Jump to content
Not connected, Your IP: 52.90.49.108
beholdbenefit

Cant Connect. Any suggestions appreciated

Recommended Posts

I have a 2015 macbook air running high sierra. Im not sure what version of Eddie I am using for but i downloaded a new version less than a month ago. 

My computer was running eddie/vpn just fine when ithe computer abruptly shut down (i have battery problems long story). From what I remember of this client if Eddie is shut down improperly it has a tendency to block any internet upon restarting and the solution is to start up Eddie close it properly then restart the computer. I have done this many times to no avail. 

Interestingly I am only ever allowed to even get to the eddie window upon startup. I have it so that the computer starts up eddie upon startup and this is the only way I can even attempt to connect. If i decline the prompt to begin a connection at startup, then later on start up eddie, i get the error message: 

"Unable to obtain elevated privileges (required) Unable to start (Client not allowed Unable to obtain signature of local)

i have no idea what this means, or how it came about, or how to prevent it and an explanation would be very much appreciated. 

When I do try to connect, here are the logs: 

I 2017.12.31 19:26:20 - Eddie version: 2.13.6 / macos_x64, System: MacOS, Name: 10.13.6, Version: Darwin MrButtonss-MacBook-Air.local 17.7.0 Darwin Kernel Version 17.7.0: Thu Jun 21 22:53:14 PDT 2018; root:xnu-4570.71.2~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319

. 2017.12.31 19:26:20 - Reading options from /Users/MrButtons/.airvpn/AirVPN.xml

. 2017.12.31 19:26:21 - Command line arguments (1): gui.osx.style="dark"

I 2017.12.31 19:26:23 - OpenVPN Driver - Expected

I 2017.12.31 19:26:23 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/VPN/Eddie.app/Contents/MacOS/openvpn)

I 2017.12.31 19:26:23 - SSH - Version: OpenSSH_7.6p1, LibreSSL 2.6.2 (/usr/bin/ssh)

I 2017.12.31 19:26:23 - SSL - Version: stunnel 5.40 (/Applications/VPN/Eddie.app/Contents/MacOS/stunnel)

I 2017.12.31 19:26:23 - curl - Version: 7.54.0 (/usr/bin/curl)

I 2017.12.31 19:26:23 - Certification Authorities: /Applications/VPN/Eddie.app/Contents/MacOS/cacert.pem

! 2017.12.31 19:26:23 - Activation of Network Lock - OS X - PF

. 2017.12.31 19:26:23 - OS X - PF rules updated, reloading

. 2017.12.31 19:26:23 - Updating systems & servers data ...

. 2017.12.31 19:26:23 - OS X - PF rules updated, reloading

! 2017.12.31 19:26:23 - Ready

. 2017.12.31 19:26:24 - Systems & servers data update completed

! 2017.12.31 19:26:30 - Deactivation of Network Lock

I 2017.12.31 19:26:43 - Checking login ...

! 2017.12.31 19:26:44 - Logged in.

! 2017.12.31 19:27:59 - Logged out.

I 2017.12.31 19:28:00 - Checking login ...

! 2017.12.31 19:28:00 - Logged in.

I 2017.12.31 19:28:09 - Session starting.

. 2017.12.31 19:28:09 - IPv6 disabled on network adapter (Wi-Fi)

. 2017.12.31 19:28:09 - IPv6 disabled on network adapter (Bluetooth PAN)

. 2017.12.31 19:28:09 - IPv6 disabled on network adapter (Thunderbolt Bridge)

I 2017.12.31 19:28:09 - Checking authorization ...

! 2017.12.31 19:28:10 - Connecting to Alya (Canada, Toronto, Ontario)

. 2017.12.31 19:28:10 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017

. 2017.12.31 19:28:10 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2017.12.31 19:28:10 - Connection to OpenVPN Management Interface

. 2017.12.31 19:28:10 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

W 2017.12.31 19:28:10 - OpenVPN > WARNING: Your certificate is not yet valid!

