-02F7-4B61-8AE7-39FBAF3A0610/d/Eddie.app/Contents/MacOS/Eddie Command line arguments: (1 args) gui.osx.style="dark" Network Lock Active: No Connected to VPN: No Detected DNS: Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 72 ms Test Ping IPv6: -1 ms Test HTTP IPv4: Ok Test HTTP IPv6: Error:curl: (7) Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True ui.skip.provider.manifest.failed: True ---------------------------- Logs: . 2020.04.28 03:06:09 - Eddie version: 2.16.3 / macos_x64, System: MacOS, Name: 10.15.4, Version: Darwin Ahmeds-MacBook-Pro.local 19.4.0 Darwin Kernel Version 19.4.0: Wed Mar 4 22:28:40 PST 2020; root:xnu-6153.101.6~15/RELEASE_X86_64 x86_64, Mono/.Net: v4.0.30319 . 2020.04.28 03:06:09 - Reading options from /Users/ahmedmoorsi/.airvpn/default.xml . 2020.04.28 03:06:10 - Command line arguments (1): gui.osx.style="dark" . 2020.04.28 03:06:10 - Profile path: /Users/ahmedmoorsi/.airvpn/default.xml . 2020.04.28 03:06:12 - OpenVPN Driver - Expected . 2020.04.28 03:06:12 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (/private/var/folders/8g/hnkf2_vd58nc3bvgsgl_n64m0000gn/T/AppTranslocation/59024EA1-02F7-4B61-8AE7-39FBAF3A0610/d/Eddie.app/Contents/MacOS/openvpn) . 2020.04.28 03:06:12 - SSH - Version: OpenSSH_8.1p1, LibreSSL 2.7.3 (/usr/bin/ssh) . 2020.04.28 03:06:12 - SSL - Version: stunnel 5.48 (/private/var/folders/8g/hnkf2_vd58nc3bvgsgl_n64m0000gn/T/AppTranslocation/59024EA1-02F7-4B61-8AE7-39FBAF3A0610/d/Eddie.app/Contents/MacOS/stunnel) . 2020.04.28 03:06:12 - curl - Version: 7.64.1 (/usr/bin/curl) . 2020.04.28 03:06:12 - Certification Authorities: /private/var/folders/8g/hnkf2_vd58nc3bvgsgl_n64m0000gn/T/AppTranslocation/59024EA1-02F7-4B61-8AE7-39FBAF3A0610/d/Eddie.app/Contents/MacOS/../Resources/cacert.pem . 2020.04.28 03:06:12 - Updating systems & servers data ... I 2020.04.28 03:06:12 - Ready . 2020.04.28 03:06:13 - Systems & servers data update completed I 2020.04.28 03:06:20 - Session starting. I 2020.04.28 03:06:20 - Checking authorization ... ! 2020.04.28 03:06:21 - Connecting to Scuti (Netherlands, Alblasserdam) . 2020.04.28 03:06:21 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.6.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Jul 29 2018 . 2020.04.28 03:06:21 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2020.04.28 03:06:21 - Connection to OpenVPN Management Interface . 2020.04.28 03:06:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.04.28 03:06:21 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.04.28 03:06:21 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.04.28 03:06:21 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.04.28 03:06:21 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.04.28 03:06:21 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.157:443 . 2020.04.28 03:06:21 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144] . 2020.04.28 03:06:21 - OpenVPN > UDP link local: (not bound) . 2020.04.28 03:06:21 - OpenVPN > UDP link remote: [AF_INET]134.19.179.157:443 . 2020.04.28 03:06:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2020.04.28 03:06:21 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.157:443, sid=eca69489 0f650a66 . 2020.04.28 03:06:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.04.28 03:06:21 - OpenVPN > VERIFY KU OK . 2020.04.28 03:06:21 - OpenVPN > Validating certificate extended key usage . 2020.04.28 03:06:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.04.28 03:06:21 - OpenVPN > VERIFY EKU OK . 2020.04.28 03:06:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Scuti, emailAddress=info@airvpn.org . 2020.04.28 03:07:24 - OpenVPN > TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) . 2020.04.28 03:07:24 - OpenVPN > TLS Error: TLS handshake failed . 2020.04.28 03:07:24 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2020.04.28 03:07:24 - OpenVPN > Restart pause, 5 second(s) ! 2020.04.28 03:07:24 - Disconnecting . 2020.04.28 03:07:24 - Sending management termination signal . 2020.04.28 03:07:24 - Management - Send 'signal SIGTERM' . 2020.04.28 03:07:24 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.04.28 03:07:24 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2020.04.28 03:07:24 - OpenVpn Management > SUCCESS: signal SIGTERM thrown . 2020.04.28 03:07:24 - Connection terminated. I 2020.04.28 03:07:27 - Checking authorization ... ! 2020.04.28 03:07:28 - Connecting to Alpheratz (Netherlands, Alblasserdam) . 2020.04.28 03:07:28 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.6.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Jul 29 2018 . 2020.04.28 03:07:28 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2020.04.28 03:07:28 - Connection to OpenVPN Management Interface . 2020.04.28 03:07:28 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.04.28 03:07:28 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.04.28 03:07:28 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.04.28 03:07:28 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.04.28 03:07:28 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.04.28 03:07:28 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.179.245:443 . 2020.04.28 03:07:28 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144] . 2020.04.28 03:07:28 - OpenVPN > UDP link local: (not bound) . 2020.04.28 03:07:28 - OpenVPN > UDP link remote: [AF_INET]134.19.179.245:443 . 2020.04.28 03:07:28 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2020.04.28 03:07:28 - OpenVPN > TLS: Initial packet from [AF_INET]134.19.179.245:443, sid=6531f21f 305568ff . 2020.04.28 03:07:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.04.28 03:07:28 - OpenVPN > VERIFY KU OK . 2020.04.28 03:07:28 - OpenVPN > Validating certificate extended key usage . 2020.04.28 03:07:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.04.28 03:07:28 - OpenVPN > VERIFY EKU OK . 2020.04.28 03:07:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alpheratz, emailAddress=info@airvpn.org . 2020.04.28 03:08:28 - OpenVPN > TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) . 2020.04.28 03:08:28 - OpenVPN > TLS Error: TLS handshake failed . 2020.04.28 03:08:28 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2020.04.28 03:08:28 - OpenVPN > Restart pause, 5 second(s) ! 2020.04.28 03:08:28 - Disconnecting . 2020.04.28 03:08:28 - Sending management termination signal . 2020.04.28 03:08:28 - Management - Send 'signal SIGTERM' . 2020.04.28 03:08:28 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.04.28 03:08:28 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2020.04.28 03:08:28 - Connection terminated. I 2020.04.28 03:08:31 - Checking authorization ... ! 2020.04.28 03:08:31 - Connecting to Pyxis (Netherlands, Alblasserdam) . 2020.04.28 03:08:31 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.6.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Jul 29 2018 . 2020.04.28 03:08:31 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2020.04.28 03:08:31 - Connection to OpenVPN Management Interface . 2020.04.28 03:08:31 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.04.28 03:08:31 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.04.28 03:08:31 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.04.28 03:08:31 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.04.28 03:08:31 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.04.28 03:08:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.236:443 . 2020.04.28 03:08:31 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144] . 2020.04.28 03:08:31 - OpenVPN > UDP link local: (not bound) . 2020.04.28 03:08:31 - OpenVPN > UDP link remote: [AF_INET]213.152.161.236:443 . 