Jump to content
Not connected, Your IP: 18.188.23.110

Recommended Posts

Hello,

I am looking to start using AirVPN on MacOS 15.3.1, but I continue to run into an issue where I am being constantly connected and disconnected to different servers without gaining a solid connection. My logs are below:

 
I 2025.03.02 21:11:10 - Session starting.
. 2025.03.02 21:11:10 - Activation of Network Lock - macOS - PF
I 2025.03.02 21:11:10 - Checking authorization ...
! 2025.03.02 21:11:11 - Connecting to Pisces (Canada, Vancouver)
. 2025.03.02 21:11:11 - Routes, add 192.30.89.29/32 for interface "en0".
E 2025.03.02 21:11:11 - OpenVPN > Error: Exception: Executable '/private/var/folders/lz/cz6zzn_d0p19b_rvzl3778580000gn/T/AppTranslocation/09286E72-648E-44A0-81AC-7663F75C6691/d/Eddie.app/Contents/MacOS/openvpn' not allowed: Not owned by root;
! 2025.03.02 21:11:11 - Disconnecting
. 2025.03.02 21:11:11 - Routes, delete 192.30.89.29/32 for interface "en0".
. 2025.03.02 21:11:11 - Collect network information
. 2025.03.02 21:11:13 - Connection terminated.
I 2025.03.02 21:11:16 - Checking authorization ...
! 2025.03.02 21:11:17 - Connecting to Sham (Canada, Vancouver)
. 2025.03.02 21:11:17 - Routes, add 192.30.89.77/32 for interface "en0".
E 2025.03.02 21:11:17 - OpenVPN > Error: Exception: Executable '/private/var/folders/lz/cz6zzn_d0p19b_rvzl3778580000gn/T/AppTranslocation/09286E72-648E-44A0-81AC-7663F75C6691/d/Eddie.app/Contents/MacOS/openvpn' not allowed: Not owned by root;
! 2025.03.02 21:11:17 - Disconnecting
. 2025.03.02 21:11:17 - Routes, delete 192.30.89.77/32 for interface "en0".
. 2025.03.02 21:11:17 - Collect network information
. 2025.03.02 21:11:19 - Connection terminated.
I 2025.03.02 21:11:22 - Checking authorization ...
! 2025.03.02 21:11:23 - Connecting to Titawin (Canada, Vancouver)
. 2025.03.02 21:11:23 - Routes, add 192.30.89.61/32 for interface "en0".
E 2025.03.02 21:11:23 - OpenVPN > Error: Exception: Executable '/private/var/folders/lz/cz6zzn_d0p19b_rvzl3778580000gn/T/AppTranslocation/09286E72-648E-44A0-81AC-7663F75C6691/d/Eddie.app/Contents/MacOS/openvpn' not allowed: Not owned by root;
! 2025.03.02 21:11:23 - Disconnecting
. 2025.03.02 21:11:23 - Routes, delete 192.30.89.61/32 for interface "en0".
. 2025.03.02 21:11:23 - Collect network information
. 2025.03.02 21:11:25 - Connection terminated.
I 2025.03.02 21:11:28 - Checking authorization ...
! 2025.03.02 21:11:28 - Connecting to Nahn (Canada, Vancouver)
. 2025.03.02 21:11:29 - Routes, add 192.30.89.69/32 for interface "en0".
E 2025.03.02 21:11:29 - OpenVPN > Error: Exception: Executable '/private/var/folders/lz/cz6zzn_d0p19b_rvzl3778580000gn/T/AppTranslocation/09286E72-648E-44A0-81AC-7663F75C6691/d/Eddie.app/Contents/MacOS/openvpn' not allowed: Not owned by root;
! 2025.03.02 21:11:29 - Disconnecting
. 2025.03.02 21:11:29 - Routes, delete 192.30.89.69/32 for interface "en0".
. 2025.03.02 21:11:29 - Collect network information
. 2025.03.02 21:11:30 - Connection terminated.
I 2025.03.02 21:11:33 - Cancel requested.
. 2025.03.02 21:11:33 - Deactivation of Network Lock
! 2025.03.02 21:11:33 - Session terminated.
I 2025.03.02 21:12:06 - Session starting.
. 2025.03.02 21:12:06 - Activation of Network Lock - macOS - PF
I 2025.03.02 21:12:07 - Checking authorization ...
! 2025.03.02 21:12:07 - Connecting to Ginan (Canada, Vancouver)
. 2025.03.02 21:12:07 - Routes, add 104.193.135.245/32 for interface "en0".
E 2025.03.02 21:12:08 - OpenVPN > Error: Exception: Executable '/private/var/folders/lz/cz6zzn_d0p19b_rvzl3778580000gn/T/AppTranslocation/09286E72-648E-44A0-81AC-7663F75C6691/d/Eddie.app/Contents/MacOS/openvpn' not allowed: Not owned by root;
! 2025.03.02 21:12:08 - Disconnecting
. 2025.03.02 21:12:08 - Routes, delete 104.193.135.245/32 for interface "en0".
. 2025.03.02 21:12:08 - Collect network information
. 2025.03.02 21:12:09 - Connection terminated.
I 2025.03.02 21:12:10 - Cancel requested.
. 2025.03.02 21:12:10 - Deactivation of Network Lock
! 2025.03.02 21:12:10 - Session terminated.
 
Thanks in advance for your help!

Share this post


Link to post
5 hours ago, sw1234 said:

I continue to run into an issue where I am being constantly connected and disconnected to different servers without gaining a solid connection.


Hello!

First, please avoid translocation (Gatekeeper Path Randomization, GRP) by copying the app in the Applications folder or in any other proper place you like, exclusively through Folder utility. Then run again the app and please send us the complete log again if the problem persists, or even better please send us a system report generated by Eddie.

Kind regards
 

Share this post


Link to post
7 hours ago, Staff said:

Hello!

First, please avoid translocation (Gatekeeper Path Randomization, GRP) by copying the app in the Applications folder or in any other proper place you like, exclusively through Folder utility. Then run again the app and please send us the complete log again if the problem persists, or even better please send us a system report generated by Eddie.

Kind regards
 

Hello,

My system report is attached. I was unable to avoid the problem via copying the app over to the Applications folder.

Eddie System Report

Share this post


Link to post
16 hours ago, sw1234 said:

I was unable to avoid the problem via copying the app over to the Applications folder.


Hello!

The translocation has been successfully avoided. Now, to resolve the problem, please open a terminal and enter the following command while Eddie is not running:
sudo chown root /Applications/Eddie.app/Contents/MacOS/*

Important, if you get a "permission denied" error after you entered the above command please grant Full Disk Access to the Terminal App.

You can do it by selecting System Preferences > Security and Privacy > Privacy > Full Disk Access and then adding the Terminal app by pressing the "+" button and selecting it. Then open another terminal and repeat the above command

Finally re-start Eddie and test again.

Kind regards
 

Share this post


Link to post
Posted ... (edited)
7 hours ago, Staff said:

Hello!

The translocation has been successfully avoided. Now, to resolve the problem, please open a terminal and enter the following command while Eddie is not running:

sudo chown root /Applications/Eddie.app/Contents/MacOS/*

Important, if you get a "permission denied" error after you entered the above command please grant Full Disk Access to the Terminal App.

You can do it by selecting System Preferences > Security and Privacy > Privacy > Full Disk Access and then adding the Terminal app by pressing the "+" button and selecting it. Then open another terminal and repeat the above command

Finally re-start Eddie and test again.

Kind regards
 

Hello,

After running the command, it appears that the authentication is now failing to connect. Here is the system report for the session: 

Eddie System/Environment Report - 3/4/2025 - 5:51 PM UTC

Eddie version: 2.24.6
Eddie OS build: macos_arm64
Eddie architecture: x64
OS type: MacOS
OS name: macOS 15.3.1
OS version: 15.3.1
OS architecture: arm64
Framework: v4.0.30319
OpenVPN: 2.6.12 - OpenSSL 3.3.2 3 Sep 2024, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)
Hummingbird: 3.3.2 - Hummingbird - OpenVPN3 Client 1.3.0 - 1 June 2023 (/Applications/Eddie.app/Contents/MacOS/hummingbird)
WireGuard: 1.0.20210315
SSH: OpenSSH_9.8p1, LibreSSL 3.3.6 (/usr/bin/ssh)
SSL: 5.57 (/Applications/Eddie.app/Contents/MacOS/stunnel)
Profile path: /Users/stevenwiener/.config/eddie/default.profile
Data path: /Users/stevenwiener/.config/eddie
Application path: /Applications/Eddie.app/Contents/MacOS
Executable path: /Applications/Eddie.app/Contents/MacOS/Eddie-UI
Command line arguments: (0 args) 
Network Lock Active: No
Connected to VPN: No
OS support IPv4: Yes
OS support IPv6: Yes
Detected DNS: 192.168.4.1
Test DNS IPv4: Ok
Test DNS IPv6: Ok
Test Ping IPv4: 166 ms
Test Ping IPv6: Failed
Test HTTP IPv4: Ok
Test HTTP IPv6: Error: Fetch url error:Couldn't connect to server
Test HTTPS: Ok
----------------------------
Important options not at defaults:

login: (omissis)
password: (omissis)
remember: True
key: (omissis)
mode.type: openvpn
mode.protocol: UDP
mode.port: 1194
mode.alt: 2
gui.osx.visible: True

----------------------------
Logs:

. 2025.03.04 10:48:07 - Eddie version: 2.24.6 / macos_arm64, System: MacOS, Name: macOS 15.3.1, Version: 15.3.1, Framework: v4.0.30319
. 2025.03.04 10:48:07 - Raise system privileges
. 2025.03.04 10:48:13 - Collect network information
. 2025.03.04 10:48:15 - Reading options from /Users/stevenwiener/.config/eddie/default.profile
. 2025.03.04 10:48:16 - OpenVPN - Version: 2.6.12 - OpenSSL 3.3.2 3 Sep 2024, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)
. 2025.03.04 10:48:16 - SSH - Version: OpenSSH_9.8p1, LibreSSL 3.3.6 (/usr/bin/ssh)
. 2025.03.04 10:48:16 - SSL - Version: 5.57 (/Applications/Eddie.app/Contents/MacOS/stunnel)
I 2025.03.04 10:48:16 - Ready
. 2025.03.04 10:48:17 - Collect information about AirVPN completed
I 2025.03.04 10:48:19 - Session starting.
. 2025.03.04 10:48:19 - Activation of Network Lock - macOS - PF
I 2025.03.04 10:48:20 - Checking authorization ...
! 2025.03.04 10:48:21 - Connecting to Telescopium (Canada, Vancouver)
. 2025.03.04 10:48:21 - Routes, add 192.30.89.53/32 for interface "en0".
. 2025.03.04 10:48:21 - OpenVPN > OpenVPN 2.6.12 aarch64-apple-darwin23.4.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD]
. 2025.03.04 10:48:21 - OpenVPN > library versions: OpenSSL 3.3.2 3 Sep 2024, LZO 2.10
. 2025.03.04 10:48:21 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.53:1194
. 2025.03.04 10:48:21 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144]
. 2025.03.04 10:48:21 - OpenVPN > UDPv4 link local: (not bound)
. 2025.03.04 10:48:21 - OpenVPN > UDPv4 link remote: [AF_INET]192.30.89.53:1194
. 2025.03.04 10:48:21 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.53:1194, sid=7ac18709 d96953f8
. 2025.03.04 10:48:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2025.03.04 10:48:21 - OpenVPN > VERIFY KU OK
. 2025.03.04 10:48:21 - OpenVPN > Validating certificate extended key usage
. 2025.03.04 10:48:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2025.03.04 10:48:21 - OpenVPN > VERIFY EKU OK
. 2025.03.04 10:48:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Telescopium, emailAddress=info@airvpn.org
. 2025.03.04 10:48:21 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519
. 2025.03.04 10:48:21 - OpenVPN > [Telescopium] Peer Connection Initiated with [AF_INET]192.30.89.53:1194
. 2025.03.04 10:48:21 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
. 2025.03.04 10:48:21 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted
. 2025.03.04 10:48:22 - OpenVPN > SENT CONTROL [Telescopium]: 'PUSH_REQUEST' (status=1)
. 2025.03.04 10:48:25 - OpenVPN > AUTH: Received control message: AUTH_FAILED
W 2025.03.04 10:48:25 - Authorization failed. Look at the client area to discover the reason.
. 2025.03.04 10:48:25 - OpenVPN > SIGTERM received, sending exit notification to peer
! 2025.03.04 10:48:25 - Disconnecting
. 2025.03.04 10:48:25 - Sending soft termination signal
. 2025.03.04 10:48:25 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4)
. 2025.03.04 10:48:25 - OpenVPN > SIGINT[hard,] received, process exiting
. 2025.03.04 10:48:25 - Routes, delete 192.30.89.53/32 for interface "en0".
. 2025.03.04 10:48:25 - Collect network information
. 2025.03.04 10:48:27 - Connection terminated.
I 2025.03.04 10:48:30 - Checking authorization ...
! 2025.03.04 10:48:31 - Connecting to Telescopium (Canada, Vancouver)
. 2025.03.04 10:48:31 - Routes, add 192.30.89.53/32 for interface "en0".
. 2025.03.04 10:48:31 - OpenVPN > OpenVPN 2.6.12 aarch64-apple-darwin23.4.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD]
. 2025.03.04 10:48:31 - OpenVPN > library versions: OpenSSL 3.3.2 3 Sep 2024, LZO 2.10
. 2025.03.04 10:48:31 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.53:1194
. 2025.03.04 10:48:31 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144]
. 2025.03.04 10:48:31 - OpenVPN > UDPv4 link local: (not bound)
. 2025.03.04 10:48:31 - OpenVPN > UDPv4 link remote: [AF_INET]192.30.89.53:1194
. 2025.03.04 10:48:31 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.53:1194, sid=edceaa15 a3e205f8
. 2025.03.04 10:48:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2025.03.04 10:48:31 - OpenVPN > VERIFY KU OK
. 2025.03.04 10:48:31 - OpenVPN > Validating certificate extended key usage
. 2025.03.04 10:48:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2025.03.04 10:48:31 - OpenVPN > VERIFY EKU OK
. 2025.03.04 10:48:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Telescopium, emailAddress=info@airvpn.org
. 2025.03.04 10:48:31 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519
. 2025.03.04 10:48:31 - OpenVPN > [Telescopium] Peer Connection Initiated with [AF_INET]192.30.89.53:1194
. 2025.03.04 10:48:31 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
. 2025.03.04 10:48:31 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted
. 2025.03.04 10:48:32 - OpenVPN > SENT CONTROL [Telescopium]: 'PUSH_REQUEST' (status=1)
. 2025.03.04 10:48:34 - OpenVPN > AUTH: Received control message: AUTH_FAILED
W 2025.03.04 10:48:34 - Authorization failed. Look at the client area to discover the reason.
. 2025.03.04 10:48:34 - OpenVPN > SIGTERM received, sending exit notification to peer
! 2025.03.04 10:48:34 - Disconnecting
. 2025.03.04 10:48:34 - Sending soft termination signal
. 2025.03.04 10:48:34 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4)
. 2025.03.04 10:48:34 - OpenVPN > SIGINT[hard,] received, process exiting
. 2025.03.04 10:48:35 - Routes, delete 192.30.89.53/32 for interface "en0".
. 2025.03.04 10:48:35 - Collect network information
. 2025.03.04 10:48:37 - Connection terminated.
I 2025.03.04 10:48:40 - Checking authorization ...
! 2025.03.04 10:48:40 - Connecting to Telescopium (Canada, Vancouver)
. 2025.03.04 10:48:40 - Routes, add 192.30.89.53/32 for interface "en0".
. 2025.03.04 10:48:41 - OpenVPN > OpenVPN 2.6.12 aarch64-apple-darwin23.4.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD]
. 2025.03.04 10:48:41 - OpenVPN > library versions: OpenSSL 3.3.2 3 Sep 2024, LZO 2.10
. 2025.03.04 10:48:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.53:1194
. 2025.03.04 10:48:41 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144]
. 2025.03.04 10:48:41 - OpenVPN > UDPv4 link local: (not bound)
. 2025.03.04 10:48:41 - OpenVPN > UDPv4 link remote: [AF_INET]192.30.89.53:1194
. 2025.03.04 10:48:43 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.53:1194, sid=1e46624f 237f1435
. 2025.03.04 10:48:43 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2025.03.04 10:48:43 - OpenVPN > VERIFY KU OK
. 2025.03.04 10:48:43 - OpenVPN > Validating certificate extended key usage
. 2025.03.04 10:48:43 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2025.03.04 10:48:43 - OpenVPN > VERIFY EKU OK
. 2025.03.04 10:48:43 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Telescopium, emailAddress=info@airvpn.org
. 2025.03.04 10:48:43 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519
. 2025.03.04 10:48:43 - OpenVPN > [Telescopium] Peer Connection Initiated with [AF_INET]192.30.89.53:1194
. 2025.03.04 10:48:43 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
. 2025.03.04 10:48:43 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted
. 2025.03.04 10:48:44 - OpenVPN > SENT CONTROL [Telescopium]: 'PUSH_REQUEST' (status=1)
. 2025.03.04 10:48:46 - OpenVPN > AUTH: Received control message: AUTH_FAILED
W 2025.03.04 10:48:46 - Authorization failed. Look at the client area to discover the reason.
. 2025.03.04 10:48:46 - OpenVPN > SIGTERM received, sending exit notification to peer
! 2025.03.04 10:48:46 - Disconnecting
. 2025.03.04 10:48:46 - Sending soft termination signal
. 2025.03.04 10:48:46 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4)
. 2025.03.04 10:48:46 - OpenVPN > SIGINT[hard,] received, process exiting
. 2025.03.04 10:48:46 - Routes, delete 192.30.89.53/32 for interface "en0".
. 2025.03.04 10:48:46 - Collect network information
. 2025.03.04 10:48:48 - Connection terminated.
I 2025.03.04 10:48:49 - Cancel requested.
. 2025.03.04 10:48:49 - Deactivation of Network Lock
! 2025.03.04 10:48:49 - Session terminated.
I 2025.03.04 10:49:09 - Session starting.
. 2025.03.04 10:49:09 - Activation of Network Lock - macOS - PF
I 2025.03.04 10:49:10 - Checking authorization ...
! 2025.03.04 10:49:10 - Connecting to Titawin (Canada, Vancouver)
. 2025.03.04 10:49:10 - Routes, add 192.30.89.61/32 for interface "en0".
. 2025.03.04 10:49:11 - OpenVPN > OpenVPN 2.6.12 aarch64-apple-darwin23.4.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD]
. 2025.03.04 10:49:11 - OpenVPN > library versions: OpenSSL 3.3.2 3 Sep 2024, LZO 2.10
. 2025.03.04 10:49:11 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.61:1194
. 2025.03.04 10:49:11 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144]
. 2025.03.04 10:49:11 - OpenVPN > UDPv4 link local: (not bound)
. 2025.03.04 10:49:11 - OpenVPN > UDPv4 link remote: [AF_INET]192.30.89.61:1194
. 2025.03.04 10:49:11 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.61:1194, sid=c7997550 4a6e83a2
. 2025.03.04 10:49:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2025.03.04 10:49:11 - OpenVPN > VERIFY KU OK
. 2025.03.04 10:49:11 - OpenVPN > Validating certificate extended key usage
. 2025.03.04 10:49:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2025.03.04 10:49:11 - OpenVPN > VERIFY EKU OK
. 2025.03.04 10:49:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Titawin, emailAddress=info@airvpn.org
. 2025.03.04 10:49:11 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519
. 2025.03.04 10:49:11 - OpenVPN > [Titawin] Peer Connection Initiated with [AF_INET]192.30.89.61:1194
. 2025.03.04 10:49:11 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
. 2025.03.04 10:49:11 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted
. 2025.03.04 10:49:12 - OpenVPN > SENT CONTROL [Titawin]: 'PUSH_REQUEST' (status=1)
. 2025.03.04 10:49:12 - OpenVPN > AUTH: Received control message: AUTH_FAILED
W 2025.03.04 10:49:12 - Authorization failed. Look at the client area to discover the reason.
. 2025.03.04 10:49:12 - OpenVPN > SIGTERM received, sending exit notification to peer
! 2025.03.04 10:49:12 - Disconnecting
. 2025.03.04 10:49:12 - Sending soft termination signal
. 2025.03.04 10:49:12 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4)
. 2025.03.04 10:49:12 - OpenVPN > SIGINT[hard,] received, process exiting
. 2025.03.04 10:49:12 - Routes, delete 192.30.89.61/32 for interface "en0".
. 2025.03.04 10:49:12 - Collect network information
. 2025.03.04 10:49:14 - Connection terminated.
I 2025.03.04 10:49:16 - Cancel requested.
. 2025.03.04 10:49:16 - Deactivation of Network Lock
! 2025.03.04 10:49:16 - Session terminated.
I 2025.03.04 10:50:21 - Session starting.
. 2025.03.04 10:50:21 - Activation of Network Lock - macOS - PF
I 2025.03.04 10:50:22 - Checking authorization ...
! 2025.03.04 10:50:22 - Connecting to Titawin (Canada, Vancouver)
. 2025.03.04 10:50:22 - Routes, add 192.30.89.61/32 for interface "en0".
. 2025.03.04 10:50:23 - OpenVPN > OpenVPN 2.6.12 aarch64-apple-darwin23.4.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD]
. 2025.03.04 10:50:23 - OpenVPN > library versions: OpenSSL 3.3.2 3 Sep 2024, LZO 2.10
. 2025.03.04 10:50:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.61:1194
. 2025.03.04 10:50:23 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144]
. 2025.03.04 10:50:23 - OpenVPN > UDPv4 link local: (not bound)
. 2025.03.04 10:50:23 - OpenVPN > UDPv4 link remote: [AF_INET]192.30.89.61:1194
. 2025.03.04 10:50:23 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.61:1194, sid=5fb924cc f5088062
. 2025.03.04 10:50:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2025.03.04 10:50:23 - OpenVPN > VERIFY KU OK
. 2025.03.04 10:50:23 - OpenVPN > Validating certificate extended key usage
. 2025.03.04 10:50:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2025.03.04 10:50:23 - OpenVPN > VERIFY EKU OK
. 2025.03.04 10:50:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Titawin, emailAddress=info@airvpn.org
. 2025.03.04 10:50:23 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519
. 2025.03.04 10:50:23 - OpenVPN > [Titawin] Peer Connection Initiated with [AF_INET]192.30.89.61:1194
. 2025.03.04 10:50:23 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
. 2025.03.04 10:50:23 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted
. 2025.03.04 10:50:24 - OpenVPN > SENT CONTROL [Titawin]: 'PUSH_REQUEST' (status=1)
. 2025.03.04 10:50:24 - OpenVPN > AUTH: Received control message: AUTH_FAILED
W 2025.03.04 10:50:24 - Authorization failed. Look at the client area to discover the reason.
. 2025.03.04 10:50:24 - OpenVPN > SIGTERM received, sending exit notification to peer
! 2025.03.04 10:50:24 - Disconnecting
. 2025.03.04 10:50:24 - Sending soft termination signal
. 2025.03.04 10:50:24 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4)
. 2025.03.04 10:50:24 - OpenVPN > SIGINT[hard,] received, process exiting
. 2025.03.04 10:50:24 - Routes, delete 192.30.89.61/32 for interface "en0".
. 2025.03.04 10:50:24 - Collect network information
. 2025.03.04 10:50:26 - Connection terminated.
I 2025.03.04 10:50:28 - Cancel requested.
. 2025.03.04 10:50:28 - Deactivation of Network Lock
! 2025.03.04 10:50:28 - Session terminated.
I 2025.03.04 10:50:42 - Session starting.
. 2025.03.04 10:50:42 - Activation of Network Lock - macOS - PF
I 2025.03.04 10:50:43 - Checking authorization ...
! 2025.03.04 10:50:44 - Connecting to Telescopium (Canada, Vancouver)
. 2025.03.04 10:50:44 - Routes, add 192.30.89.53/32 for interface "en0".
. 2025.03.04 10:50:44 - OpenVPN > OpenVPN 2.6.12 aarch64-apple-darwin23.4.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD]
. 2025.03.04 10:50:44 - OpenVPN > library versions: OpenSSL 3.3.2 3 Sep 2024, LZO 2.10
. 2025.03.04 10:50:44 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.53:1194
. 2025.03.04 10:50:44 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144]
. 2025.03.04 10:50:44 - OpenVPN > UDPv4 link local: (not bound)
. 2025.03.04 10:50:44 - OpenVPN > UDPv4 link remote: [AF_INET]192.30.89.53:1194
. 2025.03.04 10:50:44 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.53:1194, sid=9d4832d2 45076413
. 2025.03.04 10:50:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2025.03.04 10:50:44 - OpenVPN > VERIFY KU OK
. 2025.03.04 10:50:44 - OpenVPN > Validating certificate extended key usage
. 2025.03.04 10:50:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2025.03.04 10:50:44 - OpenVPN > VERIFY EKU OK
. 2025.03.04 10:50:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Telescopium, emailAddress=info@airvpn.org
. 2025.03.04 10:50:44 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519
. 2025.03.04 10:50:44 - OpenVPN > [Telescopium] Peer Connection Initiated with [AF_INET]192.30.89.53:1194
. 2025.03.04 10:50:44 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
. 2025.03.04 10:50:44 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted
. 2025.03.04 10:50:45 - OpenVPN > SENT CONTROL [Telescopium]: 'PUSH_REQUEST' (status=1)
. 2025.03.04 10:50:50 - OpenVPN > SENT CONTROL [Telescopium]: 'PUSH_REQUEST' (status=1)
. 2025.03.04 10:50:50 - OpenVPN > AUTH: Received control message: AUTH_FAILED
W 2025.03.04 10:50:50 - Authorization failed. Look at the client area to discover the reason.
. 2025.03.04 10:50:50 - OpenVPN > SIGTERM received, sending exit notification to peer
! 2025.03.04 10:50:50 - Disconnecting
. 2025.03.04 10:50:50 - Sending soft termination signal
. 2025.03.04 10:50:51 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4)
. 2025.03.04 10:50:51 - OpenVPN > SIGINT[hard,] received, process exiting
. 2025.03.04 10:50:51 - Routes, delete 192.30.89.53/32 for interface "en0".
. 2025.03.04 10:50:51 - Collect network information
. 2025.03.04 10:50:53 - Connection terminated.
I 2025.03.04 10:50:56 - Checking authorization ...
! 2025.03.04 10:50:56 - Connecting to Telescopium (Canada, Vancouver)
. 2025.03.04 10:50:57 - Routes, add 192.30.89.53/32 for interface "en0".
. 2025.03.04 10:50:57 - OpenVPN > OpenVPN 2.6.12 aarch64-apple-darwin23.4.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD]
. 2025.03.04 10:50:57 - OpenVPN > library versions: OpenSSL 3.3.2 3 Sep 2024, LZO 2.10
. 2025.03.04 10:50:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.53:1194
. 2025.03.04 10:50:57 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144]
. 2025.03.04 10:50:57 - OpenVPN > UDPv4 link local: (not bound)
. 2025.03.04 10:50:57 - OpenVPN > UDPv4 link remote: [AF_INET]192.30.89.53:1194
. 2025.03.04 10:50:57 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.53:1194, sid=64f08f48 1bb8b096
. 2025.03.04 10:50:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2025.03.04 10:50:57 - OpenVPN > VERIFY KU OK
. 2025.03.04 10:50:57 - OpenVPN > Validating certificate extended key usage
. 2025.03.04 10:50:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2025.03.04 10:50:57 - OpenVPN > VERIFY EKU OK
. 2025.03.04 10:50:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Telescopium, emailAddress=info@airvpn.org
. 2025.03.04 10:50:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519
. 2025.03.04 10:50:57 - OpenVPN > [Telescopium] Peer Connection Initiated with [AF_INET]192.30.89.53:1194
. 2025.03.04 10:50:57 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
. 2025.03.04 10:50:57 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted
. 2025.03.04 10:50:58 - OpenVPN > SENT CONTROL [Telescopium]: 'PUSH_REQUEST' (status=1)
. 2025.03.04 10:50:58 - OpenVPN > AUTH: Received control message: AUTH_FAILED
W 2025.03.04 10:50:58 - Authorization failed. Look at the client area to discover the reason.
. 2025.03.04 10:50:58 - OpenVPN > SIGTERM received, sending exit notification to peer
! 2025.03.04 10:50:58 - Disconnecting
. 2025.03.04 10:50:58 - Sending soft termination signal
. 2025.03.04 10:50:58 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4)
. 2025.03.04 10:50:58 - OpenVPN > SIGINT[hard,] received, process exiting
. 2025.03.04 10:50:58 - Routes, delete 192.30.89.53/32 for interface "en0".
. 2025.03.04 10:50:58 - Collect network information
. 2025.03.04 10:51:00 - Connection terminated.
I 2025.03.04 10:51:04 - Checking authorization ...
! 2025.03.04 10:51:04 - Connecting to Telescopium (Canada, Vancouver)
. 2025.03.04 10:51:04 - Routes, add 192.30.89.53/32 for interface "en0".
. 2025.03.04 10:51:05 - OpenVPN > OpenVPN 2.6.12 aarch64-apple-darwin23.4.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD]
. 2025.03.04 10:51:05 - OpenVPN > library versions: OpenSSL 3.3.2 3 Sep 2024, LZO 2.10
. 2025.03.04 10:51:05 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.53:1194
. 2025.03.04 10:51:05 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144]
. 2025.03.04 10:51:05 - OpenVPN > UDPv4 link local: (not bound)
. 2025.03.04 10:51:05 - OpenVPN > UDPv4 link remote: [AF_INET]192.30.89.53:1194
. 2025.03.04 10:51:05 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.53:1194, sid=c2efed8f fece80da
. 2025.03.04 10:51:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2025.03.04 10:51:05 - OpenVPN > VERIFY KU OK
. 2025.03.04 10:51:05 - OpenVPN > Validating certificate extended key usage
. 2025.03.04 10:51:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2025.03.04 10:51:05 - OpenVPN > VERIFY EKU OK
. 2025.03.04 10:51:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Telescopium, emailAddress=info@airvpn.org
. 2025.03.04 10:51:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519
. 2025.03.04 10:51:05 - OpenVPN > [Telescopium] Peer Connection Initiated with [AF_INET]192.30.89.53:1194
. 2025.03.04 10:51:05 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
. 2025.03.04 10:51:05 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted
. 2025.03.04 10:51:06 - OpenVPN > SENT CONTROL [Telescopium]: 'PUSH_REQUEST' (status=1)
. 2025.03.04 10:51:06 - OpenVPN > AUTH: Received control message: AUTH_FAILED
W 2025.03.04 10:51:06 - Authorization failed. Look at the client area to discover the reason.
. 2025.03.04 10:51:06 - OpenVPN > SIGTERM received, sending exit notification to peer
! 2025.03.04 10:51:06 - Disconnecting
. 2025.03.04 10:51:06 - Sending soft termination signal
. 2025.03.04 10:51:06 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4)
. 2025.03.04 10:51:06 - OpenVPN > SIGINT[hard,] received, process exiting
. 2025.03.04 10:51:06 - Routes, delete 192.30.89.53/32 for interface "en0".
. 2025.03.04 10:51:06 - Collect network information
. 2025.03.04 10:51:08 - Connection terminated.
I 2025.03.04 10:51:11 - Checking authorization ...
! 2025.03.04 10:51:12 - Connecting to Telescopium (Canada, Vancouver)
. 2025.03.04 10:51:12 - Routes, add 192.30.89.53/32 for interface "en0".
. 2025.03.04 10:51:12 - OpenVPN > OpenVPN 2.6.12 aarch64-apple-darwin23.4.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD]
. 2025.03.04 10:51:12 - OpenVPN > library versions: OpenSSL 3.3.2 3 Sep 2024, LZO 2.10
. 2025.03.04 10:51:12 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.53:1194
. 2025.03.04 10:51:12 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144]
. 2025.03.04 10:51:12 - OpenVPN > UDPv4 link local: (not bound)
. 2025.03.04 10:51:12 - OpenVPN > UDPv4 link remote: [AF_INET]192.30.89.53:1194
. 2025.03.04 10:51:12 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.53:1194, sid=fad5c5a6 7a0248cf
. 2025.03.04 10:51:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2025.03.04 10:51:12 - OpenVPN > VERIFY KU OK
. 2025.03.04 10:51:12 - OpenVPN > Validating certificate extended key usage
. 2025.03.04 10:51:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2025.03.04 10:51:12 - OpenVPN > VERIFY EKU OK
. 2025.03.04 10:51:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Telescopium, emailAddress=info@airvpn.org
. 2025.03.04 10:51:12 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519
. 2025.03.04 10:51:12 - OpenVPN > [Telescopium] Peer Connection Initiated with [AF_INET]192.30.89.53:1194
. 2025.03.04 10:51:12 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
. 2025.03.04 10:51:12 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted
. 2025.03.04 10:51:13 - OpenVPN > SENT CONTROL [Telescopium]: 'PUSH_REQUEST' (status=1)
. 2025.03.04 10:51:14 - OpenVPN > AUTH: Received control message: AUTH_FAILED
W 2025.03.04 10:51:14 - Authorization failed. Look at the client area to discover the reason.
. 2025.03.04 10:51:14 - OpenVPN > SIGTERM received, sending exit notification to peer
! 2025.03.04 10:51:14 - Disconnecting
. 2025.03.04 10:51:14 - Sending soft termination signal
. 2025.03.04 10:51:14 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4)
. 2025.03.04 10:51:14 - OpenVPN > SIGINT[hard,] received, process exiting
. 2025.03.04 10:51:14 - Routes, delete 192.30.89.53/32 for interface "en0".
. 2025.03.04 10:51:14 - Collect network information
. 2025.03.04 10:51:16 - Connection terminated.
I 2025.03.04 10:51:19 - Cancel requested.
. 2025.03.04 10:51:19 - Deactivation of Network Lock
! 2025.03.04 10:51:19 - Session terminated.