. 2017.12.31 19:28:10 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.12.31 19:28:10 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.12.31 19:28:10 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.170:443

. 2017.12.31 19:28:10 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2017.12.31 19:28:10 - OpenVPN > UDP link local: (not bound)

. 2017.12.31 19:28:10 - OpenVPN > UDP link remote: [AF_INET]184.75.221.170:443

. 2017.12.31 19:28:10 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.170:443, sid=55eb7001 7e8347e0

. 2017.12.31 19:28:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.12.31 19:28:10 - OpenVPN > VERIFY KU OK

. 2017.12.31 19:28:10 - OpenVPN > Validating certificate extended key usage

. 2017.12.31 19:28:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.12.31 19:28:10 - OpenVPN > VERIFY EKU OK

. 2017.12.31 19:28:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alya, emailAddress=info@airvpn.org

. 2017.12.31 19:28:10 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2017.12.31 19:28:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.12.31 19:28:10 - OpenVPN > [Alya] Peer Connection Initiated with [AF_INET]184.75.221.170:443

. 2017.12.31 19:28:11 - OpenVPN > SENT CONTROL [Alya]: 'PUSH_REQUEST' (status=1)

. 2017.12.31 19:28:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.8.164.1,route-gateway 10.8.164.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.8.164.137 255.255.255.0,peer-id 1,cipher AES-256-GCM'

. 2017.12.31 19:28:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2017.12.31 19:28:11 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2017.12.31 19:28:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2017.12.31 19:28:11 - OpenVPN > OPTIONS IMPORT: route options modified

. 2017.12.31 19:28:11 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2017.12.31 19:28:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2017.12.31 19:28:11 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2017.12.31 19:28:11 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2017.12.31 19:28:11 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2017.12.31 19:28:11 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2017.12.31 19:28:11 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2017.12.31 19:28:11 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2017.12.31 19:28:11 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 IFACE=en0 HWADDR=c4:b3:01:90:16:e2

. 2017.12.31 19:28:11 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy

. 2017.12.31 19:28:11 - OpenVPN > Opened utun device utun1

. 2017.12.31 19:28:11 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2017.12.31 19:28:11 - OpenVPN > /sbin/ifconfig utun1 delete

. 2017.12.31 19:28:11 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2017.12.31 19:28:11 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2017.12.31 19:28:11 - OpenVPN > /sbin/ifconfig utun1 10.8.164.137 10.8.164.137 netmask 255.255.255.0 mtu 1500 up

. 2017.12.31 19:28:11 - OpenVPN > /sbin/route add -net 10.8.164.0 10.8.164.137 255.255.255.0

. 2017.12.31 19:28:12 - OpenVPN > add net 10.8.164.0: gateway 10.8.164.137

. 2017.12.31 19:28:12 - OpenVPN > /sbin/route add -net 184.75.221.170 10.0.0.1 255.255.255.255

. 2017.12.31 19:28:12 - OpenVPN > add net 184.75.221.170: gateway 10.0.0.1

. 2017.12.31 19:28:12 - OpenVPN > /sbin/route add -net 0.0.0.0 10.8.164.1 128.0.0.0

. 2017.12.31 19:28:12 - OpenVPN > add net 0.0.0.0: gateway 10.8.164.1

. 2017.12.31 19:28:12 - OpenVPN > /sbin/route add -net 128.0.0.0 10.8.164.1 128.0.0.0

. 2017.12.31 19:28:12 - OpenVPN > add net 128.0.0.0: gateway 10.8.164.1

. 2017.12.31 19:28:12 - DNS of a network adapter forced (Wi-Fi, from 10.6.198.1, fde6:7a:7d20:2c6::1 to 10.8.164.1)

. 2017.12.31 19:28:12 - DNS of a network adapter forced (Bluetooth PAN, from 10.6.198.1, fde6:7a:7d20:2c6::1 to 10.8.164.1)

. 2017.12.31 19:28:12 - DNS of a network adapter forced (Thunderbolt Bridge, from 10.6.198.1, fde6:7a:7d20:2c6::1 to 10.8.164.1)

