Jump to content
Not connected, Your IP: 3.235.75.196

LZ1

Moderators
  • Content Count

    2069
  • Joined

    ...
  • Last visited

    ...
  • Days Won

    74

Reputation Activity

  1. Like
    LZ1 got a reaction from Flx in Utorrent with CyberGhost popup offer(s)   ...
    Hello!
     
    The fix is to not use ad-infested "shareware freemium junk" as a wise man once said, but only FOSS software. So please consider switching to something such as qBittorent.
     
    Guides on configuring it can likewise be found in the link in my signature.
  2. Like
    LZ1 got a reaction from paccap in Slow torrent speeds   ...
    Thank you for the detailed response. Yes that's asymmetric. Did you try changing the protocols?
     
    Remember to re-connect to a location, after making a protocol change, for it to take effect.
     
    Also, is this a wired or wireless connection?
  3. Like
    LZ1 got a reaction from H8SOCIETY in Eddie 2.14beta released   ...
    Staff did mention making the auto-selection more intelligent in the future, but I can't find the post for you at this moment sorry.  Otherwise there's the usual FAQ on how Eddie selects. I don't think setting the scoring rule to speed makes any difference, as that's only for how things are ordered in the list.
  4. Like
    LZ1 reacted to jsand in Minecraft Authentication Failure   ...
    Whitelist the authserver at authserver.mojang.com & their VPN checker at mcoapi.minecraft.net and you can login. The rest of the game traffic will be through VPN. Enjoy!
     
    NB: Do not nslookup either hostname and use the IP you find as you will notice when (if) you switch servers, the IP will change. This is because they employ a geographic load balancer on their APIs.
  5. Like
    LZ1 reacted to Staff in Rebuttal of article "Don't use VPN services."   ...
    Hello!
     
    DISCLAIMER: this post has been written by an AirVPN co-founder (Paolo) and merges the information and the points of view elaborated by the Air founders in more than seven years. Other Air VPN staff members might add additional comments in the future.
     
    We have been asked via Twitter to reply to the following post:
    https://gist.github.com/joepie91/5a9909939e6ce7d09e29
     
    We see that the issues raised by the aforementioned article may be of general interest, so we have decided to post a detailed rebuttal here, meant to fix the remarkable amount of technical misunderstandings and errors which have led the writer to astonishingly wrong conclusions and worrying generalizations.
     
    The rebuttal is based on AirVPN only; we can not and we do not want to write in the name of any other service, since most of the considerations you will read here may or may not (and sometimes we know that they will not) apply to other "VPN services". Anyway, it is our right to reply as if the writer were talking about us too, because he/she repeatedly claims that ALL VPN services act in the same way.

     
     
     
    A "VPN in this sense" is NOT a proxy. Our service encrypts and tunnels all of the client system TCP and UDP traffic to and from the VPN server. Moreover, our service, when used with our free and open source software, also makes additional steps to prevent traffic leaks outside the VPN tunnel.
     
    A proxy tunnels (and not necessarily encrypts) only TCP traffic (proxies can not support UDP), and only the traffic of those applications which are configured to connect to a proxy. UDP traffic, system traffic and traffic of applications which may be started by the system and that you failed to configure (or that you can't even configure in Windows, in some cases) are not necessarily tunneled to the proxy. Not even your system DNS queries are necessarily tunneled over the proxy.

     
     
    If we were really interested in logging our clients traffic, we would not allow connections to and from Tor, proxies and other VPNs. We have always made very clear how to bypass the problem of "trust us" when you can't really afford to do that, and our answer has always been "partition of trust".  Please see for example our post dated March 2012 (!) about it:
    https://airvpn.org/topic/54-using-airvpn-over-tor/?do=findComment&comment=1745

     
    There's more. We work under a legal framework where the safe harbors for the mere conduits are very rigidly and clearly defined (specifically, by the 2000/31/EC, the E-Commerce Directive, articles 12, 13, 14 and 15).
    https://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:32000L0031
     
    The liability exemption for the mere conduit status would not exist if we were not mere conduits. If we inspected traffic and/or modified traffic (e.g. through content injection) and/or selected source and destination of the communications, we would not be mere conduits and we would lose the legal protection on liability exemptions.

    We have also two decisions of the Court of Justice of the European Union which clearly define indiscriminate data retention as infringing the fundamental rights of the citizens of the EU:
    https://curia.europa.eu/jcms/upload/docs/application/pdf/2014-04/cp140054en.pdf
    https://curia.europa.eu/jcms/upload/docs/application/pdf/2016-12/cp160145en.pdf
     
    Therefore:
    under a legal point of view, logging and/or monitoring and/or inspecting and/or modifying the content of our customers traffic without the customers explicit and written consent would be a criminal infringement, also subject to civil prosecution by the customers themselves under a business point of view, that would be simply suicidal (more on this later)  
     
    It is enigmatic how the writer can make such claims.
     
    We charge less than 10 USD per month for our services and we can pay a whole legal firm, 250 servers (physical, bare metal servers), the whole staff, including a tiny team of programmers. We also regularly donate money to organizations and projects whose activities are compatible with AirVPN mission.
    https://airvpn.org/mission
    https://airvpn.org/status
     
    We're not here only for the money, but if the writer wants to talk about money, so be it. He/she may rest assured that we have planned seriously a business model which remains robust if not rock solid.
     
    It is obvious that we must keep our business model solid, because our infrastructure has become large and we have duties toward the people working with us and toward our customers. At the same time we never forget that our customers have transformed into reality the dream to build a rather big project based on and aimed to privacy protection in a time when the whole world was going to the opposite direction. By changing now direction and pointing to a business based on privacy infringements and personal data commerce would not only betray our beliefs and mission and customers, but we would become a goldfish in an ocean of sharks, we could not even think to compete.
     
    After 7 years, we have the right and knowledge to claim that a privacy protection mission is not incompatible with the price the writer mentions and with a strictly agnostic network where no traffic inspection or monitoring is enforced.
     
    We can also claim confidently that any business plan based on data protection and privacy infringements not declared in the terms of service would crash dramatically in the short-term in the EU: remember the legal framework we live in and feel free to do your own research on real cases and incidents in the recent past.
     
    Last but not least, please do your own math and compute the costs to store and "hand a customer traffic data over": they imply costs of losing the mere conduit status, added to the costs of civil lawsuits from that and potentially other tens of thousands customers. Then compare them to the "costs" (in reality benefits) of no monitoring at all added to the peace of mind to strictly act in a legal/lawful way.
     
    Given all of the above, you can easily discern that the quoted assumption is false for AirVPN. The logical, unavoidable conclusion is that AirVPN best interest, even under a purely cynical, business point of view, is to NOT log (in the most extensive sense of the term) customers traffic and not commerce with their data.
     
     
    This is partially, only partially, true. HideMyAss was really risking to go out of serious privacy protection business soon after the incident occurred: check the massive uproar caused by the event. The AVG acquisition, with the disruptive marketing power of AVG, has probably covered the issue, but the old HideMyAss management hurried to sell the whole Privax company. Who knows, maybe just in time, maybe before the value could be hit too seriously by the incident. We can't know for sure, and the writer can't as well. Anyway, if the writer wants to claim that marketing is powerful, we agree (what a discovery!).
     
    The logical jump from HMA incident to the assumption that every service does what HMA did is long. Do not forget that what HMA did would pose a huge amount of legal problems to us, as explained.
     
    HideMyAss targeted the same persons who are happily using the new Facebook VPN. We respect the intelligence of our customers and we don't have the arrogance to think that we can change people mind and competence all over the world in a few years (or ever), and we don't even think that we can oppose the marketing power. More importantly, that's a problem pertaining to HideMyAss. It is not only unfair, but even defamatory to surreptitiously imply that the behavior (good or bad) of certain services is the same behavior of any other service, in the same field or not.
     
    We have been providing AirVPN services since 2011, when we offered the service as a beta version totally free. Now we challenge the writer of the article to provide any single proof that any single user identity has been compromised by us through a betrayal of our terms of service and our mission and/or through traffic logging or inspection and/or by any infringement of the EU legal framework on privacy and personal data protection. 
     
     
    False. We provide our users with any tool to never make their "real" IP address appear to our servers. We have also integrated AirVPN over HTTP proxy, AirVPN over SOCKS proxy, and AirVPN over Tor usage in our free and open source software. We don't even block connections from competitor VPN servers. Finally, we accept not only Bitcoin, but Monero and ZCash as well, which are designed to provide a robust anonymity layer on the transactions.
     
    If you really don't trust us, you can easily make your IP address never visible to our servers.
     
    This is particularly important even if you trust us, but you can't afford (for the sensitivity of the data you need to transmit, for example) to assume that our servers are not monitored by hostile entities, an event that can happen with ANY service, not only VPN services. The fact that we have made every human effort to provide effective and easily usable protections against such occurrences is a proof of our interest in the protection of our customers privacy.

     
     
    This is ambiguous, because we would need the writer to define security scope and context exactly. Is he/she referring to integrity and security of data between your node and our servers? Or security of your system? Surely, our service is not meant as a security tool to protect against virus and spyware, and this is clearly stated at the very beginning of our Terms of Service. AirVPN can't do anything if your system is compromised.
     
    However, the above does not imply in any way that our service is a glorified proxy. See the reasons we mentioned above and verify how a loose security mention does not change anything. Additionally, while OpenVPN is the core of our service, it is complemented by an important series of features aimed to protect privacy and data in all of those cases which OpenVPN alone has not been designed for.
     
    Even if you don't run our free and open source software, we and our community have made any effort to provide guides and insights on how to get the most from our service to integrate it in a comprehensive environment aimed to protect your data and identity. We are very grateful to our community for the invaluable contributions throughout the years.
     
    If we were a "malicious VPN provider", does the writer really think that we would have allowed our forums to become a golden source of information for privacy, identity and data protection? Do you really think that we would have been provided monetary support to TorProject, OpenBSD, European Digital Rights, Tor infrastructure, etc. etc.?