2020.04.28 03:08:31 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2020.04.28 03:08:31 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.236:443, sid=85a25252 2a3c6d1b . 2020.04.28 03:08:32 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.04.28 03:08:32 - OpenVPN > VERIFY KU OK . 2020.04.28 03:08:32 - OpenVPN > Validating certificate extended key usage . 2020.04.28 03:08:32 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.04.28 03:08:32 - OpenVPN > VERIFY EKU OK . 2020.04.28 03:08:32 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pyxis, emailAddress=info@airvpn.org . 2020.04.28 03:09:32 - OpenVPN > TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) . 2020.04.28 03:09:32 - OpenVPN > TLS Error: TLS handshake failed . 2020.04.28 03:09:32 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2020.04.28 03:09:32 - OpenVPN > Restart pause, 5 second(s) ! 2020.04.28 03:09:32 - Disconnecting . 2020.04.28 03:09:32 - Sending management termination signal . 2020.04.28 03:09:32 - Management - Send 'signal SIGTERM' . 2020.04.28 03:09:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.04.28 03:09:32 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2020.04.28 03:09:32 - Connection terminated. I 2020.04.28 03:09:35 - Checking authorization ... ! 2020.04.28 03:09:35 - Connecting to Cygnus (Netherlands, Alblasserdam) . 2020.04.28 03:09:35 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.6.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Jul 29 2018 . 2020.04.28 03:09:35 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2020.04.28 03:09:35 - Connection to OpenVPN Management Interface . 2020.04.28 03:09:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.04.28 03:09:35 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.04.28 03:09:35 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.04.28 03:09:35 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.04.28 03:09:35 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.04.28 03:09:35 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.161.246:443 . 2020.04.28 03:09:35 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144] . 2020.04.28 03:09:35 - OpenVPN > UDP link local: (not bound) . 2020.04.28 03:09:35 - OpenVPN > UDP link remote: [AF_INET]213.152.161.246:443 . 2020.04.28 03:09:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2020.04.28 03:09:36 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.246:443, sid=bada2c95 1852b83b . 2020.04.28 03:09:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.04.28 03:09:36 - OpenVPN > VERIFY KU OK . 2020.04.28 03:09:36 - OpenVPN > Validating certificate extended key usage . 2020.04.28 03:09:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.04.28 03:09:36 - OpenVPN > VERIFY EKU OK . 2020.04.28 03:09:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cygnus, emailAddress=info@airvpn.org . 2020.04.28 03:10:44 - OpenVPN > TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) . 2020.04.28 03:10:44 - OpenVPN > TLS Error: TLS handshake failed . 2020.04.28 03:10:44 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2020.04.28 03:10:44 - OpenVPN > Restart pause, 5 second(s) . 2020.04.28 03:10:44 - OpenVPN > All connections have been connect-retry-max (1) times unsuccessful, exiting . 2020.04.28 03:10:44 - OpenVPN > Exiting due to fatal error ! 2020.04.28 03:10:44 - Disconnecting . 2020.04.28 03:10:44 - Connection terminated. I 2020.04.28 03:10:47 - Checking authorization ... ! 2020.04.28 03:10:47 - Connecting to Garnet (Netherlands, Alblasserdam) . 2020.04.28 03:10:47 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.6.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Jul 29 2018 . 2020.04.28 03:10:47 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2020.04.28 03:10:47 - Connection to OpenVPN Management Interface . 2020.04.28 03:10:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.04.28 03:10:47 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.04.28 03:10:47 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.04.28 03:10:47 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.04.28 03:10:47 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.04.28 03:10:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.76:443 . 2020.04.28 03:10:47 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144] . 2020.04.28 03:10:47 - OpenVPN > UDP link local: (not bound) . 2020.04.28 03:10:47 - OpenVPN > UDP link remote: [AF_INET]213.152.162.76:443 . 2020.04.28 03:10:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2020.04.28 03:10:48 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.76:443, sid=c96c5e4e 05cf5c34 . 2020.04.28 03:10:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.04.28 03:10:48 - OpenVPN > VERIFY KU OK . 2020.04.28 03:10:48 - OpenVPN > Validating certificate extended key usage . 2020.04.28 03:10:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.04.28 03:10:48 - OpenVPN > VERIFY EKU OK . 2020.04.28 03:10:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Garnet, emailAddress=info@airvpn.org ! 2020.04.28 03:10:48 - Disconnecting . 2020.04.28 03:10:48 - Sending management termination signal . 2020.04.28 03:10:48 - Management - Send 'signal SIGTERM' . 2020.04.28 03:10:48 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.04.28 03:10:48 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.04.28 03:10:53 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.04.28 03:10:53 - Connection terminated. I 2020.04.28 03:10:53 - Cancel requested. ! 2020.04.28 03:10:53 - Session terminated. . 2020.04.28 03:23:20 - Updating systems & servers data ... . 2020.04.28 03:23:21 - Systems & servers data update completed . 2020.04.28 03:38:09 - Updating systems & servers data ... . 2020.04.28 03:38:10 - Systems & servers data update completed . 2020.04.28 03:54:18 - Updating systems & servers data ... . 2020.04.28 03:54:19 - Systems & servers data update completed I 2020.04.28 03:55:10 - Session starting. I 2020.04.28 03:55:10 - Checking authorization ... ! 2020.04.28 03:55:11 - Connecting to Ancha (Netherlands, Alblasserdam) . 2020.04.28 03:55:11 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.6.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Jul 29 2018 . 2020.04.28 03:55:11 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2020.04.28 03:55:11 - Connection to OpenVPN Management Interface . 2020.04.28 03:55:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.04.28 03:55:11 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.04.28 03:55:11 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.04.28 03:55:11 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.04.28 03:55:11 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.04.28 03:55:11 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.167:443 . 2020.04.28 03:55:11 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144] . 2020.04.28 03:55:11 - OpenVPN > UDP link local: (not bound) . 2020.04.28 03:55:11 - OpenVPN > UDP link remote: [AF_INET]213.152.162.167:443 . 2020.04.28 03:55:11 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2020.04.28 03:55:11 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.167:443, sid=b07027b3 00765a32 . 2020.04.28 03:55:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.04.28 03:55:11 - OpenVPN > VERIFY KU OK . 2020.04.28 03:55:11 - OpenVPN > Validating certificate extended key usage . 2020.04.28 03:55:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.04.28 03:55:11 - OpenVPN > VERIFY EKU OK . 2020.04.28 03:55:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Ancha, emailAddress=info@airvpn.org . 2020.04.28 03:56:18 - OpenVPN > TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) . 2020.04.28 03:56:18 - OpenVPN > TLS Error: TLS handshake failed . 