Staff 9971 Posted ... Hello! We're very glad to inform you that we have just released Hummingbird 1.2.0 macOS (High Sierra or higher version required).UPDATE 15 FEB 2022: Release Candidate 1 is available UPDATE 08 MAR 2022: Release Candidate 2 is available UPDATE 17 MAR 2022: Release Candidate 3 is available 24 MAR 2022: Production Release is now available Main features Lightweight and stand alone binary No heavy framework required, no GUI Small RAM footprint Lightning fast Based on OpenVPN 3 library fork by AirVPN robust leaks prevention through Network Lock based on pf - working perfectly on Big Sur and higher versions too proper handling of DNS push by VPN servers capable of higher throughput than OpenVPN 2.5 What's new bug fixes pertaining to --restore-network --pause --resume and --reconnect options update of all support libraries improved handling of AirVPN IPv6 bootstrap servers higher performance, mainly thanks to the new OpenSSL library version. Both Apple M1 and Intel based Mac performances are finally on par with Linux and Windows ones. Throughput as high as 650-700 Mbit/s has been reached both with CHACHA20 and AES-GCM, both on M1 and Intel based Mac computers Check the changelog for detailed information. Download Hummingbird for macOS is distributed in plain versions for M1 and Intel based Mac computers. Notarized versions will be available with the stable release. Download page: https://airvpn.org/macos/hummingbird/ Hummingbird is released under GLPv3. Source code and repository: https://gitlab.com/AirVPN/hummingbird Changelog Version 1.2.0 - 22 March 2022 [ProMIND] production release Version 1.2.0 RC 3 - 17 March 2022 [ProMIND] updated to OpenVPN3 AirVPN 3.8.1 [ProMIND] do not check for supported ciphers in OpenVPN config file in case eval.cipher is empty [ProMIND] changed references of ClientAPI::OpenVPNClient class to ClientAPI::OpenVPNClientHelper to conform to the new OpenVPN3 client class names [ProMIND] replaced calls to removed OpenVPN client's eval_config_static() with ClientAPI::OpenVPNClientHelper::eval_config() Version 1.2.0 RC 2 - 8 March 2022 [ProMIND] Added --list-data-ciphers option [ProMIND] Check and validate requested data cipher according to VpnClient's supported ciphers [ProMIND] Normalized (extended) bool values for options allowuaf, compress and network-lock Version 1.2.0 RC 1 - 15 February 2022 [ProMIND] Updated to OpenVPN 3.7.2 AirVPN Version 1.2.0 Beta 1 - 7 February 2022 [ProMIND] updated to OpenVPN 3.7.1 AirVPN and latest support libraries and support projects [ProMIND] Added SSL library version to version message [ProMIND] Removed ipv6 command line option and replaced with allowuaf option (Allow Unused Address Families) in order to comply to the new OpenVPN3 specifications [ProMIND] Added OpenVPN and copyright information and SSL library information to the welcome message [ProMIND] Fixed recover network procedure. It now properly checks the existence of network backup file Thank you for your tests! Please feel free to report any bug, malfunction etc. on this thread or through a ticket. Kind regards & datalove AirVPN Staff 1 spinmaster reacted to this Quote Share this post Link to post
Maggie144 12 Posted ... would love to give this beta a try, but both download links return 404 Not Found Quote Share this post Link to post
Staff 9971 Posted ... 40 minutes ago, Maggie144 said: would love to give this beta a try, but both download links return 404 Not Found Hello! Fixed, can you please try again now? Kind regards Quote Share this post Link to post
Maggie144 12 Posted ... works, I'm running it now. Will report if anything goes awry Kind regards Quote Share this post Link to post
Monotremata 22 Posted ... Still does this to me on my Mac over here: Quote . 2022.02.11 17:55:19 - Hummingbird > UDP send exception: send: No buffer space available E 2022.02.11 17:55:19 - Hummingbird > ERROR: errors sending on network socket . 2022.02.11 17:55:19 - Hummingbird > UDP send exception: send: No buffer space available E 2022.02.11 17:55:19 - Hummingbird > ERROR: errors sending on network socket Just got off work and came home to a log FILLED with these messages. I installed the new version this morning, signed into the VPN and just let it run all day on my Mac while I was at work. These always pop up whenever I download or upload at any significant speed (1 Gbit fiber connection here). Im assuming my torrent client was trying to seed something when it started. This is an Intel Mini running 12.2 and the latest and greatest Eddie and Hummingbird betas.. This has been Hummingbirds standard operation here. Its fine until the minute you have any traffic come in and then it starts freaking out. Quote Share this post Link to post
Staff 9971 Posted ... @Monotremata Hello! Please set the UDP buffer at its maximum size: sudo sysctl -w kern.ipc.maxsockbuf=16554432 and test again. See also: https://airvpn.org/forums/topic/46764-hummingbird-110-released/?do=findComment&comment=173140 Please keep us posted. Kind regards 1 Monotremata reacted to this Quote Share this post Link to post
Maggie144 12 Posted ... I got the following log when my router had a connection loss at 08:01 o'clock . 2022.02.13 07:51:05 - Hummingbird > IV_PLAT=mac . 2022.02.13 07:51:05 - Hummingbird > IV_NCP=2 . 2022.02.13 07:51:05 - Hummingbird > IV_TCPNL=1 . 2022.02.13 07:51:05 - Hummingbird > IV_PROTO=30 . 2022.02.13 07:51:05 - Hummingbird > IV_CIPHERS=AES-256-GCM:AES-256-CBC:AES-192-GCM:AES-192-CBC:AES-128-GCM:AES-128-CBC . 2022.02.13 07:51:05 - Hummingbird > IV_LZO_STUB=1 . 2022.02.13 07:51:05 - Hummingbird > IV_COMP_STUB=1 . 2022.02.13 07:51:05 - Hummingbird > IV_COMP_STUBv2=1 . 2022.02.13 07:51:05 - Hummingbird > IV_GUI_VER=Eddie2.21.3 . 2022.02.13 07:51:05 - Hummingbird > VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 . 2022.02.13 07:51:05 - Hummingbird > VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Hamal/emailAddress=info@airvpn.org, signature: RSA-SHA512 . 2022.02.13 07:51:05 - Hummingbird > SSL Handshake: peer certificate: CN=Hamal, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD . 2022.02.13 07:51:05 - Hummingbird > LZO-ASYM init swap=0 asym=1 . 2022.02.13 07:51:05 - Hummingbird > Comp-stub init swap=0 . 2022.02.13 08:01:53 - SSL > LOG3[0]: SSL_read: Operation timed out (60) . 2022.02.13 08:01:53 - SSL > LOG5[0]: Connection reset: 94547132 byte(s) sent to TLS, 3063613821 byte(s) sent to socket . 2022.02.13 08:01:53 - Hummingbird > TCP recv error: Connection reset by peer E 2022.02.13 08:01:53 - Hummingbird > ERROR: errors receiving on network socket . 2022.02.13 08:01:53 - Hummingbird > Transport Error: Transport error on '127.0.0.1: NETWORK_RECV_ERROR . 2022.02.13 08:01:53 - Hummingbird > EVENT: TRANSPORT_ERROR Transport error on '127.0.0.1: NETWORK_RECV_ERROR [ERR] E 2022.02.13 08:01:53 - Hummingbird > ERROR: general transport error . 2022.02.13 08:01:53 - Detected Hummingbird retry, force disconnection . 2022.02.13 08:01:53 - Hummingbird > Client terminated, restarting in 5000 ms... . 2022.02.13 08:01:53 - Hummingbird > /sbin/route delete -net 10.18.119.0 -netmask 255.255.255.0 10.18.119.15 . 2022.02.13 08:01:53 - Hummingbird > delete net 10.18.119.0: gateway 10.18.119.15 . 2022.02.13 08:01:53 - Hummingbird > /sbin/ifconfig utun2 down . 2022.02.13 08:01:53 - Hummingbird > MacDNSAction: FLAGS=F . 2022.02.13 08:01:53 - SSL > LOG5[1]: Service [openvpn] accepted connection from 127.0.0.1:52054 . 2022.02.13 08:01:53 - SSL > LOG6[1]: s_connect: connecting 185.156.175.45:28439 . 2022.02.13 08:01:53 - Hummingbird > EVENT: RECONNECTING E 2022.02.13 08:01:53 - Hummingbird > ERROR: Number of reconnections . 2022.02.13 08:01:53 - Hummingbird > EVENT: RESOLVE . 2022.02.13 08:01:53 - Hummingbird > Contacting 127.0.0.1:37080 via TCP . 2022.02.13 08:01:53 - Hummingbird > EVENT: WAIT . 2022.02.13 08:01:53 - Hummingbird > Connecting to [127.0.0.1]:37080 (127.0.0.1) via TCP ! 2022.02.13 08:01:54 - Disconnecting . 2022.02.13 08:01:54 - Sending soft termination signal . 2022.02.13 08:01:54 - Hummingbird > Received SIGINT signal. Terminating Hummingbird. . 2022.02.13 08:01:54 - Hummingbird > EVENT: DISCONNECTED . 2022.02.13 08:01:54 - Hummingbird > Network filter successfully restored . 2022.02.13 08:01:54 - Hummingbird > Thread finished . 2022.02.13 08:01:54 - Hummingbird > STATS: . 2022.02.13 08:01:54 - Hummingbird > BYTES_IN : 3063613821 . 2022.02.13 08:01:54 - Hummingbird > BYTES_OUT : 94547188 . 2022.02.13 08:01:54 - Hummingbird > PACKETS_IN : 1547079 . 2022.02.13 08:01:54 - Hummingbird > PACKETS_OUT : 1185040 . 2022.02.13 08:01:54 - Hummingbird > TUN_BYTES_IN : 67140422 . 2022.02.13 08:01:54 - Hummingbird > TUN_BYTES_OUT : 3013096487 . 2022.02.13 08:01:54 - Hummingbird > TUN_PACKETS_IN : 1181609 . 2022.02.13 08:01:54 - Hummingbird > TUN_PACKETS_OUT : 2186417 . 2022.02.13 08:01:54 - Hummingbird > NETWORK_RECV_ERROR : 1 . 2022.02.13 08:01:54 - Hummingbird > TRANSPORT_ERROR : 1 . 2022.02.13 08:01:54 - Hummingbird > N_RECONNECT : 1 . 2022.02.13 08:01:54 - Hummingbird > N_KEV_EXPIRE : 3 . 2022.02.13 08:01:54 - Sending soft termination signal . 2022.02.13 08:01:54 - SSL > LOG5[ui]: Terminated . 2022.02.13 08:01:54 - SSL > LOG5[ui]: Terminating 2 service thread(s) . 2022.02.13 08:01:54 - SSL > LOG5[ui]: Service threads terminated . 2022.02.13 08:01:54 - Routes, delete 0.0.0.0/1 for interface "utun2", not exists. . 2022.02.13 08:01:54 - Routes, delete 128.0.0.0/1 for interface "utun2", not exists. . 2022.02.13 08:01:55 - Routes, delete 185.156.175.45/32 for interface "en0". . 2022.02.13 08:01:55 - Routes, delete 185.156.175.43/32 for interface "utun2", not exists. . 2022.02.13 08:01:55 - Routes, skipped for 2001:ac8:28:4:5cf4:b40d:cd32:5bdf : IPv6 blocked. . 2022.02.13 08:01:55 - Routes, delete 185.156.175.45/32 for interface "en0", not exists. . 2022.02.13 08:01:55 - IPv6 restored on network adapter (Wi-Fi) . 2022.02.13 08:01:55 - IPv6 restored on network adapter (Bluetooth PAN) . 2022.02.13 08:01:55 - IPv6 restored on network adapter (Thunderbolt Bridge) . 2022.02.13 08:01:55 - DNS of a network adapter restored to original settings (Wi-Fi, to 10.17.151.1) . 2022.02.13 08:01:55 - DNS of a network adapter restored to original settings (Bluetooth PAN, to 10.17.151.1) . 2022.02.13 08:01:55 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to 10.17.151.1) . 2022.02.13 08:01:55 - Connection terminated. I 2022.02.13 08:01:58 - Checking authorization ... . 2022.02.13 08:03:13 - Checking authorization ..., 1° try failed (Fetch url error:Couldn't connect to server) . 2022.02.13 08:04:28 - Checking authorization ..., 2° try failed (Fetch url error:Couldn't connect to server) . 2022.02.13 08:05:43 - Checking authorization ..., 3° try failed (Fetch url error:Couldn't connect to server) . 2022.02.13 08:06:58 - Checking authorization ..., 4° try failed (Fetch url error:Couldn't connect to server) . 2022.02.13 08:06:59 - Checking authorization ..., 5° try failed (Fetch url error:Couldn't connect to server) W 2022.02.13 08:06:59 - Authorization check failed, continue anyway (Fetch url error:Couldn't connect to server) . 2022.02.13 08:06:59 - Flushing DNS ! 2022.02.13 08:06:59 - Session terminated. I did cancel the "checking authorization" with eddie at the 1°, but it just kept on checking, even when I disabled wlan, for minutes on.. Quote Share this post Link to post
Staff 9971 Posted ... @Maggie144 Hello! It was probably caused by lack of Internet connectivity. Once the connection is over Eddie is in control and is the one "checking authorization" indefinitely, Hummingbird is not running. The fact that Eddie was unresponsive to "Cancel" and kept going on indefinitely might be an Eddie's bug, we will verify. Kind regards Quote Share this post Link to post
Maggie144 12 Posted ... thought so, I was like "I miss the instant action oft CTRL + C" other than that, Hummingbird is running fine so far. Eddie is current beta 2.21.3 Quote Share this post Link to post
Staff 9971 Posted ... Hello!Update: Hummingbird 1.2.0 Release Candidate 1 is now available. Links to download the packages have been updated in this thread first message. Thank you very much for your tests! Kind regards Quote Share this post Link to post
Maggie144 12 Posted ... Had to disable SIP to run Hummingbird on Catalina 10.15.7 - it just ignored by "allow" click in Security settings, popped up every time I tried to run it (probably macOS bug). But now after csrutil disabled I can only make a connection with Hummingbird 1.1.2 sudo ./hummingbird /Users/user/Public/servers/CH-a.ovpn Hummingbird - AirVPN OpenVPN 3 Client 1.2.0 RC 1 - 15 February 2022 OpenVPN core 3.7.2 AirVPN mac x86_64 64-bit Copyright (C) 2012-2020 OpenVPN Inc. All rights reserved. OpenSSL 1.1.1m 14 Dec 2021 Sun Feb 20 08:20:38.670 2022 System and service manager in use is launchd Sun Feb 20 08:20:38.689 2022 Network filter and lock are using pf No ALTQ support in kernel ALTQ related functions disabled pfctl: pf already enabled Sun Feb 20 08:20:38.700 2022 Starting thread Sun Feb 20 08:20:38.700 2022 OpenVPN core 3.7.2 AirVPN mac x86_64 64-bit Sun Feb 20 08:20:38.701 2022 Frame=512/2048/512 mssfix-ctrl=1250 Sun Feb 20 08:20:38.702 2022 UNUSED OPTIONS 3 [resolv-retry] [infinite] 4 [nobind] 5 [persist-key] 6 [persist-tun] 7 [auth-nocache] 8 [verb] [3] 9 [rcvbuf] [262144] 10 [sndbuf] [262144] Sun Feb 20 08:20:38.702 2022 EVENT: RESOLVE Sun Feb 20 08:20:38.703 2022 Local IPv6 address fe80::1 Sun Feb 20 08:20:38.703 2022 Local IPv4 address 192.168.178.30 Sun Feb 20 08:20:38.703 2022 Local IPv6 address fe80::e46b:6fff:fedc:bcf4 Sun Feb 20 08:20:38.703 2022 Local IPv6 address fe80::e46b:6fff:fedc:bcf4 Sun Feb 20 08:20:38.703 2022 Local IPv6 address fe80::5c2:fd71:99f4:c60a Sun Feb 20 08:20:38.703 2022 Local IPv6 address fe80::a251:d431:a0c9:7e62 Sun Feb 20 08:20:38.703 2022 Local interface gif0 Sun Feb 20 08:20:38.703 2022 Local interface stf0 Sun Feb 20 08:20:38.703 2022 Local interface XHC20 Sun Feb 20 08:20:38.703 2022 Local interface en0 Sun Feb 20 08:20:38.703 2022 Local interface en1 Sun Feb 20 08:20:38.703 2022 Local interface en2 Sun Feb 20 08:20:38.703 2022 Local interface bridge0 Sun Feb 20 08:20:38.703 2022 Local interface p2p0 Sun Feb 20 08:20:38.703 2022 Local interface awdl0 Sun Feb 20 08:20:38.703 2022 Local interface llw0 Sun Feb 20 08:20:38.703 2022 Local interface utun0 Sun Feb 20 08:20:38.703 2022 Local interface utun1 Sun Feb 20 08:20:38.705 2022 Setting up network filter and lock Sun Feb 20 08:20:38.705 2022 Allowing system DNS 10.17.151.1 to pass through the network filter No ALTQ support in kernel ALTQ related functions disabled rules cleared nat cleared dummynet cleared 0 tables deleted. 