     
     
    A part of this has been widely rebutted in our previous reply. Here it will be sufficient to add that even if you don't use end-to-end encryption, even if you don't use Tor on top of an AirVPN connection, a MITM who sniffs the packets in any point between the VPN server and the final destination (including the final destination itself of course) will see those packets coming from the VPN server exit-IP address, NOT from your real IP address and NOT from the entry-IP address of the VPN server you connect to. This is a paramount point which is incompetently (intentionally?) ignored by the writer. It is so important that in some extreme cases it makes the difference between imprisonment and freedom, or even between life and death.
     
    Imagine the case of a whistleblower giving out relevant information via VoIP or other applications relying on UDP to a self proclaimed journalist who then betrays the confidentiality of the source, or even to a serious journalist who is unaware of the fact that his/her computer is compromised, or that his/her line is wiretapped. The whistleblower can't use a proxy reliably. The journalist, or the wiretapping entity, can trace the source IP address and the identity of the whistleblower can be disclosed (just to make a trivial example which does not require any wiretapping or compromised system, think of Skype exploit, for which any party could discover the IP address of the other party). In most of these cases, end-to-end encryption would have been irrelevant for the whistleblower.
     
    Whenever the source can't trust the destination integrity, whether the recipient is in good faith or not, our service makes a vital difference.

     
     
    True. We have never said or written the contrary. In addition to changing IP address, which is anyway important in spite of the writer claims, further steps are strictly necessary to prevent profiling, from "separation of identities" to script blocking, from browser fingerprint changes to system settings obfuscation. Our community has widely covered this issue and provided precious suggestions.
     
    Here the writer makes a totally irrational shift: first he/she wants to make you think that our service is just a "glorified proxy", then he/she wants to insinuate that our service is useless because it is not some sort of supernatural system capable to protect users from their own behavior and from every possible tracking system which exploits the user system, not the service.


     
     
    The first case is true, and it is very important.
     
    However, it is totally false that you can safely rely on a proxy for the second case purpose. Many applications, including torrent software, can:
    bind to the physical network interface, or do some dangerous UPnP use UDP (not supported by a proxy) send DNS queries out of the proxy include the assigned "real" IP address inside their layer of communications, example: https://blog.torproject.org/bittorrent-over-tor-isnt-good-idea In the aforementioned cases, correct usage of our service will fulfill the purpose to never disclose your real IP address and/or the UDP traffic and/or the DNS queries. A proxy will not and you can be potentially tracked back, either by copyright trolls or any hostile entity.
     
    Additionally, our service has many more use cases:
    tunneling UDP traffic (not available with a proxy or Tor) circumventing censorship based on IP addresses block circumventing censorship based on DNS poisoning preventing injection of forged packets (not necessarily available with a proxy even in TCP, and surely not when you need UDP flow integrity) using Tor anyway when Tor usage is blocked or triggers interest of ISP or any hostile entity about you protecting your identity when the final recipient of your communications is compromised (not available with end-to-end encryption alone, and not available with Tor when you need UDP, imagine if you need to stream a video in real time which requires source identity protection) making your services (web sites, torrent clients, FTP servers for example) reachable from the Internet when your ISP does not allow port forwarding (not available with a proxy), without exposing your IP address having a static exit-IP address bypassing various types of traffic shaping tunneling simultaneously the traffic of all the devices in your local network, even with remote port forwarding, and even those which can't run OpenVPN provided that you have a device acting as a gateway to the VPN (typical examples a pfSense box or a DD-WRT / AsusWRT / Merlin / Tomato etc. router or any computer configured to work as a router) and maybe you can see more use cases which we have missed here.
     
    The fact that the writer omitted all of the above says a lot about his/her competence and/or good faith.

     
     
    This is hilarious, and not only because the whole point of the writer's post ends up into advertising LowEndBox.
     
    We will not insult our readers' intelligence with an explanation of why that is a terrible idea when you seek more privacy and some anonymity layer in your interactions with the Internet.
     
    Draw your own conclusions.
     
    Kind regards and datalove
    Paolo
    AirVPN co-founder
  6. Like
    LZ1 got a reaction from Alter94 in Comparisons   ...
    Oh it's not that you can't point out where others go wrong, it just needs to be accurate/truthful and there's plenty where that came from. Otherwise I agree there's 2-3 companies one always sees .
  7. Like
    LZ1 got a reaction from Alter94 in Comparisons   ...
    Hello!
     
    I'm not one to defend Nord, but we must keep things accurate, including about competitors, as it's potentially defamatory otherwise and that's not permitted on these boards.
     
     
    Air says something similar too:
     
     
    Airs response to this "military" thing would be:
     
     
    Whether or not Nord is aware of the same technicalities I of course can't say. But it's at least worth being aware of the origins of some of this kind of terminology.
  8. Like
    LZ1 reacted to Staff in Eddie with other providers or custom OpenVPN configuration files   ...
    Eddie can use any OpenVPN configuration file, even of course pertaining to servers from our competitors.
     
    The UI is not yet enabled by default, use Preferences -> Advanced -> Multi-provider support.

    Note that AirVPN account or subscription is not required: AirVPN can even be totally removed as VPN provider. 
    Remember: The features 'Pick port/protocol', SSH/SSL tunnels, 'Check Tunnel' and 'Check DNS' are AirVPN servers specific, so they will not be performed on other .ovpn files.
     
     
     
    Please report in this forum your experience with Eddie and other VPN providers, even if it works perfectly, thanks.
     
    The full conversion of Eddie to a generic OpenVPN wrapper is still under development, currently it's an hybrid (for example Settings contains AirVPN specific options that will be moved in the future).
     

    This is a subforum related only to Eddie. For discussion about other VPN providers, please use this subforum
  9. Like
    LZ1 got a reaction from Flx in Dedicated/static IP address?   ...
    Then the answer is "No", if the static IPs referenced in the links to the Staff posts in my last two replies aren't what you were looking for.
     
    There's certainly no history of Air letting single users get access to specific addon-features either, that I'm aware of. (In case you wanted to pay a little extra to get a static IP, like some other companies offer).
     
    It's no use sharing the contents of your support tickets with us here and I don't know which custom plans support may be referencing. Perhaps there's a misunderstanding, in that they're talking about the plans they offer, paired with my prior Staff post about static IPs. Following that logic, it's correct that they do offer "custom plans with static IPs". But you're thinking of an add-on feature of some sort I suppose. Since it wouldn't make sense otherwise, as all Air customers get access to the same things when they buy a plan.
     
    If and when Air does make a change of this kind, there's a good chance you'll hear about it in the announcements forum along with the rest of us.
     
    Now that was 8 posts from you in quick succession(now deleted). It's understandable if you didn't get the answers you were looking for, so I think the safest bet is for you to assume it's all a "No" and that there's no new/current plans they wish to share.
     
    Topic locked for now.
  10. Like
    LZ1 got a reaction from stupid are cocksure in ProtonVPN Uses IKEv2 for the Mac client   ...
    Hello!
     
    Staff commented on the use of that protocol once, so for them this is presumably nothing new .
     
  11. Like
    LZ1 got a reaction from stupid are cocksure in ProtonVPN Uses IKEv2 for the Mac client   ...
    Hello!
     
    Staff commented on the use of that protocol once, so for them this is presumably nothing new .
     
  12. Like
    LZ1 reacted to Staff in Bitcoin accepted directly   ...
    Hello!
     
    We're very glad and proud to announce that from now on we are able to accept Bitcoin directly. Any intermediary acting as a payment processor is no more required.
     
    We feel that  this is an important step, since some payment processors have taken or are taking steps which are not totally privacy friendly. Moreover, cutting out any intermediary is very coherent with Bitcoin spirit and unleashes the potential of the cryptocurrency.
     
    Kind regards and datalove
    AirVPN Staff
  13. Like
    LZ1 got a reaction from stupid are cocksure in ProtonVPN Uses IKEv2 for the Mac client   ...
    Hello!
     
    Staff commented on the use of that protocol once, so for them this is presumably nothing new .
     
  14. Like
    LZ1 reacted to EtV in Eddie 2.14beta released   ...
    Greetings,
     
    I'm running the Eddie beta (2.14.2) with Network Lock activated on a MacOS laptop (10.13.3), which I do have to close / put to sleep regularly.  Eddie sometimes has an issue reconnecting when I wake the laptop from it's slumbers.  It doesn't happen every time I wake the machine, but it does happen fairly often.
     
    Here are some log entries that I grabbed recently when Eddie was unable to complete his IPv4 checks and finish connecting after I woke the laptop. Eddie seems to try about 3 times to reconnect and then disconnects and tries again, often still unsuccessfully.
     