2020.04.28 03:56:18 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2020.04.28 03:56:18 - OpenVPN > Restart pause, 5 second(s) . 2020.04.28 03:56:18 - OpenVPN > All connections have been connect-retry-max (1) times unsuccessful, exiting . 2020.04.28 03:56:18 - OpenVPN > Exiting due to fatal error ! 2020.04.28 03:56:18 - Disconnecting . 2020.04.28 03:56:18 - Connection terminated. I 2020.04.28 03:56:22 - Checking authorization ... ! 2020.04.28 03:56:22 - Connecting to Subra (Netherlands, Alblasserdam) . 2020.04.28 03:56:22 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.6.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Jul 29 2018 . 2020.04.28 03:56:22 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2020.04.28 03:56:22 - Connection to OpenVPN Management Interface . 2020.04.28 03:56:22 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2020.04.28 03:56:22 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.04.28 03:56:22 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.04.28 03:56:22 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.04.28 03:56:22 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.04.28 03:56:22 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]213.152.162.101:443 . 2020.04.28 03:56:22 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144] . 2020.04.28 03:56:22 - OpenVPN > UDP link local: (not bound) . 2020.04.28 03:56:22 - OpenVPN > UDP link remote: [AF_INET]213.152.162.101:443 . 2020.04.28 03:56:22 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2020.04.28 03:56:22 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.101:443, sid=3e903759 99bb787e . 2020.04.28 03:56:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.04.28 03:56:23 - OpenVPN > VERIFY KU OK . 2020.04.28 03:56:23 - OpenVPN > Validating certificate extended key usage . 2020.04.28 03:56:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.04.28 03:56:23 - OpenVPN > VERIFY EKU OK . 2020.04.28 03:56:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Subra, emailAddress=info@airvpn.org ! 2020.04.28 03:56:38 - Disconnecting . 2020.04.28 03:56:38 - Sending management termination signal . 2020.04.28 03:56:38 - Management - Send 'signal SIGTERM' . 2020.04.28 03:56:38 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2020.04.28 03:56:38 - OpenVPN > SIGTERM received, sending exit notification to peer . 2020.04.28 03:56:43 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2020.04.28 03:56:43 - Connection terminated. I 2020.04.28 03:56:43 - Cancel requested. ! 2020.04.28 03:56:43 - Session terminated. . 2020.04.28 04:08:06 - Updating systems & servers data ... . 2020.04.28 04:08:07 - Systems & servers data update completed . 2020.04.28 08:10:50 - Updating systems & servers data ... . 2020.04.28 08:10:52 - Systems & servers data update completed . 2020.04.28 08:25:14 - Updating systems & servers data ... . 2020.04.28 08:25:15 - Systems & servers data update completed . 2020.04.28 18:29:46 - Updating systems & servers data ... . 2020.04.28 18:29:47 - Systems & servers data update completed . 2020.04.28 18:59:06 - Updating systems & servers data ... . 2020.04.28 18:59:08 - Systems & servers data update completed ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/0", "gateway": "192.168.1.1", "flags": "192.168.1.5", "refs": "UGSc", "use": "107", "mtu": "12", "interface": "1453", "expire": "en0" }, { "address": "0.0.0.127", "gateway": "127.0.0.1", "flags": "127.0.0.1", "refs": "UCS", "use": "0", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "127.0.0.1", "gateway": "127.0.0.1", "flags": "127.0.0.1", "refs": "UH", "use": "1", "mtu": "5403", "interface": "16384", "expire": "lo0" }, { "address": "169.0.0.254", "gateway": "link#4", "flags": "192.168.1.5", "refs": "UCS", "use": "3", "mtu": "0", "interface": "1453", "expire": "en0" }, { "address": "192.168.0.1", "gateway": "link#4", "flags": "192.168.1.5", "refs": "UCS", "use": "2", "mtu": "0", "interface": "1453", "expire": "en0" }, { "address": "192.168.1.1", "gateway": "link#4", "flags": "192.168.1.5", "refs": "UCS", "use": "1", "mtu": "0", "interface": "1453", "expire": "en0" }, { "address": "192.168.1.1", "gateway": "58:d7:59:b4:64:ca", "flags": "192.168.1.5", "refs": "UHLWIir", "use": "34", "mtu": "13", "interface": "1453", "expire": "en0" }, { "address": "192.168.1.3", "gateway": "e4:9a:dc:7e:4e:dd", "flags": "192.168.1.5", "refs": "UHLWIi", "use": "1", "mtu": "8", "interface": "1453", "expire": "en0" }, { "address": "192.168.1.5", "gateway": "link#4", "flags": "192.168.1.5", "refs": "UCS", "use": "1", "mtu": "0", "interface": "1453", "expire": "en0" }, { "address": "192.168.1.5", "gateway": "4c:32:75:96:31:3b", "flags": "192.168.1.5", "refs": "UHLWI", "use": "0", "mtu": "10", "interface": "16384", "expire": "lo0" }, { "address": "192.168.1.255", "gateway": "ff:ff:ff:ff:ff:ff", "flags": "192.168.1.5", "refs": "UHLWbI", "use": "0", "mtu": "3", "interface": "1453", "expire": "en0" }, { "address": "224.0.0.0\/4", "gateway": "link#4", "flags": "192.168.1.5", "refs": "UmCS", "use": "2", "mtu": "0", "interface": "1453", "expire": "en0" }, { "address": "224.0.0.251", "gateway": "1:0:5e:0:0:fb", "flags": "192.168.1.5", "refs": "UHmLWI", "use": "0", "mtu": "0", "interface": "1453", "expire": "en0" }, { "address": "239.255.255.250", "gateway": "1:0:5e:7f:ff:fa", "flags": "192.168.1.5", "refs": "UHmLWI", "use": "0", "mtu": "6", "interface": "1453", "expire": "en0" }, { "address": "255.255.255.255", "gateway": "link#4", "flags": "192.168.1.5", "refs": "UCS", "use": "1", "mtu": "0", "interface": "1453", "expire": "en0" }, { "address": "255.255.255.255", "gateway": "ff:ff:ff:ff:ff:ff", "flags": "192.168.1.5", "refs": "UHLWbI", "use": "0", "mtu": "1", "interface": "1453", "expire": "en0" }, { "address": "::\/0", "gateway": "fe80::%utun0", "flags": "fe80::a639:f171:ec25:393%utun0", "refs": "UGcI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun0" }, { "address": "::\/0", "gateway": "fe80::%utun1", "flags": "fe80::ab90:942c:7f30:ec38%utun1", "refs": "UGcI", "use": "0", "mtu": "0", "interface": "2000", "expire": "utun1" }, { "address": "::\/0", "gateway": "fe80::%utun2", "flags": "fe80::db0:6b79:e9f2:b31%utun2", "refs": "UGcI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun2" }, { "address": "::\/0", "gateway": "fe80::%utun3", "flags": "fe80::52f7:5d96:97d:62c7%utun3", "refs": "UGcI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun3" }, { "address": "::\/0", "gateway": "fe80::%utun4", "flags": "fe80::6e16:46fd:9d02:1e66%utun4", "refs": "UGcI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun4" }, { "address": "::\/0", "gateway": "fe80::%utun5", "flags": "fe80::5926:fe25:1776:3de7%utun5", "refs": "UGcI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun5" }, { "address": "::1", "gateway": "::1", "flags": "::1", "refs": "UHL", "use": "1", "mtu": "8", "interface": "16384", "expire": "lo0" }, { "address": "fd58:d759:b464:ca00:149d:3b46:af9c:d356", "gateway": "4c:32:75:96:31:3b", "flags": "fd58:d759:b464:ca00:149d:3b46:af9c:d356", "refs": "UHL", "use": "0", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fd58:d759:b464:ca00:c17c:8f5a:e91f:fa5", "gateway": "4c:32:75:96:31:3b", "flags": "fd58:d759:b464:ca00:c17c:8f5a:e91f:fa5", "refs": "UHL", "use": "0", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fe80::", "gateway": "fe80::1%lo0", "flags": "fe80::1%lo0", "refs": "UcI", "use": "1", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fe80::1", "gateway": "link#1", "flags": "fe80::1%lo0", "refs": "UHLI", "use": "0", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fe80::", "gateway": "link#4", "flags": "fe80::183b:d336:dfe0:3ed3%en0", "refs": "UCI", "use": "2", "mtu": "0", "interface": "1453", "expire": "en0" }, { "address": "fe80::1", "gateway": "58:d7:59:b4:64:ca", "flags": "fe80::183b:d336:dfe0:3ed3%en0", "refs": "UHLWIr", "use": "0", "mtu": "2", "interface": "1453", "expire": "en0" }, { "address": "fe80::183b:d336:dfe0:3ed3", "gateway": "4c:32:75:96:31:3b", "flags": "fe80::183b:d336:dfe0:3ed3%en0", "refs": "UHLI", "use": "1", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fe80::", "gateway": "link#9", "flags": "fe80::f0a9:90ff:fe7f:93e5%awdl0", "refs": "UCI", "use": "1", "mtu": "0", "interface": "1484", "expire": "awdl0" }, { "address": "fe80::f0a9:90ff:fe7f:93e5", "gateway": "f2:a9:90:7f:93:e5", "flags": "fe80::f0a9:90ff:fe7f:93e5%awdl0", "refs": "UHLI", "use": "1", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fe80::", "gateway": "link#10", "flags": "fe80::f0a9:90ff:fe7f:93e5%llw0", "refs": "UCI", "use": "1", "mtu": "0", "interface": "1500", "expire": "llw0" }, { "address": "fe80::f0a9:90ff:fe7f:93e5", "gateway": "f2:a9:90:7f:93:e5", "flags": "fe80::f0a9:90ff:fe7f:93e5%llw0", "refs": "UHLI", "use": "1", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fe80::", "gateway": "fe80::a639:f171:ec25:393%utun0", "flags": "fe80::a639:f171:ec25:393%utun0", "refs": "UcI", "use": "2", "mtu": "0", "interface": "1380", "expire": "utun0" }, { "address": "fe80::a639:f171:ec25:393", "gateway": "link#11", "flags": "fe80::a639:f171:ec25:393%utun0", "refs": "UHLI", "use": "1", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fe80::", "gateway": "fe80::ab90:942c:7f30:ec38%utun1", "flags": "fe80::ab90:942c:7f30:ec38%utun1", "refs": "UcI", "use": "2", "mtu": "0", "interface": "2000", "expire": "utun1" }, { "address": "fe80::ab90:942c:7f30:ec38", "gateway": "link#12", "flags": "fe80::ab90:942c:7f30:ec38%utun1", "refs": "UHLI", "use": "1", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fe80::", "gateway": "fe80::db0:6b79:e9f2:b31%utun2", "flags": "fe80::db0:6b79:e9f2:b31%utun2", "refs": "UcI", "use": "3", "mtu": "0", "interface": "1380", "expire": "utun2" }, { "address": "fe80::db0:6b79:e9f2:b31", "gateway": "link#13", "flags": "fe80::db0:6b79:e9f2:b31%utun2", "refs": "UHLI", "use": "0", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fe80::", "gateway": "fe80::52f7:5d96:97d:62c7%utun3", "flags": "fe80::52f7:5d96:97d:62c7%utun3", "refs": "UcI", "use": "3", "mtu": "0", "interface": "1380", "expire": "utun3" }, { "address": "fe80::52f7:5d96:97d:62c7", "gateway": "link#14", "flags": "fe80::52f7:5d96:97d:62c7%utun3", "refs": "UHLI", "use": "0", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fe80::", "gateway": "fe80::6e16:46fd:9d02:1e66%utun4", "flags": "fe80::6e16:46fd:9d02:1e66%utun4", "refs": "UcI", "use": "2", "mtu": "0", "interface": "1380", "expire": "utun4" }, { "address": "fe80::6e16:46fd:9d02:1e66", "gateway": "link#15", "flags": "fe80::6e16:46fd:9d02:1e66%utun4", "refs": "UHLI", "use": "0", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fe80::", "gateway": "fe80::5926:fe25:1776:3de7%utun5", "flags": "fe80::5926:fe25:1776:3de7%utun5", "refs": "UcI", "use": "2", "mtu": "0", "interface": "1380", "expire": "utun5" }, { "address": "fe80::5926:fe25:1776:3de7", "gateway": "link#16", "flags": "fe80::5926:fe25:1776:3de7%utun5", "refs": "UHLI", "use": "0", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "ff01::", "gateway": "::1", "flags": "::1", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "ff01::", "gateway": "link#4", "flags": "fe80::183b:d336:dfe0:3ed3%en0", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1453", "expire": "en0" }, { "address": "ff01::", "gateway": "link#9", "flags": "fe80::f0a9:90ff:fe7f:93e5%awdl0", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1484", "expire": "awdl0" }, { "address": "ff01::", "gateway": "link#10", "flags": "fe80::f0a9:90ff:fe7f:93e5%llw0", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1500", "expire": "llw0" }, { "address": "ff01::", "gateway": "fe80::a639:f171:ec25:393%utun0", "flags": "fe80::a639:f171:ec25:393%utun0", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun0" }, { "address": "ff01::", "gateway": "fe80::ab90:942c:7f30:ec38%utun1", "flags": "fe80::ab90:942c:7f30:ec38%utun1", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "2000", "expire": "utun1" }, { "address": "ff01::", "gateway": "fe80::db0:6b79:e9f2:b31%utun2", "flags": "fe80::db0:6b79:e9f2:b31%utun2", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun2" }, { "address": "ff01::", "gateway": "fe80::52f7:5d96:97d:62c7%utun3", "flags": "fe80::52f7:5d96:97d:62c7%utun3", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun3" }, { "address": "ff01::", "gateway": "fe80::6e16:46fd:9d02:1e66%utun4", "flags": "fe80::6e16:46fd:9d02:1e66%utun4", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun4" }, { "address": "ff01::", "gateway": "fe80::5926:fe25:1776:3de7%utun5", "flags": "fe80::5926:fe25:1776:3de7%utun5", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun5" }, { "address": "ff02::", "gateway": "::1", "flags": "::1", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "ff02::", "gateway": "link#4", "flags": "fe80::183b:d336:dfe0:3ed3%en0", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1453", "expire": "en0" }, { "address": "ff02::", "gateway": "link#9", "flags": "fe80::f0a9:90ff:fe7f:93e5%awdl0", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1484", "expire": "awdl0" }, { "address": "ff02::", "gateway": "link#10", "flags": "fe80::f0a9:90ff:fe7f:93e5%llw0", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1500", "expire": "llw0" }, { "address": "ff02::", "gateway": "fe80::a639:f171:ec25:393%utun0", "flags": "fe80::a639:f171:ec25:393%utun0", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun0" }, { "address": "ff02::", "gateway": "fe80::ab90:942c:7f30:ec38%utun1", "flags": "fe80::ab90:942c:7f30:ec38%utun1", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "2000", "expire": "utun1" }, { "address": "ff02::", "gateway": "fe80::db0:6b79:e9f2:b31%utun2", "flags": "fe80::db0:6b79:e9f2:b31%utun2", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun2" }, { "address": "ff02::", "gateway": "fe80::52f7:5d96:97d:62c7%utun3", "flags": "fe80::52f7:5d96:97d:62c7%utun3", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun3" }, { "address": "ff02::", "gateway": "fe80::6e16:46fd:9d02:1e66%utun4", "flags": "fe80::6e16:46fd:9d02:1e66%utun4", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun4" }, { "address": "ff02::", "gateway": "fe80::5926:fe25:1776:3de7%utun5", "flags": "fe80::5926:fe25:1776:3de7%utun5", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun5" } ], "interfaces": [ { "friendly": "lo0", "id": "lo0", "name": "lo0", "description": "lo0", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "127.0.0.1", "::1", "fe80::1" ], "gateways": [ "127.0.0.1" ], "bind": true }, { "friendly": "gif0", "id": "gif0", "name": "gif0", "description": "gif0", "type": "Unknown", "status": "Unknown", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "gateways": [], "bind": false }, { "friendly": "stf0", "id": "stf0", "name": "stf0", "description": "stf0", "type": "Unknown", "status": "Unknown", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "gateways": [], "bind": false }, { "friendly": "Wi-Fi", "id": "en0", "name": "en0", "description": "en0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::183b:d336:dfe0:3ed3", "192.168.1.5", "fd58:d759:b464:ca00:149d:3b46:af9c:d356", "fd58:d759:b464:ca00:c17c:8f5a:e91f:fa5" ], "gateways": [ "192.168.1.1" ], "bind": true }, { "friendly": "Thunderbolt 1", "id": "en1", "name": "en1", "description": "en1", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "gateways": [], "bind": false }, { "friendly": "Thunderbolt 2", "id": "en2", "name": "en2", "description": "en2", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "gateways": [], "bind": false }, { "friendly": "Thunderbolt Bridge", "id": "bridge0", "name": "bridge0", "description": "bridge0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "gateways": [], "bind": false }, { "friendly": "p2p0", "id": "p2p0", "name": "p2p0", "description": "p2p0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "gateways": [], "bind": false }, { "friendly": "awdl0", "id": "awdl0", "name": "awdl0", "description": "awdl0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::f0a9:90ff:fe7f:93e5" ], "gateways": [], "bind": true }, { "friendly": "llw0", "id": "llw0", "name": "llw0", "description": "llw0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::f0a9:90ff:fe7f:93e5" ], "gateways": [], "bind": true }, { "friendly": "utun0", "id": "utun0", "name": "utun0", "description": "utun0", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::a639:f171:ec25:393" ], "gateways": [], "bind": true }, { "friendly": "utun1", "id": "utun1", "name": "utun1", "description": "utun1", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::ab90:942c:7f30:ec38" ], "gateways": [], "bind": true }, { "friendly": "utun2", "id": "utun2", "name": "utun2", "description": "utun2", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::db0:6b79:e9f2:b31" ], "gateways": [], "bind": true }, { "friendly": "utun3", "id": "utun3", "name": "utun3", "description": "utun3", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::52f7:5d96:97d:62c7" ], "gateways": [], "bind": true }, { "friendly": "utun4", "id": "utun4", "name": "utun4", "description": "utun4", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::6e16:46fd:9d02:1e66" ], "gateways": [], "bind": true }, { "friendly": "utun5", "id": "utun5", "name": "utun5", "description": "utun5", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::5926:fe25:1776:3de7" ], "gateways": [], "bind": true } ], "ipv4-default-gateway": "192.168.1.1", "ipv4-default-interface": "en0" } ---------------------------- ifconfig: lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384 options=1203<RXCSUM,TXCSUM,TXSTATUS,SW_TIMESTAMP> inet 127.0.0.1 netmask 0xff000000 inet6 ::1 prefixlen 128 inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1 nd6 options=201<PERFORMNUD,DAD> gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280 stf0: flags=0<> mtu 1280 en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1453 options=400<CHANNEL_IO> ether 4c:32:75:96:31:3b inet6 fe80::183b:d336:dfe0:3ed3%en0 prefixlen 64 secured scopeid 0x4 inet 192.168.1.5 netmask 0xffffff00 broadcast 192.168.1.255 inet6 fd58:d759:b464:ca00:149d:3b46:af9c:d356 prefixlen 64 autoconf secured inet6 fd58:d759:b464:ca00:c17c:8f5a:e91f:fa5 prefixlen 64 autoconf temporary nd6 options=201<PERFORMNUD,DAD> media: autoselect status: active en1: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500 options=460<TSO4,TSO6,CHANNEL_IO> ether 82:17:0b:73:5c:00 media: autoselect <full-duplex> status: inactive en2: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500 options=460<TSO4,TSO6,CHANNEL_IO> ether 82:17:0b:73:5c:01 media: autoselect <full-duplex> status: inactive bridge0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=63<RXCSUM,TXCSUM,TSO4,TSO6> ether 82:17:0b:73:5c:00 Configuration: id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0 maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200 root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0 ipfilter disabled flags 0x0 member: en1 flags=3<LEARNING,DISCOVER> ifmaxaddr 0 port 5 priority 0 path cost 0 member: en2 flags=3<LEARNING,DISCOVER> ifmaxaddr 0 port 6 priority 0 path cost 0 nd6 options=201<PERFORMNUD,DAD> media: <unknown type> status: inactive p2p0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 2304 options=400<CHANNEL_IO> ether 0e:32:75:96:31:3b media: autoselect status: inactive awdl0: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1484 options=400<CHANNEL_IO> ether f2:a9:90:7f:93:e5 inet6 fe80::f0a9:90ff:fe7f:93e5%awdl0 prefixlen 64 scopeid 0x9 nd6 options=201<PERFORMNUD,DAD> media: autoselect status: active llw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=400<CHANNEL_IO> ether f2:a9:90:7f:93:e5 inet6 fe80::f0a9:90ff:fe7f:93e5%llw0 prefixlen 64 scopeid 0xa nd6 options=201<PERFORMNUD,DAD> media: autoselect status: active utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380 inet6 fe80::a639:f171:ec25:393%utun0 prefixlen 64 scopeid 0xb nd6 options=201<PERFORMNUD,DAD> utun1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 2000 inet6 fe80::ab90:942c:7f30:ec38%utun1 prefixlen 64 scopeid 0xc nd6 options=201<PERFORMNUD,DAD> utun2: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380 inet6 fe80::db0:6b79:e9f2:b31%utun2 prefixlen 64 scopeid 0xd nd6 options=201<PERFORMNUD,DAD> utun3: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380 inet6 fe80::52f7:5d96:97d:62c7%utun3 prefixlen 64 scopeid 0xe nd6 options=201<PERFORMNUD,DAD> utun4: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380 inet6 fe80::6e16:46fd:9d02:1e66%utun4 prefixlen 64 scopeid 0xf nd6 options=201<PERFORMNUD,DAD> utun5: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380 inet6 fe80::5926:fe25:1776:3de7%utun5 prefixlen 64 scopeid 0x10 nd6 options=201<PERFORMNUD,DAD> Edited ... by giganerd Apply LOG formatting to logs Quote Share this post Link to post
OpenSourcerer 1441 Posted ... First of all, update Eddie. Maybe it's enough to fix it. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
0day0 0 Posted ... (edited) Eddie System/Environment Report - 4/29/2020 - 11:11 PM UTC Eddie version: 2.18.9 Eddie OS build: macos_x64 Eddie architecture: x64 OS type: MacOS OS name: macOS 10.15.4 OS version: 10.15.4 (Build 19E287) OS architecture: x64 Mono /.Net Framework: v4.0.30319 TUN driver: Expected OpenVPN: 2.4.8 - OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 (/private/var/folders/8g/hnkf2_vd58nc3bvgsgl_n64m0000gn/T/AppTranslocation/9CF9A33A-426D-4D1D-ADFA-4CA08E4E045B/d/Eddie 2.app/Contents/MacOS/openvpn) Hummingbird: 3.3.2 - Hummingbird - AirVPN OpenVPN 3 Client 1.0.2 - 4 February 2020 (/private/var/folders/8g/hnkf2_vd58nc3bvgsgl_n64m0000gn/T/AppTranslocation/9CF9A33A-426D-4D1D-ADFA-4CA08E4E045B/d/Eddie 2.app/Contents/MacOS/hummingbird) SSH: OpenSSH_8.1p1, LibreSSL 2.7.3 (/usr/bin/ssh) SSL: stunnel 5.48 (/private/var/folders/8g/hnkf2_vd58nc3bvgsgl_n64m0000gn/T/AppTranslocation/9CF9A33A-426D-4D1D-ADFA-4CA08E4E045B/d/Eddie 2.app/Contents/MacOS/stunnel) curl: 7.64.1 (/usr/bin/curl) Profile path: /Users/ahmedmoorsi/.config/eddie/default.profile Data path: /Users/ahmedmoorsi/.config/eddie Application path: /private/var/folders/8g/hnkf2_vd58nc3bvgsgl_n64m0000gn/T/AppTranslocation/9CF9A33A-426D-4D1D-ADFA-4CA08E4E045B/d/Eddie 2.app/Contents/MacOS Executable path: /private/var/folders/8g/hnkf2_vd58nc3bvgsgl_n64m0000gn/T/AppTranslocation/9CF9A33A-426D-4D1D-ADFA-4CA08E4E045B/d/Eddie 2.app/Contents/MacOS/Eddie Command line arguments: (0 args) Network Lock Active: No Connected to VPN: No Detected DNS: 8.8.4.4, 8.8.8.8 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: -1 ms Test Ping IPv6: -1 ms Test HTTP IPv4: Ok Test HTTP IPv6: Error:curl: (7) Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True servers.whitelist: 5020f8fa85152b998199565de6559a50e026bc6effbddc30129e031ec4c5d0ed areas.whitelist: us ui.skip.provider.manifest.failed: True ---------------------------- Logs: . 2020.04.30 01:09:36 - Eddie version: 2.18.9 / macos_x64, System: MacOS, Name: macOS 10.15.4, Version: 10.15.4 (Build 19E287), Mono/.Net: v4.0.30319 . 2020.04.30 01:09:36 - Command line arguments (0): . 2020.04.30 01:09:36 - Raise system privileges . 2020.04.30 01:09:42 - Profile path: /Users/ahmedmoorsi/.config/eddie/default.profile . 