----------------------------
Network Info:

{
    "routes": [
        {
            "destination": "0.0.0.0\/0",
            "expire": "",
            "flags": "UGScg",
            "gateway": "192.168.4.1",
            "interface": "en0",
            "mtu": "1500",
            "refs": "302",
            "rt_ifa": "192.168.4.231",
            "use": "70608"
        },
        {
            "destination": "127",
            "expire": "",
            "flags": "UCS",
            "gateway": "127.0.0.1",
            "interface": "lo0",
            "mtu": "16384",
            "refs": "0",
            "rt_ifa": "127.0.0.1",
            "use": "0"
        },
        {
            "destination": "127.0.0.1\/32",
            "expire": "",
            "flags": "UH",
            "gateway": "127.0.0.1",
            "interface": "lo0",
            "mtu": "16384",
            "refs": "10",
            "rt_ifa": "127.0.0.1",
            "use": "767216"
        },
        {
            "destination": "169.254\/32",
            "expire": "!",
            "flags": "UCS",
            "gateway": "link#15",
            "interface": "en0",
            "mtu": "1500",
            "refs": "1",
            "rt_ifa": "192.168.4.231",
            "use": "0"
        },
        {
            "destination": "192.168.4\/32",
            "expire": "!",
            "flags": "UCS",
            "gateway": "link#15",
            "interface": "en0",
            "mtu": "1500",
            "refs": "15",
            "rt_ifa": "192.168.4.231",
            "use": "0"
        },
        {
            "destination": "192.168.4.1\/32",
            "expire": "!",
            "flags": "UCS",
            "gateway": "link#15",
            "interface": "en0",
            "mtu": "1500",
            "refs": "4",
            "rt_ifa": "192.168.4.231",
            "use": "0"
        },
        {
            "destination": "192.168.4.1\/32",
            "expire": "1196",
            "flags": "UHLWIir",
            "gateway": "d4:6a:91:b7:e3:74",
            "interface": "en0",
            "mtu": "1500",
            "refs": "258",
            "rt_ifa": "192.168.4.231",
            "use": "1960"
        },
        {
            "destination": "192.168.4.25\/32",
            "expire": "!",
            "flags": "UHRLWI",
            "gateway": "link#15",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "192.168.4.231",
            "use": "14"
        },
        {
            "destination": "192.168.4.26\/32",
            "expire": "!",
            "flags": "UHRLWI",
            "gateway": "link#15",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "192.168.4.231",
            "use": "112"
        },
        {
            "destination": "192.168.4.32\/32",
            "expire": "!",
            "flags": "UHRLWI",
            "gateway": "link#15",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "192.168.4.231",
            "use": "105"
        },
        {
            "destination": "192.168.4.124\/32",
            "expire": "1194",
            "flags": "UHLWI",
            "gateway": "d8:bc:38:d5:df:a4",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "192.168.4.231",
            "use": "0"
        },
        {
            "destination": "192.168.4.136\/32",
            "expire": "!",
            "flags": "UHLWI",
            "gateway": "c:96:e6:81:19:e9",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "192.168.4.231",
            "use": "0"
        },
        {
            "destination": "192.168.4.137\/32",
            "expire": "721",
            "flags": "UHLWI",
            "gateway": "b4:b6:86:52:a1:a7",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "192.168.4.231",
            "use": "49"
        },
        {
            "destination": "192.168.4.138\/32",
            "expire": "!",
            "flags": "UHLWI",
            "gateway": "0:f:ff:9f:99:49",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "192.168.4.231",
            "use": "0"
        },
        {
            "destination": "192.168.4.148\/32",
            "expire": "!",
            "flags": "UHLWI",
            "gateway": "50:6:f5:6e:50:4f",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "192.168.4.231",
            "use": "0"
        },
        {
            "destination": "192.168.4.161\/32",
            "expire": "1096",
            "flags": "UHLWI",
            "gateway": "78:e7:d1:a2:b:4",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "192.168.4.231",
            "use": "1"
        },
        {
            "destination": "192.168.4.172\/32",
            "expire": "285",
            "flags": "UHLWI",
            "gateway": "52:bc:f7:64:89:77",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "192.168.4.231",
            "use": "0"
        },
        {
            "destination": "192.168.4.193\/32",
            "expire": "1172",
            "flags": "UHLWI",
            "gateway": "76:d7:b7:a:7f:6d",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "192.168.4.231",
            "use": "97"
        },
        {
            "destination": "192.168.4.218\/32",
            "expire": "503",
            "flags": "UHLWI",
            "gateway": "e8:d8:d1:7c:cc:e0",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "192.168.4.231",
            "use": "1"
        },
        {
            "destination": "192.168.4.223\/32",
            "expire": "1167",
            "flags": "UHLWI",
            "gateway": "4c:b9:ea:40:45:30",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "192.168.4.231",
            "use": "0"
        },
        {
            "destination": "192.168.4.231\/32",
            "expire": "!",
            "flags": "UCS",
            "gateway": "link#15",
            "interface": "en0",
            "mtu": "1500",
            "refs": "1",
            "rt_ifa": "192.168.4.231",
            "use": "0"
        },
        {
            "destination": "192.168.4.231\/32",
            "expire": "",
            "flags": "UHLWI",
            "gateway": "8e:b7:a6:82:23:f5",
            "interface": "lo0",
            "mtu": "16384",
            "refs": "0",
            "rt_ifa": "192.168.4.231",
            "use": "83"
        },
        {
            "destination": "192.168.4.249\/32",
            "expire": "!",
            "flags": "UHLWI",
            "gateway": "48:a6:b8:20:a8:64",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "192.168.4.231",
            "use": "0"
        },
        {
            "destination": "192.168.4.255\/32",
            "expire": "!",
            "flags": "UHLWbI",
            "gateway": "ff:ff:ff:ff:ff:ff",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "192.168.4.231",
            "use": "94"
        },
        {
            "destination": "224.0.0\/4",
            "expire": "!",
            "flags": "UmCS",
            "gateway": "link#15",
            "interface": "en0",
            "mtu": "1500",
            "refs": "1",
            "rt_ifa": "192.168.4.231",
            "use": "0"
        },
        {
            "destination": "224.0.0.251\/32",
            "expire": "",
            "flags": "UHmLWI",
            "gateway": "1:0:5e:0:0:fb",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "192.168.4.231",
            "use": "0"
        },
        {
            "destination": "255.255.255.255\/32",
            "expire": "!",
            "flags": "UCS",
            "gateway": "link#15",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "192.168.4.231",
            "use": "0"
        },
        {
            "destination": "::\/0",
            "expire": "",
            "flags": "UGcIg",
            "gateway": "fe80::",
            "interface": "utun0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "fe80::11:a9ae:b1df:b455%utun0",
            "use": "0"
        },
        {
            "destination": "::\/0",
            "expire": "",
            "flags": "UGcIg",
            "gateway": "fe80::",
            "interface": "utun1",
            "mtu": "1380",
            "refs": "0",
            "rt_ifa": "fe80::66aa:b921:9bf2:f64f%utun1",
            "use": "0"
        },
        {
            "destination": "::\/0",
            "expire": "",
            "flags": "UGcIg",
            "gateway": "fe80::",
            "interface": "utun2",
            "mtu": "2000",
            "refs": "0",
            "rt_ifa": "fe80::bc05:b4f1:59a6:f984%utun2",
            "use": "0"
        },
        {
            "destination": "::\/0",
            "expire": "",
            "flags": "UGcIg",
            "gateway": "fe80::",
            "interface": "utun3",
            "mtu": "1000",
            "refs": "0",
            "rt_ifa": "fe80::ce81:b1c:bd2c:69e%utun3",
            "use": "0"
        },
        {
            "destination": "::\/0",
            "expire": "",
            "flags": "UGcIg",
            "gateway": "2607:fb90:fa75:95f1::",
            "interface": "ipsec0",
            "mtu": "1500",
            "refs": "8",
            "rt_ifa": "fe80::caa3:62ff:fe0e:7dbc%ipsec0",
            "use": "9"
        },
        {
            "destination": "::\/0",
            "expire": "",
            "flags": "UGcIg",
            "gateway": "fe80::",
            "interface": "utun5",
            "mtu": "1380",
            "refs": "0",
            "rt_ifa": "fe80::9f36:8e1a:12ef:5db9%utun5",
            "use": "0"
        },
        {
            "destination": "::\/0",
            "expire": "",
            "flags": "UGcIg",
            "gateway": "fe80::",
            "interface": "utun6",
            "mtu": "1380",
            "refs": "0",
            "rt_ifa": "fe80::d802:9f9d:f194:8863%utun6",
            "use": "0"
        },
        {
            "destination": "::\/0",
            "expire": "",
            "flags": "UGcIg",
            "gateway": "fe80::",
            "interface": "utun4",
            "mtu": "1380",
            "refs": "0",
            "rt_ifa": "fe80::7902:dff7:50a2:fb77%utun4",
            "use": "0"
        },
        {
            "destination": "::\/0",
            "expire": "",
            "flags": "UGcIg",
            "gateway": "fe80::",
            "interface": "utun7",
            "mtu": "1380",
            "refs": "0",
            "rt_ifa": "fe80::21b5:4167:c73f:d734%utun7",
            "use": "0"
        },
        {
            "destination": "::1\/128",
            "expire": "",
            "flags": "UHL",
            "gateway": "::1",
            "interface": "lo0",
            "mtu": "16384",
            "refs": "1",
            "rt_ifa": "::1",
            "use": "76"
        },
        {
            "destination": "2607:fb90:fa75:95f1::\/64",
            "expire": "",
            "flags": "Uc",
            "gateway": "fe80::caa3:62ff:fe0e:7dbc",
            "interface": "ipsec0",
            "mtu": "1500",
            "refs": "2",
            "rt_ifa": "fe80::caa3:62ff:fe0e:7dbc%ipsec0",
            "use": "0"
        },
        {
            "destination": "2607:fb90:fa75:95f1:8910:546e:8ef0:40b6\/128",
            "expire": "",
            "flags": "UHL",
            "gateway": "link#23",
            "interface": "lo0",
            "mtu": "16384",
            "refs": "0",
            "rt_ifa": "2607:fb90:fa75:95f1:8910:546e:8ef0:40b6",
            "use": "0"
        },
        {
            "destination": "fe80::\/64",
            "expire": "",
            "flags": "UcI",
            "gateway": "fe80::1",
            "interface": "lo0",
            "mtu": "16384",
            "refs": "1",
            "rt_ifa": "fe80::1%lo0",
            "use": "0"
        },
        {
            "destination": "fe80::1\/128",
            "expire": "",
            "flags": "UHLI",
            "gateway": "link#1",
            "interface": "lo0",
            "mtu": "16384",
            "refs": "0",
            "rt_ifa": "fe80::1%lo0",
            "use": "67"
        },
        {
            "destination": "fe80::\/64",
            "expire": "",
            "flags": "UCI",
            "gateway": "link#15",
            "interface": "en0",
            "mtu": "1500",
            "refs": "7",
            "rt_ifa": "fe80::1044:3da8:6f24:21f2%en0",
            "use": "0"
        },
        {
            "destination": "fe80::1044:3da8:6f24:21f2\/128",
            "expire": "",
            "flags": "UHLI",
            "gateway": "8e:b7:a6:82:23:f5",
            "interface": "lo0",
            "mtu": "16384",
            "refs": "0",
            "rt_ifa": "fe80::1044:3da8:6f24:21f2%en0",
            "use": "147"
        },
        {
            "destination": "fe80::1061:5693:53da:bfe\/128",
            "expire": "",
            "flags": "UHLWI",
            "gateway": "76:d7:b7:a:7f:6d",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "fe80::1044:3da8:6f24:21f2%en0",
            "use": "214"
        },
        {
            "destination": "fe80::14e8:b67a:a402:4c64\/128",
            "expire": "",
            "flags": "UHLWIi",
            "gateway": "76:d7:b7:a:7f:6d",
            "interface": "en0",
            "mtu": "1500",
            "refs": "2",
            "rt_ifa": "fe80::1044:3da8:6f24:21f2%en0",
            "use": "135"
        },
        {
            "destination": "fe80::a6e7:e12d:e7e2:e0ca\/128",
            "expire": "",
            "flags": "UHLWI",
            "gateway": "c:96:e6:81:19:e9",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "fe80::1044:3da8:6f24:21f2%en0",
            "use": "3"
        },
        {
            "destination": "fe80::da13:99ff:feca:b356\/128",
            "expire": "",
            "flags": "UHLWI",
            "gateway": "d8:13:99:ca:b3:56",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "fe80::1044:3da8:6f24:21f2%en0",
            "use": "15"
        },
        {
            "destination": "fe80::ead8:d1ff:fe7c:cce0\/128",
            "expire": "",
            "flags": "UHLWI",
            "gateway": "e8:d8:d1:7c:cc:e0",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "fe80::1044:3da8:6f24:21f2%en0",
            "use": "6"
        },
        {
            "destination": "fe80::\/64",
            "expire": "",
            "flags": "UcI",
            "gateway": "fe80::11:a9ae:b1df:b455",
            "interface": "utun0",
            "mtu": "1500",
            "refs": "2",
            "rt_ifa": "fe80::11:a9ae:b1df:b455%utun0",
            "use": "0"
        },
        {
            "destination": "fe80::11:a9ae:b1df:b455\/128",
            "expire": "",
            "flags": "UHLI",
            "gateway": "link#17",
            "interface": "lo0",
            "mtu": "16384",
            "refs": "0",
            "rt_ifa": "fe80::11:a9ae:b1df:b455%utun0",
            "use": "0"
        },
        {
            "destination": "fe80::\/64",
            "expire": "",
            "flags": "UcI",
            "gateway": "fe80::66aa:b921:9bf2:f64f",
            "interface": "utun1",
            "mtu": "1380",
            "refs": "2",
            "rt_ifa": "fe80::66aa:b921:9bf2:f64f%utun1",
            "use": "0"
        },
        {
            "destination": "fe80::66aa:b921:9bf2:f64f\/128",
            "expire": "",
            "flags": "UHLI",
            "gateway": "link#18",
            "interface": "lo0",
            "mtu": "16384",
            "refs": "0",
            "rt_ifa": "fe80::66aa:b921:9bf2:f64f%utun1",
            "use": "0"
        },
        {
            "destination": "fe80::6810:66ff:fe37:2c76\/128",
            "expire": "",
            "flags": "UHLI",
            "gateway": "6a:10:66:37:2c:76",
            "interface": "lo0",
            "mtu": "16384",
            "refs": "1",
            "rt_ifa": "fe80::6810:66ff:fe37:2c76%awdl0",
            "use": "0"
        },
        {
            "destination": "fe80::6810:66ff:fe37:2c76\/128",
            "expire": "",
            "flags": "UHLI",
            "gateway": "6a:10:66:37:2c:76",
            "interface": "lo0",
            "mtu": "16384",
            "refs": "0",
            "rt_ifa": "fe80::6810:66ff:fe37:2c76%llw0",
            "use": "0"
        },
        {
            "destination": "fe80::\/64",
            "expire": "",
            "flags": "UcI",
            "gateway": "fe80::bc05:b4f1:59a6:f984",
            "interface": "utun2",
            "mtu": "2000",
            "refs": "2",
            "rt_ifa": "fe80::bc05:b4f1:59a6:f984%utun2",
            "use": "0"
        },
        {
            "destination": "fe80::bc05:b4f1:59a6:f984\/128",
            "expire": "",
            "flags": "UHLI",
            "gateway": "link#21",
            "interface": "lo0",
            "mtu": "16384",
            "refs": "0",
            "rt_ifa": "fe80::bc05:b4f1:59a6:f984%utun2",
            "use": "0"
        },
        {
            "destination": "fe80::\/64",
            "expire": "",
            "flags": "UcI",
            "gateway": "fe80::ce81:b1c:bd2c:69e",
            "interface": "utun3",
            "mtu": "1000",
            "refs": "2",
            "rt_ifa": "fe80::ce81:b1c:bd2c:69e%utun3",
            "use": "0"
        },
        {
            "destination": "fe80::ce81:b1c:bd2c:69e\/128",
            "expire": "",
            "flags": "UHLI",
            "gateway": "link#22",
            "interface": "lo0",
            "mtu": "16384",
            "refs": "0",
            "rt_ifa": "fe80::ce81:b1c:bd2c:69e%utun3",
            "use": "0"
        },
        {
            "destination": "fe80::\/64",
            "expire": "",
            "flags": "UcI",
            "gateway": "fe80::caa3:62ff:fe0e:7dbc",
            "interface": "ipsec0",
            "mtu": "1500",
            "refs": "1",
            "rt_ifa": "fe80::caa3:62ff:fe0e:7dbc%ipsec0",
            "use": "0"
        },
        {
            "destination": "fe80::caa3:62ff:fe0e:7dbc\/128",
            "expire": "",
            "flags": "UHLI",
            "gateway": "link#23",
            "interface": "lo0",
            "mtu": "16384",
            "refs": "0",
            "rt_ifa": "fe80::caa3:62ff:fe0e:7dbc%ipsec0",
            "use": "0"
        },
        {
            "destination": "fe80::\/64",
            "expire": "",
            "flags": "UcI",
            "gateway": "fe80::9f36:8e1a:12ef:5db9",
            "interface": "utun5",
            "mtu": "1380",
            "refs": "3",
            "rt_ifa": "fe80::9f36:8e1a:12ef:5db9%utun5",
            "use": "0"
        },
        {
            "destination": "fe80::9f36:8e1a:12ef:5db9\/128",
            "expire": "",
            "flags": "UHLI",
            "gateway": "link#27",
            "interface": "lo0",
            "mtu": "16384",
            "refs": "0",
            "rt_ifa": "fe80::9f36:8e1a:12ef:5db9%utun5",
            "use": "0"
        },
        {
            "destination": "fe80::\/64",
            "expire": "",
            "flags": "UcI",
            "gateway": "fe80::d802:9f9d:f194:8863",
            "interface": "utun6",
            "mtu": "1380",
            "refs": "2",
            "rt_ifa": "fe80::d802:9f9d:f194:8863%utun6",
            "use": "0"
        },
        {
            "destination": "fe80::d802:9f9d:f194:8863\/128",
            "expire": "",
            "flags": "UHLI",
            "gateway": "link#28",
            "interface": "lo0",
            "mtu": "16384",
            "refs": "0",