    . 2018.03.22 07:38:29 - Eddie version: 2.14.2 / macos_x64, System: MacOS, Name: 10.13.3, Version: Darwin ***** 17.4.0 Darwin Kernel Version 17.4.0: Sun Dec 17 09:19:54 PST 2017; root:xnu-4570.41.2~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319
    . 2018.03.22 07:38:29 - Reading options from /Users/*****/.airvpn/AirVPN.xml
    . 2018.03.22 07:38:30 - Command line arguments (0):
    . 2018.03.22 07:38:32 - OpenVPN Driver - Expected
    . 2018.03.22 07:38:32 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)
    . 2018.03.22 07:38:32 - SSH - Version: OpenSSH_7.6p1, LibreSSL 2.6.2 (/usr/bin/ssh)
    . 2018.03.22 07:38:32 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)
    . 2018.03.22 07:38:32 - curl - Version: 7.54.0 (/usr/bin/curl)
    . 2018.03.22 07:38:32 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem
    W 2018.03.22 07:38:33 - Recovery. Unexpected crash?
    . 2018.03.22 07:38:33 - Routes, removed a route previously added, 199.19.94.16 for gateway 10.4.0.1
    ! 2018.03.22 07:38:33 - Activation of Network Lock - macOS - PF
    . 2018.03.22 07:38:33 - macOS - PF rules updated, reloading
    . 2018.03.22 07:38:33 - Updating systems & servers data ...
    . 2018.03.22 07:38:33 - macOS - PF rules updated, reloading
    I 2018.03.22 07:38:33 - Session starting.
    . 2018.03.22 07:38:34 - Systems & servers data update completed
    I 2018.03.22 07:38:39 - Checking authorization ...
    . 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Ethernet)
    . 2018.03.22 07:38:40 - IPv6 disabled on network adapter (FireWire)
    . 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Wi-Fi)
    . 2018.03.22 07:38:40 - IPv6 disabled on network adapter (iPhone USB)
    . 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Bluetooth PAN)
    . 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Thunderbolt Bridge)
    ! 2018.03.22 07:38:40 - Connecting to Tejat (Canada, Toronto, Ontario)
    . 2018.03.22 07:38:40 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
    . 2018.03.22 07:38:40 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
    . 2018.03.22 07:38:40 - Connection to OpenVPN Management Interface
    . 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
    . 2018.03.22 07:38:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.22 07:38:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.22 07:38:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.194:443
    . 2018.03.22 07:38:41 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
    . 2018.03.22 07:38:41 - OpenVPN > UDP link local: (not bound)
    . 2018.03.22 07:38:41 - OpenVPN > UDP link remote: [AF_INET]184.75.221.194:443
    . 2018.03.22 07:38:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.194:443, sid=be5f109c 4009b726
    . 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
    . 2018.03.22 07:38:41 - OpenVPN > VERIFY KU OK
    . 2018.03.22 07:38:41 - OpenVPN > Validating certificate extended key usage
    . 2018.03.22 07:38:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
    . 2018.03.22 07:38:41 - OpenVPN > VERIFY EKU OK
    . 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
    . 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
    . 2018.03.22 07:38:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
    . 2018.03.22 07:38:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.194:443
    . 2018.03.22 07:38:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
    . 2018.03.22 07:38:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.108 255.255.0.0,peer-id 38,cipher AES-256-GCM'
    . 2018.03.22 07:38:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
    . 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
    . 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: compression parms modified
    . 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
    . 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: route-related options modified
    . 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    . 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: peer-id set
    . 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
    . 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
    . 2018.03.22 07:38:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
    . 2018.03.22 07:38:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
    . 2018.03.22 07:38:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
    . 2018.03.22 07:38:42 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
    . 2018.03.22 07:38:42 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
    . 2018.03.22 07:38:42 - Above log line repeated 1 times more
    . 2018.03.22 07:38:42 - OpenVPN > Opened utun device utun2
    . 2018.03.22 07:38:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
    . 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 delete
    . 2018.03.22 07:38:42 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
    . 2018.03.22 07:38:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
    . 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 10.4.1.108 10.4.1.108 netmask 255.255.0.0 mtu 1500 up
    . 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.108 255.255.0.0
    . 2018.03.22 07:38:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.108
    . 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 184.75.221.194 192.168.50.1 255.255.255.255
    . 2018.03.22 07:38:42 - OpenVPN > add net 184.75.221.194: gateway 192.168.50.1
    . 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.22 07:38:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.22 07:38:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.22 07:38:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
    . 2018.03.22 07:38:42 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
    . 2018.03.22 07:38:42 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
    . 2018.03.22 07:38:42 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
    . 2018.03.22 07:38:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
    . 2018.03.22 07:38:43 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
    . 2018.03.22 07:38:43 - Routes, added a new route, 184.75.221.195 for gateway 10.4.0.1
    . 2018.03.22 07:38:43 - Flushing DNS
    . 2018.03.22 07:38:43 - macOS - PF rules updated, reloading
    I 2018.03.22 07:38:43 - Checking route IPv4
    I 2018.03.22 07:38:44 - Checking DNS
    ! 2018.03.22 07:38:44 - Connected.
    . 2018.03.22 07:38:44 - OpenVPN > Initialization Sequence Completed
    . 2018.03.22 07:48:40 - Updating systems & servers data ...
    . 2018.03.22 07:48:42 - Systems & servers data update completed
    . 2018.03.22 08:01:23 - Updating systems & servers data ...
    . 2018.03.22 08:01:27 - Systems & servers data update completed
    . 2018.03.22 10:01:36 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
    . 2018.03.22 10:01:36 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
    . 2018.03.22 10:01:36 - OpenVPN > Restart pause, 5 second(s)
    . 2018.03.22 10:01:36 - macOS - PF rules updated, reloading
    ! 2018.03.22 10:01:37 - Disconnecting
    . 2018.03.22 10:01:37 - Routes, removed a route previously added, 184.75.221.195 for gateway 10.4.0.1
    . 2018.03.22 10:01:37 - Sending management termination signal
    . 2018.03.22 10:01:37 - Management - Send 'signal SIGTERM'
    . 2018.03.22 10:01:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
    . 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 184.75.221.194 192.168.50.1 255.255.255.255
    . 2018.03.22 10:01:37 - OpenVPN > delete net 184.75.221.194: gateway 192.168.50.1
    . 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.22 10:01:37 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.22 10:01:37 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.22 10:01:37 - OpenVPN > Closing TUN/TAP interface
    . 2018.03.22 10:01:37 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
    . 2018.03.22 10:01:37 - Connection terminated.
    . 2018.03.22 10:01:37 - IPv6 restored on network adapter (Ethernet)
    . 2018.03.22 10:01:37 - IPv6 restored on network adapter (FireWire)
    . 2018.03.22 10:01:37 - IPv6 restored on network adapter (Wi-Fi)
    . 2018.03.22 10:01:37 - IPv6 restored on network adapter (iPhone USB)
    . 2018.03.22 10:01:37 - IPv6 restored on network adapter (Bluetooth PAN)
    . 2018.03.22 10:01:37 - IPv6 restored on network adapter (Thunderbolt Bridge)
    . 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
    . 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
    . 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
    . 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
    . 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
    . 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
    I 2018.03.22 10:01:45 - Checking authorization ...
    . 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Ethernet)
    . 2018.03.22 10:01:46 - IPv6 disabled on network adapter (FireWire)
    . 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Wi-Fi)
    . 2018.03.22 10:01:46 - IPv6 disabled on network adapter (iPhone USB)
    . 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)
    . 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)
    ! 2018.03.22 10:01:47 - Connecting to Lesath (Canada, Toronto, Ontario)
    . 2018.03.22 10:01:47 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
    . 2018.03.22 10:01:47 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
    . 2018.03.22 10:01:47 - Connection to OpenVPN Management Interface
    . 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
    . 2018.03.22 10:01:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.22 10:01:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.22 10:01:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.2:443
    . 2018.03.22 10:01:47 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
    . 2018.03.22 10:01:47 - OpenVPN > UDP link local: (not bound)
    . 2018.03.22 10:01:47 - OpenVPN > UDP link remote: [AF_INET]184.75.221.2:443
    . 2018.03.22 10:01:47 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.2:443, sid=9e95a07f 20cf58b5
    . 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
    . 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
    . 2018.03.22 10:01:47 - OpenVPN > VERIFY KU OK
    . 2018.03.22 10:01:47 - OpenVPN > Validating certificate extended key usage
    . 2018.03.22 10:01:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
    . 2018.03.22 10:01:47 - OpenVPN > VERIFY EKU OK
    . 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
    . 2018.03.22 10:01:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
    . 2018.03.22 10:01:47 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.2:443
    . 2018.03.22 10:01:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
    . 2018.03.22 10:01:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.14 255.255.0.0'
    . 2018.03.22 10:01:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
    . 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
    . 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: compression parms modified
    . 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
    . 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: route-related options modified
    . 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    . 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
    . 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
    . 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.22 10:01:48 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
    . 2018.03.22 10:01:48 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
    . 2018.03.22 10:01:48 - Above log line repeated 1 times more
    . 2018.03.22 10:01:48 - OpenVPN > Opened utun device utun2
    . 2018.03.22 10:01:48 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
    . 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 delete
    . 2018.03.22 10:01:48 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
    . 2018.03.22 10:01:48 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
    . 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 10.4.23.14 10.4.23.14 netmask 255.255.0.0 mtu 1500 up
    . 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.23.14 255.255.0.0
    . 2018.03.22 10:01:48 - OpenVPN > add net 10.4.0.0: gateway 10.4.23.14
    . 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 184.75.221.2 192.168.50.1 255.255.255.255
    . 2018.03.22 10:01:48 - OpenVPN > add net 184.75.221.2: gateway 192.168.50.1
    . 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.22 10:01:48 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.22 10:01:48 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.22 10:01:49 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
    . 2018.03.22 10:01:49 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
    . 2018.03.22 10:01:49 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
    . 2018.03.22 10:01:49 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
    . 2018.03.22 10:01:49 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
    . 2018.03.22 10:01:49 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
    . 2018.03.22 10:01:49 - Routes, added a new route, 184.75.221.3 for gateway 10.4.0.1
    . 2018.03.22 10:01:49 - Flushing DNS
    . 2018.03.22 10:01:50 - macOS - PF rules updated, reloading
    I 2018.03.22 10:01:50 - Checking route IPv4
    I 2018.03.22 10:01:50 - Checking DNS
    ! 2018.03.22 10:01:50 - Connected.
    . 2018.03.22 10:01:51 - OpenVPN > Initialization Sequence Completed
    . 2018.03.22 12:01:40 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
    . 2018.03.22 12:01:40 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
    . 2018.03.22 12:01:40 - OpenVPN > Restart pause, 5 second(s)
    . 2018.03.22 12:01:40 - macOS - PF rules updated, reloading