0 states cleared source tracking entries cleared pf: statistics cleared pf: interface flags reset pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Sun Feb 20 08:20:38.735 2022 Adding IPv4 server 46.19.137.117 to network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Sun Feb 20 08:20:38.789 2022 Network filter and lock successfully activated Sun Feb 20 08:20:38.790 2022 Contacting 46.19.137.117:443 via TCP Sun Feb 20 08:20:38.790 2022 EVENT: WAIT Sun Feb 20 08:20:38.790 2022 Sun Feb 20 08:20:38.948 2022 Connecting to [46.19.137.117]:443 (46.19.137.117) via TCP Sun Feb 20 08:20:38.981 2022 EVENT: CONNECTING Sun Feb 20 08:20:38.981 2022 Tunnel Options:V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Sun Feb 20 08:20:38.981 2022 Peer Info: IV_VER=3.7.2 AirVPN IV_PLAT=mac IV_NCP=2 IV_TCPNL=1 IV_PROTO=30 IV_CIPHERS=AES-256-CBC IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 UV_IPV6=yes IV_GUI_VER=Hummingbird - AirVPN OpenVPN 3 Client 1.2.0 RC 1 IV_HWADDR=18:65:90:d6:c1:dd IV_SSL=OpenSSL 1.1.1m 14 Dec 2021 Sun Feb 20 08:20:39.046 2022 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Sun Feb 20 08:20:39.046 2022 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Virginis/emailAddress=info@airvpn.org, signature: RSA-SHA512 Sun Feb 20 08:20:39.140 2022 SSL Handshake: peer certificate: CN=Virginis, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Sun Feb 20 08:20:39.140 2022 Session is ACTIVE Sun Feb 20 08:20:39.140 2022 EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Sun Feb 20 08:20:39.140 2022 EVENT: GET_CONFIG Sun Feb 20 08:20:39.140 2022 Sending PUSH_REQUEST to server... Sun Feb 20 08:20:39.277 2022 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [ipv6] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.32.55.1] 3 [dhcp-option] [DNS6] [fde6:7a:7d20:1c37::1] 4 [tun-ipv6] 5 [route-gateway] [10.32.55.1] 6 [topology] [subnet] 7 [ping] [10] 8 [ping-restart] [60] 9 [ifconfig-ipv6] [fde6:7a:7d20:1c37::1008/64] [fde6:7a:7d20:1c37::1] 10 [ifconfig] [10.32.55.10] [255.255.255.0] 11 [peer-id] [0] 12 [cipher] [AES-256-CBC] Sun Feb 20 08:20:39.278 2022 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA512 ncp enabled: yes key-derivation: OpenVPN PRF compress: LZO_STUB peer ID: 0 control channel: tls-crypt enabled Sun Feb 20 08:20:39.278 2022 EVENT: ASSIGN_IP Sun Feb 20 08:20:39.278 2022 VPN Server has pushed IPv4 DNS server 10.32.55.1 No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Sun Feb 20 08:20:39.332 2022 VPN Server has pushed IPv6 DNS server fde6:7a:7d20:1c37::1 No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled ERROR: cannot detect IPv6 default gateway /sbin/ifconfig utun2 down /sbin/ifconfig utun2 10.32.55.10 10.32.55.1 netmask 255.255.255.0 mtu 1500 up /sbin/route add -net 10.32.55.0 -netmask 255.255.255.0 10.32.55.10 add net 10.32.55.0: gateway 10.32.55.10 /sbin/ifconfig utun2 inet6 fde6:7a:7d20:1c37::1008/64 up /sbin/route add -net -inet6 fde6:7a:7d20:1c37:: -prefixlen 64 -iface utun2 route: writing to routing socket: File exists add net fde6:7a:7d20:1c37::: gateway utun2: File exists /sbin/route add -net 46.19.137.117 -netmask 255.255.255.255 192.168.178.1 add net 46.19.137.117: gateway 192.168.178.1 /sbin/route add -net 0.0.0.0 -netmask 128.0.0.0 10.32.55.1 add net 0.0.0.0: gateway 10.32.55.1 /sbin/route add -net 128.0.0.0 -netmask 128.0.0.0 10.32.55.1 add net 128.0.0.0: gateway 10.32.55.1 /sbin/route add -net -inet6 :: -prefixlen 1 -iface utun2 add net ::: gateway utun2 /sbin/route add -net -inet6 8000:: -prefixlen 1 -iface utun2 add net 8000::: gateway utun2 MacDNSAction: FLAGS=F RD=1 SO=5000 DNS=10.32.55.1,fde6:7a:7d20:1c37::1 DOM= ADS= Sun Feb 20 08:20:39.459 2022 DSDict: updated Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS Sun Feb 20 08:20:39.459 2022 DSDict: updated State:/Network/Service/OpenVPNConnect/Info Sun Feb 20 08:20:39.459 2022 MacDNS: SETDNS 19.6.0 *** DSDict State:/Network/Global/IPv4 ORIG { PrimaryInterface = en0; PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; Router = "192.168.178.1"; } *** DSDict State:/Network/Service/OpenVPNConnect/Info ORIG { } MODIFIED { PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; } *** DSDict State:/Network/Service/OpenVPNConnect/DNS ORIG { } *** DSDict Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS ORIG { ServerAddresses = ( "10.17.151.1" ); } MODIFIED { OpenVPNConnectOrigSearchDomains = OpenVPNConnectDeleteValue; OpenVPNConnectOrigSearchOrder = OpenVPNConnectDeleteValue; OpenVPNConnectOrigServerAddresses = ( "10.17.151.1" ); SearchOrder = 5000; ServerAddresses = ( "10.32.55.1", "fde6:7a:7d20:1c37::1" ); } Sun Feb 20 08:20:39.460 2022 /usr/bin/dscacheutil -flushcache Sun Feb 20 08:20:39.478 2022 /usr/bin/killall -HUP mDNSResponder Sun Feb 20 08:20:39.495 2022 DSDict: SCDynamicStoreNotifyValue Setup:/Network/Global/IPv4 open utun2 SUCCEEDED Sun Feb 20 08:20:39.496 2022 Connected via tun Sun Feb 20 08:20:39.496 2022 Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use Sun Feb 20 08:20:39.497 2022 Client terminated, restarting in 2000 ms... Sun Feb 20 08:20:39.560 2022 DSDict: updated Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS Sun Feb 20 08:20:39.561 2022 DSDict: removed State:/Network/Service/OpenVPNConnect/Info Sun Feb 20 08:20:39.561 2022 MacDNS: RESETDNS 19.6.0 *** DSDict State:/Network/Global/IPv4 ORIG { PrimaryInterface = en0; PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; Router = "192.168.178.1"; } *** DSDict State:/Network/Service/OpenVPNConnect/Info ORIG { PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; } *** DSDict State:/Network/Service/OpenVPNConnect/DNS ORIG { } *** DSDict Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS ORIG { OpenVPNConnectOrigSearchDomains = OpenVPNConnectDeleteValue; OpenVPNConnectOrigSearchOrder = OpenVPNConnectDeleteValue; OpenVPNConnectOrigServerAddresses = ( "10.17.151.1" ); SearchOrder = 5000; ServerAddresses = ( "10.32.55.1", "fde6:7a:7d20:1c37::1" ); } MODIFIED { ServerAddresses = ( "10.17.151.1" ); } Sun Feb 20 08:20:39.561 2022 /usr/bin/dscacheutil -flushcache Sun Feb 20 08:20:39.579 2022 /usr/bin/killall -HUP mDNSResponder Sun Feb 20 08:20:39.605 2022 DSDict: SCDynamicStoreNotifyValue Setup:/Network/Global/IPv4 Sun Feb 20 08:20:39.605 2022 /sbin/route delete -net 10.32.55.0 -netmask 255.255.255.0 10.32.55.10 delete net 10.32.55.0: gateway 10.32.55.10 /sbin/route delete -net -inet6 fde6:7a:7d20:1c37:: -prefixlen 64 -iface utun2 delete net fde6:7a:7d20:1c37::: gateway utun2 /sbin/route delete -net 46.19.137.117 -netmask 255.255.255.255 192.168.178.1 delete net 46.19.137.117: gateway 192.168.178.1 /sbin/route delete -net 0.0.0.0 -netmask 128.0.0.0 10.32.55.1 delete net 0.0.0.0: gateway 10.32.55.1 /sbin/route delete -net 128.0.0.0 -netmask 128.0.0.0 10.32.55.1 delete net 128.0.0.0: gateway 10.32.55.1 /sbin/route delete -net -inet6 :: -prefixlen 1 -iface utun2 delete net ::: gateway utun2 /sbin/route delete -net -inet6 8000:: -prefixlen 1 -iface utun2 delete net 8000::: gateway utun2 /sbin/ifconfig utun2 down MacDNSAction: FLAGS=F Sun Feb 20 08:20:41.499 2022 EVENT: RECONNECTING Sun Feb 20 08:20:41.501 2022 Successfully restored system DNS. Sun Feb 20 08:20:41.501 2022 ERROR: N_RECONNECT Sun Feb 20 08:20:41.502 2022 EVENT: RESOLVE Sun Feb 20 08:20:41.502 2022 Setting up network filter and lock Sun Feb 20 08:20:41.502 2022 Allowing system DNS 10.17.151.1 to pass through the network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Sun Feb 20 08:20:41.560 2022 Adding IPv4 server 46.19.137.117 to network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Sun Feb 20 08:20:41.619 2022 Network filter and lock successfully activated Sun Feb 20 08:20:41.620 2022 Contacting 46.19.137.117:443 via TCP Sun Feb 20 08:20:41.620 2022 EVENT: WAIT Sun Feb 20 08:20:41.620 2022 Sun Feb 20 08:20:41.778 2022 Connecting to [46.19.137.117]:443 (46.19.137.117) via TCP Sun Feb 20 08:20:41.808 2022 EVENT: CONNECTING Sun Feb 20 08:20:41.809 2022 Tunnel Options:V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Sun Feb 20 08:20:41.809 2022 Peer Info: IV_VER=3.7.2 AirVPN IV_PLAT=mac IV_NCP=2 IV_TCPNL=1 IV_PROTO=30 IV_CIPHERS=AES-256-CBC IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 UV_IPV6=yes IV_GUI_VER=Hummingbird - AirVPN OpenVPN 3 Client 1.2.0 RC 1 IV_HWADDR=18:65:90:d6:c1:dd IV_SSL=OpenSSL 1.1.1m 14 Dec 2021 Sun Feb 20 08:20:41.870 2022 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Sun Feb 20 08:20:41.870 2022 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Virginis/emailAddress=info@airvpn.org, signature: RSA-SHA512 Sun Feb 20 08:20:41.969 2022 SSL Handshake: peer certificate: CN=Virginis, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Sun Feb 20 08:20:41.969 2022 Session is ACTIVE Sun Feb 20 08:20:41.969 2022 EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Sun Feb 20 08:20:41.969 2022 EVENT: GET_CONFIG Sun Feb 20 08:20:41.969 2022 Sending PUSH_REQUEST to server... Sun Feb 20 08:20:42.114 2022 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [ipv6] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.32.55.1] 3 [dhcp-option] [DNS6] [fde6:7a:7d20:1c37::1] 4 [tun-ipv6] 5 [route-gateway] [10.32.55.1] 6 [topology] [subnet] 7 [ping] [10] 8 [ping-restart] [60] 9 [ifconfig-ipv6] [fde6:7a:7d20:1c37::1008/64] [fde6:7a:7d20:1c37::1] 10 [ifconfig] [10.32.55.10] [255.255.255.0] 11 [peer-id] [0] 12 [cipher] [AES-256-CBC] Sun Feb 20 08:20:42.114 2022 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA512 ncp enabled: yes key-derivation: OpenVPN PRF compress: LZO_STUB peer ID: 0 control channel: tls-crypt enabled Sun Feb 20 08:20:42.114 2022 EVENT: ASSIGN_IP Sun Feb 20 08:20:42.115 2022 VPN Server has pushed IPv4 DNS server 10.32.55.1 No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Sun Feb 20 08:20:42.171 2022 VPN Server has pushed IPv6 DNS server fde6:7a:7d20:1c37::1 No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled ERROR: cannot detect IPv6 default gateway /sbin/ifconfig utun2 down /sbin/ifconfig utun2 10.32.55.10 10.32.55.1 netmask 255.255.255.0 mtu 1500 up /sbin/route add -net 10.32.55.0 -netmask 255.255.255.0 10.32.55.10 add net 10.32.55.0: gateway 10.32.55.10 /sbin/ifconfig utun2 inet6 fde6:7a:7d20:1c37::1008/64 up /sbin/route add -net -inet6 fde6:7a:7d20:1c37:: -prefixlen 64 -iface utun2 route: writing to routing socket: File exists add net fde6:7a:7d20:1c37::: gateway utun2: File exists /sbin/route add -net 46.19.137.117 -netmask 255.255.255.255 192.168.178.1 add net 46.19.137.117: gateway 192.168.178.1 /sbin/route add -net 0.0.0.0 -netmask 128.0.0.0 10.32.55.1 add net 0.0.0.0: gateway 10.32.55.1 /sbin/route add -net 128.0.0.0 -netmask 128.0.0.0 10.32.55.1 add net 128.0.0.0: gateway 10.32.55.1 /sbin/route add -net -inet6 :: -prefixlen 1 -iface utun2 add net ::: gateway utun2 /sbin/route add -net -inet6 8000:: -prefixlen 1 -iface utun2 add net 8000::: gateway utun2 MacDNSAction: FLAGS=F RD=1 SO=5000 DNS=10.32.55.1,fde6:7a:7d20:1c37::1,10.32.55.1,fde6:7a:7d20:1c37::1 DOM= ADS= Sun Feb 20 08:20:42.298 2022 DSDict: updated Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS Sun Feb 20 08:20:42.299 2022 DSDict: updated State:/Network/Service/OpenVPNConnect/Info Sun Feb 20 08:20:42.299 2022 MacDNS: SETDNS 19.6.0 *** DSDict State:/Network/Global/IPv4 ORIG { PrimaryInterface = en0; PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; Router = "192.168.178.1"; } *** DSDict State:/Network/Service/OpenVPNConnect/Info ORIG { } MODIFIED { PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; } *** DSDict State:/Network/Service/OpenVPNConnect/DNS ORIG { } *** DSDict Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS ORIG { ServerAddresses = ( "10.17.151.1" ); } MODIFIED { OpenVPNConnectOrigSearchDomains = OpenVPNConnectDeleteValue; OpenVPNConnectOrigSearchOrder = OpenVPNConnectDeleteValue; OpenVPNConnectOrigServerAddresses = ( "10.17.151.1" ); SearchOrder = 5000; ServerAddresses = ( "10.32.55.1", "fde6:7a:7d20:1c37::1", "10.32.55.1", "fde6:7a:7d20:1c37::1" ); } Sun Feb 20 08:20:42.299 2022 /usr/bin/dscacheutil -flushcache Sun Feb 20 08:20:42.316 2022 /usr/bin/killall -HUP mDNSResponder Sun Feb 20 08:20:42.336 2022 DSDict: SCDynamicStoreNotifyValue Setup:/Network/Global/IPv4 open utun2 SUCCEEDED Sun Feb 20 08:20:42.336 2022 Connected via tun Sun Feb 20 08:20:42.336 2022 Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use Sun Feb 20 08:20:42.337 2022 Client terminated, restarting in 2000 ms... Sun Feb 20 08:20:42.401 2022 DSDict: updated Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS Sun Feb 20 08:20:42.402 2022 DSDict: removed State:/Network/Service/OpenVPNConnect/Info Sun Feb 20 08:20:42.402 2022 MacDNS: RESETDNS 19.6.0 *** DSDict State:/Network/Global/IPv4 ORIG { PrimaryInterface = en0; PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; Router = "192.168.178.1"; } *** DSDict State:/Network/Service/OpenVPNConnect/Info ORIG { PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; } *** DSDict State:/Network/Service/OpenVPNConnect/DNS ORIG { } *** DSDict Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS ORIG { OpenVPNConnectOrigSearchDomains = OpenVPNConnectDeleteValue; OpenVPNConnectOrigSearchOrder = OpenVPNConnectDeleteValue; OpenVPNConnectOrigServerAddresses = ( "10.17.151.1" ); SearchOrder = 5000; ServerAddresses = ( "10.32.55.1", "fde6:7a:7d20:1c37::1", "10.32.55.1", "fde6:7a:7d20:1c37::1" ); } MODIFIED { ServerAddresses = ( "10.17.151.1" ); } Sun Feb 20 08:20:42.402 2022 /usr/bin/dscacheutil -flushcache Sun Feb 20 08:20:42.426 2022 /usr/bin/killall -HUP mDNSResponder Sun Feb 20 08:20:42.449 2022 DSDict: SCDynamicStoreNotifyValue Setup:/Network/Global/IPv4 Sun Feb 20 08:20:42.449 2022 /sbin/route delete -net 10.32.55.0 -netmask 255.255.255.0 10.32.55.10 delete net 10.32.55.0: gateway 10.32.55.10 /sbin/route delete -net -inet6 fde6:7a:7d20:1c37:: -prefixlen 64 -iface utun2 delete net fde6:7a:7d20:1c37::: gateway utun2 /sbin/route delete -net 46.19.137.117 -netmask 255.255.255.255 192.168.178.1 delete net 46.19.137.117: gateway 192.168.178.1 /sbin/route delete -net 0.0.0.0 -netmask 128.0.0.0 10.32.55.1 delete net 0.0.0.0: gateway 10.32.55.1 /sbin/route delete -net 128.0.0.0 -netmask 128.0.0.0 10.32.55.1 delete net 128.0.0.0: gateway 10.32.55.1 /sbin/route delete -net -inet6 :: -prefixlen 1 -iface utun2 delete net ::: gateway utun2 /sbin/route delete -net -inet6 8000:: -prefixlen 1 -iface utun2 delete net 8000::: gateway utun2 /sbin/ifconfig utun2 down MacDNSAction: FLAGS=F ^CReceived SIGINT signal. Terminating Hummingbird. Sun Feb 20 08:20:43.286 2022 EVENT: DISCONNECTED Sun Feb 20 08:20:43.286 2022 WARNING: Backup copy of resolv.conf not found. DNS settings do not need to be restored. No ALTQ support in kernel ALTQ related functions disabled rules cleared nat cleared dummynet cleared 0 tables deleted. 20 states cleared source tracking entries cleared pf: statistics cleared pf: interface flags reset pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Sun Feb 20 08:20:43.312 2022 Network filter successfully restored Sun Feb 20 08:20:43.313 2022 Thread finished STATS: BYTES_IN : 8056 BYTES_OUT : 7640 PACKETS_IN : 16 PACKETS_OUT : 20 N_RECONNECT : 1 user@MacBook-Pro hummingbird-1.2.0 % cd .. user@MacBook-Pro Public % sudo ./hummingbird servers/CH-b.ovpn Hummingbird - AirVPN OpenVPN 3 Client 1.1.2 - 4 June 2021 Sun Feb 20 08:21:44.570 2022 System and service manager in use is launchd Sun Feb 20 08:21:44.589 2022 Network filter and lock are using pf No ALTQ support in kernel ALTQ related functions disabled pfctl: pf already enabled Sun Feb 20 08:21:44.599 2022 Starting thread Sun Feb 20 08:21:44.599 2022 OpenVPN core 3.7 AirVPN mac x86_64 64-bit Sun Feb 20 08:21:44.600 2022 Frame=512/2048/512 mssfix-ctrl=1250 Sun Feb 20 08:21:44.602 2022 UNUSED OPTIONS 3 [resolv-retry] [infinite] 4 [nobind] 5 [persist-key] 6 [persist-tun] 7 [auth-nocache] 8 [verb] [3] 9 [rcvbuf] [262144] 10 [sndbuf] [262144] Sun Feb 20 08:21:44.602 2022 EVENT: RESOLVE Sun Feb 20 08:21:44.603 2022 Local IPv6 address fe80::1 Sun Feb 20 08:21:44.603 2022 Local IPv4 address 192.168.178.30 Sun Feb 20 08:21:44.603 2022 Local IPv6 address fe80::e46b:6fff:fedc:bcf4 Sun Feb 20 08:21:44.603 2022 Local IPv6 address fe80::e46b:6fff:fedc:bcf4 Sun Feb 20 08:21:44.603 2022 Local IPv6 address fe80::5c2:fd71:99f4:c60a Sun Feb 20 08:21:44.603 2022 Local IPv6 address fe80::a251:d431:a0c9:7e62 Sun Feb 20 08:21:44.603 2022 Local interface gif0 Sun Feb 20 08:21:44.603 2022 Local interface stf0 Sun Feb 20 08:21:44.603 2022 Local interface XHC20 Sun Feb 20 08:21:44.603 2022 Local interface en0 Sun Feb 20 08:21:44.603 2022 Local interface en1 Sun Feb 20 08:21:44.603 2022 Local interface en2 Sun Feb 20 08:21:44.603 2022 Local interface bridge0 Sun Feb 20 08:21:44.603 2022 Local interface p2p0 Sun Feb 20 08:21:44.603 2022 Local interface awdl0 Sun Feb 20 08:21:44.603 2022 Local interface llw0 Sun Feb 20 08:21:44.603 2022 Local interface utun0 Sun Feb 20 08:21:44.603 2022 Local interface utun1 Sun Feb 20 08:21:44.603 2022 Setting up network filter and lock Sun Feb 20 08:21:44.603 2022 Allowing system DNS 10.17.151.1 to pass through the network filter No ALTQ support in kernel ALTQ related functions disabled rules cleared nat cleared dummynet cleared 0 tables deleted. 