. 2017.12.31 19:28:12 - Flushing DNS

I 2017.12.31 19:28:12 - Checking route

. 2017.12.31 19:28:12 - curl: (60) SSL certificate problem: certificate is not yet valid

. 2017.12.31 19:28:12 -     More details here: https://curl.haxx.se/docs/sslcerts.html

. 2017.12.31 19:28:12 -     curl performs SSL certificate verification by default, using a "bundle"

. 2017.12.31 19:28:12 -     of Certificate Authority (CA) public keys (CA certs). If the default

. 2017.12.31 19:28:12 -     bundle file isn't adequate, you can specify an alternate file

. 2017.12.31 19:28:12 -     using the --cacert option.

. 2017.12.31 19:28:12 -     If this HTTPS server uses a certificate signed by a CA represented in

. 2017.12.31 19:28:12 -     the bundle, the certificate verification probably failed due to a

. 2017.12.31 19:28:12 -     problem with the certificate (it might be expired, or the name might

. 2017.12.31 19:28:12 -     not match the domain name in the URL).

. 2017.12.31 19:28:12 -     If you'd like to turn off curl's verification of the certificate, use

. 2017.12.31 19:28:12 -     the -k (or --insecure) option.

. 2017.12.31 19:28:12 -     HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure.

. 2017.12.31 19:28:12 - Checking route (2° try)

. 2017.12.31 19:28:14 - curl: (60) SSL certificate problem: certificate is not yet valid

. 2017.12.31 19:28:14 -     More details here: https://curl.haxx.se/docs/sslcerts.html

. 2017.12.31 19:28:14 -     curl performs SSL certificate verification by default, using a "bundle"

. 2017.12.31 19:28:14 -     of Certificate Authority (CA) public keys (CA certs). If the default

. 2017.12.31 19:28:14 -     bundle file isn't adequate, you can specify an alternate file

. 2017.12.31 19:28:14 -     using the --cacert option.

. 2017.12.31 19:28:14 -     If this HTTPS server uses a certificate signed by a CA represented in

. 2017.12.31 19:28:14 -     the bundle, the certificate verification probably failed due to a

. 2017.12.31 19:28:14 -     problem with the certificate (it might be expired, or the name might

. 2017.12.31 19:28:14 -     not match the domain name in the URL).

. 2017.12.31 19:28:14 -     If you'd like to turn off curl's verification of the certificate, use

. 2017.12.31 19:28:14 -     the -k (or --insecure) option.

. 2017.12.31 19:28:14 -     HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure.

. 2017.12.31 19:28:14 - Checking route (3° try)

. 2017.12.31 19:28:16 - curl: (60) SSL certificate problem: certificate is not yet valid

. 2017.12.31 19:28:16 -     More details here: https://curl.haxx.se/docs/sslcerts.html

. 2017.12.31 19:28:16 -     curl performs SSL certificate verification by default, using a "bundle"

. 2017.12.31 19:28:16 -     of Certificate Authority (CA) public keys (CA certs). If the default

. 2017.12.31 19:28:16 -     bundle file isn't adequate, you can specify an alternate file

. 2017.12.31 19:28:16 -     using the --cacert option.

. 2017.12.31 19:28:16 -     If this HTTPS server uses a certificate signed by a CA represented in

. 2017.12.31 19:28:16 -     the bundle, the certificate verification probably failed due to a

. 2017.12.31 19:28:16 -     problem with the certificate (it might be expired, or the name might

. 2017.12.31 19:28:16 -     not match the domain name in the URL).

. 2017.12.31 19:28:16 -     If you'd like to turn off curl's verification of the certificate, use

. 2017.12.31 19:28:16 -     the -k (or --insecure) option.

. 2017.12.31 19:28:16 -     HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure.

E 2017.12.31 19:28:16 - Checking route failed.

. 2017.12.31 19:28:16 - OpenVPN > Initialization Sequence Completed

! 2017.12.31 19:28:16 - Disconnecting

. 2017.12.31 19:28:16 - Sending management termination signal

. 2017.12.31 19:28:16 - Management - Send 'signal SIGTERM'

. 2017.12.31 19:28:21 - Connection terminated.