    ! 2018.03.22 12:01:40 - Disconnecting
    . 2018.03.22 12:01:40 - Routes, removed a route previously added, 184.75.221.3 for gateway 10.4.0.1
    . 2018.03.22 12:01:40 - Sending management termination signal
    . 2018.03.22 12:01:40 - Management - Send 'signal SIGTERM'
    . 2018.03.22 12:01:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
    . 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 184.75.221.2 192.168.50.1 255.255.255.255
    . 2018.03.22 12:01:40 - OpenVPN > delete net 184.75.221.2: gateway 192.168.50.1
    . 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.22 12:01:40 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.22 12:01:40 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.22 12:01:40 - OpenVPN > Closing TUN/TAP interface
    . 2018.03.22 12:01:40 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
    . 2018.03.22 12:01:40 - Connection terminated.
    . 2018.03.22 12:01:40 - IPv6 restored on network adapter (Ethernet)
    . 2018.03.22 12:01:40 - IPv6 restored on network adapter (FireWire)
    . 2018.03.22 12:01:40 - IPv6 restored on network adapter (Wi-Fi)
    . 2018.03.22 12:01:40 - IPv6 restored on network adapter (iPhone USB)
    . 2018.03.22 12:01:41 - Updating systems & servers data ...
    . 2018.03.22 12:01:41 - IPv6 restored on network adapter (Bluetooth PAN)
    . 2018.03.22 12:01:41 - IPv6 restored on network adapter (Thunderbolt Bridge)
    . 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
    . 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
    . 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
    . 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
    . 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
    . 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
    . 2018.03.22 12:01:41 - Systems & servers data update completed
    I 2018.03.22 12:01:46 - Checking authorization ...
    . 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Ethernet)
    . 2018.03.22 12:01:47 - IPv6 disabled on network adapter (FireWire)
    . 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Wi-Fi)
    . 2018.03.22 12:01:47 - IPv6 disabled on network adapter (iPhone USB)
    . 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)
    . 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)
    ! 2018.03.22 12:01:47 - Connecting to Angetenar (Canada, Toronto, Ontario)
    . 2018.03.22 12:01:48 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
    . 2018.03.22 12:01:48 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
    . 2018.03.22 12:01:48 - Connection to OpenVPN Management Interface
    . 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
    . 2018.03.22 12:01:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.22 12:01:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.22 12:01:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.162:443
    . 2018.03.22 12:01:48 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
    . 2018.03.22 12:01:48 - OpenVPN > UDP link local: (not bound)
    . 2018.03.22 12:01:48 - OpenVPN > UDP link remote: [AF_INET]184.75.221.162:443
    . 2018.03.22 12:01:48 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.162:443, sid=a3cfefdd 41e9127e
    . 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
    . 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
    . 2018.03.22 12:01:48 - OpenVPN > VERIFY KU OK
    . 2018.03.22 12:01:48 - OpenVPN > Validating certificate extended key usage
    . 2018.03.22 12:01:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
    . 2018.03.22 12:01:48 - OpenVPN > VERIFY EKU OK
    . 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
    . 2018.03.22 12:01:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
    . 2018.03.22 12:01:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.162:443
    . 2018.03.22 12:01:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
    . 2018.03.22 12:01:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.220 255.255.0.0'
    . 2018.03.22 12:01:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
    . 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
    . 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: compression parms modified
    . 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
    . 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: route-related options modified
    . 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    . 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
    . 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
    . 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.22 12:01:51 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
    . 2018.03.22 12:01:51 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
    . 2018.03.22 12:01:51 - Above log line repeated 1 times more
    . 2018.03.22 12:01:51 - OpenVPN > Opened utun device utun2
    . 2018.03.22 12:01:51 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
    . 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 delete
    . 2018.03.22 12:01:51 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
    . 2018.03.22 12:01:51 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
    . 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 10.4.0.220 10.4.0.220 netmask 255.255.0.0 mtu 1500 up
    . 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.220 255.255.0.0
    . 2018.03.22 12:01:51 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.220
    . 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 184.75.221.162 192.168.50.1 255.255.255.255
    . 2018.03.22 12:01:51 - OpenVPN > add net 184.75.221.162: gateway 192.168.50.1
    . 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.22 12:01:51 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.22 12:01:51 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.22 12:01:51 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
    . 2018.03.22 12:01:52 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
    . 2018.03.22 12:01:52 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
    . 2018.03.22 12:01:52 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
    . 2018.03.22 12:01:52 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
    . 2018.03.22 12:01:52 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
    . 2018.03.22 12:01:52 - Routes, added a new route, 184.75.221.163 for gateway 10.4.0.1
    . 2018.03.22 12:01:52 - Flushing DNS
    . 2018.03.22 12:01:52 - macOS - PF rules updated, reloading
    I 2018.03.22 12:01:53 - Checking route IPv4
    I 2018.03.22 12:01:53 - Checking DNS
    ! 2018.03.22 12:01:53 - Connected.
    . 2018.03.22 12:01:53 - OpenVPN > Initialization Sequence Completed
    . 2018.03.24 07:51:52 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
    . 2018.03.24 07:51:52 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
    . 2018.03.24 07:51:52 - OpenVPN > Restart pause, 5 second(s)
    . 2018.03.24 07:51:56 - macOS - PF rules updated, reloading
    ! 2018.03.24 07:51:56 - Disconnecting
    . 2018.03.24 07:51:56 - Routes, removed a route previously added, 184.75.221.163 for gateway 10.4.0.1
    . 2018.03.24 07:51:56 - Sending management termination signal
    . 2018.03.24 07:51:56 - Management - Send 'signal SIGTERM'
    . 2018.03.24 07:51:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
    . 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 184.75.221.162 192.168.50.1 255.255.255.255
    . 2018.03.24 07:51:56 - OpenVPN > delete net 184.75.221.162: gateway 192.168.50.1
    . 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:51:56 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:51:56 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:51:56 - OpenVPN > Closing TUN/TAP interface
    . 2018.03.24 07:51:56 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
    . 2018.03.24 07:51:56 - Connection terminated.
    . 2018.03.24 07:51:56 - IPv6 restored on network adapter (Ethernet)
    . 2018.03.24 07:51:57 - IPv6 restored on network adapter (FireWire)
    . 2018.03.24 07:51:57 - IPv6 restored on network adapter (Wi-Fi)
    . 2018.03.24 07:51:57 - IPv6 restored on network adapter (iPhone USB)
    . 2018.03.24 07:51:57 - IPv6 restored on network adapter (Bluetooth PAN)
    . 2018.03.24 07:51:57 - IPv6 restored on network adapter (Thunderbolt Bridge)
    . 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
    . 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
    . 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
    . 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
    . 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
    . 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
    I 2018.03.24 07:52:00 - Checking authorization ...
    W 2018.03.24 07:52:01 - Authorization check failed, continue anyway (curl: (7) Couldn't connect to server)
    . 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Ethernet)
    . 2018.03.24 07:52:01 - IPv6 disabled on network adapter (FireWire)
    . 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Wi-Fi)
    . 2018.03.24 07:52:01 - IPv6 disabled on network adapter (iPhone USB)
    . 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Bluetooth PAN)
    . 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Thunderbolt Bridge)
    ! 2018.03.24 07:52:01 - Connecting to Sargas (Canada, Toronto, Ontario)
    . 2018.03.24 07:52:02 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
    . 2018.03.24 07:52:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
    . 2018.03.24 07:52:02 - Connection to OpenVPN Management Interface
    . 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
    . 2018.03.24 07:52:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.24 07:52:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.24 07:52:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.194:443
    . 2018.03.24 07:52:02 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
    . 2018.03.24 07:52:02 - OpenVPN > UDP link local: (not bound)
    . 2018.03.24 07:52:02 - OpenVPN > UDP link remote: [AF_INET]184.75.223.194:443
    . 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
    . 2018.03.24 07:52:02 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.194:443, sid=43b6f14a 13cd2419
    . 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
    . 2018.03.24 07:52:02 - OpenVPN > VERIFY KU OK
    . 2018.03.24 07:52:02 - OpenVPN > Validating certificate extended key usage
    . 2018.03.24 07:52:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
    . 2018.03.24 07:52:02 - OpenVPN > VERIFY EKU OK
    . 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
    . 2018.03.24 07:52:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
    . 2018.03.24 07:52:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.194:443
    . 2018.03.24 07:52:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
    . 2018.03.24 07:52:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.64 255.255.0.0,peer-id 67,cipher AES-256-GCM'
    . 2018.03.24 07:52:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
    . 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
    . 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: compression parms modified
    . 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
    . 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: route-related options modified
    . 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    . 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: peer-id set
    . 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
    . 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
    . 2018.03.24 07:52:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
    . 2018.03.24 07:52:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
    . 2018.03.24 07:52:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
    . 2018.03.24 07:52:03 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
    . 2018.03.24 07:52:03 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
    . 2018.03.24 07:52:03 - Above log line repeated 1 times more
    . 2018.03.24 07:52:03 - OpenVPN > Opened utun device utun2
    . 2018.03.24 07:52:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
    . 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 delete
    . 2018.03.24 07:52:03 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
    . 2018.03.24 07:52:03 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
    . 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 10.4.1.64 10.4.1.64 netmask 255.255.0.0 mtu 1500 up
    . 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.64 255.255.0.0
    . 2018.03.24 07:52:03 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.64
    . 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 184.75.223.194 192.168.50.1 255.255.255.255
    . 2018.03.24 07:52:03 - OpenVPN > add net 184.75.223.194: gateway 192.168.50.1
    . 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:52:03 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:52:03 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:52:04 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:04 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:04 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:04 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:04 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:04 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:04 - Routes, added a new route, 184.75.223.195 for gateway 10.4.0.1
    . 2018.03.24 07:52:04 - Flushing DNS
    . 2018.03.24 07:52:05 - macOS - PF rules updated, reloading
    I 2018.03.24 07:52:05 - Checking route IPv4
    I 2018.03.24 07:52:05 - Checking DNS
    . 2018.03.24 07:52:06 - Checking DNS failed:
    . 2018.03.24 07:52:06 - Checking DNS (2° try)
    . 2018.03.24 07:52:07 - Checking DNS failed:
    . 2018.03.24 07:52:07 - Checking DNS (3° try)
    . 2018.03.24 07:52:10 - Checking DNS failed:
    E 2018.03.24 07:52:10 - Checking DNS failed.
    . 2018.03.24 07:52:10 - OpenVPN > Initialization Sequence Completed
    ! 2018.03.24 07:52:10 - Disconnecting
    . 2018.03.24 07:52:10 - Routes, removed a route previously added, 184.75.223.195 for gateway 10.4.0.1
    . 2018.03.24 07:52:10 - Sending management termination signal
    . 2018.03.24 07:52:10 - Management - Send 'signal SIGTERM'
    . 2018.03.24 07:52:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
    . 2018.03.24 07:52:10 - OpenVPN > SIGTERM received, sending exit notification to peer
    . 2018.03.24 07:52:13 - Updating systems & servers data ...
    . 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 184.75.223.194 192.168.50.1 255.255.255.255
    . 2018.03.24 07:52:15 - OpenVPN > delete net 184.75.223.194: gateway 192.168.50.1
    . 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:52:15 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:52:15 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:52:15 - OpenVPN > Closing TUN/TAP interface
    . 2018.03.24 07:52:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
    . 2018.03.24 07:52:15 - Connection terminated.
    . 2018.03.24 07:52:15 - IPv6 restored on network adapter (Ethernet)
    . 2018.03.24 07:52:15 - IPv6 restored on network adapter (FireWire)
    . 2018.03.24 07:52:15 - IPv6 restored on network adapter (Wi-Fi)
    . 2018.03.24 07:52:15 - IPv6 restored on network adapter (iPhone USB)
    . 2018.03.24 07:52:15 - IPv6 restored on network adapter (Bluetooth PAN)
    . 2018.03.24 07:52:15 - IPv6 restored on network adapter (Thunderbolt Bridge)
    . 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
    . 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
    . 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
    . 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
    . 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
    . 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
    I 2018.03.24 07:52:19 - Checking authorization ...
    . 2018.03.24 07:52:19 - IPv6 disabled on network adapter (Ethernet)
    . 2018.03.24 07:52:20 - IPv6 disabled on network adapter (FireWire)
    . 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Wi-Fi)
    . 2018.03.24 07:52:20 - IPv6 disabled on network adapter (iPhone USB)
    . 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Bluetooth PAN)
    . 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Thunderbolt Bridge)
    ! 2018.03.24 07:52:20 - Connecting to Alya (Canada, Toronto, Ontario)
    . 2018.03.24 07:52:20 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
    . 2018.03.24 07:52:20 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
    . 2018.03.24 07:52:20 - Connection to OpenVPN Management Interface
    . 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
    . 2018.03.24 07:52:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.24 07:52:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.24 07:52:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.170:443
    . 2018.03.24 07:52:20 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
    . 2018.03.24 07:52:20 - OpenVPN > UDP link local: (not bound)
    . 2018.03.24 07:52:20 - OpenVPN > UDP link remote: [AF_INET]184.75.221.170:443
    . 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
    . 2018.03.24 07:52:20 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.170:443, sid=daa7e334 fe2412a1
    . 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
    . 2018.03.24 07:52:20 - OpenVPN > VERIFY KU OK
    . 2018.03.24 07:52:20 - OpenVPN > Validating certificate extended key usage
    . 2018.03.24 07:52:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
    . 2018.03.24 07:52:20 - OpenVPN > VERIFY EKU OK
    . 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
    . 2018.03.24 07:52:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
    . 2018.03.24 07:52:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.170:443
    . 2018.03.24 07:52:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
    . 2018.03.24 07:52:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.43 255.255.0.0,peer-id 68,cipher AES-256-GCM'
    . 2018.03.24 07:52:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
    . 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
    . 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: compression parms modified
    . 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
    . 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: route-related options modified
    . 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    . 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: peer-id set
    . 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
    . 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
    . 2018.03.24 07:52:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
    . 2018.03.24 07:52:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
    . 2018.03.24 07:52:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
    . 2018.03.24 07:52:22 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
    . 2018.03.24 07:52:22 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
    . 2018.03.24 07:52:22 - Above log line repeated 1 times more
    . 2018.03.24 07:52:22 - OpenVPN > Opened utun device utun2
    . 2018.03.24 07:52:22 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
    . 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 delete
    . 2018.03.24 07:52:22 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
    . 2018.03.24 07:52:22 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
    . 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 10.4.9.43 10.4.9.43 netmask 255.255.0.0 mtu 1500 up
    . 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.9.43 255.255.0.0
    . 2018.03.24 07:52:22 - OpenVPN > add net 10.4.0.0: gateway 10.4.9.43
    . 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 184.75.221.170 192.168.50.1 255.255.255.255
    . 2018.03.24 07:52:22 - OpenVPN > add net 184.75.221.170: gateway 192.168.50.1
    . 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:52:22 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:52:22 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:52:22 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:22 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:22 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:22 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:23 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:23 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:23 - Routes, added a new route, 184.75.221.171 for gateway 10.4.0.1
    . 2018.03.24 07:52:23 - Flushing DNS
    I 2018.03.24 07:52:23 - Checking route IPv4
    . 2018.03.24 07:52:34 - Systems & servers data update completed
    . 2018.03.24 07:52:43 - curl: (28) Connection timed out after 20001 milliseconds
    . 2018.03.24 07:52:43 - Checking route (2° try)
    . 2018.03.24 07:53:04 - curl: (28) Connection timed out after 20006 milliseconds
    . 2018.03.24 07:53:04 - Checking route (3° try)
    . 2018.03.24 07:53:26 - curl: (28) Connection timed out after 20004 milliseconds
    E 2018.03.24 07:53:26 - Checking route IPv4 failed.
    . 2018.03.24 07:53:26 - OpenVPN > Initialization Sequence Completed
    ! 2018.03.24 07:53:26 - Disconnecting
    . 2018.03.24 07:53:26 - Routes, removed a route previously added, 184.75.221.171 for gateway 10.4.0.1
    . 2018.03.24 07:53:26 - Sending management termination signal
    . 2018.03.24 07:53:26 - Management - Send 'signal SIGTERM'
    . 2018.03.24 07:53:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
    . 2018.03.24 07:53:26 - OpenVPN > SIGTERM received, sending exit notification to peer
    . 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 184.75.221.170 192.168.50.1 255.255.255.255
    . 2018.03.24 07:53:31 - OpenVPN > delete net 184.75.221.170: gateway 192.168.50.1
    . 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:53:31 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:53:31 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:53:31 - OpenVPN > Closing TUN/TAP interface
    . 2018.03.24 07:53:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
    . 2018.03.24 07:53:31 - Connection terminated.
    . 2018.03.24 07:53:31 - IPv6 restored on network adapter (Ethernet)
    . 2018.03.24 07:53:31 - IPv6 restored on network adapter (FireWire)
    . 2018.03.24 07:53:31 - IPv6 restored on network adapter (Wi-Fi)
    . 2018.03.24 07:53:31 - IPv6 restored on network adapter (iPhone USB)
    . 2018.03.24 07:53:31 - IPv6 restored on network adapter (Bluetooth PAN)
    . 2018.03.24 07:53:31 - IPv6 restored on network adapter (Thunderbolt Bridge)
    . 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
    . 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
    . 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
    . 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
    . 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
    . 2018.03.24 07:53:32 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
    I 2018.03.24 07:53:35 - Checking authorization ...
    . 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Ethernet)
    . 2018.03.24 07:53:35 - IPv6 disabled on network adapter (FireWire)
    . 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Wi-Fi)
    . 2018.03.24 07:53:36 - IPv6 disabled on network adapter (iPhone USB)
    . 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Bluetooth PAN)
    . 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Thunderbolt Bridge)
    ! 2018.03.24 07:53:36 - Connecting to Arkab (Canada, Toronto, Ontario)
    . 2018.03.24 07:53:36 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
    . 2018.03.24 07:53:36 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
    . 2018.03.24 07:53:36 - Connection to OpenVPN Management Interface
    . 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
    . 2018.03.24 07:53:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.24 07:53:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.24 07:53:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.210:443
    . 2018.03.24 07:53:36 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
    . 2018.03.24 07:53:36 - OpenVPN > UDP link local: (not bound)
    . 2018.03.24 07:53:36 - OpenVPN > UDP link remote: [AF_INET]184.75.221.210:443
    . 2018.03.24 07:53:36 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.210:443, sid=4e4a3c2f c85b27ca
    . 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
    . 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
    . 2018.03.24 07:53:36 - OpenVPN > VERIFY KU OK
    . 2018.03.24 07:53:36 - OpenVPN > Validating certificate extended key usage
    . 2018.03.24 07:53:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
    . 2018.03.24 07:53:36 - OpenVPN > VERIFY EKU OK
    . 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
    . 2018.03.24 07:53:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
    . 2018.03.24 07:53:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.210:443
    . 2018.03.24 07:53:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
    . 2018.03.24 07:53:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.211 255.255.0.0'
    . 2018.03.24 07:53:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
    . 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
    . 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: compression parms modified
    . 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
    . 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: route-related options modified
    . 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    . 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
    . 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
    . 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.24 07:53:38 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
    . 2018.03.24 07:53:38 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
    . 2018.03.24 07:53:38 - Above log line repeated 1 times more
    . 2018.03.24 07:53:38 - OpenVPN > Opened utun device utun2
    . 2018.03.24 07:53:38 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
    . 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 delete
    . 2018.03.24 07:53:38 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
    . 2018.03.24 07:53:38 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
    . 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 10.4.2.211 10.4.2.211 netmask 255.255.0.0 mtu 1500 up
    . 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.2.211 255.255.0.0
    . 2018.03.24 07:53:38 - OpenVPN > add net 10.4.0.0: gateway 10.4.2.211
    . 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 184.75.221.210 192.168.50.1 255.255.255.255
    . 2018.03.24 07:53:38 - OpenVPN > add net 184.75.221.210: gateway 192.168.50.1
    . 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:53:38 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:53:38 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:53:38 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
    . 2018.03.24 07:53:38 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
    . 2018.03.24 07:53:38 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
    . 2018.03.24 07:53:39 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
    . 2018.03.24 07:53:39 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
    . 2018.03.24 07:53:39 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
    . 2018.03.24 07:53:39 - Routes, added a new route, 184.75.221.211 for gateway 10.4.0.1
    . 2018.03.24 07:53:39 - Flushing DNS
    I 2018.03.24 07:53:39 - Checking route IPv4
    . 2018.03.24 07:53:59 - curl: (28) Connection timed out after 20003 milliseconds
    . 2018.03.24 07:53:59 - Checking route (2° try)