0 states cleared source tracking entries cleared pf: statistics cleared pf: interface flags reset pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Sun Feb 20 08:21:44.635 2022 Adding IPv4 server 195.206.105.205 to network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Sun Feb 20 08:21:44.687 2022 Network filter and lock successfully activated Sun Feb 20 08:21:44.688 2022 Contacting 195.206.105.205:443 via TCP Sun Feb 20 08:21:44.688 2022 EVENT: WAIT Sun Feb 20 08:21:44.688 2022 Sun Feb 20 08:21:44.851 2022 Connecting to [195.206.105.205]:443 (195.206.105.205) via TCP Sun Feb 20 08:21:44.881 2022 EVENT: CONNECTING Sun Feb 20 08:21:44.881 2022 Tunnel Options:V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCP_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Sun Feb 20 08:21:44.881 2022 Peer Info: IV_VER=3.7 AirVPN IV_PLAT=mac IV_NCP=2 IV_TCPNL=1 IV_PROTO=30 IV_CIPHERS=AES-256-CBC IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 UV_IPV6=yes IV_GUI_VER=Hummingbird - AirVPN OpenVPN 3 Client 1.1.2 IV_HWADDR=18:65:90:d6:c1:dd IV_SSL=OpenSSL 1.1.1k 25 Mar 2021 Sun Feb 20 08:21:44.916 2022 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Sun Feb 20 08:21:44.917 2022 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Sextans/emailAddress=info@airvpn.org, signature: RSA-SHA512 Sun Feb 20 08:21:45.006 2022 SSL Handshake: peer certificate: CN=Sextans, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Sun Feb 20 08:21:45.006 2022 Session is ACTIVE Sun Feb 20 08:21:45.006 2022 EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Sun Feb 20 08:21:45.006 2022 EVENT: GET_CONFIG Sun Feb 20 08:21:45.006 2022 Sending PUSH_REQUEST to server... Sun Feb 20 08:21:45.097 2022 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [ipv6] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.17.151.1] 3 [dhcp-option] [DNS6] [fde6:7a:7d20:d97::1] 4 [tun-ipv6] 5 [route-gateway] [10.17.151.1] 6 [topology] [subnet] 7 [ping] [10] 8 [ping-restart] [60] 9 [ifconfig-ipv6] [fde6:7a:7d20:d97::101e/64] [fde6:7a:7d20:d97::1] 10 [ifconfig] [10.17.151.32] [255.255.255.0] 11 [peer-id] [0] 12 [cipher] [AES-256-CBC] Sun Feb 20 08:21:45.098 2022 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA512 ncp enabled: yes key-derivation: OpenVPN PRF compress: LZO_STUB peer ID: 0 control channel: tls-crypt enabled Sun Feb 20 08:21:45.098 2022 EVENT: ASSIGN_IP Sun Feb 20 08:21:45.098 2022 VPN Server has pushed IPv4 DNS server 10.17.151.1 No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Sun Feb 20 08:21:45.154 2022 VPN Server has pushed IPv6 DNS server fde6:7a:7d20:d97::1 No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled ERROR: cannot detect IPv6 default gateway /sbin/ifconfig utun2 down /sbin/ifconfig utun2 10.17.151.32 10.17.151.1 netmask 255.255.255.0 mtu 1500 up /sbin/route add -net 10.17.151.0 -netmask 255.255.255.0 10.17.151.32 add net 10.17.151.0: gateway 10.17.151.32 /sbin/ifconfig utun2 inet6 fde6:7a:7d20:d97::101e/64 up /sbin/route add -net -inet6 fde6:7a:7d20:d97:: -prefixlen 64 -iface utun2 route: writing to routing socket: File exists add net fde6:7a:7d20:d97::: gateway utun2: File exists /sbin/route add -net 195.206.105.205 -netmask 255.255.255.255 192.168.178.1 add net 195.206.105.205: gateway 192.168.178.1 /sbin/route add -net 0.0.0.0 -netmask 128.0.0.0 10.17.151.1 add net 0.0.0.0: gateway 10.17.151.1 /sbin/route add -net 128.0.0.0 -netmask 128.0.0.0 10.17.151.1 add net 128.0.0.0: gateway 10.17.151.1 /sbin/route add -net -inet6 :: -prefixlen 1 -iface utun2 add net ::: gateway utun2 /sbin/route add -net -inet6 8000:: -prefixlen 1 -iface utun2 add net 8000::: gateway utun2 MacDNSAction: FLAGS=F RD=1 SO=5000 DNS=10.17.151.1,fde6:7a:7d20:d97::1 DOM= ADS= Sun Feb 20 08:21:45.281 2022 DSDict: updated Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS Sun Feb 20 08:21:45.282 2022 DSDict: updated State:/Network/Service/OpenVPNConnect/Info Sun Feb 20 08:21:45.282 2022 MacDNS: SETDNS 19.6.0 *** DSDict State:/Network/Global/IPv4 ORIG { PrimaryInterface = en0; PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; Router = "192.168.178.1"; } *** DSDict State:/Network/Service/OpenVPNConnect/Info ORIG { } MODIFIED { PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; } *** DSDict State:/Network/Service/OpenVPNConnect/DNS ORIG { } *** DSDict Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS ORIG { ServerAddresses = ( "10.17.151.1" ); } MODIFIED { OpenVPNConnectOrigSearchDomains = OpenVPNConnectDeleteValue; OpenVPNConnectOrigSearchOrder = OpenVPNConnectDeleteValue; OpenVPNConnectOrigServerAddresses = ( "10.17.151.1" ); SearchOrder = 5000; ServerAddresses = ( "10.17.151.1", "fde6:7a:7d20:d97::1" ); } Sun Feb 20 08:21:45.282 2022 /usr/bin/dscacheutil -flushcache Sun Feb 20 08:21:45.299 2022 /usr/bin/killall -HUP mDNSResponder Sun Feb 20 08:21:45.316 2022 DSDict: SCDynamicStoreNotifyValue Setup:/Network/Global/IPv4 open utun2 SUCCEEDED Sun Feb 20 08:21:45.316 2022 Connected via tun Sun Feb 20 08:21:45.316 2022 LZO-ASYM init swap=0 asym=1 Sun Feb 20 08:21:45.317 2022 Comp-stub init swap=0 Sun Feb 20 08:21:45.317 2022 EVENT: CONNECTED 195.206.105.205:443 (195.206.105.205) via /TCP on tun/10.17.151.32/fde6:7a:7d20:d97::101e gw=[10.17.151.1/fde6:7a:7d20:d97::1] No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Sun Feb 20 08:21:45.378 2022 Server has pushed its own DNS. Removing system DNS from network filter. No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Sun Feb 20 08:21:45.434 2022 System DNS 10.17.151.1 is now rejected by the network filter Quote Share this post Link to post
Maggie144 12 Posted ... did create some new config-files, to try some different protocols, but with the newly created ones I can't even connect with Hummingbird 1.1.2 - same errors. This happens when using the last option in 'protocols' SSL 28439 4 If your ISP applies caps or blocks on lower port ranges and blocks the standard Entry IP tls-crypt, tls1.2 user@MacBook-Pro hummingbird-1.2.0 % sudo ./hummingbird /Users/user/Public/servers/swiss.ovpn Hummingbird - AirVPN OpenVPN 3 Client 1.2.0 RC 1 - 15 February 2022 OpenVPN core 3.7.2 AirVPN mac x86_64 64-bit Copyright (C) 2012-2020 OpenVPN Inc. All rights reserved. OpenSSL 1.1.1m 14 Dec 2021 Sun Feb 20 09:40:01.648 2022 System and service manager in use is launchd Sun Feb 20 09:40:01.655 2022 Network filter and lock are using pf No ALTQ support in kernel ALTQ related functions disabled pfctl: pf already enabled Sun Feb 20 09:40:01.658 2022 Starting thread Sun Feb 20 09:40:01.658 2022 OpenVPN core 3.7.2 AirVPN mac x86_64 64-bit Sun Feb 20 09:40:01.659 2022 Frame=512/2048/512 mssfix-ctrl=1250 Sun Feb 20 09:40:01.660 2022 UNUSED OPTIONS 3 [resolv-retry] [infinite] 4 [nobind] 5 [persist-key] 6 [persist-tun] 7 [auth-nocache] 8 [verb] [3] 9 [rcvbuf] [262144] 10 [sndbuf] [262144] Sun Feb 20 09:40:01.660 2022 EVENT: RESOLVE Sun Feb 20 09:40:01.661 2022 Local IPv6 address fe80::1 Sun Feb 20 09:40:01.661 2022 Local IPv4 address 192.168.178.30 Sun Feb 20 09:40:01.661 2022 Local IPv6 address fe80::e46b:6fff:fedc:bcf4 Sun Feb 20 09:40:01.661 2022 Local IPv6 address fe80::e46b:6fff:fedc:bcf4 Sun Feb 20 09:40:01.661 2022 Local IPv6 address fe80::5c2:fd71:99f4:c60a Sun Feb 20 09:40:01.661 2022 Local IPv6 address fe80::a251:d431:a0c9:7e62 Sun Feb 20 09:40:01.661 2022 Local interface gif0 Sun Feb 20 09:40:01.661 2022 Local interface stf0 Sun Feb 20 09:40:01.661 2022 Local interface XHC20 Sun Feb 20 09:40:01.661 2022 Local interface en0 Sun Feb 20 09:40:01.661 2022 Local interface en1 Sun Feb 20 09:40:01.661 2022 Local interface en2 Sun Feb 20 09:40:01.661 2022 Local interface bridge0 Sun Feb 20 09:40:01.661 2022 Local interface p2p0 Sun Feb 20 09:40:01.661 2022 Local interface awdl0 Sun Feb 20 09:40:01.661 2022 Local interface llw0 Sun Feb 20 09:40:01.661 2022 Local interface utun0 Sun Feb 20 09:40:01.661 2022 Local interface utun1 Sun Feb 20 09:40:01.661 2022 Setting up network filter and lock Sun Feb 20 09:40:01.661 2022 Allowing system DNS 10.17.151.1 to pass through the network filter No ALTQ support in kernel ALTQ related functions disabled rules cleared nat cleared dummynet cleared 0 tables deleted. 0 states cleared source tracking entries cleared pf: statistics cleared pf: interface flags reset pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Sun Feb 20 09:40:01.674 2022 Adding IPv4 server 127.0.0.1 to network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Sun Feb 20 09:40:01.695 2022 Network filter and lock successfully activated Sun Feb 20 09:40:01.695 2022 Contacting 127.0.0.1:1413 via TCP Sun Feb 20 09:40:01.696 2022 EVENT: WAIT Sun Feb 20 09:40:01.696 2022 Sun Feb 20 09:40:01.696 2022 ERROR: TCP_CONNECT_ERROR Sun Feb 20 09:40:01.696 2022 Transport Error: TCP connect error on '127.0.0.1:1413' (127.0.0.1:1413): Connection refused Sun Feb 20 09:40:01.696 2022 Client terminated, restarting in 2000 ms... Sun Feb 20 09:40:03.699 2022 EVENT: RECONNECTING Sun Feb 20 09:40:03.702 2022 Successfully restored system DNS. Sun Feb 20 09:40:03.702 2022 ERROR: N_RECONNECT Sun Feb 20 09:40:03.702 2022 EVENT: RESOLVE Sun Feb 20 09:40:03.703 2022 Setting up network filter and lock Sun Feb 20 09:40:03.703 2022 Allowing system DNS 10.17.151.1 to pass through the network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Sun Feb 20 09:40:03.724 2022 Adding IPv4 server 127.0.0.1 to network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Sun Feb 20 09:40:03.742 2022 Network filter and lock successfully activated Sun Feb 20 09:40:03.742 2022 Contacting 127.0.0.1:1413 via TCP Sun Feb 20 09:40:03.742 2022 EVENT: WAIT Sun Feb 20 09:40:03.742 2022 Sun Feb 20 09:40:03.742 2022 ERROR: TCP_CONNECT_ERROR Sun Feb 20 09:40:03.742 2022 Transport Error: TCP connect error on '127.0.0.1:1413' (127.0.0.1:1413): Connection refused Sun Feb 20 09:40:03.742 2022 Client terminated, restarting in 2000 ms... ^CReceived SIGINT signal. Terminating Hummingbird. Sun Feb 20 09:40:04.525 2022 EVENT: DISCONNECTED Sun Feb 20 09:40:04.526 2022 WARNING: Backup copy of resolv.conf not found. DNS settings do not need to be restored. No ALTQ support in kernel ALTQ related functions disabled rules cleared nat cleared dummynet cleared 0 tables deleted. 0 states cleared source tracking entries cleared pf: statistics cleared pf: interface flags reset pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Sun Feb 20 09:40:04.537 2022 Network filter successfully restored Sun Feb 20 09:40:04.537 2022 Thread finished STATS: TCP_CONNECT_ERROR : 2 N_RECONNECT : 1 Quote Share this post Link to post
Staff 9971 Posted ... @Maggie144 Hello! The problem is here: Quote Sun Feb 20 09:40:03.742 2022 Transport Error: TCP connect error on '127.0.0.1:1413' (127.0.0.1:1413): Connection refused Apparently you have generated a configuration file for OpenVPN over SSH/TLS connections, i.e. OpenVPN should connect locally to a previously established SSH or TLS tunnel. Since SSH or stunnel do not run, OpenVPN fails. Can you please check and generate a new ovpn file? Kind regards Quote Share this post Link to post
Maggie144 12 Posted ... I've seen the local-connect via 127.0.0.1 but don't get it. I just generated some new ovpn files 1 AirVPN_SE-Uppsala_Alrami_UDP-443-Entry3.ovpn 2 AirVPN_SE-Uppsala_Alrami_UDP-41185-Entry3.ovpn 3 AirVPN_SE-Uppsala_Alrami_TCP-41185-Entry4.ovpn 4 AirVPN_SE-Uppsala_Alrami_SSH-38915-Entry4.ovpn 5 AirVPN_CH-Zurich_Hamal_SSL-28439-Entry4.ovpn can connect to 1-3 with Hummingbird 1.1.2, but 4-5 SSL & SSH configs still trying to connect locally.. with Hummingbird beta 1.2.0 I get the previously mentioned failure log on 1-5 When I was able to use Eddie still with Hummingbird as a base, SSL & SSH connections did not make any problems. Kind regards Quote Share this post Link to post
Staff 9971 Posted ... @Maggie144 Quote with Hummingbird beta 1.2.0 I get the previously mentioned failure log on 1-5 Hello! We can't reproduce the issue with config files generated with the same settings (for example Alrami, UDP, 443 etc.). Can you send us one of those files (1, 2, or 3, for 4 and 5 the outcome is expected), without certificate and key? Quote When I was able to use Eddie still with Hummingbird as a base, SSL & SSH connections did not make any problems. Yes, that's normal, because Eddie takes care to prepare the first tunnel (via SSH or stunnel) first, and only later it tells OpenVPN how to connect to that first tunnel. Kind regards Quote Share this post Link to post
Maggie144 12 Posted ... When I changed the ovpn file to GCM cipher manually, I'm now able to connect with Hummingbird 1.2.0 RC1 All seems fine, but I can't get any connection to the outside world - tried for several minutes, very strange Hummingbird - AirVPN OpenVPN 3 Client 1.2.0 RC 1 - 15 February 2022 OpenVPN core 3.7.2 AirVPN mac x86_64 64-bit Copyright (C) 2012-2020 OpenVPN Inc. All rights reserved. OpenSSL 1.1.1m 14 Dec 2021 Tue Feb 22 06:50:40.924 2022 System and service manager in use is launchd Tue Feb 22 06:50:40.930 2022 Network filter and lock are using pf No ALTQ support in kernel ALTQ related functions disabled pfctl: pf already enabled Tue Feb 22 06:50:40.933 2022 Starting thread Tue Feb 22 06:50:40.934 2022 OpenVPN core 3.7.2 AirVPN mac x86_64 64-bit Tue Feb 22 06:50:40.935 2022 Frame=512/2048/512 mssfix-ctrl=1250 Tue Feb 22 06:50:40.938 2022 UNUSED OPTIONS 3 [resolv-retry] [infinite] 4 [nobind] 5 [persist-key] 6 [persist-tun] 7 [auth-nocache] 8 [verb] [3] 9 [explicit-exit-notify] [5] 10 [rcvbuf] [262144] 11 [sndbuf] [262144] Tue Feb 22 06:50:40.938 2022 EVENT: RESOLVE Tue Feb 22 06:50:40.939 2022 Local IPv6 address fe80::1 Tue Feb 22 06:50:40.939 2022 Local IPv4 address 192.168.178.30 Tue Feb 22 06:50:40.939 2022 Local IPv6 address fe80::e46b:6fff:fedc:bcf4 Tue Feb 22 06:50:40.939 2022 Local IPv6 address fe80::e46b:6fff:fedc:bcf4 Tue Feb 22 06:50:40.939 2022 Local IPv6 address fe80::5c2:fd71:99f4:c60a Tue Feb 22 06:50:40.939 2022 Local IPv6 address fe80::a251:d431:a0c9:7e62 Tue Feb 22 06:50:40.939 2022 Local interface gif0 Tue Feb 22 06:50:40.939 2022 Local interface stf0 Tue Feb 22 06:50:40.940 2022 Local interface XHC20 Tue Feb 22 06:50:40.940 2022 Local interface en0 Tue Feb 22 06:50:40.940 2022 Local interface en1 Tue Feb 22 06:50:40.940 2022 Local interface en2 Tue Feb 22 06:50:40.940 2022 Local interface bridge0 Tue Feb 22 06:50:40.940 2022 Local interface p2p0 Tue Feb 22 06:50:40.940 2022 Local interface awdl0 Tue Feb 22 06:50:40.940 2022 Local interface llw0 Tue Feb 22 06:50:40.940 2022 Local interface utun0 Tue Feb 22 06:50:40.940 2022 Local interface utun1 Tue Feb 22 06:50:40.940 2022 Setting up network filter and lock Tue Feb 22 06:50:40.940 2022 Allowing system DNS 10.17.151.1 to pass through the network filter No ALTQ support in kernel ALTQ related functions disabled rules cleared nat cleared dummynet cleared 0 tables deleted. 