. 2017.12.31 19:28:21 - DNS of a network adapter restored to original settings (Wi-Fi, to 10.6.198.1, fde6:7a:7d20:2c6::1)

. 2017.12.31 19:28:21 - DNS of a network adapter restored to original settings (Bluetooth PAN, to 10.6.198.1, fde6:7a:7d20:2c6::1)

. 2017.12.31 19:28:21 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to 10.6.198.1, fde6:7a:7d20:2c6::1)

I 2017.12.31 19:28:24 - Checking authorization ...

! 2017.12.31 19:28:24 - Connecting to Tejat (Canada, Toronto, Ontario)

. 2017.12.31 19:28:24 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017

. 2017.12.31 19:28:24 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2017.12.31 19:28:24 - Connection to OpenVPN Management Interface

. 2017.12.31 19:28:25 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

W 2017.12.31 19:28:25 - OpenVPN > WARNING: Your certificate is not yet valid!

. 2017.12.31 19:28:25 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.12.31 19:28:25 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.12.31 19:28:25 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.194:443

. 2017.12.31 19:28:25 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2017.12.31 19:28:25 - OpenVPN > UDP link local: (not bound)

. 2017.12.31 19:28:25 - OpenVPN > UDP link remote: [AF_INET]184.75.221.194:443

. 2017.12.31 19:28:25 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.194:443, sid=f6ab9f4c eb631b45

. 2017.12.31 19:28:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.12.31 19:28:25 - OpenVPN > VERIFY KU OK

. 2017.12.31 19:28:25 - OpenVPN > Validating certificate extended key usage

. 2017.12.31 19:28:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.12.31 19:28:25 - OpenVPN > VERIFY EKU OK

. 2017.12.31 19:28:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Tejat, emailAddress=info@airvpn.org

. 2017.12.31 19:28:25 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2017.12.31 19:28:25 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.12.31 19:28:25 - OpenVPN > [Tejat] Peer Connection Initiated with [AF_INET]184.75.221.194:443

. 2017.12.31 19:28:26 - OpenVPN > SENT CONTROL [Tejat]: 'PUSH_REQUEST' (status=1)

. 2017.12.31 19:28:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway  def1 bypass-dhcp,dhcp-option DNS 10.31.100.1,route-gateway 10.31.100.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.31.100.248 255.255.255.0,peer-id 4,cipher AES-256-GCM'

. 2017.12.31 19:28:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2017.12.31 19:28:26 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2017.12.31 19:28:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2017.12.31 19:28:26 - OpenVPN > OPTIONS IMPORT: route options modified

. 2017.12.31 19:28:26 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2017.12.31 19:28:26 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2017.12.31 19:28:26 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2017.12.31 19:28:26 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2017.12.31 19:28:26 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2017.12.31 19:28:26 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2017.12.31 19:28:26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2017.12.31 19:28:26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2017.12.31 19:28:26 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 IFACE=en0 HWADDR=c4:b3:01:90:16:e2

. 2017.12.31 19:28:26 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy

. 2017.12.31 19:28:26 - OpenVPN > Opened utun device utun1

. 2017.12.31 19:28:26 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2017.12.31 19:28:26 - OpenVPN > /sbin/ifconfig utun1 delete

. 2017.12.31 19:28:26 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2017.12.31 19:28:26 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2017.12.31 19:28:26 - OpenVPN > /sbin/ifconfig utun1 10.31.100.248 10.31.100.248 netmask 255.255.255.0 mtu 1500 up

. 2017.12.31 19:28:26 - OpenVPN > /sbin/route add -net 10.31.100.0 10.31.100.248 255.255.255.0

. 2017.12.31 19:28:26 - OpenVPN > add net 10.31.100.0: gateway 10.31.100.248

. 2017.12.31 19:28:26 - OpenVPN > /sbin/route add -net 184.75.221.194 10.0.0.1 255.255.255.255

. 2017.12.31 19:28:26 - OpenVPN > add net 184.75.221.194: gateway 10.0.0.1

. 2017.12.31 19:28:26 - OpenVPN > /sbin/route add -net 0.0.0.0 10.31.100.1 128.0.0.0