            "rt_ifa": "fe80::d802:9f9d:f194:8863%utun6",
            "use": "0"
        },
        {
            "destination": "fe80::\/64",
            "expire": "",
            "flags": "UcI",
            "gateway": "fe80::7902:dff7:50a2:fb77",
            "interface": "utun4",
            "mtu": "1380",
            "refs": "3",
            "rt_ifa": "fe80::7902:dff7:50a2:fb77%utun4",
            "use": "0"
        },
        {
            "destination": "fe80::7902:dff7:50a2:fb77\/128",
            "expire": "",
            "flags": "UHLI",
            "gateway": "link#29",
            "interface": "lo0",
            "mtu": "16384",
            "refs": "0",
            "rt_ifa": "fe80::7902:dff7:50a2:fb77%utun4",
            "use": "0"
        },
        {
            "destination": "fe80::\/64",
            "expire": "",
            "flags": "UcI",
            "gateway": "fe80::21b5:4167:c73f:d734",
            "interface": "utun7",
            "mtu": "1380",
            "refs": "2",
            "rt_ifa": "fe80::21b5:4167:c73f:d734%utun7",
            "use": "0"
        },
        {
            "destination": "fe80::21b5:4167:c73f:d734\/128",
            "expire": "",
            "flags": "UHLI",
            "gateway": "link#30",
            "interface": "lo0",
            "mtu": "16384",
            "refs": "0",
            "rt_ifa": "fe80::21b5:4167:c73f:d734%utun7",
            "use": "0"
        },
        {
            "destination": "ff00::\/8",
            "expire": "",
            "flags": "UmCI",
            "gateway": "::1",
            "interface": "lo0",
            "mtu": "16384",
            "refs": "0",
            "rt_ifa": "::1",
            "use": "0"
        },
        {
            "destination": "ff00::\/8",
            "expire": "",
            "flags": "UmCI",
            "gateway": "link#15",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "fe80::109e:7838:33b9:d3f4%en0",
            "use": "0"
        },
        {
            "destination": "ff00::\/8",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::11:a9ae:b1df:b455",
            "interface": "utun0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "fe80::11:a9ae:b1df:b455%utun0",
            "use": "0"
        },
        {
            "destination": "ff00::\/8",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::66aa:b921:9bf2:f64f",
            "interface": "utun1",
            "mtu": "1380",
            "refs": "0",
            "rt_ifa": "fe80::66aa:b921:9bf2:f64f%utun1",
            "use": "0"
        },
        {
            "destination": "ff00::\/8",
            "expire": "",
            "flags": "UmCI",
            "gateway": "link#19",
            "interface": "awdl0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "fe80::60e3:1fff:fe49:8196%awdl0",
            "use": "0"
        },
        {
            "destination": "ff00::\/8",
            "expire": "",
            "flags": "UmCI",
            "gateway": "link#20",
            "interface": "llw0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "fe80::60e3:1fff:fe49:8196%llw0",
            "use": "0"
        },
        {
            "destination": "ff00::\/8",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::bc05:b4f1:59a6:f984",
            "interface": "utun2",
            "mtu": "2000",
            "refs": "0",
            "rt_ifa": "fe80::bc05:b4f1:59a6:f984%utun2",
            "use": "0"
        },
        {
            "destination": "ff00::\/8",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::ce81:b1c:bd2c:69e",
            "interface": "utun3",
            "mtu": "1000",
            "refs": "0",
            "rt_ifa": "fe80::ce81:b1c:bd2c:69e%utun3",
            "use": "0"
        },
        {
            "destination": "ff00::\/8",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::caa3:62ff:fe0e:7dbc",
            "interface": "ipsec0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "fe80::caa3:62ff:fe0e:7dbc%ipsec0",
            "use": "0"
        },
        {
            "destination": "ff00::\/8",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::9f36:8e1a:12ef:5db9",
            "interface": "utun5",
            "mtu": "1380",
            "refs": "0",
            "rt_ifa": "fe80::9f36:8e1a:12ef:5db9%utun5",
            "use": "0"
        },
        {
            "destination": "ff00::\/8",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::d802:9f9d:f194:8863",
            "interface": "utun6",
            "mtu": "1380",
            "refs": "0",
            "rt_ifa": "fe80::d802:9f9d:f194:8863%utun6",
            "use": "0"
        },
        {
            "destination": "ff00::\/8",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::7902:dff7:50a2:fb77",
            "interface": "utun4",
            "mtu": "1380",
            "refs": "0",
            "rt_ifa": "fe80::7902:dff7:50a2:fb77%utun4",
            "use": "0"
        },
        {
            "destination": "ff00::\/8",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::21b5:4167:c73f:d734",
            "interface": "utun7",
            "mtu": "1380",
            "refs": "0",
            "rt_ifa": "fe80::21b5:4167:c73f:d734%utun7",
            "use": "0"
        },
        {
            "destination": "ff01::\/32",
            "expire": "",
            "flags": "UmCI",
            "gateway": "::1",
            "interface": "lo0",
            "mtu": "16384",
            "refs": "0",
            "rt_ifa": "::1",
            "use": "0"
        },
        {
            "destination": "ff01::\/32",
            "expire": "",
            "flags": "UmCI",
            "gateway": "link#15",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "fe80::109e:7838:33b9:d3f4%en0",
            "use": "0"
        },
        {
            "destination": "ff01::\/32",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::11:a9ae:b1df:b455",
            "interface": "utun0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "fe80::11:a9ae:b1df:b455%utun0",
            "use": "0"
        },
        {
            "destination": "ff01::\/32",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::66aa:b921:9bf2:f64f",
            "interface": "utun1",
            "mtu": "1380",
            "refs": "0",
            "rt_ifa": "fe80::66aa:b921:9bf2:f64f%utun1",
            "use": "0"
        },
        {
            "destination": "ff01::\/32",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::bc05:b4f1:59a6:f984",
            "interface": "utun2",
            "mtu": "2000",
            "refs": "0",
            "rt_ifa": "fe80::bc05:b4f1:59a6:f984%utun2",
            "use": "0"
        },
        {
            "destination": "ff01::\/32",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::ce81:b1c:bd2c:69e",
            "interface": "utun3",
            "mtu": "1000",
            "refs": "0",
            "rt_ifa": "fe80::ce81:b1c:bd2c:69e%utun3",
            "use": "0"
        },
        {
            "destination": "ff01::\/32",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::caa3:62ff:fe0e:7dbc",
            "interface": "ipsec0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "fe80::caa3:62ff:fe0e:7dbc%ipsec0",
            "use": "0"
        },
        {
            "destination": "ff01::\/32",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::9f36:8e1a:12ef:5db9",
            "interface": "utun5",
            "mtu": "1380",
            "refs": "0",
            "rt_ifa": "fe80::9f36:8e1a:12ef:5db9%utun5",
            "use": "0"
        },
        {
            "destination": "ff01::\/32",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::d802:9f9d:f194:8863",
            "interface": "utun6",
            "mtu": "1380",
            "refs": "0",
            "rt_ifa": "fe80::d802:9f9d:f194:8863%utun6",
            "use": "0"
        },
        {
            "destination": "ff01::\/32",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::7902:dff7:50a2:fb77",
            "interface": "utun4",
            "mtu": "1380",
            "refs": "0",
            "rt_ifa": "fe80::7902:dff7:50a2:fb77%utun4",
            "use": "0"
        },
        {
            "destination": "ff01::\/32",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::21b5:4167:c73f:d734",
            "interface": "utun7",
            "mtu": "1380",
            "refs": "0",
            "rt_ifa": "fe80::21b5:4167:c73f:d734%utun7",
            "use": "0"
        },
        {
            "destination": "ff02::\/32",
            "expire": "",
            "flags": "UmCI",
            "gateway": "::1",
            "interface": "lo0",
            "mtu": "16384",
            "refs": "0",
            "rt_ifa": "::1",
            "use": "0"
        },
        {
            "destination": "ff02::\/32",
            "expire": "",
            "flags": "UmCI",
            "gateway": "link#15",
            "interface": "en0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "fe80::109e:7838:33b9:d3f4%en0",
            "use": "0"
        },
        {
            "destination": "ff02::\/32",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::11:a9ae:b1df:b455",
            "interface": "utun0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "fe80::11:a9ae:b1df:b455%utun0",
            "use": "0"
        },
        {
            "destination": "ff02::\/32",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::66aa:b921:9bf2:f64f",
            "interface": "utun1",
            "mtu": "1380",
            "refs": "0",
            "rt_ifa": "fe80::66aa:b921:9bf2:f64f%utun1",
            "use": "0"
        },
        {
            "destination": "ff02::\/32",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::bc05:b4f1:59a6:f984",
            "interface": "utun2",
            "mtu": "2000",
            "refs": "0",
            "rt_ifa": "fe80::bc05:b4f1:59a6:f984%utun2",
            "use": "0"
        },
        {
            "destination": "ff02::\/32",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::ce81:b1c:bd2c:69e",
            "interface": "utun3",
            "mtu": "1000",
            "refs": "0",
            "rt_ifa": "fe80::ce81:b1c:bd2c:69e%utun3",
            "use": "0"
        },
        {
            "destination": "ff02::\/32",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::caa3:62ff:fe0e:7dbc",
            "interface": "ipsec0",
            "mtu": "1500",
            "refs": "0",
            "rt_ifa": "fe80::caa3:62ff:fe0e:7dbc%ipsec0",
            "use": "0"
        },
        {
            "destination": "ff02::\/32",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::9f36:8e1a:12ef:5db9",
            "interface": "utun5",
            "mtu": "1380",
            "refs": "0",
            "rt_ifa": "fe80::9f36:8e1a:12ef:5db9%utun5",
            "use": "0"
        },
        {
            "destination": "ff02::\/32",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::d802:9f9d:f194:8863",
            "interface": "utun6",
            "mtu": "1380",
            "refs": "0",
            "rt_ifa": "fe80::d802:9f9d:f194:8863%utun6",
            "use": "0"
        },
        {
            "destination": "ff02::\/32",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::7902:dff7:50a2:fb77",
            "interface": "utun4",
            "mtu": "1380",
            "refs": "0",
            "rt_ifa": "fe80::7902:dff7:50a2:fb77%utun4",
            "use": "0"
        },
        {
            "destination": "ff02::\/32",
            "expire": "",
            "flags": "UmCI",
            "gateway": "fe80::21b5:4167:c73f:d734",
            "interface": "utun7",
            "mtu": "1380",
            "refs": "0",
            "rt_ifa": "fe80::21b5:4167:c73f:d734%utun7",
            "use": "0"
        }
    ],
    "ipv4-default-gateway": "192.168.4.1",
    "ipv4-default-interface": "en0",
    "ipv6-default-gateway": "fe80::",
    "ipv6-default-interface": "utun0",
    "interfaces": [
        {
            "friendly": "lo0",
            "id": "lo0",
            "name": "lo0",
            "description": "lo0",
            "type": "Loopback",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "127.0.0.1",
                "::1",
                "fe80::1"
            ],
            "bind": true
        },
        {
            "friendly": "gif0",
            "id": "gif0",
            "name": "gif0",
            "description": "gif0",
            "type": "Unknown",
            "status": "Unknown",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [],
            "bind": false
        },
        {
            "friendly": "stf0",
            "id": "stf0",
            "name": "stf0",
            "description": "stf0",
            "type": "Unknown",
            "status": "Unknown",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [],
            "bind": false
        },
        {
            "friendly": "anpi0",
            "id": "anpi0",
            "name": "anpi0",
            "description": "anpi0",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [],
            "bind": false
        },
        {
            "friendly": "anpi2",
            "id": "anpi2",
            "name": "anpi2",
            "description": "anpi2",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [],
            "bind": false
        },
        {
            "friendly": "anpi1",
            "id": "anpi1",
            "name": "anpi1",
            "description": "anpi1",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [],
            "bind": false
        },
        {
            "friendly": "Ethernet Adapter (en4)",
            "id": "en4",
            "name": "en4",
            "description": "en4",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [],
            "bind": false
        },
        {
            "friendly": "Ethernet Adapter (en5)",
            "id": "en5",
            "name": "en5",
            "description": "en5",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [],
            "bind": false
        },
        {
            "friendly": "Ethernet Adapter (en6)",
            "id": "en6",
            "name": "en6",
            "description": "en6",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [],
            "bind": false
        },
        {
            "friendly": "Thunderbolt 1",
            "id": "en1",
            "name": "en1",
            "description": "en1",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [],
            "bind": false
        },
        {
            "friendly": "Thunderbolt 2",
            "id": "en2",
            "name": "en2",
            "description": "en2",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [],
            "bind": false
        },
        {
            "friendly": "Thunderbolt 3",
            "id": "en3",
            "name": "en3",
            "description": "en3",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [],
            "bind": false
        },
        {
            "friendly": "Thunderbolt Bridge",
            "id": "bridge0",
            "name": "bridge0",
            "description": "bridge0",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [],
            "bind": false
        },
        {
            "friendly": "utun0",
            "id": "utun0",
            "name": "utun0",
            "description": "utun0",
            "type": "Unknown",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::11:a9ae:b1df:b455"
            ],
            "bind": true
        },
        {
            "friendly": "utun1",
            "id": "utun1",
            "name": "utun1",
            "description": "utun1",
            "type": "Unknown",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::66aa:b921:9bf2:f64f"
            ],
            "bind": true
        },
        {
            "friendly": "ap1",
            "id": "ap1",
            "name": "ap1",
            "description": "ap1",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [],
            "bind": false
        },
        {
            "friendly": "Wi-Fi",
            "id": "en0",
            "name": "en0",
            "description": "en0",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::1044:3da8:6f24:21f2",
                "192.168.4.231"
            ],
            "bind": true
        },
        {
            "friendly": "awdl0",
            "id": "awdl0",
            "name": "awdl0",
            "description": "awdl0",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::6810:66ff:fe37:2c76"
            ],
            "bind": true
        },
        {
            "friendly": "llw0",
            "id": "llw0",
            "name": "llw0",
            "description": "llw0",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::6810:66ff:fe37:2c76"
            ],
            "bind": true
        },
        {
            "friendly": "utun2",
            "id": "utun2",
            "name": "utun2",
            "description": "utun2",
            "type": "Unknown",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::bc05:b4f1:59a6:f984"
            ],
            "bind": true
        },
        {
            "friendly": "utun3",
            "id": "utun3",
            "name": "utun3",
            "description": "utun3",
            "type": "Unknown",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::ce81:b1c:bd2c:69e"
            ],
            "bind": true
        },
        {
            "friendly": "utun5",
            "id": "utun5",
            "name": "utun5",
            "description": "utun5",
            "type": "Unknown",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::9f36:8e1a:12ef:5db9"
            ],
            "bind": true
        },
        {
            "friendly": "utun6",
            "id": "utun6",
            "name": "utun6",
            "description": "utun6",
            "type": "Unknown",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::d802:9f9d:f194:8863"
            ],
            "bind": true
        },
        {
            "friendly": "utun4",
            "id": "utun4",
            "name": "utun4",
            "description": "utun4",
            "type": "Unknown",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::7902:dff7:50a2:fb77"
            ],
            "bind": true
        },
        {
            "friendly": "utun7",
            "id": "utun7",
            "name": "utun7",
            "description": "utun7",
            "type": "Unknown",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::21b5:4167:c73f:d734"
            ],
            "bind": true
        },
        {
            "friendly": "AX88179A",
            "id": "en7",
            "name": "en7",
            "description": "en7",
            "type": "Ethernet",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [],
            "bind": false
        },
        {
            "friendly": "ipsec0",
            "id": "ipsec0",
            "name": "ipsec0",
            "description": "ipsec0",
            "type": "Unknown",
            "status": "Up",
            "bytes_received": "0",
            "bytes_sent": "0",
            "support_ipv4": true,
            "support_ipv6": true,
            "ips": [
                "fe80::caa3:62ff:fe0e:7dbc",
                "2607:fb90:fa75:95f1:8910:546e:8ef0:40b6"
            ],
            "bind": true
        }
    ]
}
----------------------------
ifconfig:

lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
    options=1203<RXCSUM,TXCSUM,TXSTATUS,SW_TIMESTAMP>
    inet 127.0.0.1 netmask 0xff000000
    inet6 ::1 prefixlen 128 
    inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1 
    nd6 options=201<PERFORMNUD,DAD>
gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280
stf0: flags=0<> mtu 1280
anpi0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
    options=400<CHANNEL_IO>
    ether 32:7d:c0:c1:b9:32
    media: none
    status: inactive
anpi2: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
    options=400<CHANNEL_IO>
    ether 32:7d:c0:c1:b9:34
    media: none
    status: inactive
anpi1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
    options=400<CHANNEL_IO>
    ether 32:7d:c0:c1:b9:33
    media: none
    status: inactive
en4: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
    options=400<CHANNEL_IO>
    ether 32:7d:c0:c1:b9:12
    nd6 options=201<PERFORMNUD,DAD>
    media: none
    status: inactive
en5: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
    options=400<CHANNEL_IO>
    ether 32:7d:c0:c1:b9:13
    nd6 options=201<PERFORMNUD,DAD>
    media: none
    status: inactive
en6: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
    options=400<CHANNEL_IO>
    ether 32:7d:c0:c1:b9:14
    nd6 options=201<PERFORMNUD,DAD>
    media: none
    status: inactive
en1: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
    options=460<TSO4,TSO6,CHANNEL_IO>
    ether 36:9f:e3:6c:4f:c0
    media: autoselect <full-duplex>
    status: inactive
en2: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
    options=460<TSO4,TSO6,CHANNEL_IO>
    ether 36:9f:e3:6c:4f:c4
    media: autoselect <full-duplex>
    status: inactive
en3: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
    options=460<TSO4,TSO6,CHANNEL_IO>
    ether 36:9f:e3:6c:4f:c8
    media: autoselect <full-duplex>
    status: inactive
bridge0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
    options=63<RXCSUM,TXCSUM,TSO4,TSO6>
    ether 36:9f:e3:6c:4f:c0
    Configuration:
        id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0
        maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200
        root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0
        ipfilter disabled flags 0x0
    member: en1 flags=3<LEARNING,DISCOVER>
            ifmaxaddr 0 port 10 priority 0 path cost 0
    member: en2 flags=3<LEARNING,DISCOVER>
            ifmaxaddr 0 port 11 priority 0 path cost 0
    member: en3 flags=3<LEARNING,DISCOVER>
            ifmaxaddr 0 port 12 priority 0 path cost 0
    nd6 options=201<PERFORMNUD,DAD>
    media: <unknown type>
    status: inactive
utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500
    inet6 fe80::11:a9ae:b1df:b455%utun0 prefixlen 64 scopeid 0x11 
    nd6 options=201<PERFORMNUD,DAD>
utun1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380
    inet6 fe80::66aa:b921:9bf2:f64f%utun1 prefixlen 64 scopeid 0x12 
    nd6 options=201<PERFORMNUD,DAD>
ap1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
    options=6460<TSO4,TSO6,CHANNEL_IO,PARTIAL_CSUM,ZEROINVERT_CSUM>
    ether c6:6c:ee:a4:aa:86
    nd6 options=201<PERFORMNUD,DAD>
    media: autoselect (none)
    status: inactive
en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
    options=6460<TSO4,TSO6,CHANNEL_IO,PARTIAL_CSUM,ZEROINVERT_CSUM>
    ether 8e:b7:a6:82:23:f5
    inet6 fe80::1044:3da8:6f24:21f2%en0 prefixlen 64 secured scopeid 0xf 
    inet 192.168.4.231 netmask 0xffffff00 broadcast 192.168.4.255
    nd6 options=201<PERFORMNUD,DAD>
    media: autoselect
    status: active
awdl0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
    options=6460<TSO4,TSO6,CHANNEL_IO,PARTIAL_CSUM,ZEROINVERT_CSUM>
    ether 6a:10:66:37:2c:76
    inet6 fe80::6810:66ff:fe37:2c76%awdl0 prefixlen 64 scopeid 0x13 
    nd6 options=201<PERFORMNUD,DAD>
    media: autoselect
    status: active
llw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
    options=400<CHANNEL_IO>
    ether 6a:10:66:37:2c:76
    inet6 fe80::6810:66ff:fe37:2c76%llw0 prefixlen 64 scopeid 0x14 
    nd6 options=201<PERFORMNUD,DAD>
    media: autoselect (none)
utun2: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 2000
    inet6 fe80::bc05:b4f1:59a6:f984%utun2 prefixlen 64 scopeid 0x15 
    nd6 options=201<PERFORMNUD,DAD>
utun3: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1000
    inet6 fe80::ce81:b1c:bd2c:69e%utun3 prefixlen 64 scopeid 0x16 
    nd6 options=201<PERFORMNUD,DAD>
utun5: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380
    inet6 fe80::9f36:8e1a:12ef:5db9%utun5 prefixlen 64 scopeid 0x1b 
    nd6 options=201<PERFORMNUD,DAD>
utun6: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380
    inet6 fe80::d802:9f9d:f194:8863%utun6 prefixlen 64 scopeid 0x1c 
    nd6 options=201<PERFORMNUD,DAD>
utun4: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380
    inet6 fe80::7902:dff7:50a2:fb77%utun4 prefixlen 64 scopeid 0x1d 
    nd6 options=201<PERFORMNUD,DAD>
utun7: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380
    inet6 fe80::21b5:4167:c73f:d734%utun7 prefixlen 64 scopeid 0x1e 
    nd6 options=201<PERFORMNUD,DAD>
en7: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
    options=404<VLAN_MTU,CHANNEL_IO>
    ether c8:a3:62:0e:7d:bc
    nd6 options=201<PERFORMNUD,DAD>
    media: autoselect (none)
    status: inactive
ipsec0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500
    options=6460<TSO4,TSO6,CHANNEL_IO,PARTIAL_CSUM,ZEROINVERT_CSUM>
    inet6 fe80::caa3:62ff:fe0e:7dbc%ipsec0 prefixlen 64 scopeid 0x17 
    inet6 2607:fb90:fa75:95f1:8910:546e:8ef0:40b6 prefixlen 64 
    nd6 options=201<PERFORMNUD,DAD>