     
    I've tried hitting "Cancel" on the main Eddie window, refreshing the servers list on the Servers tab, and then reconnecting to a recommended server.  This usually doesn't work either and results in the same issue with checking the IPv4 route.  Here's a batch of log entries from one of those attempts (cancel, refresh servers list, reconnect to recommended server).
     

    . 2018.03.22 07:38:29 - Eddie version: 2.14.2 / macos_x64, System: MacOS, Name: 10.13.3, Version: Darwin ***** 17.4.0 Darwin Kernel Version 17.4.0: Sun Dec 17 09:19:54 PST 2017; root:xnu-4570.41.2~1/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319
    . 2018.03.22 07:38:29 - Reading options from /Users/*****/.airvpn/AirVPN.xml
    . 2018.03.22 07:38:30 - Command line arguments (0):
    . 2018.03.22 07:38:32 - OpenVPN Driver - Expected
    . 2018.03.22 07:38:32 - OpenVPN - Version: 2.4.4 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)
    . 2018.03.22 07:38:32 - SSH - Version: OpenSSH_7.6p1, LibreSSL 2.6.2 (/usr/bin/ssh)
    . 2018.03.22 07:38:32 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)
    . 2018.03.22 07:38:32 - curl - Version: 7.54.0 (/usr/bin/curl)
    . 2018.03.22 07:38:32 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem
    W 2018.03.22 07:38:33 - Recovery. Unexpected crash?
    . 2018.03.22 07:38:33 - Routes, removed a route previously added, 199.19.94.16 for gateway 10.4.0.1
    ! 2018.03.22 07:38:33 - Activation of Network Lock - macOS - PF
    . 2018.03.22 07:38:33 - macOS - PF rules updated, reloading
    . 2018.03.22 07:38:33 - Updating systems & servers data ...
    . 2018.03.22 07:38:33 - macOS - PF rules updated, reloading
    I 2018.03.22 07:38:33 - Session starting.
    . 2018.03.22 07:38:34 - Systems & servers data update completed
    I 2018.03.22 07:38:39 - Checking authorization ...
    . 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Ethernet)
    . 2018.03.22 07:38:40 - IPv6 disabled on network adapter (FireWire)
    . 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Wi-Fi)
    . 2018.03.22 07:38:40 - IPv6 disabled on network adapter (iPhone USB)
    . 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Bluetooth PAN)
    . 2018.03.22 07:38:40 - IPv6 disabled on network adapter (Thunderbolt Bridge)
    ! 2018.03.22 07:38:40 - Connecting to Tejat (Canada, Toronto, Ontario)
    . 2018.03.22 07:38:40 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
    . 2018.03.22 07:38:40 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
    . 2018.03.22 07:38:40 - Connection to OpenVPN Management Interface
    . 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
    . 2018.03.22 07:38:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.22 07:38:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.22 07:38:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.194:443
    . 2018.03.22 07:38:41 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
    . 2018.03.22 07:38:41 - OpenVPN > UDP link local: (not bound)
    . 2018.03.22 07:38:41 - OpenVPN > UDP link remote: [AF_INET]184.75.221.194:443
    . 2018.03.22 07:38:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.194:443, sid=be5f109c 4009b726
    . 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
    . 2018.03.22 07:38:41 - OpenVPN > VERIFY KU OK
    . 2018.03.22 07:38:41 - OpenVPN > Validating certificate extended key usage
    . 2018.03.22 07:38:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
    . 2018.03.22 07:38:41 - OpenVPN > VERIFY EKU OK
    . 2018.03.22 07:38:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
    . 2018.03.22 07:38:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
    . 2018.03.22 07:38:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
    . 2018.03.22 07:38:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.194:443
    . 2018.03.22 07:38:42 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
    . 2018.03.22 07:38:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.108 255.255.0.0,peer-id 38,cipher AES-256-GCM'
    . 2018.03.22 07:38:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
    . 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
    . 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: compression parms modified
    . 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
    . 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: route-related options modified
    . 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    . 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: peer-id set
    . 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
    . 2018.03.22 07:38:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
    . 2018.03.22 07:38:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
    . 2018.03.22 07:38:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
    . 2018.03.22 07:38:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
    . 2018.03.22 07:38:42 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
    . 2018.03.22 07:38:42 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
    . 2018.03.22 07:38:42 - Above log line repeated 1 times more
    . 2018.03.22 07:38:42 - OpenVPN > Opened utun device utun2
    . 2018.03.22 07:38:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
    . 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 delete
    . 2018.03.22 07:38:42 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
    . 2018.03.22 07:38:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
    . 2018.03.22 07:38:42 - OpenVPN > /sbin/ifconfig utun2 10.4.1.108 10.4.1.108 netmask 255.255.0.0 mtu 1500 up
    . 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.108 255.255.0.0
    . 2018.03.22 07:38:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.108
    . 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 184.75.221.194 192.168.50.1 255.255.255.255
    . 2018.03.22 07:38:42 - OpenVPN > add net 184.75.221.194: gateway 192.168.50.1
    . 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.22 07:38:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.22 07:38:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.22 07:38:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.22 07:38:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
    . 2018.03.22 07:38:42 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
    . 2018.03.22 07:38:42 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
    . 2018.03.22 07:38:42 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
    . 2018.03.22 07:38:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
    . 2018.03.22 07:38:43 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
    . 2018.03.22 07:38:43 - Routes, added a new route, 184.75.221.195 for gateway 10.4.0.1
    . 2018.03.22 07:38:43 - Flushing DNS
    . 2018.03.22 07:38:43 - macOS - PF rules updated, reloading
    I 2018.03.22 07:38:43 - Checking route IPv4
    I 2018.03.22 07:38:44 - Checking DNS
    ! 2018.03.22 07:38:44 - Connected.
    . 2018.03.22 07:38:44 - OpenVPN > Initialization Sequence Completed
    . 2018.03.22 07:48:40 - Updating systems & servers data ...
    . 2018.03.22 07:48:42 - Systems & servers data update completed
    . 2018.03.22 08:01:23 - Updating systems & servers data ...
    . 2018.03.22 08:01:27 - Systems & servers data update completed
    . 2018.03.22 10:01:36 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
    . 2018.03.22 10:01:36 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
    . 2018.03.22 10:01:36 - OpenVPN > Restart pause, 5 second(s)
    . 2018.03.22 10:01:36 - macOS - PF rules updated, reloading
    ! 2018.03.22 10:01:37 - Disconnecting
    . 2018.03.22 10:01:37 - Routes, removed a route previously added, 184.75.221.195 for gateway 10.4.0.1
    . 2018.03.22 10:01:37 - Sending management termination signal
    . 2018.03.22 10:01:37 - Management - Send 'signal SIGTERM'
    . 2018.03.22 10:01:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
    . 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 184.75.221.194 192.168.50.1 255.255.255.255
    . 2018.03.22 10:01:37 - OpenVPN > delete net 184.75.221.194: gateway 192.168.50.1
    . 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.22 10:01:37 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.22 10:01:37 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.22 10:01:37 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.22 10:01:37 - OpenVPN > Closing TUN/TAP interface
    . 2018.03.22 10:01:37 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
    . 2018.03.22 10:01:37 - Connection terminated.
    . 2018.03.22 10:01:37 - IPv6 restored on network adapter (Ethernet)
    . 2018.03.22 10:01:37 - IPv6 restored on network adapter (FireWire)
    . 2018.03.22 10:01:37 - IPv6 restored on network adapter (Wi-Fi)
    . 2018.03.22 10:01:37 - IPv6 restored on network adapter (iPhone USB)
    . 2018.03.22 10:01:37 - IPv6 restored on network adapter (Bluetooth PAN)
    . 2018.03.22 10:01:37 - IPv6 restored on network adapter (Thunderbolt Bridge)
    . 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
    . 2018.03.22 10:01:37 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
    . 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
    . 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
    . 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
    . 2018.03.22 10:01:38 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
    I 2018.03.22 10:01:45 - Checking authorization ...
    . 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Ethernet)
    . 2018.03.22 10:01:46 - IPv6 disabled on network adapter (FireWire)
    . 2018.03.22 10:01:46 - IPv6 disabled on network adapter (Wi-Fi)
    . 2018.03.22 10:01:46 - IPv6 disabled on network adapter (iPhone USB)
    . 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)
    . 2018.03.22 10:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)
    ! 2018.03.22 10:01:47 - Connecting to Lesath (Canada, Toronto, Ontario)
    . 2018.03.22 10:01:47 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
    . 2018.03.22 10:01:47 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
    . 2018.03.22 10:01:47 - Connection to OpenVPN Management Interface
    . 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
    . 2018.03.22 10:01:47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.22 10:01:47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.22 10:01:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.2:443
    . 2018.03.22 10:01:47 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
    . 2018.03.22 10:01:47 - OpenVPN > UDP link local: (not bound)
    . 2018.03.22 10:01:47 - OpenVPN > UDP link remote: [AF_INET]184.75.221.2:443
    . 2018.03.22 10:01:47 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.2:443, sid=9e95a07f 20cf58b5
    . 2018.03.22 10:01:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
    . 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
    . 2018.03.22 10:01:47 - OpenVPN > VERIFY KU OK
    . 2018.03.22 10:01:47 - OpenVPN > Validating certificate extended key usage
    . 2018.03.22 10:01:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
    . 2018.03.22 10:01:47 - OpenVPN > VERIFY EKU OK
    . 2018.03.22 10:01:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
    . 2018.03.22 10:01:47 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
    . 2018.03.22 10:01:47 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.2:443
    . 2018.03.22 10:01:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
    . 2018.03.22 10:01:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.23.14 255.255.0.0'
    . 2018.03.22 10:01:48 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
    . 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
    . 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: compression parms modified
    . 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
    . 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: route-related options modified
    . 2018.03.22 10:01:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    . 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
    . 2018.03.22 10:01:48 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
    . 2018.03.22 10:01:48 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.22 10:01:48 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
    . 2018.03.22 10:01:48 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
    . 2018.03.22 10:01:48 - Above log line repeated 1 times more
    . 2018.03.22 10:01:48 - OpenVPN > Opened utun device utun2
    . 2018.03.22 10:01:48 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