. 2017.12.31 19:28:26 - OpenVPN > add net 0.0.0.0: gateway 10.31.100.1

. 2017.12.31 19:28:26 - OpenVPN > /sbin/route add -net 128.0.0.0 10.31.100.1 128.0.0.0

. 2017.12.31 19:28:26 - OpenVPN > add net 128.0.0.0: gateway 10.31.100.1

. 2017.12.31 19:28:26 - DNS of a network adapter forced (Wi-Fi, from 10.6.198.1, fde6:7a:7d20:2c6::1 to 10.31.100.1)

. 2017.12.31 19:28:26 - DNS of a network adapter forced (Bluetooth PAN, from 10.6.198.1, fde6:7a:7d20:2c6::1 to 10.31.100.1)

. 2017.12.31 19:28:26 - DNS of a network adapter forced (Thunderbolt Bridge, from 10.6.198.1, fde6:7a:7d20:2c6::1 to 10.31.100.1)

. 2017.12.31 19:28:26 - Flushing DNS

I 2017.12.31 19:28:26 - Checking route

. 2017.12.31 19:28:27 - curl: (60) SSL certificate problem: certificate is not yet valid

. 2017.12.31 19:28:27 -     More details here: https://curl.haxx.se/docs/sslcerts.html

. 2017.12.31 19:28:27 -     curl performs SSL certificate verification by default, using a "bundle"

. 2017.12.31 19:28:27 -     of Certificate Authority (CA) public keys (CA certs). If the default

. 2017.12.31 19:28:27 -     bundle file isn't adequate, you can specify an alternate file

. 2017.12.31 19:28:27 -     using the --cacert option.

. 2017.12.31 19:28:27 -     If this HTTPS server uses a certificate signed by a CA represented in

. 2017.12.31 19:28:27 -     the bundle, the certificate verification probably failed due to a

. 2017.12.31 19:28:27 -     problem with the certificate (it might be expired, or the name might

. 2017.12.31 19:28:27 -     not match the domain name in the URL).

. 2017.12.31 19:28:27 -     If you'd like to turn off curl's verification of the certificate, use

. 2017.12.31 19:28:27 -     the -k (or --insecure) option.

. 2017.12.31 19:28:27 -     HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure.

. 2017.12.31 19:28:27 - Checking route (2° try)

. 2017.12.31 19:28:28 - curl: (60) SSL certificate problem: certificate is not yet valid

. 2017.12.31 19:28:28 -     More details here: https://curl.haxx.se/docs/sslcerts.html

. 2017.12.31 19:28:28 -     curl performs SSL certificate verification by default, using a "bundle"

. 2017.12.31 19:28:28 -     of Certificate Authority (CA) public keys (CA certs). If the default

. 2017.12.31 19:28:28 -     bundle file isn't adequate, you can specify an alternate file

. 2017.12.31 19:28:28 -     using the --cacert option.

. 2017.12.31 19:28:28 -     If this HTTPS server uses a certificate signed by a CA represented in

. 2017.12.31 19:28:28 -     the bundle, the certificate verification probably failed due to a

. 2017.12.31 19:28:28 -     problem with the certificate (it might be expired, or the name might

. 2017.12.31 19:28:28 -     not match the domain name in the URL).

. 2017.12.31 19:28:28 -     If you'd like to turn off curl's verification of the certificate, use

. 2017.12.31 19:28:28 -     the -k (or --insecure) option.

. 2017.12.31 19:28:28 -     HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure.

. 2017.12.31 19:28:28 - Checking route (3° try)





I am at a loss as to how to proceed. Any help is appreciated. Please and thank you. 

Id also like to add that all other devices connect to the network just fine. 

Share this post


Link to post
9 hours ago, beholdbenefit said:

I 2017.12.31 19:26:20 - Eddie version: 2.13.6 / macos_x64, System: MacOS, Name: 10.13.6, Version: Darwin MrButtonss-MacBook-Air.local 17.7.0 Darwin Kernel Version 17.7.0: Thu Jun 21 22:53:14 PDT 2018; root:xnu-4570.71.2~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319


This version is several years old, the current one is 2.18.9. I would like you to update first and see if any problems persist.