0 states cleared source tracking entries cleared pf: statistics cleared pf: interface flags reset pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 06:50:40.955 2022 Adding IPv4 server 195.206.105.205 to network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 06:50:40.972 2022 Network filter and lock successfully activated Tue Feb 22 06:50:40.973 2022 Contacting 195.206.105.205:53 via UDP Tue Feb 22 06:50:40.973 2022 EVENT: WAIT Tue Feb 22 06:50:40.973 2022 Tue Feb 22 06:50:40.974 2022 Connecting to [195.206.105.205]:53 (195.206.105.205) via UDPv4 Tue Feb 22 06:50:41.163 2022 EVENT: CONNECTING Tue Feb 22 06:50:41.164 2022 Tunnel Options:V4,dev-type tun,link-mtu 1522,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client Tue Feb 22 06:50:41.164 2022 Peer Info: IV_VER=3.7.2 AirVPN IV_PLAT=mac IV_NCP=2 IV_TCPNL=1 IV_PROTO=30 IV_CIPHERS=AES-256-GCM IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 UV_IPV6=yes IV_GUI_VER=Hummingbird - AirVPN OpenVPN 3 Client 1.2.0 RC 1 IV_HWADDR=18:65:90:d6:c1:dd IV_SSL=OpenSSL 1.1.1m 14 Dec 2021 Tue Feb 22 06:50:41.199 2022 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA512 Tue Feb 22 06:50:41.200 2022 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Sextans/emailAddress=info@airvpn.org, signature: RSA-SHA512 Tue Feb 22 06:50:41.242 2022 SSL Handshake: peer certificate: CN=Sextans, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Tue Feb 22 06:50:41.242 2022 Session is ACTIVE Tue Feb 22 06:50:41.242 2022 EVENT: GET_CONFIG Tue Feb 22 06:50:41.242 2022 Sending PUSH_REQUEST to server... Tue Feb 22 06:50:41.357 2022 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [ipv6] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.17.150.1] 3 [dhcp-option] [DNS6] [fde6:7a:7d20:d96::1] 4 [tun-ipv6] 5 [route-gateway] [10.17.150.1] 6 [topology] [subnet] 7 [ping] [10] 8 [ping-restart] [60] 9 [ifconfig-ipv6] [fde6:7a:7d20:d96::1094/64] [fde6:7a:7d20:d96::1] 10 [ifconfig] [10.17.150.150] [255.255.255.0] 11 [peer-id] [4] 12 [cipher] [AES-256-GCM] Tue Feb 22 06:50:41.357 2022 PROTOCOL OPTIONS: cipher: AES-256-GCM digest: NONE ncp enabled: yes key-derivation: OpenVPN PRF compress: LZO_STUB peer ID: 4 control channel: tls-crypt enabled Tue Feb 22 06:50:41.357 2022 EVENT: ASSIGN_IP Tue Feb 22 06:50:41.357 2022 VPN Server has pushed IPv4 DNS server 10.17.150.1 No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 06:50:41.376 2022 VPN Server has pushed IPv6 DNS server fde6:7a:7d20:d96::1 No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled ERROR: cannot detect IPv6 default gateway /sbin/ifconfig utun2 down /sbin/ifconfig utun2 10.17.150.150 10.17.150.1 netmask 255.255.255.0 mtu 1500 up /sbin/route add -net 10.17.150.0 -netmask 255.255.255.0 10.17.150.150 add net 10.17.150.0: gateway 10.17.150.150 /sbin/ifconfig utun2 inet6 fde6:7a:7d20:d96::1094/64 up /sbin/route add -net -inet6 fde6:7a:7d20:d96:: -prefixlen 64 -iface utun2 route: writing to routing socket: File exists add net fde6:7a:7d20:d96::: gateway utun2: File exists /sbin/route add -net 195.206.105.205 -netmask 255.255.255.255 192.168.178.1 add net 195.206.105.205: gateway 192.168.178.1 /sbin/route add -net 0.0.0.0 -netmask 128.0.0.0 10.17.150.1 add net 0.0.0.0: gateway 10.17.150.1 /sbin/route add -net 128.0.0.0 -netmask 128.0.0.0 10.17.150.1 add net 128.0.0.0: gateway 10.17.150.1 /sbin/route add -net -inet6 :: -prefixlen 1 -iface utun2 add net ::: gateway utun2 /sbin/route add -net -inet6 8000:: -prefixlen 1 -iface utun2 add net 8000::: gateway utun2 MacDNSAction: FLAGS=F RD=1 SO=5000 DNS=10.17.150.1,fde6:7a:7d20:d96::1 DOM= ADS= Tue Feb 22 06:50:41.423 2022 DSDict: updated Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS Tue Feb 22 06:50:41.424 2022 DSDict: updated State:/Network/Service/OpenVPNConnect/Info Tue Feb 22 06:50:41.424 2022 MacDNS: SETDNS 19.6.0 *** DSDict State:/Network/Global/IPv4 ORIG { PrimaryInterface = en0; PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; Router = "192.168.178.1"; } *** DSDict State:/Network/Service/OpenVPNConnect/Info ORIG { } MODIFIED { PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; } *** DSDict State:/Network/Service/OpenVPNConnect/DNS ORIG { } *** DSDict Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS ORIG { ServerAddresses = ( "10.17.151.1" ); } MODIFIED { OpenVPNConnectOrigSearchDomains = OpenVPNConnectDeleteValue; OpenVPNConnectOrigSearchOrder = OpenVPNConnectDeleteValue; OpenVPNConnectOrigServerAddresses = ( "10.17.151.1" ); SearchOrder = 5000; ServerAddresses = ( "10.17.150.1", "fde6:7a:7d20:d96::1" ); } Tue Feb 22 06:50:41.424 2022 /usr/bin/dscacheutil -flushcache Tue Feb 22 06:50:41.431 2022 /usr/bin/killall -HUP mDNSResponder Tue Feb 22 06:50:41.439 2022 DSDict: SCDynamicStoreNotifyValue Setup:/Network/Global/IPv4 open utun2 SUCCEEDED Tue Feb 22 06:50:41.439 2022 Connected via tun Tue Feb 22 06:50:41.439 2022 LZO-ASYM init swap=0 asym=1 Tue Feb 22 06:50:41.439 2022 Comp-stub init swap=0 Tue Feb 22 06:50:41.439 2022 EVENT: CONNECTED 195.206.105.205:53 (195.206.105.205) via /UDPv4 on tun/10.17.150.150/fde6:7a:7d20:d96::1094 gw=[10.17.150.1/fde6:7a:7d20:d96::1] No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 06:50:41.463 2022 Server has pushed its own DNS. Removing system DNS from network filter. No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 06:50:41.487 2022 System DNS 10.17.151.1 is now rejected by the network filter Tue Feb 22 06:51:51.806 2022 ERROR: KEEPALIVE_TIMEOUT Tue Feb 22 06:51:51.806 2022 Session invalidated: KEEPALIVE_TIMEOUT Tue Feb 22 06:51:51.806 2022 Client terminated, restarting in 2000 ms... Tue Feb 22 06:51:51.831 2022 DSDict: updated Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS Tue Feb 22 06:51:51.831 2022 DSDict: removed State:/Network/Service/OpenVPNConnect/Info Tue Feb 22 06:51:51.831 2022 MacDNS: RESETDNS 19.6.0 *** DSDict State:/Network/Global/IPv4 ORIG { PrimaryInterface = en0; PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; Router = "192.168.178.1"; } *** DSDict State:/Network/Service/OpenVPNConnect/Info ORIG { PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; } *** DSDict State:/Network/Service/OpenVPNConnect/DNS ORIG { } *** DSDict Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS ORIG { OpenVPNConnectOrigSearchDomains = OpenVPNConnectDeleteValue; OpenVPNConnectOrigSearchOrder = OpenVPNConnectDeleteValue; OpenVPNConnectOrigServerAddresses = ( "10.17.151.1" ); SearchOrder = 5000; ServerAddresses = ( "10.17.150.1", "fde6:7a:7d20:d96::1" ); } MODIFIED { ServerAddresses = ( "10.17.151.1" ); } Tue Feb 22 06:51:51.831 2022 /usr/bin/dscacheutil -flushcache Tue Feb 22 06:51:51.840 2022 /usr/bin/killall -HUP mDNSResponder Tue Feb 22 06:51:51.848 2022 DSDict: SCDynamicStoreNotifyValue Setup:/Network/Global/IPv4 Tue Feb 22 06:51:51.848 2022 /sbin/route delete -net 10.17.150.0 -netmask 255.255.255.0 10.17.150.150 delete net 10.17.150.0: gateway 10.17.150.150 /sbin/route delete -net -inet6 fde6:7a:7d20:d96:: -prefixlen 64 -iface utun2 delete net fde6:7a:7d20:d96::: gateway utun2 /sbin/route delete -net 195.206.105.205 -netmask 255.255.255.255 192.168.178.1 delete net 195.206.105.205: gateway 192.168.178.1 /sbin/route delete -net 0.0.0.0 -netmask 128.0.0.0 10.17.150.1 delete net 0.0.0.0: gateway 10.17.150.1 /sbin/route delete -net 128.0.0.0 -netmask 128.0.0.0 10.17.150.1 delete net 128.0.0.0: gateway 10.17.150.1 /sbin/route delete -net -inet6 :: -prefixlen 1 -iface utun2 delete net ::: gateway utun2 /sbin/route delete -net -inet6 8000:: -prefixlen 1 -iface utun2 delete net 8000::: gateway utun2 /sbin/ifconfig utun2 down MacDNSAction: FLAGS=F Tue Feb 22 06:51:53.808 2022 EVENT: RECONNECTING Tue Feb 22 06:51:53.810 2022 Successfully restored system DNS. Tue Feb 22 06:51:53.810 2022 ERROR: N_RECONNECT Tue Feb 22 06:51:53.810 2022 EVENT: RESOLVE Tue Feb 22 06:51:53.810 2022 Setting up network filter and lock Tue Feb 22 06:51:53.811 2022 Allowing system DNS 10.17.151.1 to pass through the network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 06:51:53.831 2022 Adding IPv4 server 195.206.105.205 to network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 06:51:53.852 2022 Network filter and lock successfully activated Tue Feb 22 06:51:53.852 2022 Contacting 195.206.105.205:53 via UDP Tue Feb 22 06:51:53.852 2022 EVENT: WAIT Tue Feb 22 06:51:53.852 2022 Tue Feb 22 06:51:53.852 2022 Connecting to [195.206.105.205]:53 (195.206.105.205) via UDPv4 Tue Feb 22 06:51:54.042 2022 EVENT: CONNECTING Tue Feb 22 06:51:54.043 2022 Tunnel Options:V4,dev-type tun,link-mtu 1522,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client Tue Feb 22 06:51:54.043 2022 Peer Info: IV_VER=3.7.2 AirVPN IV_PLAT=mac IV_NCP=2 IV_TCPNL=1 IV_PROTO=30 IV_CIPHERS=AES-256-GCM IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 UV_IPV6=yes IV_GUI_VER=Hummingbird - AirVPN OpenVPN 3 Client 1.2.0 RC 1 IV_HWADDR=18:65:90:d6:c1:dd IV_SSL=OpenSSL 1.1.1m 14 Dec 2021 Tue Feb 22 06:51:54.077 2022 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA512 Tue Feb 22 06:51:54.077 2022 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Sextans/emailAddress=info@airvpn.org, signature: RSA-SHA512 Tue Feb 22 06:51:54.114 2022 SSL Handshake: peer certificate: CN=Sextans, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Tue Feb 22 06:51:54.114 2022 Session is ACTIVE Tue Feb 22 06:51:54.115 2022 EVENT: GET_CONFIG Tue Feb 22 06:51:54.115 2022 Sending PUSH_REQUEST to server... Tue Feb 22 06:51:54.370 2022 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [ipv6] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.17.150.1] 3 [dhcp-option] [DNS6] [fde6:7a:7d20:d96::1] 4 [tun-ipv6] 5 [route-gateway] [10.17.150.1] 6 [topology] [subnet] 7 [ping] [10] 8 [ping-restart] [60] 9 [ifconfig-ipv6] [fde6:7a:7d20:d96::1094/64] [fde6:7a:7d20:d96::1] 10 [ifconfig] [10.17.150.150] [255.255.255.0] 11 [peer-id] [6] 12 [cipher] [AES-256-GCM] Tue Feb 22 06:51:54.370 2022 PROTOCOL OPTIONS: cipher: AES-256-GCM digest: NONE ncp enabled: yes key-derivation: OpenVPN PRF compress: LZO_STUB peer ID: 6 control channel: tls-crypt enabled Tue Feb 22 06:51:54.370 2022 EVENT: ASSIGN_IP Tue Feb 22 06:51:54.370 2022 VPN Server has pushed IPv4 DNS server 10.17.150.1 No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 06:51:54.391 2022 VPN Server has pushed IPv6 DNS server fde6:7a:7d20:d96::1 No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled ERROR: cannot detect IPv6 default gateway /sbin/ifconfig utun2 down /sbin/ifconfig utun2 10.17.150.150 10.17.150.1 netmask 255.255.255.0 mtu 1500 up /sbin/route add -net 10.17.150.0 -netmask 255.255.255.0 10.17.150.150 add net 10.17.150.0: gateway 10.17.150.150 /sbin/ifconfig utun2 inet6 fde6:7a:7d20:d96::1094/64 up /sbin/route add -net -inet6 fde6:7a:7d20:d96:: -prefixlen 64 -iface utun2 route: writing to routing socket: File exists add net fde6:7a:7d20:d96::: gateway utun2: File exists /sbin/route add -net 195.206.105.205 -netmask 255.255.255.255 192.168.178.1 add net 195.206.105.205: gateway 192.168.178.1 /sbin/route add -net 0.0.0.0 -netmask 128.0.0.0 10.17.150.1 add net 0.0.0.0: gateway 10.17.150.1 /sbin/route add -net 128.0.0.0 -netmask 128.0.0.0 10.17.150.1 add net 128.0.0.0: gateway 10.17.150.1 /sbin/route add -net -inet6 :: -prefixlen 1 -iface utun2 add net ::: gateway utun2 /sbin/route add -net -inet6 8000:: -prefixlen 1 -iface utun2 add net 8000::: gateway utun2 MacDNSAction: FLAGS=F RD=1 SO=5000 DNS=10.17.150.1,fde6:7a:7d20:d96::1,10.17.150.1,fde6:7a:7d20:d96::1 DOM= ADS= Tue Feb 22 06:51:54.438 2022 DSDict: updated Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS Tue Feb 22 06:51:54.438 2022 DSDict: updated State:/Network/Service/OpenVPNConnect/Info Tue Feb 22 06:51:54.438 2022 MacDNS: SETDNS 19.6.0 *** DSDict State:/Network/Global/IPv4 ORIG { PrimaryInterface = en0; PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; Router = "192.168.178.1"; } *** DSDict State:/Network/Service/OpenVPNConnect/Info ORIG { } MODIFIED { PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; } *** DSDict State:/Network/Service/OpenVPNConnect/DNS ORIG { } *** DSDict Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS ORIG { ServerAddresses = ( "10.17.151.1" ); } MODIFIED { OpenVPNConnectOrigSearchDomains = OpenVPNConnectDeleteValue; OpenVPNConnectOrigSearchOrder = OpenVPNConnectDeleteValue; OpenVPNConnectOrigServerAddresses = ( "10.17.151.1" ); SearchOrder = 5000; ServerAddresses = ( "10.17.150.1", "fde6:7a:7d20:d96::1", "10.17.150.1", "fde6:7a:7d20:d96::1" ); } Tue Feb 22 06:51:54.438 2022 /usr/bin/dscacheutil -flushcache Tue Feb 22 06:51:54.448 2022 /usr/bin/killall -HUP mDNSResponder Tue Feb 22 06:51:54.456 2022 DSDict: SCDynamicStoreNotifyValue Setup:/Network/Global/IPv4 open utun2 SUCCEEDED Tue Feb 22 06:51:54.456 2022 Connected via tun Tue Feb 22 06:51:54.456 2022 LZO-ASYM init swap=0 asym=1 Tue Feb 22 06:51:54.456 2022 Comp-stub init swap=0 Tue Feb 22 06:51:54.456 2022 EVENT: CONNECTED 195.206.105.205:53 (195.206.105.205) via /UDPv4 on tun/10.17.150.150/fde6:7a:7d20:d96::1094 gw=[10.17.150.1/fde6:7a:7d20:d96::1] Tue Feb 22 06:51:54.456 2022 Server has pushed its own DNS. Removing system DNS from network filter. No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 06:51:54.479 2022 System DNS 10.17.151.1 is now rejected by the network filter Tue Feb 22 06:53:04.920 2022 ERROR: KEEPALIVE_TIMEOUT Tue Feb 22 06:53:04.920 2022 Session invalidated: KEEPALIVE_TIMEOUT Tue Feb 22 06:53:04.920 2022 Client terminated, restarting in 2000 ms... Tue Feb 22 06:53:04.944 2022 DSDict: updated Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS Tue Feb 22 06:53:04.944 2022 DSDict: removed State:/Network/Service/OpenVPNConnect/Info Tue Feb 22 06:53:04.944 2022 MacDNS: RESETDNS 19.6.0 *** DSDict State:/Network/Global/IPv4 ORIG { PrimaryInterface = en0; PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; Router = "192.168.178.1"; } *** DSDict State:/Network/Service/OpenVPNConnect/Info ORIG { PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; } *** DSDict State:/Network/Service/OpenVPNConnect/DNS ORIG { } *** DSDict Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS ORIG { OpenVPNConnectOrigSearchDomains = OpenVPNConnectDeleteValue; OpenVPNConnectOrigSearchOrder = OpenVPNConnectDeleteValue; OpenVPNConnectOrigServerAddresses = ( "10.17.151.1" ); SearchOrder = 5000; ServerAddresses = ( "10.17.150.1", "fde6:7a:7d20:d96::1", "10.17.150.1", "fde6:7a:7d20:d96::1" ); } MODIFIED { ServerAddresses = ( "10.17.151.1" ); } Tue Feb 22 06:53:04.944 2022 /usr/bin/dscacheutil -flushcache Tue Feb 22 06:53:04.952 2022 /usr/bin/killall -HUP mDNSResponder Tue Feb 22 06:53:04.961 2022 DSDict: SCDynamicStoreNotifyValue Setup:/Network/Global/IPv4 Tue Feb 22 06:53:04.961 2022 /sbin/route delete -net 10.17.150.0 -netmask 255.255.255.0 10.17.150.150 delete net 10.17.150.0: gateway 10.17.150.150 /sbin/route delete -net -inet6 fde6:7a:7d20:d96:: -prefixlen 64 -iface utun2 delete net fde6:7a:7d20:d96::: gateway utun2 /sbin/route delete -net 195.206.105.205 -netmask 255.255.255.255 192.168.178.1 delete net 195.206.105.205: gateway 192.168.178.1 /sbin/route delete -net 0.0.0.0 -netmask 128.0.0.0 10.17.150.1 delete net 0.0.0.0: gateway 10.17.150.1 /sbin/route delete -net 128.0.0.0 -netmask 128.0.0.0 10.17.150.1 delete net 128.0.0.0: gateway 10.17.150.1 /sbin/route delete -net -inet6 :: -prefixlen 1 -iface utun2 delete net ::: gateway utun2 /sbin/route delete -net -inet6 8000:: -prefixlen 1 -iface utun2 delete net 8000::: gateway utun2 /sbin/ifconfig utun2 down MacDNSAction: FLAGS=F Tue Feb 22 06:53:06.920 2022 EVENT: RECONNECTING Tue Feb 22 06:53:06.920 2022 WARNING: Backup copy of resolv.conf not found. DNS settings do not need to be restored. Tue Feb 22 06:53:06.920 2022 ERROR: N_RECONNECT Tue Feb 22 06:53:06.920 2022 EVENT: RESOLVE Tue Feb 22 06:53:06.920 2022 Setting up network filter and lock Tue Feb 22 06:53:06.920 2022 Allowing system DNS 10.17.151.1 to pass through the network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 06:53:06.940 2022 Adding IPv4 server 195.206.105.205 to network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 06:53:06.960 2022 Network filter and lock successfully activated Tue Feb 22 06:53:06.960 2022 Contacting 195.206.105.205:53 via UDP Tue Feb 22 06:53:06.960 2022 EVENT: WAIT Tue Feb 22 06:53:06.960 2022 Tue Feb 22 06:53:06.960 2022 Connecting to [195.206.105.205]:53 (195.206.105.205) via UDPv4 Tue Feb 22 06:53:07.211 2022 EVENT: CONNECTING Tue Feb 22 06:53:07.211 2022 Tunnel Options:V4,dev-type tun,link-mtu 1522,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client Tue Feb 22 06:53:07.211 2022 Peer Info: IV_VER=3.7.2 AirVPN IV_PLAT=mac IV_NCP=2 IV_TCPNL=1 IV_PROTO=30 IV_CIPHERS=AES-256-GCM IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 UV_IPV6=yes IV_GUI_VER=Hummingbird - AirVPN OpenVPN 3 Client 1.2.0 RC 1 IV_HWADDR=18:65:90:d6:c1:dd IV_SSL=OpenSSL 1.1.1m 14 Dec 2021 Tue Feb 22 06:53:07.247 2022 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA512 Tue Feb 22 06:53:07.247 2022 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Sextans/emailAddress=info@airvpn.org, signature: RSA-SHA512 Tue Feb 22 06:53:07.287 2022 SSL Handshake: peer certificate: CN=Sextans, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Tue Feb 22 06:53:07.287 2022 Session is ACTIVE Tue Feb 22 06:53:07.287 2022 EVENT: GET_CONFIG Tue Feb 22 06:53:07.287 2022 Sending PUSH_REQUEST to server... Tue Feb 22 06:53:07.454 2022 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [ipv6] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.17.150.1] 3 [dhcp-option] [DNS6] [fde6:7a:7d20:d96::1] 4 [tun-ipv6] 5 [route-gateway] [10.17.150.1] 6 [topology] [subnet] 7 [ping] [10] 8 [ping-restart] [60] 9 [ifconfig-ipv6] [fde6:7a:7d20:d96::1094/64] [fde6:7a:7d20:d96::1] 10 [ifconfig] [10.17.150.150] [255.255.255.0] 11 [peer-id] [4] 12 [cipher] [AES-256-GCM] Tue Feb 22 06:53:07.454 2022 PROTOCOL OPTIONS: cipher: AES-256-GCM digest: NONE ncp enabled: yes key-derivation: OpenVPN PRF compress: LZO_STUB peer ID: 4 control channel: tls-crypt enabled Tue Feb 22 06:53:07.454 2022 EVENT: ASSIGN_IP Tue Feb 22 06:53:07.454 2022 VPN Server has pushed IPv4 DNS server 10.17.150.1 No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 06:53:07.477 2022 VPN Server has pushed IPv6 DNS server fde6:7a:7d20:d96::1 