Edited ... by OpenSourcerer
Apply LOG format to system report

Share this post


Link to post
16 hours ago, sw1234 said:

After running the command, it appears that the authentication is now failing to connect. Here is the system report for the session: 


Hello!

Correct, the previous problem is solved and now this is a new one. Try to resolve it simply by logging your account out (from Eddie's main window), then login back and try a connection.

Kind regards
 

Share this post


Link to post
Posted ... (edited)
11 hours ago, Staff said:

Hello!

Correct, the previous problem is solved and now this is a new one. Try to resolve it simply by logging your account out (from Eddie's main window), then login back and try a connection.

Kind regards
 

Here is the system report and logs from after I tried logging out and back in:

Eddie System/Environment Report - 3/5/2025 - 3:35 PM UTC

Eddie version: 2.24.6
Eddie OS build: macos_arm64
Eddie architecture: x64
OS type: MacOS
OS name: macOS 15.3.1
OS version: 15.3.1
OS architecture: arm64
Framework: v4.0.30319
OpenVPN: 2.6.12 - OpenSSL 3.3.2 3 Sep 2024, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)
Hummingbird: 3.3.2 - Hummingbird - OpenVPN3 Client 1.3.0 - 1 June 2023 (/Applications/Eddie.app/Contents/MacOS/hummingbird)
WireGuard: 1.0.20210315
SSH: OpenSSH_9.8p1, LibreSSL 3.3.6 (/usr/bin/ssh)
SSL: 5.57 (/Applications/Eddie.app/Contents/MacOS/stunnel)
Profile path: /Users/stevenwiener/.config/eddie/default.profile
Data path: /Users/stevenwiener/.config/eddie
Application path: /Applications/Eddie.app/Contents/MacOS
Executable path: /Applications/Eddie.app/Contents/MacOS/Eddie-UI
Command line arguments: (0 args) 
Network Lock Active: No
Connected to VPN: No
OS support IPv4: Yes
OS support IPv6: Yes
Detected DNS: 162.252.172.57,149.154.159.92,192.168.4.1