    . 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 delete
    . 2018.03.22 10:01:48 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
    . 2018.03.22 10:01:48 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
    . 2018.03.22 10:01:48 - OpenVPN > /sbin/ifconfig utun2 10.4.23.14 10.4.23.14 netmask 255.255.0.0 mtu 1500 up
    . 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.23.14 255.255.0.0
    . 2018.03.22 10:01:48 - OpenVPN > add net 10.4.0.0: gateway 10.4.23.14
    . 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 184.75.221.2 192.168.50.1 255.255.255.255
    . 2018.03.22 10:01:48 - OpenVPN > add net 184.75.221.2: gateway 192.168.50.1
    . 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.22 10:01:48 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.22 10:01:48 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.22 10:01:48 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.22 10:01:49 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
    . 2018.03.22 10:01:49 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
    . 2018.03.22 10:01:49 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
    . 2018.03.22 10:01:49 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
    . 2018.03.22 10:01:49 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
    . 2018.03.22 10:01:49 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
    . 2018.03.22 10:01:49 - Routes, added a new route, 184.75.221.3 for gateway 10.4.0.1
    . 2018.03.22 10:01:49 - Flushing DNS
    . 2018.03.22 10:01:50 - macOS - PF rules updated, reloading
    I 2018.03.22 10:01:50 - Checking route IPv4
    I 2018.03.22 10:01:50 - Checking DNS
    ! 2018.03.22 10:01:50 - Connected.
    . 2018.03.22 10:01:51 - OpenVPN > Initialization Sequence Completed
    . 2018.03.22 12:01:40 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
    . 2018.03.22 12:01:40 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
    . 2018.03.22 12:01:40 - OpenVPN > Restart pause, 5 second(s)
    . 2018.03.22 12:01:40 - macOS - PF rules updated, reloading
    ! 2018.03.22 12:01:40 - Disconnecting
    . 2018.03.22 12:01:40 - Routes, removed a route previously added, 184.75.221.3 for gateway 10.4.0.1
    . 2018.03.22 12:01:40 - Sending management termination signal
    . 2018.03.22 12:01:40 - Management - Send 'signal SIGTERM'
    . 2018.03.22 12:01:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
    . 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 184.75.221.2 192.168.50.1 255.255.255.255
    . 2018.03.22 12:01:40 - OpenVPN > delete net 184.75.221.2: gateway 192.168.50.1
    . 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.22 12:01:40 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.22 12:01:40 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.22 12:01:40 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.22 12:01:40 - OpenVPN > Closing TUN/TAP interface
    . 2018.03.22 12:01:40 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
    . 2018.03.22 12:01:40 - Connection terminated.
    . 2018.03.22 12:01:40 - IPv6 restored on network adapter (Ethernet)
    . 2018.03.22 12:01:40 - IPv6 restored on network adapter (FireWire)
    . 2018.03.22 12:01:40 - IPv6 restored on network adapter (Wi-Fi)
    . 2018.03.22 12:01:40 - IPv6 restored on network adapter (iPhone USB)
    . 2018.03.22 12:01:41 - Updating systems & servers data ...
    . 2018.03.22 12:01:41 - IPv6 restored on network adapter (Bluetooth PAN)
    . 2018.03.22 12:01:41 - IPv6 restored on network adapter (Thunderbolt Bridge)
    . 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
    . 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
    . 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
    . 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
    . 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
    . 2018.03.22 12:01:41 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
    . 2018.03.22 12:01:41 - Systems & servers data update completed
    I 2018.03.22 12:01:46 - Checking authorization ...
    . 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Ethernet)
    . 2018.03.22 12:01:47 - IPv6 disabled on network adapter (FireWire)
    . 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Wi-Fi)
    . 2018.03.22 12:01:47 - IPv6 disabled on network adapter (iPhone USB)
    . 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Bluetooth PAN)
    . 2018.03.22 12:01:47 - IPv6 disabled on network adapter (Thunderbolt Bridge)
    ! 2018.03.22 12:01:47 - Connecting to Angetenar (Canada, Toronto, Ontario)
    . 2018.03.22 12:01:48 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
    . 2018.03.22 12:01:48 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
    . 2018.03.22 12:01:48 - Connection to OpenVPN Management Interface
    . 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
    . 2018.03.22 12:01:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.22 12:01:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.22 12:01:48 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.162:443
    . 2018.03.22 12:01:48 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
    . 2018.03.22 12:01:48 - OpenVPN > UDP link local: (not bound)
    . 2018.03.22 12:01:48 - OpenVPN > UDP link remote: [AF_INET]184.75.221.162:443
    . 2018.03.22 12:01:48 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.162:443, sid=a3cfefdd 41e9127e
    . 2018.03.22 12:01:48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
    . 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
    . 2018.03.22 12:01:48 - OpenVPN > VERIFY KU OK
    . 2018.03.22 12:01:48 - OpenVPN > Validating certificate extended key usage
    . 2018.03.22 12:01:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
    . 2018.03.22 12:01:48 - OpenVPN > VERIFY EKU OK
    . 2018.03.22 12:01:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
    . 2018.03.22 12:01:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
    . 2018.03.22 12:01:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.162:443
    . 2018.03.22 12:01:49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
    . 2018.03.22 12:01:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.220 255.255.0.0'
    . 2018.03.22 12:01:51 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
    . 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
    . 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: compression parms modified
    . 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
    . 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: route-related options modified
    . 2018.03.22 12:01:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    . 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
    . 2018.03.22 12:01:51 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
    . 2018.03.22 12:01:51 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.22 12:01:51 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
    . 2018.03.22 12:01:51 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
    . 2018.03.22 12:01:51 - Above log line repeated 1 times more
    . 2018.03.22 12:01:51 - OpenVPN > Opened utun device utun2
    . 2018.03.22 12:01:51 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
    . 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 delete
    . 2018.03.22 12:01:51 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
    . 2018.03.22 12:01:51 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
    . 2018.03.22 12:01:51 - OpenVPN > /sbin/ifconfig utun2 10.4.0.220 10.4.0.220 netmask 255.255.0.0 mtu 1500 up
    . 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.220 255.255.0.0
    . 2018.03.22 12:01:51 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.220
    . 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 184.75.221.162 192.168.50.1 255.255.255.255
    . 2018.03.22 12:01:51 - OpenVPN > add net 184.75.221.162: gateway 192.168.50.1
    . 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.22 12:01:51 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.22 12:01:51 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.22 12:01:51 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.22 12:01:51 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
    . 2018.03.22 12:01:52 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
    . 2018.03.22 12:01:52 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
    . 2018.03.22 12:01:52 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
    . 2018.03.22 12:01:52 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
    . 2018.03.22 12:01:52 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
    . 2018.03.22 12:01:52 - Routes, added a new route, 184.75.221.163 for gateway 10.4.0.1
    . 2018.03.22 12:01:52 - Flushing DNS
    . 2018.03.22 12:01:52 - macOS - PF rules updated, reloading
    I 2018.03.22 12:01:53 - Checking route IPv4
    I 2018.03.22 12:01:53 - Checking DNS
    ! 2018.03.22 12:01:53 - Connected.
    . 2018.03.22 12:01:53 - OpenVPN > Initialization Sequence Completed
    . 2018.03.24 07:51:52 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
    . 2018.03.24 07:51:52 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
    . 2018.03.24 07:51:52 - OpenVPN > Restart pause, 5 second(s)
    . 2018.03.24 07:51:56 - macOS - PF rules updated, reloading
    ! 2018.03.24 07:51:56 - Disconnecting
    . 2018.03.24 07:51:56 - Routes, removed a route previously added, 184.75.221.163 for gateway 10.4.0.1
    . 2018.03.24 07:51:56 - Sending management termination signal
    . 2018.03.24 07:51:56 - Management - Send 'signal SIGTERM'
    . 2018.03.24 07:51:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
    . 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 184.75.221.162 192.168.50.1 255.255.255.255
    . 2018.03.24 07:51:56 - OpenVPN > delete net 184.75.221.162: gateway 192.168.50.1
    . 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:51:56 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:51:56 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:51:56 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:51:56 - OpenVPN > Closing TUN/TAP interface
    . 2018.03.24 07:51:56 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting
    . 2018.03.24 07:51:56 - Connection terminated.
    . 2018.03.24 07:51:56 - IPv6 restored on network adapter (Ethernet)
    . 2018.03.24 07:51:57 - IPv6 restored on network adapter (FireWire)
    . 2018.03.24 07:51:57 - IPv6 restored on network adapter (Wi-Fi)
    . 2018.03.24 07:51:57 - IPv6 restored on network adapter (iPhone USB)
    . 2018.03.24 07:51:57 - IPv6 restored on network adapter (Bluetooth PAN)
    . 2018.03.24 07:51:57 - IPv6 restored on network adapter (Thunderbolt Bridge)
    . 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
    . 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
    . 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
    . 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
    . 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
    . 2018.03.24 07:51:57 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
    I 2018.03.24 07:52:00 - Checking authorization ...
    W 2018.03.24 07:52:01 - Authorization check failed, continue anyway (curl: (7) Couldn't connect to server)
    . 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Ethernet)
    . 2018.03.24 07:52:01 - IPv6 disabled on network adapter (FireWire)
    . 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Wi-Fi)
    . 2018.03.24 07:52:01 - IPv6 disabled on network adapter (iPhone USB)
    . 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Bluetooth PAN)
    . 2018.03.24 07:52:01 - IPv6 disabled on network adapter (Thunderbolt Bridge)
    ! 2018.03.24 07:52:01 - Connecting to Sargas (Canada, Toronto, Ontario)
    . 2018.03.24 07:52:02 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
    . 2018.03.24 07:52:02 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
    . 2018.03.24 07:52:02 - Connection to OpenVPN Management Interface
    . 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
    . 2018.03.24 07:52:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.24 07:52:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.24 07:52:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.194:443
    . 2018.03.24 07:52:02 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
    . 2018.03.24 07:52:02 - OpenVPN > UDP link local: (not bound)
    . 2018.03.24 07:52:02 - OpenVPN > UDP link remote: [AF_INET]184.75.223.194:443
    . 2018.03.24 07:52:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
    . 2018.03.24 07:52:02 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.194:443, sid=43b6f14a 13cd2419