No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled ERROR: cannot detect IPv6 default gateway /sbin/ifconfig utun2 down /sbin/ifconfig utun2 10.17.150.150 10.17.150.1 netmask 255.255.255.0 mtu 1500 up /sbin/route add -net 10.17.150.0 -netmask 255.255.255.0 10.17.150.150 add net 10.17.150.0: gateway 10.17.150.150 /sbin/ifconfig utun2 inet6 fde6:7a:7d20:d96::1094/64 up /sbin/route add -net -inet6 fde6:7a:7d20:d96:: -prefixlen 64 -iface utun2 route: writing to routing socket: File exists add net fde6:7a:7d20:d96::: gateway utun2: File exists /sbin/route add -net 195.206.105.205 -netmask 255.255.255.255 192.168.178.1 add net 195.206.105.205: gateway 192.168.178.1 /sbin/route add -net 0.0.0.0 -netmask 128.0.0.0 10.17.150.1 add net 0.0.0.0: gateway 10.17.150.1 /sbin/route add -net 128.0.0.0 -netmask 128.0.0.0 10.17.150.1 add net 128.0.0.0: gateway 10.17.150.1 /sbin/route add -net -inet6 :: -prefixlen 1 -iface utun2 add net ::: gateway utun2 /sbin/route add -net -inet6 8000:: -prefixlen 1 -iface utun2 add net 8000::: gateway utun2 MacDNSAction: FLAGS=F RD=1 SO=5000 DNS=10.17.150.1,fde6:7a:7d20:d96::1,10.17.150.1,fde6:7a:7d20:d96::1,10.17.150.1,fde6:7a:7d20:d96::1 DOM= ADS= Tue Feb 22 06:53:07.523 2022 DSDict: updated Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS Tue Feb 22 06:53:07.523 2022 DSDict: updated State:/Network/Service/OpenVPNConnect/Info Tue Feb 22 06:53:07.524 2022 MacDNS: SETDNS 19.6.0 *** DSDict State:/Network/Global/IPv4 ORIG { PrimaryInterface = en0; PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; Router = "192.168.178.1"; } *** DSDict State:/Network/Service/OpenVPNConnect/Info ORIG { } MODIFIED { PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; } *** DSDict State:/Network/Service/OpenVPNConnect/DNS ORIG { } *** DSDict Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS ORIG { ServerAddresses = ( "10.17.151.1" ); } MODIFIED { OpenVPNConnectOrigSearchDomains = OpenVPNConnectDeleteValue; OpenVPNConnectOrigSearchOrder = OpenVPNConnectDeleteValue; OpenVPNConnectOrigServerAddresses = ( "10.17.151.1" ); SearchOrder = 5000; ServerAddresses = ( "10.17.150.1", "fde6:7a:7d20:d96::1", "10.17.150.1", "fde6:7a:7d20:d96::1", "10.17.150.1", "fde6:7a:7d20:d96::1" ); } Tue Feb 22 06:53:07.524 2022 /usr/bin/dscacheutil -flushcache Tue Feb 22 06:53:07.530 2022 /usr/bin/killall -HUP mDNSResponder Tue Feb 22 06:53:07.539 2022 DSDict: SCDynamicStoreNotifyValue Setup:/Network/Global/IPv4 open utun2 SUCCEEDED Tue Feb 22 06:53:07.540 2022 Connected via tun Tue Feb 22 06:53:07.540 2022 LZO-ASYM init swap=0 asym=1 Tue Feb 22 06:53:07.540 2022 Comp-stub init swap=0 Tue Feb 22 06:53:07.540 2022 EVENT: CONNECTED 195.206.105.205:53 (195.206.105.205) via /UDPv4 on tun/10.17.150.150/fde6:7a:7d20:d96::1094 gw=[10.17.150.1/fde6:7a:7d20:d96::1] Tue Feb 22 06:53:07.540 2022 Server has pushed its own DNS. Removing system DNS from network filter. No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 06:53:07.563 2022 System DNS 10.17.151.1 is now rejected by the network filter Kind regards Quote Share this post Link to post
Staff 9971 Posted ... @Maggie144 Hello! Now the connection goes through but it's broken almost immediately, that's why you can't browse: Quote Tue Feb 22 06:50:41.487 2022 System DNS 10.17.151.1 is now rejected by the network filter Tue Feb 22 06:51:51.806 2022 ERROR: KEEPALIVE_TIMEOUT Tue Feb 22 06:51:51.806 2022 Session invalidated: KEEPALIVE_TIMEOUT We also notice that your system DNS setting seems wrong (10.17.151.1 is a DNS of another subnet of the same VPN server you're connecting to), as if a system restore from a previous connection to the same server on a different port was not performed correctly. Please try the following procedure and let's see whether the problem is resolved and if it re-occurs: make sure that Hummingbird is not running verify the DNS settings of your system and set the correct DNS delete the whole content of /etc/airvpn with command "sudo rm /etc/airvpn/*" reboot the system try again a connection with Hummingbird Kind regards Quote Share this post Link to post
Maggie144 12 Posted ... did follow your suggested procedure, with a new system DNS (5.9.164.11), airvpn directory was empty already. Hummingbird 1.2.0 logs with GCM sudo ./hummingbird servers/CH-2.ovpn Hummingbird - AirVPN OpenVPN 3 Client 1.2.0 RC 1 - 15 February 2022 OpenVPN core 3.7.2 AirVPN mac x86_64 64-bit Copyright (C) 2012-2020 OpenVPN Inc. All rights reserved. OpenSSL 1.1.1m 14 Dec 2021 Tue Feb 22 14:05:24.413 2022 System and service manager in use is launchd Tue Feb 22 14:05:24.435 2022 Network filter and lock are using pf No ALTQ support in kernel ALTQ related functions disabled pfctl: pf already enabled Tue Feb 22 14:05:24.446 2022 Starting thread Tue Feb 22 14:05:24.446 2022 OpenVPN core 3.7.2 AirVPN mac x86_64 64-bit Tue Feb 22 14:05:24.446 2022 Frame=512/2048/512 mssfix-ctrl=1250 Tue Feb 22 14:05:24.448 2022 UNUSED OPTIONS 3 [resolv-retry] [infinite] 4 [nobind] 5 [persist-key] 6 [persist-tun] 7 [auth-nocache] 8 [verb] [3] 9 [explicit-exit-notify] [5] 10 [rcvbuf] [262144] 11 [sndbuf] [262144] Tue Feb 22 14:05:24.448 2022 EVENT: RESOLVE Tue Feb 22 14:05:24.449 2022 Local IPv6 address fe80::1 Tue Feb 22 14:05:24.449 2022 Local IPv4 address 192.168.178.30 Tue Feb 22 14:05:24.449 2022 Local IPv6 address fe80::d0c7:eff:fe98:21cf Tue Feb 22 14:05:24.449 2022 Local IPv6 address fe80::d0c7:eff:fe98:21cf Tue Feb 22 14:05:24.449 2022 Local IPv6 address fe80::f7b5:ebe9:48ef:450a Tue Feb 22 14:05:24.449 2022 Local IPv6 address fe80::7170:fc7b:f9d6:daae Tue Feb 22 14:05:24.449 2022 Local interface gif0 Tue Feb 22 14:05:24.449 2022 Local interface stf0 Tue Feb 22 14:05:24.449 2022 Local interface XHC20 Tue Feb 22 14:05:24.449 2022 Local interface en0 Tue Feb 22 14:05:24.449 2022 Local interface en1 Tue Feb 22 14:05:24.449 2022 Local interface en2 Tue Feb 22 14:05:24.449 2022 Local interface bridge0 Tue Feb 22 14:05:24.449 2022 Local interface p2p0 Tue Feb 22 14:05:24.449 2022 Local interface awdl0 Tue Feb 22 14:05:24.449 2022 Local interface llw0 Tue Feb 22 14:05:24.458 2022 Local interface utun0 Tue Feb 22 14:05:24.458 2022 Local interface utun1 Tue Feb 22 14:05:24.458 2022 Setting up network filter and lock Tue Feb 22 14:05:24.458 2022 Allowing system DNS 5.9.164.112 to pass through the network filter Tue Feb 22 14:05:24.458 2022 Allowing system DNS 5.9.164.112 to pass through the network filter No ALTQ support in kernel ALTQ related functions disabled rules cleared nat cleared dummynet cleared 0 tables deleted. 0 states cleared source tracking entries cleared pf: statistics cleared pf: interface flags reset pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:05:24.488 2022 Adding IPv4 server 91.214.169.71 to network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:05:24.541 2022 Network filter and lock successfully activated Tue Feb 22 14:05:24.542 2022 Contacting 91.214.169.71:53 via UDP Tue Feb 22 14:05:24.542 2022 EVENT: WAIT Tue Feb 22 14:05:24.542 2022 Tue Feb 22 14:05:24.542 2022 Connecting to [91.214.169.71]:53 (91.214.169.71) via UDPv4 Tue Feb 22 14:05:24.803 2022 EVENT: CONNECTING Tue Feb 22 14:05:24.804 2022 Tunnel Options:V4,dev-type tun,link-mtu 1522,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client Tue Feb 22 14:05:24.804 2022 Peer Info: IV_VER=3.7.2 AirVPN IV_PLAT=mac IV_NCP=2 IV_TCPNL=1 IV_PROTO=30 IV_CIPHERS=AES-256-GCM IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 UV_IPV6=yes IV_GUI_VER=Hummingbird - AirVPN OpenVPN 3 Client 1.2.0 RC 1 IV_HWADDR=18:65:90:d6:c1:dd IV_SSL=OpenSSL 1.1.1m 14 Dec 2021 Tue Feb 22 14:05:24.862 2022 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA512 Tue Feb 22 14:05:24.863 2022 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Kitalpha/emailAddress=info@airvpn.org, signature: RSA-SHA512 Tue Feb 22 14:05:24.912 2022 SSL Handshake: peer certificate: CN=Kitalpha, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Tue Feb 22 14:05:24.912 2022 Session is ACTIVE Tue Feb 22 14:05:24.912 2022 EVENT: GET_CONFIG Tue Feb 22 14:05:24.912 2022 Sending PUSH_REQUEST to server... Tue Feb 22 14:05:25.034 2022 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.20.6.1] 3 [route-gateway] [10.20.6.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.20.6.230] [255.255.255.0] 8 [peer-id] [1] 9 [cipher] [AES-256-GCM] Tue Feb 22 14:05:25.034 2022 PROTOCOL OPTIONS: cipher: AES-256-GCM digest: NONE ncp enabled: yes key-derivation: OpenVPN PRF compress: LZO_STUB peer ID: 1 control channel: tls-crypt enabled Tue Feb 22 14:05:25.035 2022 EVENT: ASSIGN_IP Tue Feb 22 14:05:25.035 2022 VPN Server has pushed IPv4 DNS server 10.20.6.1 No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled /sbin/ifconfig utun2 down /sbin/ifconfig utun2 10.20.6.230 10.20.6.1 netmask 255.255.255.0 mtu 1500 up /sbin/route add -net 10.20.6.0 -netmask 255.255.255.0 10.20.6.230 add net 10.20.6.0: gateway 10.20.6.230 /sbin/route add -net 91.214.169.71 -netmask 255.255.255.255 192.168.178.1 add net 91.214.169.71: gateway 192.168.178.1 /sbin/route add -net 0.0.0.0 -netmask 128.0.0.0 10.20.6.1 add net 0.0.0.0: gateway 10.20.6.1 /sbin/route add -net 128.0.0.0 -netmask 128.0.0.0 10.20.6.1 add net 128.0.0.0: gateway 10.20.6.1 MacDNSAction: FLAGS=F RD=1 SO=5000 DNS=10.20.6.1 DOM= ADS= Tue Feb 22 14:05:25.136 2022 DSDict: updated Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS Tue Feb 22 14:05:25.136 2022 DSDict: updated State:/Network/Service/OpenVPNConnect/Info Tue Feb 22 14:05:25.136 2022 MacDNS: SETDNS 19.6.0 *** DSDict State:/Network/Global/IPv4 ORIG { PrimaryInterface = en0; PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; Router = "192.168.178.1"; } *** DSDict State:/Network/Service/OpenVPNConnect/Info ORIG { } MODIFIED { PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; } *** DSDict State:/Network/Service/OpenVPNConnect/DNS ORIG { } *** DSDict Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS ORIG { ServerAddresses = ( "5.9.164.112", "5.9.164.112" ); } MODIFIED { OpenVPNConnectOrigSearchDomains = OpenVPNConnectDeleteValue; OpenVPNConnectOrigSearchOrder = OpenVPNConnectDeleteValue; OpenVPNConnectOrigServerAddresses = ( "5.9.164.112", "5.9.164.112" ); SearchOrder = 5000; ServerAddresses = ( "10.20.6.1" ); } Tue Feb 22 14:05:25.137 2022 /usr/bin/dscacheutil -flushcache Tue Feb 22 14:05:25.153 2022 /usr/bin/killall -HUP mDNSResponder Tue Feb 22 14:05:25.166 2022 DSDict: SCDynamicStoreNotifyValue Setup:/Network/Global/IPv4 open utun2 SUCCEEDED Tue Feb 22 14:05:25.167 2022 Connected via tun Tue Feb 22 14:05:25.167 2022 LZO-ASYM init swap=0 asym=1 Tue Feb 22 14:05:25.167 2022 Comp-stub init swap=0 Tue Feb 22 14:05:25.167 2022 EVENT: CONNECTED 91.214.169.71:53 (91.214.169.71) via /UDPv4 on tun/10.20.6.230/ gw=[10.20.6.1/] No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:05:25.228 2022 Server has pushed its own DNS. Removing system DNS from network filter. No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:05:25.283 2022 System DNS 5.9.164.112 is now rejected by the network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:05:25.336 2022 System DNS 5.9.164.112 is now rejected by the network filter Tue Feb 22 14:06:34.980 2022 ERROR: KEEPALIVE_TIMEOUT Tue Feb 22 14:06:34.980 2022 Session invalidated: KEEPALIVE_TIMEOUT Tue Feb 22 14:06:34.980 2022 Client terminated, restarting in 2000 ms... Tue Feb 22 14:06:35.018 2022 DSDict: updated Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS Tue Feb 22 14:06:35.018 2022 DSDict: removed State:/Network/Service/OpenVPNConnect/Info Tue Feb 22 14:06:35.019 2022 MacDNS: RESETDNS 19.6.0 *** DSDict State:/Network/Global/IPv4 ORIG { PrimaryInterface = en0; PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; Router = "192.168.178.1"; } *** DSDict State:/Network/Service/OpenVPNConnect/Info ORIG { PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; } *** DSDict State:/Network/Service/OpenVPNConnect/DNS ORIG { } *** DSDict Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS ORIG { OpenVPNConnectOrigSearchDomains = OpenVPNConnectDeleteValue; OpenVPNConnectOrigSearchOrder = OpenVPNConnectDeleteValue; OpenVPNConnectOrigServerAddresses = ( "5.9.164.112", "5.9.164.112" ); SearchOrder = 5000; ServerAddresses = ( "10.20.6.1" ); } MODIFIED { ServerAddresses = ( "5.9.164.112", "5.9.164.112" ); } Tue Feb 22 14:06:35.019 2022 /usr/bin/dscacheutil -flushcache Tue Feb 22 14:06:35.036 2022 /usr/bin/killall -HUP mDNSResponder Tue Feb 22 14:06:35.050 2022 DSDict: SCDynamicStoreNotifyValue Setup:/Network/Global/IPv4 Tue Feb 22 14:06:35.051 2022 /sbin/route delete -net 10.20.6.0 -netmask 255.255.255.0 10.20.6.230 delete net 10.20.6.0: gateway 10.20.6.230 /sbin/route delete -net 91.214.169.71 -netmask 255.255.255.255 192.168.178.1 delete net 91.214.169.71: gateway 192.168.178.1 /sbin/route delete -net 0.0.0.0 -netmask 128.0.0.0 10.20.6.1 delete net 0.0.0.0: gateway 10.20.6.1 /sbin/route delete -net 128.0.0.0 -netmask 128.0.0.0 10.20.6.1 delete net 128.0.0.0: gateway 10.20.6.1 /sbin/ifconfig utun2 down MacDNSAction: FLAGS=F Tue Feb 22 14:06:36.979 2022 EVENT: RECONNECTING Tue Feb 22 14:06:36.981 2022 Successfully restored system DNS. Tue Feb 22 14:06:36.981 2022 ERROR: N_RECONNECT Tue Feb 22 14:06:36.981 2022 EVENT: RESOLVE Tue Feb 22 14:06:36.981 2022 Setting up network filter and lock Tue Feb 22 14:06:36.981 2022 Allowing system DNS 5.9.164.112 to pass through the network filter Tue Feb 22 14:06:36.981 2022 Allowing system DNS 5.9.164.112 to pass through the network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:06:37.037 2022 Adding IPv4 server 91.214.169.71 to network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:06:37.089 2022 Network filter and lock successfully activated Tue Feb 22 14:06:37.090 2022 Contacting 91.214.169.71:53 via UDP Tue Feb 22 14:06:37.090 2022 EVENT: WAIT Tue Feb 22 14:06:37.090 2022 Tue Feb 22 14:06:37.090 2022 Connecting to [91.214.169.71]:53 (91.214.169.71) via UDPv4 Tue Feb 22 14:06:37.338 2022 EVENT: CONNECTING Tue Feb 22 14:06:37.338 2022 Tunnel Options:V4,dev-type tun,link-mtu 1522,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client Tue Feb 22 14:06:37.338 2022 Peer Info: IV_VER=3.7.2 AirVPN IV_PLAT=mac IV_NCP=2 IV_TCPNL=1 IV_PROTO=30 IV_CIPHERS=AES-256-GCM IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 UV_IPV6=yes IV_GUI_VER=Hummingbird - AirVPN OpenVPN 3 Client 1.2.0 RC 1 IV_HWADDR=18:65:90:d6:c1:dd IV_SSL=OpenSSL 1.1.1m 14 Dec 2021 Tue Feb 22 14:06:37.413 2022 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA512 Tue Feb 22 14:06:37.413 2022 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Kitalpha/emailAddress=info@airvpn.org, signature: RSA-SHA512 Tue Feb 22 14:06:37.460 2022 SSL Handshake: peer certificate: CN=Kitalpha, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Tue Feb 22 14:06:37.461 2022 Session is ACTIVE Tue Feb 22 14:06:37.461 2022 EVENT: GET_CONFIG Tue Feb 22 14:06:37.461 2022 Sending PUSH_REQUEST to server... Tue Feb 22 14:06:37.777 2022 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.20.6.1] 3 [route-gateway] [10.20.6.1] 4 [topology] [subnet] 5 [ping] [10] 6 [ping-restart] [60] 7 [ifconfig] [10.20.6.230] [255.255.255.0] 8 [peer-id] [3] 9 [cipher] [AES-256-GCM] Tue Feb 22 14:06:37.777 2022 PROTOCOL OPTIONS: cipher: AES-256-GCM digest: NONE ncp enabled: yes key-derivation: OpenVPN PRF compress: LZO_STUB peer ID: 3 control channel: tls-crypt enabled Tue Feb 22 14:06:37.777 2022 EVENT: ASSIGN_IP Tue Feb 22 14:06:37.777 2022 VPN Server has pushed IPv4 DNS server 10.20.6.1 No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled /sbin/ifconfig utun2 down /sbin/ifconfig utun2 10.20.6.230 10.20.6.1 netmask 255.255.255.0 mtu 1500 up /sbin/route add -net 10.20.6.0 -netmask 255.255.255.0 10.20.6.230 add net 10.20.6.0: gateway 10.20.6.230 /sbin/route add -net 91.214.169.71 -netmask 255.255.255.255 192.168.178.1 add net 91.214.169.71: gateway 192.168.178.1 /sbin/route add -net 0.0.0.0 -netmask 128.0.0.0 10.20.6.1 add net 0.0.0.0: gateway 10.20.6.1 /sbin/route add -net 128.0.0.0 -netmask 128.0.0.0 10.20.6.1 add net 128.0.0.0: gateway 10.20.6.1 MacDNSAction: FLAGS=F RD=1 SO=5000 DNS=10.20.6.1,10.20.6.1 DOM= ADS= Tue Feb 22 14:06:37.875 2022 DSDict: updated Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS Tue Feb 22 14:06:37.875 2022 DSDict: updated State:/Network/Service/OpenVPNConnect/Info Tue Feb 22 14:06:37.876 2022 MacDNS: SETDNS 19.6.0 *** DSDict State:/Network/Global/IPv4 ORIG { PrimaryInterface = en0; PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; Router = "192.168.178.1"; } *** DSDict State:/Network/Service/OpenVPNConnect/Info ORIG { } MODIFIED { PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; } *** DSDict State:/Network/Service/OpenVPNConnect/DNS ORIG { } *** DSDict Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS ORIG { ServerAddresses = ( "5.9.164.112", "5.9.164.112" ); } MODIFIED { OpenVPNConnectOrigSearchDomains = OpenVPNConnectDeleteValue; OpenVPNConnectOrigSearchOrder = OpenVPNConnectDeleteValue; OpenVPNConnectOrigServerAddresses = ( "5.9.164.112", "5.9.164.112" ); SearchOrder = 5000; ServerAddresses = ( "10.20.6.1", "10.20.6.1" ); } Tue Feb 22 14:06:37.876 2022 /usr/bin/dscacheutil -flushcache Tue Feb 22 14:06:37.893 2022 /usr/bin/killall -HUP mDNSResponder Tue Feb 22 14:06:37.906 2022 DSDict: SCDynamicStoreNotifyValue Setup:/Network/Global/IPv4 open utun2 SUCCEEDED Tue Feb 22 14:06:37.907 2022 Connected via tun Tue Feb 22 14:06:37.907 2022 LZO-ASYM init swap=0 asym=1 Tue Feb 22 14:06:37.907 2022 Comp-stub init swap=0 Tue Feb 22 14:06:37.907 2022 EVENT: CONNECTED 91.214.169.71:53 (91.214.169.71) via /UDPv4 on tun/10.20.6.230/ gw=[10.20.6.1/] Tue Feb 22 14:06:37.907 2022 Server has pushed its own DNS. Removing system DNS from network filter. No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:06:37.965 2022 System DNS 5.9.164.112 is now rejected by the network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:06:38.020 2022 System DNS 5.9.164.112 is now rejected by the network filter Tue Feb 22 14:07:37.778 2022 ERROR: KEEPALIVE_TIMEOUT Tue Feb 22 14:07:37.778 2022 Session invalidated: KEEPALIVE_TIMEOUT Tue Feb 22 14:07:37.778 2022 Client terminated, restarting in 2000 ms... Tue Feb 22 14:07:37.815 2022 DSDict: updated Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS Tue Feb 22 14:07:37.816 2022 DSDict: removed State:/Network/Service/OpenVPNConnect/Info Tue Feb 22 14:07:37.816 2022 MacDNS: RESETDNS 19.6.0 *** DSDict State:/Network/Global/IPv4 ORIG { PrimaryInterface = en0; PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; Router = "192.168.178.1"; } *** DSDict State:/Network/Service/OpenVPNConnect/Info ORIG { PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; } *** DSDict State:/Network/Service/OpenVPNConnect/DNS ORIG { } *** DSDict Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS ORIG { OpenVPNConnectOrigSearchDomains = OpenVPNConnectDeleteValue; OpenVPNConnectOrigSearchOrder = OpenVPNConnectDeleteValue; OpenVPNConnectOrigServerAddresses = ( "5.9.164.112", "5.9.164.112" ); SearchOrder = 5000; ServerAddresses = ( "10.20.6.1", "10.20.6.1" ); } MODIFIED { ServerAddresses = ( "5.9.164.112", "5.9.164.112" ); } Tue Feb 22 14:07:37.816 2022 /usr/bin/dscacheutil -flushcache Tue Feb 22 14:07:37.833 2022 /usr/bin/killall -HUP mDNSResponder Tue Feb 22 14:07:37.846 2022 DSDict: SCDynamicStoreNotifyValue Setup:/Network/Global/IPv4 Tue Feb 22 14:07:37.847 2022 /sbin/route delete -net 10.20.6.0 -netmask 255.255.255.0 10.20.6.230 delete net 10.20.6.0: gateway 10.20.6.230 /sbin/route delete -net 91.214.169.71 -netmask 255.255.255.255 192.168.178.1 delete net 91.214.169.71: gateway 192.168.178.1 /sbin/route delete -net 0.0.0.0 -netmask 128.0.0.0 10.20.6.1 delete net 0.0.0.0: gateway 10.20.6.1 /sbin/route delete -net 128.0.0.0 -netmask 128.0.0.0 10.20.6.1 delete net 128.0.0.0: gateway 10.20.6.1 /sbin/ifconfig utun2 down MacDNSAction: FLAGS=F Tue Feb 22 14:07:39.778 2022 EVENT: RECONNECTING Tue Feb 22 14:07:39.778 2022 WARNING: Backup copy of resolv.conf not found. DNS settings do not need to be restored. Tue Feb 22 14:07:39.778 2022 ERROR: N_RECONNECT Tue Feb 22 14:07:39.779 2022 EVENT: RESOLVE Tue Feb 22 14:07:39.779 2022 Setting up network filter and lock Tue Feb 22 14:07:39.779 2022 Allowing system DNS 5.9.164.112 to pass through the network filter Tue Feb 22 14:07:39.779 2022 Allowing system DNS 5.9.164.112 to pass through the network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:07:39.839 2022 Adding IPv4 server 91.214.169.71 to network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:07:39.892 2022 Network filter and lock successfully activated Tue Feb 22 14:07:39.892 2022 Contacting 91.214.169.71:53 via UDP Tue Feb 22 14:07:39.892 2022 EVENT: WAIT Tue Feb 22 14:07:39.892 2022 Tue Feb 22 14:07:39.892 2022 Connecting to [91.214.169.71]:53 (91.214.169.71) via UDPv4 Tue Feb 22 14:07:49.779 2022 Server poll timeout, trying next remote entry... Tue Feb 22 14:07:49.780 2022 EVENT: RECONNECTING Tue Feb 22 14:07:49.780 2022 WARNING: Backup copy of resolv.conf not found. DNS settings do not need to be restored. Tue Feb 22 14:07:49.780 2022 ERROR: N_RECONNECT Tue Feb 22 14:07:49.780 2022 EVENT: RESOLVE Tue Feb 22 14:07:49.780 2022 Setting up network filter and lock Tue Feb 22 14:07:49.780 2022 Allowing system DNS 5.9.164.112 to pass through the network filter Tue Feb 22 14:07:49.780 2022 Allowing system DNS 5.9.164.112 to pass through the network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:07:49.840 2022 Adding IPv4 server 91.214.169.71 to network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:07:49.896 2022 Network filter and lock successfully activated Tue Feb 22 14:07:49.896 2022 Contacting 91.214.169.71:53 via UDP Tue Feb 22 14:07:49.896 2022 EVENT: WAIT Tue Feb 22 14:07:49.896 2022 Tue Feb 22 14:07:49.897 2022 Connecting to [91.214.169.71]:53 (91.214.169.71) via UDPv4 Tue Feb 22 14:07:59.781 2022 Server poll timeout, trying next remote entry... Tue Feb 22 14:07:59.781 2022 EVENT: RECONNECTING Tue Feb 22 14:07:59.781 2022 WARNING: Backup copy of resolv.conf not found. DNS settings do not need to be restored. Tue Feb 22 14:07:59.782 2022 ERROR: N_RECONNECT Tue Feb 22 14:07:59.782 2022 EVENT: RESOLVE Tue Feb 22 14:07:59.782 2022 Setting up network filter and lock Tue Feb 22 14:07:59.782 2022 Allowing system DNS 5.9.164.112 to pass through the network filter Tue Feb 22 14:07:59.782 2022 Allowing system DNS 5.9.164.112 to pass through the network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:07:59.840 2022 Adding IPv4 server 91.214.169.71 to network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:07:59.894 2022 Network filter and lock successfully activated Tue Feb 22 14:07:59.895 2022 Contacting 91.214.169.71:53 via UDP Tue Feb 22 14:07:59.895 2022 EVENT: WAIT Tue Feb 22 14:07:59.895 2022 Tue Feb 22 14:07:59.895 2022 Connecting to [91.214.169.71]:53 (91.214.169.71) via UDPv4 Tue Feb 22 14:08:09.781 2022 Server poll timeout, trying next remote entry... Tue Feb 22 14:08:09.782 2022 EVENT: RECONNECTING Tue Feb 22 14:08:09.782 2022 WARNING: Backup copy of resolv.conf not found. DNS settings do not need to be restored. Tue Feb 22 14:08:09.782 2022 ERROR: N_RECONNECT Tue Feb 22 14:08:09.782 2022 EVENT: RESOLVE Tue Feb 22 14:08:09.782 2022 Setting up network filter and lock Tue Feb 22 14:08:09.782 2022 Allowing system DNS 5.9.164.112 to pass through the network filter Tue Feb 22 14:08:09.782 2022 Allowing system DNS 5.9.164.112 to pass through the network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:08:09.845 2022 Adding IPv4 server 91.214.169.71 to network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:08:09.900 2022 Network filter and lock successfully activated Tue Feb 22 14:08:09.901 2022 Contacting 91.214.169.71:53 via UDP Tue Feb 22 14:08:09.901 2022 EVENT: WAIT Tue Feb 22 14:08:09.901 2022 Tue Feb 22 14:08:09.901 2022 Connecting to [91.214.169.71]:53 (91.214.169.71) via UDPv4 Tue Feb 22 14:08:14.653 2022 EVENT: CONNECTING Tue Feb 22 14:08:14.654 2022 ERROR: CC_ERROR Tue Feb 22 14:08:14.654 2022 ERROR: CC_ERROR Tue Feb 22 14:08:14.654 2022 ERROR: CC_ERROR Tue Feb 22 14:08:15.940 2022 ERROR: CC_ERROR Tue Feb 22 14:08:15.940 2022 ERROR: CC_ERROR Tue Feb 22 14:08:16.657 2022 ERROR: CC_ERROR Tue Feb 22 14:08:16.657 2022 ERROR: CC_ERROR Tue Feb 22 14:08:23.434 2022 ERROR: CC_ERROR Tue Feb 22 14:08:23.434 2022 ERROR: CC_ERROR Tue Feb 22 14:08:24.219 2022 ERROR: CC_ERROR Tue Feb 22 14:08:24.220 2022 ERROR: CC_ERROR Tue Feb 22 14:08:24.220 2022 ERROR: CC_ERROR Tue Feb 22 14:08:24.221 2022 ERROR: CC_ERROR Tue Feb 22 14:08:24.221 2022 ERROR: CC_ERROR Tue Feb 22 14:08:24.222 2022 ERROR: CC_ERROR Tue Feb 22 14:08:36.627 2022 ERROR: CC_ERROR Tue Feb 22 14:08:36.627 2022 ERROR: CC_ERROR Tue Feb 22 14:08:36.627 2022 ERROR: CC_ERROR Tue Feb 22 14:08:36.627 2022 ERROR: CC_ERROR Tue Feb 22 14:08:36.628 2022 ERROR: CC_ERROR Tue Feb 22 14:08:36.628 2022 ERROR: CC_ERROR Tue Feb 22 14:08:36.837 2022 ERROR: CC_ERROR Tue Feb 22 14:08:38.980 2022 ERROR: CC_ERROR Tue Feb 22 14:08:38.980 2022 ERROR: CC_ERROR Tue Feb 22 14:08:39.847 2022 ERROR: CC_ERROR Tue Feb 22 14:08:40.840 2022 ERROR: CC_ERROR Tue Feb 22 14:08:41.851 2022 ERROR: CC_ERROR Tue Feb 22 14:08:42.845 2022 ERROR: CC_ERROR Tue Feb 22 14:08:43.845 2022 ERROR: CC_ERROR Tue Feb 22 14:08:44.846 2022 ERROR: CC_ERROR Tue Feb 22 14:08:45.851 2022 ERROR: CC_ERROR Tue Feb 22 14:08:46.848 2022 ERROR: CC_ERROR ^CReceived SIGINT signal. Terminating Hummingbird. Tue Feb 22 14:08:47.593 2022 EVENT: DISCONNECTED Tue Feb 22 14:08:47.593 2022 WARNING: Backup copy of resolv.conf not found. DNS settings do not need to be restored. No ALTQ support in kernel ALTQ related functions disabled rules cleared nat cleared dummynet cleared 0 tables deleted. 22 states cleared source tracking entries cleared pf: statistics cleared pf: interface flags reset pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:08:47.622 2022 Network filter successfully restored Tue Feb 22 14:08:47.623 2022 Thread finished STATS: BYTES_IN : 11736 BYTES_OUT : 54418 PACKETS_IN : 61 PACKETS_OUT : 534 TUN_BYTES_IN : 33616 TUN_BYTES_OUT : 1645 TUN_PACKETS_IN : 442 TUN_PACKETS_OUT : 8 CC_ERROR : 32 KEEPALIVE_TIMEOUT : 2 N_RECONNECT : 5 with CBC sudo ./hummingbird servers/NL-0.ovpn Hummingbird - AirVPN OpenVPN 3 Client 1.2.0 RC 1 - 15 February 2022 OpenVPN core 3.7.2 AirVPN mac x86_64 64-bit Copyright (C) 2012-2020 OpenVPN Inc. All rights reserved. OpenSSL 1.1.1m 14 Dec 2021 Tue Feb 22 14:12:32.157 2022 System and service manager in use is launchd Tue Feb 22 14:12:32.177 2022 Network filter and lock are using pf No ALTQ support in kernel ALTQ related functions disabled pfctl: pf already enabled Tue Feb 22 14:12:32.189 2022 Starting thread Tue Feb 22 14:12:32.189 2022 OpenVPN core 3.7.2 AirVPN mac x86_64 64-bit Tue Feb 22 14:12:32.189 2022 Frame=512/2048/512 mssfix-ctrl=1250 Tue Feb 22 14:12:32.191 2022 UNUSED OPTIONS 3 [resolv-retry] [infinite] 4 [nobind] 5 [persist-key] 6 [persist-tun] 7 [auth-nocache] 8 [verb] [3] 9 [rcvbuf] [262144] 10 [sndbuf] [262144] Tue Feb 22 14:12:32.191 2022 EVENT: RESOLVE Tue Feb 22 14:12:32.191 2022 Local IPv6 address fe80::1 Tue Feb 22 14:12:32.191 2022 Local IPv4 address 192.168.178.30 Tue Feb 22 14:12:32.192 2022 Local IPv6 address fe80::d0c7:eff:fe98:21cf Tue Feb 22 14:12:32.192 2022 Local IPv6 address fe80::d0c7:eff:fe98:21cf Tue Feb 22 14:12:32.192 2022 Local IPv6 address fe80::f7b5:ebe9:48ef:450a Tue Feb 22 14:12:32.192 2022 Local IPv6 address fe80::7170:fc7b:f9d6:daae Tue Feb 22 14:12:32.192 2022 Local interface gif0 Tue Feb 22 14:12:32.192 2022 Local interface stf0 Tue Feb 22 14:12:32.192 2022 Local interface XHC20 Tue Feb 22 14:12:32.192 2022 Local interface en0 Tue Feb 22 14:12:32.192 2022 Local interface en1 Tue Feb 22 14:12:32.192 2022 Local interface en2 Tue Feb 22 14:12:32.192 2022 Local interface bridge0 Tue Feb 22 14:12:32.192 2022 Local interface p2p0 Tue Feb 22 14:12:32.192 2022 Local interface awdl0 Tue Feb 22 14:12:32.192 2022 Local interface llw0 Tue Feb 22 14:12:32.192 2022 Local interface utun0 Tue Feb 22 14:12:32.192 2022 Local interface utun1 Tue Feb 22 14:12:32.192 2022 Setting up network filter and lock Tue Feb 22 14:12:32.192 2022 Allowing system DNS 5.9.164.112 to pass through the network filter Tue Feb 22 14:12:32.192 2022 Allowing system DNS 5.9.164.112 to pass through the network filter No ALTQ support in kernel ALTQ related functions disabled rules cleared nat cleared dummynet cleared 0 tables deleted. 0 states cleared source tracking entries cleared pf: statistics cleared pf: interface flags reset pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:12:32.221 2022 Adding IPv4 server 213.152.161.37 to network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:12:32.273 2022 Network filter and lock successfully activated Tue Feb 22 14:12:32.274 2022 Contacting 213.152.161.37:443 via TCP Tue Feb 22 14:12:32.274 2022 EVENT: WAIT Tue Feb 22 14:12:32.274 2022 Tue Feb 22 14:12:32.429 2022 Connecting to [213.152.161.37]:443 (213.152.161.37) via TCP Tue Feb 22 14:12:32.472 2022 EVENT: CONNECTING Tue Feb 22 14:12:32.472 2022 Tunnel Options:V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Tue Feb 22 14:12:32.472 2022 Peer Info: IV_VER=3.7.2 AirVPN IV_PLAT=mac IV_NCP=2 IV_TCPNL=1 IV_PROTO=30 IV_CIPHERS=AES-256-CBC IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 UV_IPV6=yes IV_GUI_VER=Hummingbird - AirVPN OpenVPN 3 Client 1.2.0 RC 1 IV_HWADDR=18:65:90:d6:c1:dd IV_SSL=OpenSSL 1.1.1m 14 Dec 2021 Tue Feb 22 14:12:32.526 2022 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Tue Feb 22 14:12:32.526 2022 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Hyadum/emailAddress=info@airvpn.org, signature: RSA-SHA512 Tue Feb 22 14:12:32.611 2022 SSL Handshake: peer certificate: CN=Hyadum, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Tue Feb 22 14:12:32.611 2022 Session is ACTIVE Tue Feb 22 14:12:32.611 2022 EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Tue Feb 22 14:12:32.611 2022 EVENT: GET_CONFIG Tue Feb 22 14:12:32.611 2022 Sending PUSH_REQUEST to server... Tue Feb 22 14:12:32.734 2022 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [ipv6] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.19.87.1] 3 [dhcp-option] [DNS6] [fde6:7a:7d20:f57::1] 4 [tun-ipv6] 5 [route-gateway] [10.19.87.1] 6 [topology] [subnet] 7 [ping] [10] 8 [ping-restart] [60] 9 [ifconfig-ipv6] [fde6:7a:7d20:f57::1008/64] [fde6:7a:7d20:f57::1] 10 [ifconfig] [10.19.87.10] [255.255.255.0] 11 [peer-id] [0] 12 [cipher] [AES-256-CBC] Tue Feb 22 14:12:32.734 2022 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA512 ncp enabled: yes key-derivation: OpenVPN PRF compress: LZO_STUB peer ID: 0 control channel: tls-crypt enabled Tue Feb 22 14:12:32.734 2022 EVENT: ASSIGN_IP Tue Feb 22 14:12:32.734 2022 VPN Server has pushed IPv4 DNS server 10.19.87.1 No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:12:32.790 2022 VPN Server has pushed IPv6 DNS server fde6:7a:7d20:f57::1 No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled ERROR: cannot detect IPv6 default gateway /sbin/ifconfig utun2 down /sbin/ifconfig utun2 10.19.87.10 10.19.87.1 netmask 255.255.255.0 mtu 1500 up /sbin/route add -net 10.19.87.0 -netmask 255.255.255.0 10.19.87.10 add net 10.19.87.0: gateway 10.19.87.10 /sbin/ifconfig utun2 inet6 fde6:7a:7d20:f57::1008/64 up /sbin/route add -net -inet6 fde6:7a:7d20:f57:: -prefixlen 64 -iface utun2 route: writing to routing socket: File exists add net fde6:7a:7d20:f57::: gateway utun2: File exists /sbin/route add -net 213.152.161.37 -netmask 255.255.255.255 192.168.178.1 add net 213.152.161.37: gateway 192.168.178.1 /sbin/route add -net 0.0.0.0 -netmask 128.0.0.0 10.19.87.1 add net 0.0.0.0: gateway 10.19.87.1 /sbin/route add -net 128.0.0.0 -netmask 128.0.0.0 10.19.87.1 add net 128.0.0.0: gateway 10.19.87.1 /sbin/route add -net -inet6 :: -prefixlen 1 -iface utun2 add net ::: gateway utun2 /sbin/route add -net -inet6 8000:: -prefixlen 1 -iface utun2 add net 8000::: gateway utun2 MacDNSAction: FLAGS=F RD=1 SO=5000 DNS=10.19.87.1,fde6:7a:7d20:f57::1 DOM= ADS= Tue Feb 22 14:12:32.921 2022 DSDict: updated Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS Tue Feb 22 14:12:32.921 2022 DSDict: updated State:/Network/Service/OpenVPNConnect/Info Tue Feb 22 14:12:32.922 2022 MacDNS: SETDNS 19.6.0 *** DSDict State:/Network/Global/IPv4 ORIG { PrimaryInterface = en0; PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; Router = "192.168.178.1"; } *** DSDict