2020.04.30 01:09:43 - Reading options from /Users/ahmedmoorsi/.config/eddie/default.profile . 2020.04.30 01:09:44 - Tun Driver - Expected . 2020.04.30 01:09:44 - OpenVPN - Version: 2.4.8 - OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 (/private/var/folders/8g/hnkf2_vd58nc3bvgsgl_n64m0000gn/T/AppTranslocation/9CF9A33A-426D-4D1D-ADFA-4CA08E4E045B/d/Eddie 2.app/Contents/MacOS/openvpn) . 2020.04.30 01:09:44 - SSH - Version: OpenSSH_8.1p1, LibreSSL 2.7.3 (/usr/bin/ssh) . 2020.04.30 01:09:44 - SSL - Version: stunnel 5.48 (/private/var/folders/8g/hnkf2_vd58nc3bvgsgl_n64m0000gn/T/AppTranslocation/9CF9A33A-426D-4D1D-ADFA-4CA08E4E045B/d/Eddie 2.app/Contents/MacOS/stunnel) . 2020.04.30 01:09:44 - curl - Version: 7.64.1 (/usr/bin/curl) I 2020.04.30 01:09:44 - Ready . 2020.04.30 01:09:46 - Collect information about AirVPN completed I 2020.04.30 01:09:53 - Session starting. I 2020.04.30 01:09:53 - Checking authorization ... ! 2020.04.30 01:09:53 - Connecting to Diadema (Belgium, Brussels) . 2020.04.30 01:09:53 - OpenVPN > OpenVPN 2.4.8 x86_64-apple-darwin17.7.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Nov 22 2019 . 2020.04.30 01:09:53 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.04.30 01:09:53 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.04.30 01:09:53 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.04.30 01:09:53 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.04.30 01:09:53 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.04.30 01:09:53 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.165:443 . 2020.04.30 01:09:53 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144] . 2020.04.30 01:09:53 - OpenVPN > UDP link local: (not bound) . 2020.04.30 01:09:53 - OpenVPN > UDP link remote: [AF_INET]194.187.251.165:443 . 2020.04.30 01:09:53 - OpenVPN > TLS: Initial packet from [AF_INET]194.187.251.165:443, sid=196410bf 59bca2f6 . 2020.04.30 01:09:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.04.30 01:09:54 - OpenVPN > VERIFY KU OK . 2020.04.30 01:09:54 - OpenVPN > Validating certificate extended key usage . 2020.04.30 01:09:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.04.30 01:09:54 - OpenVPN > VERIFY EKU OK . 2020.04.30 01:09:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Diadema, emailAddress=info@airvpn.org . 2020.04.30 01:10:53 - OpenVPN > TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) . 2020.04.30 01:10:53 - OpenVPN > TLS Error: TLS handshake failed . 2020.04.30 01:10:53 - OpenVPN > SIGUSR1[soft,tls-error] received, process restarting . 2020.04.30 01:10:53 - OpenVPN > Restart pause, 5 second(s) ! 2020.04.30 01:10:53 - Disconnecting . 2020.04.30 01:10:53 - Sending soft termination signal . 2020.04.30 01:10:53 - OpenVPN > SIGINT[hard,init_instance] received, process exiting . 2020.04.30 01:10:53 - Connection terminated. I 2020.04.30 01:10:56 - Checking authorization ... ! 2020.04.30 01:10:57 - Connecting to Diadema (Belgium, Brussels) . 2020.04.30 01:10:57 - OpenVPN > OpenVPN 2.4.8 x86_64-apple-darwin17.7.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Nov 22 2019 . 2020.04.30 01:10:57 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.04.30 01:10:57 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.04.30 01:10:57 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.04.30 01:10:57 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.04.30 01:10:57 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.04.30 01:10:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]194.187.251.165:443 . 2020.04.30 01:10:57 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144] . 2020.04.30 01:10:57 - OpenVPN > UDP link local: (not bound) . 2020.04.30 01:10:57 - OpenVPN > UDP link remote: [AF_INET]194.187.251.165:443 . 2020.04.30 01:10:58 - OpenVPN > TLS: Initial packet from [AF_INET]194.187.251.165:443, sid=97750303 41c78231 . 2020.04.30 01:10:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.04.30 01:10:58 - OpenVPN > VERIFY KU OK . 2020.04.30 01:10:58 - OpenVPN > Validating certificate extended key usage . 2020.04.30 01:10:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.04.30 01:10:58 - OpenVPN > VERIFY EKU OK . 2020.04.30 01:10:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Diadema, emailAddress=info@airvpn.org ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/0", "gateway": "192.168.1.1", "flags": "192.168.1.5", "refs": "UGSc", "use": "147", "mtu": "2157", "interface": "1453", "expire": "en0" }, { "address": "0.0.0.127", "gateway": "127.0.0.1", "flags": "127.0.0.1", "refs": "UCS", "use": "0", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "127.0.0.1", "gateway": "127.0.0.1", "flags": "127.0.0.1", "refs": "UH", "use": "3", "mtu": "7676", "interface": "16384", "expire": "lo0" }, { "address": "169.0.0.254", "gateway": "link#4", "flags": "192.168.1.5", "refs": "UCS", "use": "3", "mtu": "0", "interface": "1453", "expire": "en0" }, { "address": "192.168.0.1", "gateway": "link#4", "flags": "192.168.1.5", "refs": "UCS", "use": "4", "mtu": "0", "interface": "1453", "expire": "en0" }, { "address": "192.168.1.1", "gateway": "link#4", "flags": "192.168.1.5", "refs": "UCS", "use": "2", "mtu": "0", "interface": "1453", "expire": "en0" }, { "address": "192.168.1.1", "gateway": "58:d7:59:b4:64:ca", "flags": "192.168.1.5", "refs": "UHLWIir", "use": "63", "mtu": "26", "interface": "1453", "expire": "en0" }, { "address": "192.168.1.4", "gateway": "link#4", "flags": "192.168.1.5", "refs": "UHLWIi", "use": "1", "mtu": "9", "interface": "1453", "expire": "en0" }, { "address": "192.168.1.5", "gateway": "link#4", "flags": "192.168.1.5", "refs": "UCS", "use": "1", "mtu": "0", "interface": "1453", "expire": "en0" }, { "address": "192.168.1.5", "gateway": "4c:32:75:96:31:3b", "flags": "192.168.1.5", "refs": "UHLWI", "use": "0", "mtu": "10", "interface": "16384", "expire": "lo0" }, { "address": "192.168.1.7", "gateway": "38:68:a4:5c:b9:b7", "flags": "192.168.1.5", "refs": "UHLWIi", "use": "1", "mtu": "54", "interface": "1453", "expire": "en0" }, { "address": "192.168.1.10", "gateway": "f8:6f:c1:86:aa:bb", "flags": "192.168.1.5", "refs": "UHLWI", "use": "0", "mtu": "0", "interface": "1453", "expire": "en0" }, { "address": "192.168.1.255", "gateway": "ff:ff:ff:ff:ff:ff", "flags": "192.168.1.5", "refs": "UHLWbI", "use": "0", "mtu": "9", "interface": "1453", "expire": "en0" }, { "address": "224.0.0.0\/4", "gateway": "link#4", "flags": "192.168.1.5", "refs": "UmCS", "use": "2", "mtu": "0", "interface": "1453", "expire": "en0" }, { "address": "224.0.0.251", "gateway": "1:0:5e:0:0:fb", "flags": "192.168.1.5", "refs": "UHmLWI", "use": "0", "mtu": "1", "interface": "1453", "expire": "en0" }, { "address": "239.255.255.250", "gateway": "1:0:5e:7f:ff:fa", "flags": "192.168.1.5", "refs": "UHmLWI", "use": "0", "mtu": "53", "interface": "1453", "expire": "en0" }, { "address": "255.255.255.255", "gateway": "link#4", "flags": "192.168.1.5", "refs": "UCS", "use": "1", "mtu": "0", "interface": "1453", "expire": "en0" }, { "address": "255.255.255.255", "gateway": "ff:ff:ff:ff:ff:ff", "flags": "192.168.1.5", "refs": "UHLWbI", "use": "0", "mtu": "3", "interface": "1453", "expire": "en0" }, { "address": "::\/0", "gateway": "fe80::%utun0", "flags": "fe80::a639:f171:ec25:393%utun0", "refs": "UGcI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun0" }, { "address": "::\/0", "gateway": "fe80::%utun1", "flags": "fe80::ab90:942c:7f30:ec38%utun1", "refs": "UGcI", "use": "0", "mtu": "0", "interface": "2000", "expire": "utun1" }, { "address": "::\/0", "gateway": "fe80::%utun2", "flags": "fe80::db0:6b79:e9f2:b31%utun2", "refs": "UGcI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun2" }, { "address": "::\/0", "gateway": "fe80::%utun3", "flags": "fe80::52f7