. 2025.03.05 08:31:01 - Eddie version: 2.24.6 / macos_arm64, System: MacOS, Name: macOS 15.3.1, Version: 15.3.1, Framework: v4.0.30319
. 2025.03.05 08:31:02 - Raise system privileges
. 2025.03.05 08:31:08 - Collect network information
. 2025.03.05 08:31:10 - Reading options from /Users/stevenwiener/.config/eddie/default.profile
. 2025.03.05 08:31:11 - OpenVPN - Version: 2.6.12 - OpenSSL 3.3.2 3 Sep 2024, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)
. 2025.03.05 08:31:11 - SSH - Version: OpenSSH_9.8p1, LibreSSL 3.3.6 (/usr/bin/ssh)
. 2025.03.05 08:31:11 - SSL - Version: 5.57 (/Applications/Eddie.app/Contents/MacOS/stunnel)
I 2025.03.05 08:31:11 - Ready
! 2025.03.05 08:31:13 - Logged out.
. 2025.03.05 08:31:13 - Collect information about AirVPN completed
I 2025.03.05 08:31:14 - Checking login ...
! 2025.03.05 08:31:15 - Logged in.
I 2025.03.05 08:31:18 - Session starting.
. 2025.03.05 08:31:18 - Activation of Network Lock - macOS - PF
I 2025.03.05 08:31:19 - Checking authorization ...
. 2025.03.05 08:31:59 - Authorization check failed, continue anyway (Fetch url error:Timeout was reached)
! 2025.03.05 08:31:59 - Connecting to Nahn (Canada, Vancouver)
. 2025.03.05 08:31:59 - Routes, add 192.30.89.69/32 for interface "en0".
. 2025.03.05 08:32:00 - OpenVPN > OpenVPN 2.6.12 aarch64-apple-darwin23.4.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD]
. 2025.03.05 08:32:00 - OpenVPN > library versions: OpenSSL 3.3.2 3 Sep 2024, LZO 2.10
. 2025.03.05 08:32:00 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.69:1194
. 2025.03.05 08:32:00 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144]
. 2025.03.05 08:32:00 - OpenVPN > UDPv4 link local: (not bound)
. 2025.03.05 08:32:00 - OpenVPN > UDPv4 link remote: [AF_INET]192.30.89.69:1194
. 2025.03.05 08:32:00 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.69:1194, sid=66f56a6b c82513c4
. 2025.03.05 08:32:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2025.03.05 08:32:00 - OpenVPN > VERIFY KU OK
. 2025.03.05 08:32:00 - OpenVPN > Validating certificate extended key usage
. 2025.03.05 08:32:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2025.03.05 08:32:00 - OpenVPN > VERIFY EKU OK
. 2025.03.05 08:32:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Nahn, emailAddress=info@airvpn.org
. 2025.03.05 08:32:00 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519
. 2025.03.05 08:32:00 - OpenVPN > [Nahn] Peer Connection Initiated with [AF_INET]192.30.89.69:1194
. 2025.03.05 08:32:00 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
. 2025.03.05 08:32:00 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted
. 2025.03.05 08:32:00 - OpenVPN > Error: ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2025.03.05 08:32:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.35.66.1,dhcp-option DNS6 fde6:7a:7d20:1f42::1,tun-ipv6,route-gateway 10.35.66.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1f42::105a/64 fde6:7a:7d20:1f42::1,ifconfig 10.35.66.92 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2025.03.05 08:32:00 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2025.03.05 08:32:00 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.35.66.1'
. 2025.03.05 08:32:00 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1f42::1'
. 2025.03.05 08:32:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2025.03.05 08:32:00 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2025.03.05 08:32:00 - OpenVPN > Opened utun device utun9
. 2025.03.05 08:32:00 - OpenVPN > /sbin/ifconfig utun9 delete
. 2025.03.05 08:32:00 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2025.03.05 08:32:00 - OpenVPN > /sbin/ifconfig utun9 10.35.66.92 10.35.66.92 netmask 255.255.255.0 mtu 1500 up
. 2025.03.05 08:32:00 - OpenVPN > /sbin/route add -net 10.35.66.0 10.35.66.92 255.255.255.0
. 2025.03.05 08:32:00 - OpenVPN > add net 10.35.66.0: gateway 10.35.66.92
. 2025.03.05 08:32:00 - OpenVPN > /sbin/ifconfig utun9 inet6 fde6:7a:7d20:1f42::105a/64 mtu 1500 up
. 2025.03.05 08:32:01 - OpenVPN > Error: route: writing to routing socket: File exists
. 2025.03.05 08:32:01 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1f42::/64 -> fde6:7a:7d20:1f42::105a metric 0) dev utun9
. 2025.03.05 08:32:01 - OpenVPN > /sbin/route add -inet6 fde6:7a:7d20:1f42:: -prefixlen 64 -iface utun9
. 2025.03.05 08:32:01 - OpenVPN > add net fde6:7a:7d20:1f42::: gateway utun9: File exists
. 2025.03.05 08:32:01 - OpenVPN > Initialization Sequence Completed
. 2025.03.05 08:32:01 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 0, compression: 'stub'
. 2025.03.05 08:32:01 - Workaround to enable IPv6 DNS lookups activated
. 2025.03.05 08:32:01 - DNS of a network adapter forced (AX88179A, from Automatic to 10.35.66.1, fde6:7a:7d20:1f42::1)
. 2025.03.05 08:32:01 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.35.66.1, fde6:7a:7d20:1f42::1)
. 2025.03.05 08:32:01 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.35.66.1, fde6:7a:7d20:1f42::1)
. 2025.03.05 08:32:01 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.35.66.1, fde6:7a:7d20:1f42::1)
. 2025.03.05 08:32:01 - DNS of a network adapter forced (Surfshark. WireGuard, from Automatic to 10.35.66.1, fde6:7a:7d20:1f42::1)
. 2025.03.05 08:32:01 - Routes, add 0.0.0.0/1 for interface "utun9".
. 2025.03.05 08:32:02 - Routes, add 128.0.0.0/1 for interface "utun9".
. 2025.03.05 08:32:02 - Routes, add ::/1 for interface "utun9".
. 2025.03.05 08:32:02 - Routes, add 8000::/1 for interface "utun9".
. 2025.03.05 08:32:02 - Routes, add 192.30.89.67/32 for interface "utun9".
. 2025.03.05 08:32:02 - Routes, add 2606:9580:100:e:d075:a67e:1f9c:139d/128 for interface "utun9".
. 2025.03.05 08:32:02 - Flushing DNS
I 2025.03.05 08:32:13 - Checking route IPv4
. 2025.03.05 08:32:19 - Checking route (4° try)
. 2025.03.05 08:32:23 - Checking route (5° try)
E 2025.03.05 08:32:23 - Checking route IPv4 failed, last reason: Fetch url error:Couldn't connect to server
. 2025.03.05 08:32:23 - OpenVPN > Timers: ping 10, ping-restart 60
. 2025.03.05 08:32:23 - OpenVPN > Protocol options: explicit-exit-notify 5
! 2025.03.05 08:32:23 - Disconnecting
. 2025.03.05 08:32:23 - Sending soft termination signal
. 2025.03.05 08:32:23 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4)
. 2025.03.05 08:32:23 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2025.03.05 08:32:28 - OpenVPN > Closing TUN/TAP interface
. 2025.03.05 08:32:28 - OpenVPN > /sbin/route delete -inet6 fde6:7a:7d20:1f42::105a
. 2025.03.05 08:32:28 - OpenVPN > delete host fde6:7a:7d20:1f42::105a
. 2025.03.05 08:32:28 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2025.03.05 08:32:28 - Routes, delete 0.0.0.0/1 for interface "utun9", not exists.
. 2025.03.05 08:32:29 - Routes, delete 128.0.0.0/1 for interface "utun9", not exists.
. 2025.03.05 08:32:29 - Routes, delete ::/1 for interface "utun9", not exists.
. 2025.03.05 08:32:29 - Routes, delete 8000::/1 for interface "utun9", not exists.
. 2025.03.05 08:32:29 - Routes, delete 192.30.89.69/32 for interface "en0".
. 2025.03.05 08:32:29 - Routes, delete 192.30.89.67/32 for interface "utun9", not exists.
. 2025.03.05 08:32:29 - Routes, delete 2606:9580:100:e:d075:a67e:1f9c:139d/128 for interface "utun9", not exists.
. 2025.03.05 08:32:29 - DNS of a network adapter restored to original settings (AX88179A, to Automatic)
. 2025.03.05 08:32:29 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
. 2025.03.05 08:32:29 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2025.03.05 08:32:29 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2025.03.05 08:32:29 - DNS of a network adapter restored to original settings (Surfshark. WireGuard, to Automatic)
. 2025.03.05 08:32:29 - Workaround for enabling IPv6 DNS lookups deactivated
. 2025.03.05 08:32:29 - Collect network information
. 2025.03.05 08:32:31 - Connection terminated.
I 2025.03.05 08:32:34 - Checking authorization ...
. 2025.03.05 08:33:14 - Authorization check failed, continue anyway (Fetch url error:Timeout was reached)
! 2025.03.05 08:33:14 - Connecting to Sham (Canada, Vancouver)
. 2025.03.05 08:33:15 - Routes, add 192.30.89.77/32 for interface "en0".
. 2025.03.05 08:33:15 - OpenVPN > OpenVPN 2.6.12 aarch64-apple-darwin23.4.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD]
. 2025.03.05 08:33:15 - OpenVPN > library versions: OpenSSL 3.3.2 3 Sep 2024, LZO 2.10
. 2025.03.05 08:33:15 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.77:1194
. 2025.03.05 08:33:15 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144]
. 2025.03.05 08:33:15 - OpenVPN > UDPv4 link local: (not bound)
. 2025.03.05 08:33:15 - OpenVPN > UDPv4 link remote: [AF_INET]192.30.89.77:1194
. 2025.03.05 08:33:15 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.77:1194, sid=ef42e547 6aa993b8
. 2025.03.05 08:33:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2025.03.05 08:33:15 - OpenVPN > VERIFY KU OK
. 2025.03.05 08:33:15 - OpenVPN > Validating certificate extended key usage
. 2025.03.05 08:33:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2025.03.05 08:33:15 - OpenVPN > VERIFY EKU OK
. 2025.03.05 08:33:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Sham, emailAddress=info@airvpn.org
. 2025.03.05 08:33:15 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519
. 2025.03.05 08:33:15 - OpenVPN > [Sham] Peer Connection Initiated with [AF_INET]192.30.89.77:1194
. 2025.03.05 08:33:15 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
. 2025.03.05 08:33:15 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted
. 2025.03.05 08:33:16 - OpenVPN > SENT CONTROL [Sham]: 'PUSH_REQUEST' (status=1)
. 2025.03.05 08:33:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.35.98.1,dhcp-option DNS6 fde6:7a:7d20:1f62::1,tun-ipv6,route-gateway 10.35.98.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1f62::1015/64 fde6:7a:7d20:1f62::1,ifconfig 10.35.98.23 255.255.255.0,peer-id 3,cipher AES-256-GCM'
. 2025.03.05 08:33:16 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2025.03.05 08:33:16 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.35.98.1'
. 2025.03.05 08:33:16 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1f62::1'
. 2025.03.05 08:33:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2025.03.05 08:33:16 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2025.03.05 08:33:16 - OpenVPN > Opened utun device utun9
. 2025.03.05 08:33:16 - OpenVPN > /sbin/ifconfig utun9 delete
. 2025.03.05 08:33:16 - OpenVPN > Error: ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2025.03.05 08:33:16 - OpenVPN > Error: route: writing to routing socket: File exists
. 2025.03.05 08:33:16 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2025.03.05 08:33:16 - OpenVPN > /sbin/ifconfig utun9 10.35.98.23 10.35.98.23 netmask 255.255.255.0 mtu 1500 up
. 2025.03.05 08:33:16 - OpenVPN > /sbin/route add -net 10.35.98.0 10.35.98.23 255.255.255.0
. 2025.03.05 08:33:16 - OpenVPN > add net 10.35.98.0: gateway 10.35.98.23
. 2025.03.05 08:33:16 - OpenVPN > /sbin/ifconfig utun9 inet6 fde6:7a:7d20:1f62::1015/64 mtu 1500 up
. 2025.03.05 08:33:16 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1f62::/64 -> fde6:7a:7d20:1f62::1015 metric 0) dev utun9
. 2025.03.05 08:33:16 - OpenVPN > /sbin/route add -inet6 fde6:7a:7d20:1f62:: -prefixlen 64 -iface utun9
. 2025.03.05 08:33:16 - OpenVPN > add net fde6:7a:7d20:1f62::: gateway utun9: File exists
. 2025.03.05 08:33:16 - OpenVPN > Initialization Sequence Completed
. 2025.03.05 08:33:16 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 3, compression: 'stub'
. 2025.03.05 08:33:16 - Workaround to enable IPv6 DNS lookups activated
. 2025.03.05 08:33:16 - DNS of a network adapter forced (AX88179A, from Automatic to 10.35.98.1, fde6:7a:7d20:1f62::1)
. 2025.03.05 08:33:16 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.35.98.1, fde6:7a:7d20:1f62::1)
. 2025.03.05 08:33:16 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.35.98.1, fde6:7a:7d20:1f62::1)