State:/Network/Service/OpenVPNConnect/Info ORIG { } MODIFIED { PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; } *** DSDict State:/Network/Service/OpenVPNConnect/DNS ORIG { } *** DSDict Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS ORIG { ServerAddresses = ( "5.9.164.112", "5.9.164.112" ); } MODIFIED { OpenVPNConnectOrigSearchDomains = OpenVPNConnectDeleteValue; OpenVPNConnectOrigSearchOrder = OpenVPNConnectDeleteValue; OpenVPNConnectOrigServerAddresses = ( "5.9.164.112", "5.9.164.112" ); SearchOrder = 5000; ServerAddresses = ( "10.19.87.1", "fde6:7a:7d20:f57::1" ); } Tue Feb 22 14:12:32.922 2022 /usr/bin/dscacheutil -flushcache Tue Feb 22 14:12:32.942 2022 /usr/bin/killall -HUP mDNSResponder Tue Feb 22 14:12:32.957 2022 DSDict: SCDynamicStoreNotifyValue Setup:/Network/Global/IPv4 open utun2 SUCCEEDED Tue Feb 22 14:12:32.957 2022 Connected via tun Tue Feb 22 14:12:32.958 2022 Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use Tue Feb 22 14:12:32.958 2022 Client terminated, restarting in 2000 ms... Tue Feb 22 14:12:33.018 2022 DSDict: updated Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS Tue Feb 22 14:12:33.018 2022 DSDict: removed State:/Network/Service/OpenVPNConnect/Info Tue Feb 22 14:12:33.019 2022 MacDNS: RESETDNS 19.6.0 *** DSDict State:/Network/Global/IPv4 ORIG { PrimaryInterface = en0; PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; Router = "192.168.178.1"; } *** DSDict State:/Network/Service/OpenVPNConnect/Info ORIG { PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; } *** DSDict State:/Network/Service/OpenVPNConnect/DNS ORIG { } *** DSDict Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS ORIG { OpenVPNConnectOrigSearchDomains = OpenVPNConnectDeleteValue; OpenVPNConnectOrigSearchOrder = OpenVPNConnectDeleteValue; OpenVPNConnectOrigServerAddresses = ( "5.9.164.112", "5.9.164.112" ); SearchOrder = 5000; ServerAddresses = ( "10.19.87.1", "fde6:7a:7d20:f57::1" ); } MODIFIED { ServerAddresses = ( "5.9.164.112", "5.9.164.112" ); } Tue Feb 22 14:12:33.019 2022 /usr/bin/dscacheutil -flushcache Tue Feb 22 14:12:33.037 2022 /usr/bin/killall -HUP mDNSResponder Tue Feb 22 14:12:33.053 2022 DSDict: SCDynamicStoreNotifyValue Setup:/Network/Global/IPv4 Tue Feb 22 14:12:33.053 2022 /sbin/route delete -net 10.19.87.0 -netmask 255.255.255.0 10.19.87.10 delete net 10.19.87.0: gateway 10.19.87.10 /sbin/route delete -net -inet6 fde6:7a:7d20:f57:: -prefixlen 64 -iface utun2 delete net fde6:7a:7d20:f57::: gateway utun2 /sbin/route delete -net 213.152.161.37 -netmask 255.255.255.255 192.168.178.1 delete net 213.152.161.37: gateway 192.168.178.1 /sbin/route delete -net 0.0.0.0 -netmask 128.0.0.0 10.19.87.1 delete net 0.0.0.0: gateway 10.19.87.1 /sbin/route delete -net 128.0.0.0 -netmask 128.0.0.0 10.19.87.1 delete net 128.0.0.0: gateway 10.19.87.1 /sbin/route delete -net -inet6 :: -prefixlen 1 -iface utun2 delete net ::: gateway utun2 /sbin/route delete -net -inet6 8000:: -prefixlen 1 -iface utun2 delete net 8000::: gateway utun2 /sbin/ifconfig utun2 down MacDNSAction: FLAGS=F Tue Feb 22 14:12:34.956 2022 EVENT: RECONNECTING Tue Feb 22 14:12:34.958 2022 Successfully restored system DNS. Tue Feb 22 14:12:34.958 2022 ERROR: N_RECONNECT Tue Feb 22 14:12:34.958 2022 EVENT: RESOLVE Tue Feb 22 14:12:34.958 2022 Setting up network filter and lock Tue Feb 22 14:12:34.958 2022 Allowing system DNS 5.9.164.112 to pass through the network filter Tue Feb 22 14:12:34.958 2022 Allowing system DNS 5.9.164.112 to pass through the network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:12:35.017 2022 Adding IPv4 server 213.152.161.37 to network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:12:35.076 2022 Network filter and lock successfully activated Tue Feb 22 14:12:35.077 2022 Contacting 213.152.161.37:443 via TCP Tue Feb 22 14:12:35.077 2022 EVENT: WAIT Tue Feb 22 14:12:35.077 2022 Tue Feb 22 14:12:35.359 2022 Connecting to [213.152.161.37]:443 (213.152.161.37) via TCP Tue Feb 22 14:12:35.400 2022 EVENT: CONNECTING Tue Feb 22 14:12:35.401 2022 Tunnel Options:V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Tue Feb 22 14:12:35.401 2022 Peer Info: IV_VER=3.7.2 AirVPN IV_PLAT=mac IV_NCP=2 IV_TCPNL=1 IV_PROTO=30 IV_CIPHERS=AES-256-CBC IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 UV_IPV6=yes IV_GUI_VER=Hummingbird - AirVPN OpenVPN 3 Client 1.2.0 RC 1 IV_HWADDR=18:65:90:d6:c1:dd IV_SSL=OpenSSL 1.1.1m 14 Dec 2021 Tue Feb 22 14:12:35.469 2022 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Tue Feb 22 14:12:35.470 2022 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Hyadum/emailAddress=info@airvpn.org, signature: RSA-SHA512 Tue Feb 22 14:12:35.557 2022 SSL Handshake: peer certificate: CN=Hyadum, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Tue Feb 22 14:12:35.557 2022 Session is ACTIVE Tue Feb 22 14:12:35.557 2022 EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Tue Feb 22 14:12:35.557 2022 EVENT: GET_CONFIG Tue Feb 22 14:12:35.557 2022 Sending PUSH_REQUEST to server... Tue Feb 22 14:12:35.661 2022 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [ipv6] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.19.87.1] 3 [dhcp-option] [DNS6] [fde6:7a:7d20:f57::1] 4 [tun-ipv6] 5 [route-gateway] [10.19.87.1] 6 [topology] [subnet] 7 [ping] [10] 8 [ping-restart] [60] 9 [ifconfig-ipv6] [fde6:7a:7d20:f57::1008/64] [fde6:7a:7d20:f57::1] 10 [ifconfig] [10.19.87.10] [255.255.255.0] 11 [peer-id] [0] 12 [cipher] [AES-256-CBC] Tue Feb 22 14:12:35.662 2022 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA512 ncp enabled: yes key-derivation: OpenVPN PRF compress: LZO_STUB peer ID: 0 control channel: tls-crypt enabled Tue Feb 22 14:12:35.662 2022 EVENT: ASSIGN_IP Tue Feb 22 14:12:35.662 2022 VPN Server has pushed IPv4 DNS server 10.19.87.1 No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:12:35.719 2022 VPN Server has pushed IPv6 DNS server fde6:7a:7d20:f57::1 No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled ERROR: cannot detect IPv6 default gateway /sbin/ifconfig utun2 down /sbin/ifconfig utun2 10.19.87.10 10.19.87.1 netmask 255.255.255.0 mtu 1500 up /sbin/route add -net 10.19.87.0 -netmask 255.255.255.0 10.19.87.10 add net 10.19.87.0: gateway 10.19.87.10 /sbin/ifconfig utun2 inet6 fde6:7a:7d20:f57::1008/64 up /sbin/route add -net -inet6 fde6:7a:7d20:f57:: -prefixlen 64 -iface utun2 route: writing to routing socket: File exists add net fde6:7a:7d20:f57::: gateway utun2: File exists /sbin/route add -net 213.152.161.37 -netmask 255.255.255.255 192.168.178.1 add net 213.152.161.37: gateway 192.168.178.1 /sbin/route add -net 0.0.0.0 -netmask 128.0.0.0 10.19.87.1 add net 0.0.0.0: gateway 10.19.87.1 /sbin/route add -net 128.0.0.0 -netmask 128.0.0.0 10.19.87.1 add net 128.0.0.0: gateway 10.19.87.1 /sbin/route add -net -inet6 :: -prefixlen 1 -iface utun2 add net ::: gateway utun2 /sbin/route add -net -inet6 8000:: -prefixlen 1 -iface utun2 add net 8000::: gateway utun2 MacDNSAction: FLAGS=F RD=1 SO=5000 DNS=10.19.87.1,fde6:7a:7d20:f57::1,10.19.87.1,fde6:7a:7d20:f57::1 DOM= ADS= Tue Feb 22 14:12:35.842 2022 DSDict: updated Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS Tue Feb 22 14:12:35.843 2022 DSDict: updated State:/Network/Service/OpenVPNConnect/Info Tue Feb 22 14:12:35.843 2022 MacDNS: SETDNS 19.6.0 *** DSDict State:/Network/Global/IPv4 ORIG { PrimaryInterface = en0; PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; Router = "192.168.178.1"; } *** DSDict State:/Network/Service/OpenVPNConnect/Info ORIG { } MODIFIED { PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; } *** DSDict State:/Network/Service/OpenVPNConnect/DNS ORIG { } *** DSDict Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS ORIG { ServerAddresses = ( "5.9.164.112", "5.9.164.112" ); } MODIFIED { OpenVPNConnectOrigSearchDomains = OpenVPNConnectDeleteValue; OpenVPNConnectOrigSearchOrder = OpenVPNConnectDeleteValue; OpenVPNConnectOrigServerAddresses = ( "5.9.164.112", "5.9.164.112" ); SearchOrder = 5000; ServerAddresses = ( "10.19.87.1", "fde6:7a:7d20:f57::1", "10.19.87.1", "fde6:7a:7d20:f57::1" ); } Tue Feb 22 14:12:35.843 2022 /usr/bin/dscacheutil -flushcache Tue Feb 22 14:12:35.860 2022 /usr/bin/killall -HUP mDNSResponder Tue Feb 22 14:12:35.875 2022 DSDict: SCDynamicStoreNotifyValue Setup:/Network/Global/IPv4 open utun2 SUCCEEDED Tue Feb 22 14:12:35.875 2022 Connected via tun Tue Feb 22 14:12:35.875 2022 Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use Tue Feb 22 14:12:35.875 2022 Client terminated, restarting in 2000 ms... Tue Feb 22 14:12:35.933 2022 DSDict: updated Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS Tue Feb 22 14:12:35.933 2022 DSDict: removed State:/Network/Service/OpenVPNConnect/Info Tue Feb 22 14:12:35.933 2022 MacDNS: RESETDNS 19.6.0 *** DSDict State:/Network/Global/IPv4 ORIG { PrimaryInterface = en0; PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; Router = "192.168.178.1"; } *** DSDict State:/Network/Service/OpenVPNConnect/Info ORIG { PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; } *** DSDict State:/Network/Service/OpenVPNConnect/DNS ORIG { } *** DSDict Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS ORIG { OpenVPNConnectOrigSearchDomains = OpenVPNConnectDeleteValue; OpenVPNConnectOrigSearchOrder = OpenVPNConnectDeleteValue; OpenVPNConnectOrigServerAddresses = ( "5.9.164.112", "5.9.164.112" ); SearchOrder = 5000; ServerAddresses = ( "10.19.87.1", "fde6:7a:7d20:f57::1", "10.19.87.1", "fde6:7a:7d20:f57::1" ); } MODIFIED { ServerAddresses = ( "5.9.164.112", "5.9.164.112" ); } Tue Feb 22 14:12:35.933 2022 /usr/bin/dscacheutil -flushcache Tue Feb 22 14:12:35.952 2022 /usr/bin/killall -HUP mDNSResponder Tue Feb 22 14:12:35.969 2022 DSDict: SCDynamicStoreNotifyValue Setup:/Network/Global/IPv4 Tue Feb 22 14:12:35.970 2022 /sbin/route delete -net 10.19.87.0 -netmask 255.255.255.0 10.19.87.10 delete net 10.19.87.0: gateway 10.19.87.10 /sbin/route delete -net -inet6 fde6:7a:7d20:f57:: -prefixlen 64 -iface utun2 delete net fde6:7a:7d20:f57::: gateway utun2 /sbin/route delete -net 213.152.161.37 -netmask 255.255.255.255 192.168.178.1 delete net 213.152.161.37: gateway 192.168.178.1 /sbin/route delete -net 0.0.0.0 -netmask 128.0.0.0 10.19.87.1 delete net 0.0.0.0: gateway 10.19.87.1 /sbin/route delete -net 128.0.0.0 -netmask 128.0.0.0 10.19.87.1 delete net 128.0.0.0: gateway 10.19.87.1 /sbin/route delete -net -inet6 :: -prefixlen 1 -iface utun2 delete net ::: gateway utun2 /sbin/route delete -net -inet6 8000:: -prefixlen 1 -iface utun2 delete net 8000::: gateway utun2 /sbin/ifconfig utun2 down MacDNSAction: FLAGS=F Tue Feb 22 14:12:37.879 2022 EVENT: RECONNECTING Tue Feb 22 14:12:37.879 2022 WARNING: Backup copy of resolv.conf not found. DNS settings do not need to be restored. Tue Feb 22 14:12:37.879 2022 ERROR: N_RECONNECT Tue Feb 22 14:12:37.879 2022 EVENT: RESOLVE Tue Feb 22 14:12:37.879 2022 Setting up network filter and lock Tue Feb 22 14:12:37.879 2022 Allowing system DNS 5.9.164.112 to pass through the network filter Tue Feb 22 14:12:37.879 2022 Allowing system DNS 5.9.164.112 to pass through the network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:12:37.939 2022 Adding IPv4 server 213.152.161.37 to network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:12:37.992 2022 Network filter and lock successfully activated Tue Feb 22 14:12:37.993 2022 Contacting 213.152.161.37:443 via TCP Tue Feb 22 14:12:37.993 2022 EVENT: WAIT Tue Feb 22 14:12:37.993 2022 Tue Feb 22 14:12:38.137 2022 Connecting to [213.152.161.37]:443 (213.152.161.37) via TCP Tue Feb 22 14:12:38.173 2022 EVENT: CONNECTING Tue Feb 22 14:12:38.173 2022 Tunnel Options:V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Tue Feb 22 14:12:38.174 2022 Peer Info: IV_VER=3.7.2 AirVPN IV_PLAT=mac IV_NCP=2 IV_TCPNL=1 IV_PROTO=30 IV_CIPHERS=AES-256-CBC IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 UV_IPV6=yes IV_GUI_VER=Hummingbird - AirVPN OpenVPN 3 Client 1.2.0 RC 1 IV_HWADDR=18:65:90:d6:c1:dd IV_SSL=OpenSSL 1.1.1m 14 Dec 2021 Tue Feb 22 14:12:38.218 2022 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Tue Feb 22 14:12:38.219 2022 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Hyadum/emailAddress=info@airvpn.org, signature: RSA-SHA512 Tue Feb 22 14:12:38.350 2022 SSL Handshake: peer certificate: CN=Hyadum, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Tue Feb 22 14:12:38.350 2022 Session is ACTIVE Tue Feb 22 14:12:38.350 2022 EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Tue Feb 22 14:12:38.350 2022 EVENT: GET_CONFIG Tue Feb 22 14:12:38.350 2022 Sending PUSH_REQUEST to server... Tue Feb 22 14:12:38.479 2022 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [ipv6] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.19.87.1] 3 [dhcp-option] [DNS6] [fde6:7a:7d20:f57::1] 4 [tun-ipv6] 5 [route-gateway] [10.19.87.1] 6 [topology] [subnet] 7 [ping] [10] 8 [ping-restart] [60] 9 [ifconfig-ipv6] [fde6:7a:7d20:f57::1008/64] [fde6:7a:7d20:f57::1] 10 [ifconfig] [10.19.87.10] [255.255.255.0] 11 [peer-id] [0] 12 [cipher] [AES-256-CBC] Tue Feb 22 14:12:38.479 2022 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA512 ncp enabled: yes key-derivation: OpenVPN PRF compress: LZO_STUB peer ID: 0 control channel: tls-crypt enabled Tue Feb 22 14:12:38.479 2022 EVENT: ASSIGN_IP Tue Feb 22 14:12:38.479 2022 VPN Server has pushed IPv4 DNS server 10.19.87.1 No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:12:38.536 2022 VPN Server has pushed IPv6 DNS server fde6:7a:7d20:f57::1 No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled ERROR: cannot detect IPv6 default gateway /sbin/ifconfig utun2 down /sbin/ifconfig utun2 10.19.87.10 10.19.87.1 netmask 255.255.255.0 mtu 1500 up /sbin/route add -net 10.19.87.0 -netmask 255.255.255.0 10.19.87.10 add net 10.19.87.0: gateway 10.19.87.10 /sbin/ifconfig utun2 inet6 fde6:7a:7d20:f57::1008/64 up /sbin/route add -net -inet6 fde6:7a:7d20:f57:: -prefixlen 64 -iface utun2 route: writing to routing socket: File exists add net fde6:7a:7d20:f57::: gateway utun2: File exists /sbin/route add -net 213.152.161.37 -netmask 255.255.255.255 192.168.178.1 add net 213.152.161.37: gateway 192.168.178.1 /sbin/route add -net 0.0.0.0 -netmask 128.0.0.0 10.19.87.1 add net 0.0.0.0: gateway 10.19.87.1 /sbin/route add -net 128.0.0.0 -netmask 128.0.0.0 10.19.87.1 add net 128.0.0.0: gateway 10.19.87.1 /sbin/route add -net -inet6 :: -prefixlen 1 -iface utun2 add net ::: gateway utun2 /sbin/route add -net -inet6 8000:: -prefixlen 1 -iface utun2 add net 8000::: gateway utun2 MacDNSAction: FLAGS=F RD=1 SO=5000 DNS=10.19.87.1,fde6:7a:7d20:f57::1,10.19.87.1,fde6:7a:7d20:f57::1,10.19.87.1,fde6:7a:7d20:f57::1 DOM= ADS= Tue Feb 22 14:12:38.661 2022 DSDict: updated Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS Tue Feb 22 14:12:38.662 2022 DSDict: updated State:/Network/Service/OpenVPNConnect/Info Tue Feb 22 14:12:38.662 2022 MacDNS: SETDNS 19.6.0 *** DSDict State:/Network/Global/IPv4 ORIG { PrimaryInterface = en0; PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; Router = "192.168.178.1"; } *** DSDict State:/Network/Service/OpenVPNConnect/Info ORIG { } MODIFIED { PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; } *** DSDict State:/Network/Service/OpenVPNConnect/DNS ORIG { } *** DSDict Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS ORIG { ServerAddresses = ( "5.9.164.112", "5.9.164.112" ); } MODIFIED { OpenVPNConnectOrigSearchDomains = OpenVPNConnectDeleteValue; OpenVPNConnectOrigSearchOrder = OpenVPNConnectDeleteValue; OpenVPNConnectOrigServerAddresses = ( "5.9.164.112", "5.9.164.112" ); SearchOrder = 5000; ServerAddresses = ( "10.19.87.1", "fde6:7a:7d20:f57::1", "10.19.87.1", "fde6:7a:7d20:f57::1", "10.19.87.1", "fde6:7a:7d20:f57::1" ); } Tue Feb 22 14:12:38.662 2022 /usr/bin/dscacheutil -flushcache Tue Feb 22 14:12:38.679 2022 /usr/bin/killall -HUP mDNSResponder Tue Feb 22 14:12:38.693 2022 DSDict: SCDynamicStoreNotifyValue Setup:/Network/Global/IPv4 open utun2 SUCCEEDED Tue Feb 22 14:12:38.693 2022 Connected via tun Tue Feb 22 14:12:38.694 2022 Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use Tue Feb 22 14:12:38.694 2022 Client terminated, restarting in 2000 ms... Tue Feb 22 14:12:38.754 2022 DSDict: updated Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS Tue Feb 