:5d96:97d:62c7%utun3", "refs": "UGcI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun3" }, { "address": "::\/0", "gateway": "fe80::%utun4", "flags": "fe80::6e16:46fd:9d02:1e66%utun4", "refs": "UGcI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun4" }, { "address": "::\/0", "gateway": "fe80::%utun5", "flags": "fe80::5926:fe25:1776:3de7%utun5", "refs": "UGcI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun5" }, { "address": "::1", "gateway": "::1", "flags": "::1", "refs": "UHL", "use": "1", "mtu": "22", "interface": "16384", "expire": "lo0" }, { "address": "fd58:d759:b464:ca00:11d4:9f13:5816:d3ee", "gateway": "4c:32:75:96:31:3b", "flags": "fd58:d759:b464:ca00:11d4:9f13:5816:d3ee", "refs": "UHL", "use": "0", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fd58:d759:b464:ca00:149d:3b46:af9c:d356", "gateway": "4c:32:75:96:31:3b", "flags": "fd58:d759:b464:ca00:149d:3b46:af9c:d356", "refs": "UHL", "use": "0", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fe80::", "gateway": "fe80::1%lo0", "flags": "fe80::1%lo0", "refs": "UcI", "use": "1", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fe80::1", "gateway": "link#1", "flags": "fe80::1%lo0", "refs": "UHLI", "use": "0", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fe80::", "gateway": "link#4", "flags": "fe80::183b:d336:dfe0:3ed3%en0", "refs": "UCI", "use": "4", "mtu": "0", "interface": "1453", "expire": "en0" }, { "address": "fe80::1", "gateway": "58:d7:59:b4:64:ca", "flags": "fe80::183b:d336:dfe0:3ed3%en0", "refs": "UHLWIr", "use": "0", "mtu": "4", "interface": "1453", "expire": "en0" }, { "address": "fe80::183b:d336:dfe0:3ed3", "gateway": "4c:32:75:96:31:3b", "flags": "fe80::183b:d336:dfe0:3ed3%en0", "refs": "UHLI", "use": "0", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fe80::3a68:a4ff:fe5c:b9b7", "gateway": "38:68:a4:5c:b9:b7", "flags": "fe80::183b:d336:dfe0:3ed3%en0", "refs": "UHLWI", "use": "0", "mtu": "2", "interface": "1453", "expire": "en0" }, { "address": "fe80::", "gateway": "link#9", "flags": "fe80::f0a9:90ff:fe7f:93e5%awdl0", "refs": "UCI", "use": "1", "mtu": "0", "interface": "1484", "expire": "awdl0" }, { "address": "fe80::f0a9:90ff:fe7f:93e5", "gateway": "f2:a9:90:7f:93:e5", "flags": "fe80::f0a9:90ff:fe7f:93e5%awdl0", "refs": "UHLI", "use": "1", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fe80::", "gateway": "link#10", "flags": "fe80::f0a9:90ff:fe7f:93e5%llw0", "refs": "UCI", "use": "1", "mtu": "0", "interface": "1500", "expire": "llw0" }, { "address": "fe80::f0a9:90ff:fe7f:93e5", "gateway": "f2:a9:90:7f:93:e5", "flags": "fe80::f0a9:90ff:fe7f:93e5%llw0", "refs": "UHLI", "use": "0", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fe80::", "gateway": "fe80::a639:f171:ec25:393%utun0", "flags": "fe80::a639:f171:ec25:393%utun0", "refs": "UcI", "use": "2", "mtu": "0", "interface": "1380", "expire": "utun0" }, { "address": "fe80::a639:f171:ec25:393", "gateway": "link#11", "flags": "fe80::a639:f171:ec25:393%utun0", "refs": "UHLI", "use": "1", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fe80::", "gateway": "fe80::ab90:942c:7f30:ec38%utun1", "flags": "fe80::ab90:942c:7f30:ec38%utun1", "refs": "UcI", "use": "2", "mtu": "0", "interface": "2000", "expire": "utun1" }, { "address": "fe80::ab90:942c:7f30:ec38", "gateway": "link#12", "flags": "fe80::ab90:942c:7f30:ec38%utun1", "refs": "UHLI", "use": "1", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fe80::", "gateway": "fe80::db0:6b79:e9f2:b31%utun2", "flags": "fe80::db0:6b79:e9f2:b31%utun2", "refs": "UcI", "use": "3", "mtu": "0", "interface": "1380", "expire": "utun2" }, { "address": "fe80::db0:6b79:e9f2:b31", "gateway": "link#13", "flags": "fe80::db0:6b79:e9f2:b31%utun2", "refs": "UHLI", "use": "0", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fe80::", "gateway": "fe80::52f7:5d96:97d:62c7%utun3", "flags": "fe80::52f7:5d96:97d:62c7%utun3", "refs": "UcI", "use": "3", "mtu": "0", "interface": "1380", "expire": "utun3" }, { "address": "fe80::52f7:5d96:97d:62c7", "gateway": "link#14", "flags": "fe80::52f7:5d96:97d:62c7%utun3", "refs": "UHLI", "use": "0", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fe80::", "gateway": "fe80::6e16:46fd:9d02:1e66%utun4", "flags": "fe80::6e16:46fd:9d02:1e66%utun4", "refs": "UcI", "use": "2", "mtu": "0", "interface": "1380", "expire": "utun4" }, { "address": "fe80::6e16:46fd:9d02:1e66", "gateway": "link#15", "flags": "fe80::6e16:46fd:9d02:1e66%utun4", "refs": "UHLI", "use": "0", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "fe80::", "gateway": "fe80::5926:fe25:1776:3de7%utun5", "flags": "fe80::5926:fe25:1776:3de7%utun5", "refs": "UcI", "use": "2", "mtu": "0", "interface": "1380", "expire": "utun5" }, { "address": "fe80::5926:fe25:1776:3de7", "gateway": "link#16", "flags": "fe80::5926:fe25:1776:3de7%utun5", "refs": "UHLI", "use": "0", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "ff01::", "gateway": "::1", "flags": "::1", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "ff01::", "gateway": "link#4", "flags": "fe80::183b:d336:dfe0:3ed3%en0", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1453", "expire": "en0" }, { "address": "ff01::", "gateway": "link#9", "flags": "fe80::f0a9:90ff:fe7f:93e5%awdl0", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1484", "expire": "awdl0" }, { "address": "ff01::", "gateway": "link#10", "flags": "fe80::f0a9:90ff:fe7f:93e5%llw0", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1500", "expire": "llw0" }, { "address": "ff01::", "gateway": "fe80::a639:f171:ec25:393%utun0", "flags": "fe80::a639:f171:ec25:393%utun0", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun0" }, { "address": "ff01::", "gateway": "fe80::ab90:942c:7f30:ec38%utun1", "flags": "fe80::ab90:942c:7f30:ec38%utun1", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "2000", "expire": "utun1" }, { "address": "ff01::", "gateway": "fe80::db0:6b79:e9f2:b31%utun2", "flags": "fe80::db0:6b79:e9f2:b31%utun2", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun2" }, { "address": "ff01::", "gateway": "fe80::52f7:5d96:97d:62c7%utun3", "flags": "fe80::52f7:5d96:97d:62c7%utun3", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun3" }, { "address": "ff01::", "gateway": "fe80::6e16:46fd:9d02:1e66%utun4", "flags": "fe80::6e16:46fd:9d02:1e66%utun4", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun4" }, { "address": "ff01::", "gateway": "fe80::5926:fe25:1776:3de7%utun5", "flags": "fe80::5926:fe25:1776:3de7%utun5", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun5" }, { "address": "ff02::", "gateway": "::1", "flags": "::1", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "16384", "expire": "lo0" }, { "address": "ff02::", "gateway": "link#4", "flags": "fe80::183b:d336:dfe0:3ed3%en0", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1453", "expire": "en0" }, { "address": "ff02::", "gateway": "link#9", "flags": "fe80::f0a9:90ff:fe7f:93e5%awdl0", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1484", "expire": "awdl0" }, { "address": "ff02::", "gateway": "link#10", "flags": "fe80::f0a9:90ff:fe7f:93e5%llw0", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1500", "expire": "llw0" }, { "address": "ff02::", "gateway": "fe80::a639:f171:ec25:393%utun0", "flags": "fe80::a639:f171:ec25:393%utun0", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun0" }, { "address": "ff02::", "gateway": "fe80::ab90:942c:7f30:ec38%utun1", "flags": "fe80::ab90:942c:7f30:ec38%utun1", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "2000", "expire": "utun1" }, { "address": "ff02::", "gateway": "fe80::db0:6b79:e9f2:b31%utun2", "flags": "fe80::db0:6b79:e9f2:b31%utun2", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun2" }, { "address": "ff02::", "gateway": "fe80::52f7:5d96:97d:62c7%utun3", "flags": "fe80::52f7:5d96:97d:62c7%utun3", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun3" }, { "address": "ff02::", "gateway": "fe80::6e16:46fd:9d02:1e66%utun4", "flags": "fe80::6e16:46fd:9d02:1e66%utun4", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun4" }, { "address": "ff02::", "gateway": "fe80::5926:fe25:1776:3de7%utun5", "flags": "fe80::5926:fe25:1776:3de7%utun5", "refs": "UmCI", "use": "0", "mtu": "0", "interface": "1380", "expire": "utun5" } ], "interfaces": [ { "friendly": "lo0", "id": "lo0", "name": "lo0", "description": "lo0", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "127.0.0.1", "::1", "fe80::1" ], "gateways": [ "127.0.0.1" ], "bind": true }, { "friendly": "gif0", "id": "gif0", "name": "gif0", "description": "gif0", "type": "Unknown", "status": "Unknown", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "gateways": [], "bind": false }, { "friendly": "stf0", "id": "stf0", "name": "stf0", "description": "stf0", "type": "Unknown", "status": "Unknown", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "gateways": [], "bind": false }, { "friendly": "Wi-Fi", "id": "en0", "name": "en0", "description": "en0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::183b:d336:dfe0:3ed3", "192.168.1.5", "fd58:d759:b464:ca00:149d:3b46:af9c:d356", "fd58:d759:b464:ca00:11d4:9f13:5816:d3ee" ], "gateways": [ "192.168.1.1" ], "bind": true }, { "friendly": "Thunderbolt 1", "id": "en1", "name": "en1", "description": "en1", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "gateways": [], "bind": false }, { "friendly": "Thunderbolt 2", "id": "en2", "name": "en2", "description": "en2", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "gateways": [], "bind": false }, { "friendly": "Thunderbolt Bridge", "id": "bridge0", "name": "bridge0", "description": "bridge0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "gateways": [], "bind": false }, { "friendly": "p2p0", "id": "p2p0", "name": "p2p0", "description": "p2p0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "gateways": [], "bind": false }, { "friendly": "awdl0", "id": "awdl0", "name": "awdl0", "description": "awdl0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::f0a9:90ff:fe7f:93e5" ], "gateways": [], "bind": true }, { "friendly": "llw0", "id": "llw0", "name": "llw0", "description": "llw0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::f0a9:90ff:fe7f:93e5" ], "gateways": [], "bind": true }, { "friendly": "utun0", "id": "utun0", "name": "utun0", "description": "utun0", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::a639:f171:ec25:393" ], "gateways": [], "bind": true }, { "friendly": "utun1", "id": "utun1", "name": "utun1", "description": "utun1", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::ab90:942c:7f30:ec38" ], "gateways": [], "bind": true }, { "friendly": "utun2", "id": "utun2", "name": "utun2", "description": "utun2", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::db0:6b79:e9f2:b31" ], "gateways": [], "bind": true }, { "friendly": "utun3", "id": "utun3", "name": "utun3", "description": "utun3", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::52f7:5d96:97d:62c7" ], "gateways": [], "bind": true }, { "friendly": "utun4", "id": "utun4", "name": "utun4", "description": "utun4", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::6e16:46fd:9d02:1e66" ], "gateways": [], "bind": true }, { "friendly": "utun5", "id": "utun5", "name": "utun5", "description": "utun5", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::5926:fe25:1776:3de7" ], "gateways": [], "bind": true } ], "ipv4-default-gateway": "192.168.1.1", "ipv4-default-interface": "en0" } ---------------------------- ifconfig: lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384 options=1203<RXCSUM,TXCSUM,TXSTATUS,SW_TIMESTAMP> inet 127.0.0.1 netmask 0xff000000 inet6 ::1 prefixlen 128 inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1 nd6 options=201<PERFORMNUD,DAD> gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280 stf0: flags=0<> mtu 1280 en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1453 options=400<CHANNEL_IO> ether 4c:32:75:96:31:3b inet6 fe80::183b:d336:dfe0:3ed3%en0 prefixlen 64 secured scopeid 0x4 inet 192.168.1.5 netmask 0xffffff00 broadcast 192.168.1.255 inet6 fd58:d759:b464:ca00:149d:3b46:af9c:d356 prefixlen 64 autoconf secured inet6 fd58:d759:b464:ca00:11d4:9f13:5816:d3ee prefixlen 64 autoconf temporary nd6 options=201<PERFORMNUD,DAD> media: autoselect status: active en1: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500 options=460<TSO4,TSO6,CHANNEL_IO> ether 82:17:0b:73:5c:00 media: autoselect <full-duplex> status: inactive en2: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500 options=460<TSO4,TSO6,CHANNEL_IO> ether 82:17:0b:73:5c:01 media: autoselect <full-duplex> status: inactive bridge0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=63<RXCSUM,TXCSUM,TSO4,TSO6> ether 82:17:0b:73:5c:00 Configuration: id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0 maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200 root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0 ipfilter disabled flags 0x0 member: en1 flags=3<LEARNING,DISCOVER> ifmaxaddr 0 port 5 priority 0 path cost 0 member: en2 flags=3<LEARNING,DISCOVER> ifmaxaddr 0 port 6 priority 0 path cost 0 nd6 options=201<PERFORMNUD,DAD> media: <unknown type> status: inactive p2p0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 2304 options=400<CHANNEL_IO> ether 0e:32:75:96:31:3b media: autoselect status: inactive awdl0: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1484 options=400<CHANNEL_IO> ether f2:a9:90:7f:93:e5 inet6 fe80::f0a9:90ff:fe7f:93e5%awdl0 prefixlen 64 scopeid 0x9 nd6 options=201<PERFORMNUD,DAD> media: autoselect status: active llw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=400<CHANNEL_IO> ether f2:a9:90:7f:93:e5 inet6 fe80::f0a9:90ff:fe7f:93e5%llw0 prefixlen 64 scopeid 0xa nd6 options=201<PERFORMNUD,DAD> media: autoselect status: active utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380 inet6 fe80::a639:f171:ec25:393%utun0 prefixlen 64 scopeid 0xb nd6 options=201<PERFORMNUD,DAD> utun1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 2000 inet6 fe80::ab90:942c:7f30:ec38%utun1 prefixlen 64 scopeid 0xc nd6 options=201<PERFORMNUD,DAD> utun2: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380 inet6 fe80::db0:6b79:e9f2:b31%utun2 prefixlen 64 scopeid 0xd nd6 options=201<PERFORMNUD,DAD> utun3: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380 inet6 fe80::52f7:5d96:97d:62c7%utun3 prefixlen 64 scopeid 0xe nd6 options=201<PERFORMNUD,DAD> utun4: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380 inet6 fe80::6e16:46fd:9d02:1e66%utun4 prefixlen 64 scopeid 0xf nd6 options=201<PERFORMNUD,DAD> utun5: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380 inet6 fe80::5926:fe25:1776:3de7%utun5 prefixlen 64 scopeid 0x10 nd6 options=201<PERFORMNUD,DAD> Edited ... by giganerd Apply LOG formatting to logs Quote Share this post Link to post
0day0 0 Posted ... i have updated to latest version and same problem Quote Share this post Link to post
OpenSourcerer 1441 Posted ... 13 hours ago, 0day0 said: . 2020.04.30 01:09:53 - OpenVPN > TLS: Initial packet from [AF_INET]194.187.251.165:443, sid=196410bf 59bca2f6 This line proves that your ISP isn't blocking anything. Have you tried other ports and protocols? Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post
0day0 0 Posted ... it works when I change ports and protocols, thank you Quote Share this post Link to post
OpenSourcerer 1441 Posted ... Can you please state which combination started to work for you? Would be helpful for future readers. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post