. 2025.03.05 08:33:16 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.35.98.1, fde6:7a:7d20:1f62::1)
. 2025.03.05 08:33:16 - DNS of a network adapter forced (Surfshark. WireGuard, from Automatic to 10.35.98.1, fde6:7a:7d20:1f62::1)
. 2025.03.05 08:33:17 - Routes, add 0.0.0.0/1 for interface "utun9".
. 2025.03.05 08:33:17 - Routes, add 128.0.0.0/1 for interface "utun9".
. 2025.03.05 08:33:17 - Routes, add ::/1 for interface "utun9".
. 2025.03.05 08:33:17 - Routes, add 8000::/1 for interface "utun9".
. 2025.03.05 08:33:17 - Routes, add 192.30.89.75/32 for interface "utun9".
. 2025.03.05 08:33:17 - Routes, add 2606:9580:100:f:5792:2dec:a4b6:2419/128 for interface "utun9".
. 2025.03.05 08:33:17 - Flushing DNS
I 2025.03.05 08:33:30 - Checking route IPv4
I 2025.03.05 08:33:30 - Checking route IPv6
I 2025.03.05 08:33:30 - Checking DNS
. 2025.03.05 08:33:46 - Checking DNS (4° try)
. 2025.03.05 08:33:51 - Checking DNS (5° try)
E 2025.03.05 08:33:51 - Checking DNS failed, last reason: Checking DNS failed:
. 2025.03.05 08:33:51 - OpenVPN > Timers: ping 10, ping-restart 60
. 2025.03.05 08:33:51 - OpenVPN > Protocol options: explicit-exit-notify 5
! 2025.03.05 08:33:51 - Disconnecting
. 2025.03.05 08:33:51 - Sending soft termination signal
. 2025.03.05 08:33:51 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4)
. 2025.03.05 08:33:51 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2025.03.05 08:33:56 - OpenVPN > Closing TUN/TAP interface
. 2025.03.05 08:33:56 - OpenVPN > /sbin/route delete -inet6 fde6:7a:7d20:1f62::1015
. 2025.03.05 08:33:56 - OpenVPN > delete host fde6:7a:7d20:1f62::1015
. 2025.03.05 08:33:56 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2025.03.05 08:33:56 - Routes, delete 0.0.0.0/1 for interface "utun9", not exists.
. 2025.03.05 08:33:56 - Routes, delete 128.0.0.0/1 for interface "utun9", not exists.
. 2025.03.05 08:33:56 - Routes, delete ::/1 for interface "utun9", not exists.
. 2025.03.05 08:33:56 - Routes, delete 8000::/1 for interface "utun9", not exists.
. 2025.03.05 08:33:56 - Routes, delete 192.30.89.77/32 for interface "en0".
. 2025.03.05 08:33:56 - Routes, delete 192.30.89.75/32 for interface "utun9", not exists.
. 2025.03.05 08:33:56 - Routes, delete 2606:9580:100:f:5792:2dec:a4b6:2419/128 for interface "utun9", not exists.
. 2025.03.05 08:33:56 - DNS of a network adapter restored to original settings (AX88179A, to Automatic)
. 2025.03.05 08:33:56 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
. 2025.03.05 08:33:56 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2025.03.05 08:33:56 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2025.03.05 08:33:56 - DNS of a network adapter restored to original settings (Surfshark. WireGuard, to Automatic)
. 2025.03.05 08:33:56 - Workaround for enabling IPv6 DNS lookups deactivated
. 2025.03.05 08:33:56 - Collect network information
. 2025.03.05 08:33:58 - Connection terminated.
I 2025.03.05 08:34:01 - Checking authorization ...
. 2025.03.05 08:34:42 - Authorization check failed, continue anyway (Fetch url error:Timeout was reached)
! 2025.03.05 08:34:42 - Connecting to Telescopium (Canada, Vancouver)
. 2025.03.05 08:34:42 - Routes, add 192.30.89.53/32 for interface "en0".
. 2025.03.05 08:34:42 - OpenVPN > OpenVPN 2.6.12 aarch64-apple-darwin23.4.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD]
. 2025.03.05 08:34:42 - OpenVPN > library versions: OpenSSL 3.3.2 3 Sep 2024, LZO 2.10
. 2025.03.05 08:34:42 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]192.30.89.53:1194
. 2025.03.05 08:34:42 - OpenVPN > Socket Buffers: R=[786896->262144] S=[9216->262144]
. 2025.03.05 08:34:42 - OpenVPN > UDPv4 link local: (not bound)
. 2025.03.05 08:34:42 - OpenVPN > UDPv4 link remote: [AF_INET]192.30.89.53:1194
. 2025.03.05 08:34:42 - OpenVPN > TLS: Initial packet from [AF_INET]192.30.89.53:1194, sid=c050f30e 702b67e8
. 2025.03.05 08:34:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2025.03.05 08:34:42 - OpenVPN > VERIFY KU OK
. 2025.03.05 08:34:42 - OpenVPN > Validating certificate extended key usage
. 2025.03.05 08:34:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2025.03.05 08:34:42 - OpenVPN > VERIFY EKU OK
. 2025.03.05 08:34:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Telescopium, emailAddress=info@airvpn.org
. 2025.03.05 08:34:42 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bits RSA, signature: RSA-SHA512, peer temporary key: 253 bits X25519
. 2025.03.05 08:34:42 - OpenVPN > [Telescopium] Peer Connection Initiated with [AF_INET]192.30.89.53:1194
. 2025.03.05 08:34:42 - OpenVPN > TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
. 2025.03.05 08:34:42 - OpenVPN > TLS: tls_multi_process: initial untrusted session promoted to trusted
. 2025.03.05 08:34:43 - OpenVPN > Error: ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2025.03.05 08:34:43 - OpenVPN > SENT CONTROL [Telescopium]: 'PUSH_REQUEST' (status=1)
. 2025.03.05 08:34:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.19.2.1,dhcp-option DNS6 fde6:7a:7d20:f02::1,tun-ipv6,route-gateway 10.19.2.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:f02::1069/64 fde6:7a:7d20:f02::1,ifconfig 10.19.2.107 255.255.255.0,peer-id 7,cipher AES-256-GCM'
. 2025.03.05 08:34:43 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2025.03.05 08:34:43 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.19.2.1'
. 2025.03.05 08:34:43 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:f02::1'
. 2025.03.05 08:34:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2025.03.05 08:34:43 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2025.03.05 08:34:43 - OpenVPN > Opened utun device utun9
. 2025.03.05 08:34:43 - OpenVPN > /sbin/ifconfig utun9 delete
. 2025.03.05 08:34:43 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2025.03.05 08:34:43 - OpenVPN > /sbin/ifconfig utun9 10.19.2.107 10.19.2.107 netmask 255.255.255.0 mtu 1500 up
. 2025.03.05 08:34:43 - OpenVPN > /sbin/route add -net 10.19.2.0 10.19.2.107 255.255.255.0
. 2025.03.05 08:34:43 - OpenVPN > add net 10.19.2.0: gateway 10.19.2.107
. 2025.03.05 08:34:43 - OpenVPN > /sbin/ifconfig utun9 inet6 fde6:7a:7d20:f02::1069/64 mtu 1500 up
. 2025.03.05 08:34:43 - OpenVPN > Error: route: writing to routing socket: File exists
. 2025.03.05 08:34:43 - OpenVPN > add_route_ipv6(fde6:7a:7d20:f02::/64 -> fde6:7a:7d20:f02::1069 metric 0) dev utun9
. 2025.03.05 08:34:43 - OpenVPN > /sbin/route add -inet6 fde6:7a:7d20:f02:: -prefixlen 64 -iface utun9
. 2025.03.05 08:34:43 - OpenVPN > add net fde6:7a:7d20:f02::: gateway utun9: File exists
. 2025.03.05 08:34:43 - OpenVPN > Initialization Sequence Completed
. 2025.03.05 08:34:43 - OpenVPN > Data Channel: cipher 'AES-256-GCM', peer-id: 7, compression: 'stub'
. 2025.03.05 08:34:43 - Workaround to enable IPv6 DNS lookups activated
. 2025.03.05 08:34:44 - DNS of a network adapter forced (AX88179A, from Automatic to 10.19.2.1, fde6:7a:7d20:f02::1)
. 2025.03.05 08:34:44 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.19.2.1, fde6:7a:7d20:f02::1)
. 2025.03.05 08:34:44 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.19.2.1, fde6:7a:7d20:f02::1)
. 2025.03.05 08:34:44 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.19.2.1, fde6:7a:7d20:f02::1)
. 2025.03.05 08:34:44 - DNS of a network adapter forced (Surfshark. WireGuard, from Automatic to 10.19.2.1, fde6:7a:7d20:f02::1)
. 2025.03.05 08:34:44 - Routes, add 0.0.0.0/1 for interface "utun9".
. 2025.03.05 08:34:44 - Routes, add 128.0.0.0/1 for interface "utun9".
. 2025.03.05 08:34:44 - Routes, add ::/1 for interface "utun9".
. 2025.03.05 08:34:44 - Routes, add 8000::/1 for interface "utun9".
. 2025.03.05 08:34:44 - Routes, add 192.30.89.51/32 for interface "utun9".
. 2025.03.05 08:34:44 - Routes, add 2606:9580:100:c:8757:8ee:ec9c:991c/128 for interface "utun9".
. 2025.03.05 08:34:44 - Flushing DNS
I 2025.03.05 08:34:57 - Checking route IPv4
I 2025.03.05 08:34:57 - Checking route IPv6
I 2025.03.05 08:34:58 - Checking DNS
. 2025.03.05 08:35:08 - Checking DNS (4° try)
. 2025.03.05 08:35:14 - Checking DNS (5° try)
. 2025.03.05 08:35:15 - OpenVPN > Timers: ping 10, ping-restart 60
. 2025.03.05 08:35:15 - OpenVPN > Protocol options: explicit-exit-notify 5
! 2025.03.05 08:35:15 - Disconnecting
. 2025.03.05 08:35:15 - Sending soft termination signal
. 2025.03.05 08:35:15 - OpenVPN > event_wait : Interrupted system call (fd=-1,code=4)
. 2025.03.05 08:35:15 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2025.03.05 08:35:20 - OpenVPN > Closing TUN/TAP interface
. 2025.03.05 08:35:20 - OpenVPN > /sbin/route delete -inet6 fde6:7a:7d20:f02::1069
. 2025.03.05 08:35:20 - OpenVPN > delete host fde6:7a:7d20:f02::1069
. 2025.03.05 08:35:20 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2025.03.05 08:35:20 - Routes, delete 0.0.0.0/1 for interface "utun9", not exists.
. 2025.03.05 08:35:20 - Routes, delete 128.0.0.0/1 for interface "utun9", not exists.
. 2025.03.05 08:35:20 - Routes, delete ::/1 for interface "utun9", not exists.
. 2025.03.05 08:35:20 - Routes, delete 8000::/1 for interface "utun9", not exists.
. 2025.03.05 08:35:20 - Routes, delete 192.30.89.53/32 for interface "en0".
. 2025.03.05 08:35:20 - Routes, delete 192.30.89.51/32 for interface "utun9", not exists.
. 2025.03.05 08:35:20 - Routes, delete 2606:9580:100:c:8757:8ee:ec9c:991c/128 for interface "utun9", not exists.
. 2025.03.05 08:35:21 - DNS of a network adapter restored to original settings (AX88179A, to Automatic)
. 2025.03.05 08:35:21 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
. 2025.03.05 08:35:21 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
. 2025.03.05 08:35:21 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
. 2025.03.05 08:35:21 - DNS of a network adapter restored to original settings (Surfshark. WireGuard, to Automatic)
. 2025.03.05 08:35:21 - Workaround for enabling IPv6 DNS lookups deactivated
. 2025.03.05 08:35:21 - Collect network information
. 2025.03.05 08:35:23 - Connection terminated.
I 2025.03.05 08:35:23 - Cancel requested.
. 2025.03.05 08:35:23 - Deactivation of Network Lock
! 2025.03.05 08:35:23 - Session terminated.
I 2025.03.05 08:35:32 - Session starting.
. 2025.03.05 08:35:32 - Activation of Network Lock - macOS - PF
F 2025.03.05 08:35:39 - Object reference not set to an instance of an object
I 2025.03.05 08:35:41 - Cancel requested.
! 2025.03.05 08:35:41 - Session terminated.

Edited ... by OpenSourcerer
Apply LOG format to system report

Share this post


Link to post
@sw1234

Hello!

Too bad that the system report has been cut. Why did you cut a vast portion of the report pertaining to network interfaces and routing? If you did not cut anything please warn us, otherwise consider to send us an integral system report if the following suggestions do not resolve the new problem. EDIT: never mind, we can see them from your previous system report.

Even the 2nd problem is now solved. The new (and hopefully last... :) ) problem is that Eddie route check fails, in spite of the successful connection claimed by OpenVPN. If you switch to WireGuard (you can do it in "Preferences" > "Protocols" window) does the problem persist? If so please make sure that no antimalware or packet filtering tool blocks UDP (including tools like Malwarebytes, Little Snitch, any third party antivirus...).

If you find nothing blocking, or anyway the problem persists after you have disabled any possible interfering software, let's  discern first whether the route check failure is a false positive by Eddie:
  • from Eddie's main window select "Preferences" > "Advanced"
  • uncheck "Check if the VPN tunnel works"
  • click "Save"
  • from Eddie's main window select "Preferences" > "DNS"
  • uncheck "Check Air VPN DNS"
  • click "Save"
  • from Eddie's main window activate "Network Lock" and test again connections

Kind regards

 

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...