22 14:12:38.754 2022 DSDict: removed State:/Network/Service/OpenVPNConnect/Info Tue Feb 22 14:12:38.754 2022 MacDNS: RESETDNS 19.6.0 *** DSDict State:/Network/Global/IPv4 ORIG { PrimaryInterface = en0; PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; Router = "192.168.178.1"; } *** DSDict State:/Network/Service/OpenVPNConnect/Info ORIG { PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; } *** DSDict State:/Network/Service/OpenVPNConnect/DNS ORIG { } *** DSDict Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS ORIG { OpenVPNConnectOrigSearchDomains = OpenVPNConnectDeleteValue; OpenVPNConnectOrigSearchOrder = OpenVPNConnectDeleteValue; OpenVPNConnectOrigServerAddresses = ( "5.9.164.112", "5.9.164.112" ); SearchOrder = 5000; ServerAddresses = ( "10.19.87.1", "fde6:7a:7d20:f57::1", "10.19.87.1", "fde6:7a:7d20:f57::1", "10.19.87.1", "fde6:7a:7d20:f57::1" ); } MODIFIED { ServerAddresses = ( "5.9.164.112", "5.9.164.112" ); } Tue Feb 22 14:12:38.755 2022 /usr/bin/dscacheutil -flushcache Tue Feb 22 14:12:38.772 2022 /usr/bin/killall -HUP mDNSResponder Tue Feb 22 14:12:38.788 2022 DSDict: SCDynamicStoreNotifyValue Setup:/Network/Global/IPv4 Tue Feb 22 14:12:38.789 2022 /sbin/route delete -net 10.19.87.0 -netmask 255.255.255.0 10.19.87.10 delete net 10.19.87.0: gateway 10.19.87.10 /sbin/route delete -net -inet6 fde6:7a:7d20:f57:: -prefixlen 64 -iface utun2 delete net fde6:7a:7d20:f57::: gateway utun2 /sbin/route delete -net 213.152.161.37 -netmask 255.255.255.255 192.168.178.1 delete net 213.152.161.37: gateway 192.168.178.1 /sbin/route delete -net 0.0.0.0 -netmask 128.0.0.0 10.19.87.1 delete net 0.0.0.0: gateway 10.19.87.1 /sbin/route delete -net 128.0.0.0 -netmask 128.0.0.0 10.19.87.1 delete net 128.0.0.0: gateway 10.19.87.1 /sbin/route delete -net -inet6 :: -prefixlen 1 -iface utun2 delete net ::: gateway utun2 /sbin/route delete -net -inet6 8000:: -prefixlen 1 -iface utun2 delete net 8000::: gateway utun2 /sbin/ifconfig utun2 down MacDNSAction: FLAGS=F Tue Feb 22 14:12:40.693 2022 EVENT: RECONNECTING Tue Feb 22 14:12:40.693 2022 WARNING: Backup copy of resolv.conf not found. DNS settings do not need to be restored. Tue Feb 22 14:12:40.693 2022 ERROR: N_RECONNECT Tue Feb 22 14:12:40.693 2022 EVENT: RESOLVE Tue Feb 22 14:12:40.693 2022 Setting up network filter and lock Tue Feb 22 14:12:40.693 2022 Allowing system DNS 5.9.164.112 to pass through the network filter Tue Feb 22 14:12:40.693 2022 Allowing system DNS 5.9.164.112 to pass through the network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:12:40.754 2022 Adding IPv4 server 213.152.161.37 to network filter No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:12:40.809 2022 Network filter and lock successfully activated Tue Feb 22 14:12:40.809 2022 Contacting 213.152.161.37:443 via TCP Tue Feb 22 14:12:40.809 2022 EVENT: WAIT Tue Feb 22 14:12:40.809 2022 Tue Feb 22 14:12:40.952 2022 Connecting to [213.152.161.37]:443 (213.152.161.37) via TCP Tue Feb 22 14:12:40.979 2022 EVENT: CONNECTING Tue Feb 22 14:12:40.979 2022 Tunnel Options:V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client Tue Feb 22 14:12:40.979 2022 Peer Info: IV_VER=3.7.2 AirVPN IV_PLAT=mac IV_NCP=2 IV_TCPNL=1 IV_PROTO=30 IV_CIPHERS=AES-256-CBC IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 UV_IPV6=yes IV_GUI_VER=Hummingbird - AirVPN OpenVPN 3 Client 1.2.0 RC 1 IV_HWADDR=18:65:90:d6:c1:dd IV_SSL=OpenSSL 1.1.1m 14 Dec 2021 Tue Feb 22 14:12:41.029 2022 VERIFY OK: depth=1, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=airvpn.org CA/emailAddress=info@airvpn.org, signature: RSA-SHA1 Tue Feb 22 14:12:41.029 2022 VERIFY OK: depth=0, /C=IT/ST=IT/L=Perugia/O=airvpn.org/CN=Hyadum/emailAddress=info@airvpn.org, signature: RSA-SHA512 Tue Feb 22 14:12:41.113 2022 SSL Handshake: peer certificate: CN=Hyadum, 4096 bit RSA, cipher: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD Tue Feb 22 14:12:41.114 2022 Session is ACTIVE Tue Feb 22 14:12:41.114 2022 EVENT: WARN TLS: received certificate signed with SHA1. Please inform your admin to upgrade to a stronger algorithm. Support for SHA1 signatures will be dropped in the future Tue Feb 22 14:12:41.114 2022 EVENT: GET_CONFIG Tue Feb 22 14:12:41.114 2022 Sending PUSH_REQUEST to server... Tue Feb 22 14:12:41.223 2022 OPTIONS: 0 [comp-lzo] [no] 1 [redirect-gateway] [ipv6] [def1] [bypass-dhcp] 2 [dhcp-option] [DNS] [10.19.87.1] 3 [dhcp-option] [DNS6] [fde6:7a:7d20:f57::1] 4 [tun-ipv6] 5 [route-gateway] [10.19.87.1] 6 [topology] [subnet] 7 [ping] [10] 8 [ping-restart] [60] 9 [ifconfig-ipv6] [fde6:7a:7d20:f57::1008/64] [fde6:7a:7d20:f57::1] 10 [ifconfig] [10.19.87.10] [255.255.255.0] 11 [peer-id] [0] 12 [cipher] [AES-256-CBC] Tue Feb 22 14:12:41.223 2022 PROTOCOL OPTIONS: cipher: AES-256-CBC digest: SHA512 ncp enabled: yes key-derivation: OpenVPN PRF compress: LZO_STUB peer ID: 0 control channel: tls-crypt enabled Tue Feb 22 14:12:41.224 2022 EVENT: ASSIGN_IP Tue Feb 22 14:12:41.224 2022 VPN Server has pushed IPv4 DNS server 10.19.87.1 No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:12:41.285 2022 VPN Server has pushed IPv6 DNS server fde6:7a:7d20:f57::1 No ALTQ support in kernel ALTQ related functions disabled nat cleared No ALTQ support in kernel ALTQ related functions disabled No ALTQ support in kernel ALTQ related functions disabled rules cleared No ALTQ support in kernel ALTQ related functions disabled 0 tables deleted. pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled ERROR: cannot detect IPv6 default gateway /sbin/ifconfig utun2 down /sbin/ifconfig utun2 10.19.87.10 10.19.87.1 netmask 255.255.255.0 mtu 1500 up /sbin/route add -net 10.19.87.0 -netmask 255.255.255.0 10.19.87.10 add net 10.19.87.0: gateway 10.19.87.10 /sbin/ifconfig utun2 inet6 fde6:7a:7d20:f57::1008/64 up /sbin/route add -net -inet6 fde6:7a:7d20:f57:: -prefixlen 64 -iface utun2 route: writing to routing socket: File exists add net fde6:7a:7d20:f57::: gateway utun2: File exists /sbin/route add -net 213.152.161.37 -netmask 255.255.255.255 192.168.178.1 add net 213.152.161.37: gateway 192.168.178.1 /sbin/route add -net 0.0.0.0 -netmask 128.0.0.0 10.19.87.1 add net 0.0.0.0: gateway 10.19.87.1 /sbin/route add -net 128.0.0.0 -netmask 128.0.0.0 10.19.87.1 add net 128.0.0.0: gateway 10.19.87.1 /sbin/route add -net -inet6 :: -prefixlen 1 -iface utun2 add net ::: gateway utun2 /sbin/route add -net -inet6 8000:: -prefixlen 1 -iface utun2 add net 8000::: gateway utun2 MacDNSAction: FLAGS=F RD=1 SO=5000 DNS=10.19.87.1,fde6:7a:7d20:f57::1,10.19.87.1,fde6:7a:7d20:f57::1,10.19.87.1,fde6:7a:7d20:f57::1,10.19.87.1,fde6:7a:7d20:f57::1 DOM= ADS= Tue Feb 22 14:12:41.416 2022 DSDict: updated Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS Tue Feb 22 14:12:41.416 2022 DSDict: updated State:/Network/Service/OpenVPNConnect/Info Tue Feb 22 14:12:41.417 2022 MacDNS: SETDNS 19.6.0 *** DSDict State:/Network/Global/IPv4 ORIG { PrimaryInterface = en0; PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; Router = "192.168.178.1"; } *** DSDict State:/Network/Service/OpenVPNConnect/Info ORIG { } MODIFIED { PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; } *** DSDict State:/Network/Service/OpenVPNConnect/DNS ORIG { } *** DSDict Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS ORIG { ServerAddresses = ( "5.9.164.112", "5.9.164.112" ); } MODIFIED { OpenVPNConnectOrigSearchDomains = OpenVPNConnectDeleteValue; OpenVPNConnectOrigSearchOrder = OpenVPNConnectDeleteValue; OpenVPNConnectOrigServerAddresses = ( "5.9.164.112", "5.9.164.112" ); SearchOrder = 5000; ServerAddresses = ( "10.19.87.1", "fde6:7a:7d20:f57::1", "10.19.87.1", "fde6:7a:7d20:f57::1", "10.19.87.1", "fde6:7a:7d20:f57::1", "10.19.87.1", "fde6:7a:7d20:f57::1" ); } Tue Feb 22 14:12:41.417 2022 /usr/bin/dscacheutil -flushcache Tue Feb 22 14:12:41.436 2022 /usr/bin/killall -HUP mDNSResponder Tue Feb 22 14:12:41.450 2022 DSDict: SCDynamicStoreNotifyValue Setup:/Network/Global/IPv4 open utun2 SUCCEEDED Tue Feb 22 14:12:41.450 2022 Connected via tun Tue Feb 22 14:12:41.451 2022 Client exception in transport_recv: crypto_alg: AES-256-CBC: bad cipher for data channel use Tue Feb 22 14:12:41.451 2022 Client terminated, restarting in 2000 ms... Tue Feb 22 14:12:41.509 2022 DSDict: updated Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS Tue Feb 22 14:12:41.509 2022 DSDict: removed State:/Network/Service/OpenVPNConnect/Info Tue Feb 22 14:12:41.509 2022 MacDNS: RESETDNS 19.6.0 *** DSDict State:/Network/Global/IPv4 ORIG { PrimaryInterface = en0; PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; Router = "192.168.178.1"; } *** DSDict State:/Network/Service/OpenVPNConnect/Info ORIG { PrimaryService = "8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E"; } *** DSDict State:/Network/Service/OpenVPNConnect/DNS ORIG { } *** DSDict Setup:/Network/Service/8C5A6D8A-C7B4-46B7-81F9-6436A2E4761E/DNS ORIG { OpenVPNConnectOrigSearchDomains = OpenVPNConnectDeleteValue; OpenVPNConnectOrigSearchOrder = OpenVPNConnectDeleteValue; OpenVPNConnectOrigServerAddresses = ( "5.9.164.112", "5.9.164.112" ); SearchOrder = 5000; ServerAddresses = ( "10.19.87.1", "fde6:7a:7d20:f57::1", "10.19.87.1", "fde6:7a:7d20:f57::1", "10.19.87.1", "fde6:7a:7d20:f57::1", "10.19.87.1", "fde6:7a:7d20:f57::1" ); } MODIFIED { ServerAddresses = ( "5.9.164.112", "5.9.164.112" ); } Tue Feb 22 14:12:41.510 2022 /usr/bin/dscacheutil -flushcache Tue Feb 22 14:12:41.529 2022 /usr/bin/killall -HUP mDNSResponder Tue Feb 22 14:12:41.546 2022 DSDict: SCDynamicStoreNotifyValue Setup:/Network/Global/IPv4 Tue Feb 22 14:12:41.546 2022 /sbin/route delete -net 10.19.87.0 -netmask 255.255.255.0 10.19.87.10 delete net 10.19.87.0: gateway 10.19.87.10 /sbin/route delete -net -inet6 fde6:7a:7d20:f57:: -prefixlen 64 -iface utun2 delete net fde6:7a:7d20:f57::: gateway utun2 /sbin/route delete -net 213.152.161.37 -netmask 255.255.255.255 192.168.178.1 delete net 213.152.161.37: gateway 192.168.178.1 /sbin/route delete -net 0.0.0.0 -netmask 128.0.0.0 10.19.87.1 delete net 0.0.0.0: gateway 10.19.87.1 /sbin/route delete -net 128.0.0.0 -netmask 128.0.0.0 10.19.87.1 delete net 128.0.0.0: gateway 10.19.87.1 /sbin/route delete -net -inet6 :: -prefixlen 1 -iface utun2 delete net ::: gateway utun2 /sbin/route delete -net -inet6 8000:: -prefixlen 1 -iface utun2 delete net 8000::: gateway utun2 /sbin/ifconfig utun2 down MacDNSAction: FLAGS=F ^CReceived SIGINT signal. Terminating Hummingbird. Tue Feb 22 14:12:42.816 2022 EVENT: DISCONNECTED Tue Feb 22 14:12:42.816 2022 WARNING: Backup copy of resolv.conf not found. DNS settings do not need to be restored. No ALTQ support in kernel ALTQ related functions disabled rules cleared nat cleared dummynet cleared 0 tables deleted. 33 states cleared source tracking entries cleared pf: statistics cleared pf: interface flags reset pfctl: Use of -f option, could result in flushing of rules present in the main ruleset added by the system at startup. See /etc/pf.conf for further details. No ALTQ support in kernel ALTQ related functions disabled Tue Feb 22 14:12:42.842 2022 Network filter successfully restored Tue Feb 22 14:12:42.842 2022 Thread finished STATS: BYTES_IN : 16092 BYTES_OUT : 15280 PACKETS_IN : 32 PACKETS_OUT : 40 N_RECONNECT : 3 Kind regards Quote Share this post Link to post
Staff 9971 Posted ... @Maggie144 Thanks. AES-CBC is not supported on the data channel (hence "bad cipher" error). When you configure AES-GCM, we see that you can't reach Kitalpha on port 53 at all. In fact the server is reachable on port 53, and the problem could be caused by your ISP (for example by hijacking all packets to port 53, as Vodafone did some time ago). Can you try different servers and different ports? Kind regards Quote Share this post Link to post
Maggie144 12 Posted ... CBC is standard output in all ovpn files generated, maybe update the config generator? After manually changing cipher to GCM, it works now with Hummingbird 1.2.0 RC 1 directly, for the first time. Love it. When is SSL > TCP going to be supported for Hummingbird? Quote Share this post Link to post
Staff 9971 Posted ... 1 hour ago, Maggie144 said: CBC is standard output in all ovpn files generated, maybe update the config generator? Hello! We will think about it. At the moment the Configuration Generator proposes files for OpenVPN 2.4. A user must check "Advanced Mode" and then select "OpenVPN >= 2.5" to get files compatible both with OpenVPN 2.5 and OpenVPN 3, with the correct directives: data-ciphers AES-256-GCM:AES-256-CBC:AES-192-GCM:AES-192-CBC:AES-128-GCM:AES-128-CBC data-ciphers-fallback AES-256-CBC But those files will not be compatible with OpenVPN versions older than 2.5. It's not easy when the user base is split between OpenVPN 2.3, 2.4, 2.5, 3.. with their mutual incompatibilities. Quote After manually changing cipher to GCM, it works now with Hummingbird 1.2.0 RC 1 directly, for the first time. Love it. Excellent! Quote When is SSL > TCP going to be supported for Hummingbird? It's not planned at the moment, because tls-crypt made it essentially obsolete. We might instead consider OpenVPN over SSH in the future. Kind regards 1 Maggie144 reacted to this Quote Share this post Link to post
Maggie144 12 Posted ... thank you so much for your help and detailed answers. the field of "OpenVPN version:" in advanced settings is just displaying ">=2." (in Firefox v98b7) never thought about being able to change it for their discrepancies. Thanks for pointing the multiple choice out. Kind regards 1 Staff reacted to this Quote Share this post Link to post
Staff 9971 Posted ... Hello!Update: Hummingbird 1.2.0 Release Candidate 2 is now available. Links to download the packages have been updated in this thread first message. Thank you very much for your tests! Kind regards Quote Share this post Link to post
Maggie144 12 Posted ... RC2 is running fine in Terminal. When using it with Eddie 2.21.5 beta, it first nags with "not allowed, executable is not owned by root". When I created a copy with sudo, it goes on with cipher, see log at the end *edit*: just checked with RC1 it works with Eddie 2.21.5 when sudo created the copy. Seems to be RC2 related issue . 2022.03.09 18:40:09 - Eddie version: 2.21.5beta / macos_x64, System: MacOS, Name: macOS 10.16, Version: 10.16 (Build 21D62), Mono/.Net: v4.0.30319 . 2022.03.09 18:40:10 - Reading options from /Users/net/.config/eddie/default.profile . 2022.03.09 18:40:12 - OpenVPN - Version: 3.3.2 - Hummingbird - AirVPN OpenVPN 3 Client 1.2.0 RC 2 - 8 March 2022 (/Users/net/Public/hmgbrd) . 2022.03.09 18:40:12 - SSH - Version: OpenSSH_8.6p1, LibreSSL 2.8.3 (/usr/bin/ssh) . 2022.03.09 18:40:12 - SSL - Version: stunnel 5.56 (/Applications/Eddie.app/Contents/MacOS/stunnel) ! 2022.03.09 18:40:12 - Activation of Network Lock - macOS - PF I 2022.03.09 18:40:14 - Ready . 2022.03.09 18:40:15 - Collect information about AirVPN completed I 2022.03.09 18:40:29 - Session starting. I 2022.03.09 18:40:29 - Checking authorization ... ! 2022.03.09 18:40:29 - Connecting to Canis (Netherlands, Alblasserdam) . 2022.03.09 18:40:30 - Routes, add 213.152.161.221/32 for interface "en0". . 2022.03.09 18:40:30 - Routes, add 213.152.161.221/32 for interface "en0", already exists. . 2022.03.09 18:40:30 - Hummingbird > Hummingbird - AirVPN OpenVPN 3 Client 1.2.0 RC 2 - 8 March 2022 . 2022.03.09 18:40:30 - Hummingbird > OpenVPN core 3.7.2 AirVPN mac x86_64 64-bit . 2022.03.09 18:40:30 - Hummingbird > Copyright (C) 2012-2020 OpenVPN Inc. All rights reserved. . 2022.03.09 18:40:30 - Hummingbird > OpenSSL 1.1.1m 14 Dec 2021 . 2022.03.09 18:40:30 - Hummingbird > System and service manager in use is launchd E 2022.03.09 18:40:30 - Hummingbird > ERROR: cipher is not supported. Please use --list-data-ciphers to list supported data ciphers. ! 2022.03.09 18:40:30 - Disconnecting . 2022.03.09 18:40:30 - Routes, delete 213.152.161.221/32 for interface "en0". . 2022.03.09 18:40:30 - Routes, delete 213.152.161.221/32 for interface "en0", not exists. . 2022.03.09 18:40:30 - Connection terminated. I 2022.03.09 18:40:32 - Cancel requested. ! 2022.03.09 18:40:32 - Session terminated. Quote Share this post Link to post
Staff 9971 Posted ... @Maggie144 Hello! Thank you, bug reproduced and confirmed. It will be fixed soon. Kind regards Quote Share this post Link to post