Edit: Also, just noticed: 31.12.2017? Check if the system date is correct.

» I am not an AirVPN team member. All opinions are my own and are not official. Refer to Staff postings for the official word.

» These are the community forums, not the support portal. You're writing with other users here.

» New here? LZ1's New User Guide to AirVPN. Use the search function, Luke!

» Tor exits behind a VPN connection are discouraged. Using Tor on the other hand is not.

 

» Privacy is like alcohol: Drink a little and it can help you stay unnoticed. Drink a lot and everyone will notice you.

» I cannot give you the solution to all your issues. But I can guide you to it. The rest is up to you.

Share this post


Link to post
On 7/4/2020 at 3:42 AM, giganerd said:

This version is several years old, the current one is 2.18.9. I would like you to update first and see if any problems persist.

Edit: Also, just noticed: 31.12.2017? Check if the system date is correct.
After updating just now to 2.18.9 from a properly working 2.15, I am now getting the same error: "Raise system privileges" in the splash window followed by the "Unable to obtain system privileges" error when trying to launch Eddie (macOS Mojave). Please help, thanks.

Share this post


Link to post

Not your thread. The cause could be different in your case, so open your own one. If we do happen to notice it's related, some moderator will most probably merge the topics.


» I am not an AirVPN team member. All opinions are my own and are not official. Refer to Staff postings for the official word.

» These are the community forums, not the support portal. You're writing with other users here.

» New here? LZ1's New User Guide to AirVPN. Use the search function, Luke!

» Tor exits behind a VPN connection are discouraged. Using Tor on the other hand is not.

 

» Privacy is like alcohol: Drink a little and it can help you stay unnoticed. Drink a lot and everyone will notice you.

» I cannot give you the solution to all your issues. But I can guide you to it. The rest is up to you.

Share this post


Link to post

eddie I 2018.docxSomething very interesting has happened. I downloaded the latest version of Eddie and installed it and now not only can I connect to the internet but the year in my computer system has been reset to the current time. See logs

image.png.3209b038b518b16addc909a7ba21662c.png

Share this post


Link to post

my computer fixed this automatically now that i have installed the latest eddie and connected to the internet.

my question is how did this happened in the first place? why does my computer revert to the year 2018 and a version of eddie several years old? 

changing the system date/time is only a bandaid.

Share this post


Link to post
33 minutes ago, beholdbenefit said:

my question is how did this happened in the first place? why does my computer revert to the year 2018 and a version of eddie several years old? 

changing the system date/time is only a bandaid.


Something related to backups, maybe? Time Machine (or whatever it's called)? How do you turn off your computer? Are you sure it shuts down properly?

» I am not an AirVPN team member. All opinions are my own and are not official. Refer to Staff postings for the official word.

» These are the community forums, not the support portal. You're writing with other users here.

» New here? LZ1's New User Guide to AirVPN. Use the search function, Luke!

» Tor exits behind a VPN connection are discouraged. Using Tor on the other hand is not.

 

» Privacy is like alcohol: Drink a little and it can help you stay unnoticed. Drink a lot and everyone will notice you.

» I cannot give you the solution to all your issues. But I can guide you to it. The rest is up to you.

Share this post


Link to post

thats the only thing i can think of that would make sense but unfortunately i dont backup my computer that way but instead use an external hd. and even then i back up at least once a year. the system is resetting somehow to more than two years ago (without changing any files). 

i realize this is now more of a computer problem rather than an eddie/air vpn problem. 

many thanks for all you guys help. hope youre all doing well

Share this post


Link to post
8 hours ago, beholdbenefit said:

changing the system date/time is only a bandaid.

Bandaid? If you don't change your system OS to current date/time....you will not be able to connect to server.
Most commonly this happens in Tomato flushed routers where your date/time will be changed to 1969 etc...upon a power outage or related.
 

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...