    . 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
    . 2018.03.24 07:52:02 - OpenVPN > VERIFY KU OK
    . 2018.03.24 07:52:02 - OpenVPN > Validating certificate extended key usage
    . 2018.03.24 07:52:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
    . 2018.03.24 07:52:02 - OpenVPN > VERIFY EKU OK
    . 2018.03.24 07:52:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
    . 2018.03.24 07:52:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
    . 2018.03.24 07:52:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.194:443
    . 2018.03.24 07:52:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
    . 2018.03.24 07:52:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.64 255.255.0.0,peer-id 67,cipher AES-256-GCM'
    . 2018.03.24 07:52:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
    . 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
    . 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: compression parms modified
    . 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
    . 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: route-related options modified
    . 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    . 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: peer-id set
    . 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
    . 2018.03.24 07:52:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
    . 2018.03.24 07:52:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
    . 2018.03.24 07:52:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
    . 2018.03.24 07:52:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
    . 2018.03.24 07:52:03 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
    . 2018.03.24 07:52:03 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
    . 2018.03.24 07:52:03 - Above log line repeated 1 times more
    . 2018.03.24 07:52:03 - OpenVPN > Opened utun device utun2
    . 2018.03.24 07:52:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
    . 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 delete
    . 2018.03.24 07:52:03 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
    . 2018.03.24 07:52:03 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
    . 2018.03.24 07:52:03 - OpenVPN > /sbin/ifconfig utun2 10.4.1.64 10.4.1.64 netmask 255.255.0.0 mtu 1500 up
    . 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.64 255.255.0.0
    . 2018.03.24 07:52:03 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.64
    . 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 184.75.223.194 192.168.50.1 255.255.255.255
    . 2018.03.24 07:52:03 - OpenVPN > add net 184.75.223.194: gateway 192.168.50.1
    . 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:52:03 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:52:03 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:52:03 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:52:04 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:04 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:04 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:04 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:04 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:04 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:04 - Routes, added a new route, 184.75.223.195 for gateway 10.4.0.1
    . 2018.03.24 07:52:04 - Flushing DNS
    . 2018.03.24 07:52:05 - macOS - PF rules updated, reloading
    I 2018.03.24 07:52:05 - Checking route IPv4
    I 2018.03.24 07:52:05 - Checking DNS
    . 2018.03.24 07:52:06 - Checking DNS failed:
    . 2018.03.24 07:52:06 - Checking DNS (2° try)
    . 2018.03.24 07:52:07 - Checking DNS failed:
    . 2018.03.24 07:52:07 - Checking DNS (3° try)
    . 2018.03.24 07:52:10 - Checking DNS failed:
    E 2018.03.24 07:52:10 - Checking DNS failed.
    . 2018.03.24 07:52:10 - OpenVPN > Initialization Sequence Completed
    ! 2018.03.24 07:52:10 - Disconnecting
    . 2018.03.24 07:52:10 - Routes, removed a route previously added, 184.75.223.195 for gateway 10.4.0.1
    . 2018.03.24 07:52:10 - Sending management termination signal
    . 2018.03.24 07:52:10 - Management - Send 'signal SIGTERM'
    . 2018.03.24 07:52:10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
    . 2018.03.24 07:52:10 - OpenVPN > SIGTERM received, sending exit notification to peer
    . 2018.03.24 07:52:13 - Updating systems & servers data ...
    . 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 184.75.223.194 192.168.50.1 255.255.255.255
    . 2018.03.24 07:52:15 - OpenVPN > delete net 184.75.223.194: gateway 192.168.50.1
    . 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:52:15 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:52:15 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:52:15 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:52:15 - OpenVPN > Closing TUN/TAP interface
    . 2018.03.24 07:52:15 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
    . 2018.03.24 07:52:15 - Connection terminated.
    . 2018.03.24 07:52:15 - IPv6 restored on network adapter (Ethernet)
    . 2018.03.24 07:52:15 - IPv6 restored on network adapter (FireWire)
    . 2018.03.24 07:52:15 - IPv6 restored on network adapter (Wi-Fi)
    . 2018.03.24 07:52:15 - IPv6 restored on network adapter (iPhone USB)
    . 2018.03.24 07:52:15 - IPv6 restored on network adapter (Bluetooth PAN)
    . 2018.03.24 07:52:15 - IPv6 restored on network adapter (Thunderbolt Bridge)
    . 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
    . 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
    . 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
    . 2018.03.24 07:52:15 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
    . 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
    . 2018.03.24 07:52:16 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
    I 2018.03.24 07:52:19 - Checking authorization ...
    . 2018.03.24 07:52:19 - IPv6 disabled on network adapter (Ethernet)
    . 2018.03.24 07:52:20 - IPv6 disabled on network adapter (FireWire)
    . 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Wi-Fi)
    . 2018.03.24 07:52:20 - IPv6 disabled on network adapter (iPhone USB)
    . 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Bluetooth PAN)
    . 2018.03.24 07:52:20 - IPv6 disabled on network adapter (Thunderbolt Bridge)
    ! 2018.03.24 07:52:20 - Connecting to Alya (Canada, Toronto, Ontario)
    . 2018.03.24 07:52:20 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
    . 2018.03.24 07:52:20 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
    . 2018.03.24 07:52:20 - Connection to OpenVPN Management Interface
    . 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
    . 2018.03.24 07:52:20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.24 07:52:20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.24 07:52:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.170:443
    . 2018.03.24 07:52:20 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
    . 2018.03.24 07:52:20 - OpenVPN > UDP link local: (not bound)
    . 2018.03.24 07:52:20 - OpenVPN > UDP link remote: [AF_INET]184.75.221.170:443
    . 2018.03.24 07:52:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
    . 2018.03.24 07:52:20 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.170:443, sid=daa7e334 fe2412a1
    . 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
    . 2018.03.24 07:52:20 - OpenVPN > VERIFY KU OK
    . 2018.03.24 07:52:20 - OpenVPN > Validating certificate extended key usage
    . 2018.03.24 07:52:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
    . 2018.03.24 07:52:20 - OpenVPN > VERIFY EKU OK
    . 2018.03.24 07:52:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
    . 2018.03.24 07:52:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
    . 2018.03.24 07:52:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.170:443
    . 2018.03.24 07:52:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
    . 2018.03.24 07:52:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.43 255.255.0.0,peer-id 68,cipher AES-256-GCM'
    . 2018.03.24 07:52:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
    . 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
    . 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: compression parms modified
    . 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
    . 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: route-related options modified
    . 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    . 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: peer-id set
    . 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
    . 2018.03.24 07:52:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
    . 2018.03.24 07:52:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
    . 2018.03.24 07:52:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
    . 2018.03.24 07:52:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
    . 2018.03.24 07:52:22 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
    . 2018.03.24 07:52:22 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
    . 2018.03.24 07:52:22 - Above log line repeated 1 times more
    . 2018.03.24 07:52:22 - OpenVPN > Opened utun device utun2
    . 2018.03.24 07:52:22 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
    . 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 delete
    . 2018.03.24 07:52:22 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
    . 2018.03.24 07:52:22 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
    . 2018.03.24 07:52:22 - OpenVPN > /sbin/ifconfig utun2 10.4.9.43 10.4.9.43 netmask 255.255.0.0 mtu 1500 up
    . 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.9.43 255.255.0.0
    . 2018.03.24 07:52:22 - OpenVPN > add net 10.4.0.0: gateway 10.4.9.43
    . 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 184.75.221.170 192.168.50.1 255.255.255.255
    . 2018.03.24 07:52:22 - OpenVPN > add net 184.75.221.170: gateway 192.168.50.1
    . 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:52:22 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:52:22 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:52:22 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:52:22 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:22 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:22 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:22 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:23 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:23 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
    . 2018.03.24 07:52:23 - Routes, added a new route, 184.75.221.171 for gateway 10.4.0.1
    . 2018.03.24 07:52:23 - Flushing DNS
    I 2018.03.24 07:52:23 - Checking route IPv4
    . 2018.03.24 07:52:34 - Systems & servers data update completed
    . 2018.03.24 07:52:43 - curl: (28) Connection timed out after 20001 milliseconds
    . 2018.03.24 07:52:43 - Checking route (2° try)
    . 2018.03.24 07:53:04 - curl: (28) Connection timed out after 20006 milliseconds
    . 2018.03.24 07:53:04 - Checking route (3° try)
    . 2018.03.24 07:53:26 - curl: (28) Connection timed out after 20004 milliseconds
    E 2018.03.24 07:53:26 - Checking route IPv4 failed.
    . 2018.03.24 07:53:26 - OpenVPN > Initialization Sequence Completed
    ! 2018.03.24 07:53:26 - Disconnecting
    . 2018.03.24 07:53:26 - Routes, removed a route previously added, 184.75.221.171 for gateway 10.4.0.1
    . 2018.03.24 07:53:26 - Sending management termination signal
    . 2018.03.24 07:53:26 - Management - Send 'signal SIGTERM'
    . 2018.03.24 07:53:26 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
    . 2018.03.24 07:53:26 - OpenVPN > SIGTERM received, sending exit notification to peer
    . 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 184.75.221.170 192.168.50.1 255.255.255.255
    . 2018.03.24 07:53:31 - OpenVPN > delete net 184.75.221.170: gateway 192.168.50.1
    . 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:53:31 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:53:31 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:53:31 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:53:31 - OpenVPN > Closing TUN/TAP interface
    . 2018.03.24 07:53:31 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
    . 2018.03.24 07:53:31 - Connection terminated.
    . 2018.03.24 07:53:31 - IPv6 restored on network adapter (Ethernet)
    . 2018.03.24 07:53:31 - IPv6 restored on network adapter (FireWire)
    . 2018.03.24 07:53:31 - IPv6 restored on network adapter (Wi-Fi)
    . 2018.03.24 07:53:31 - IPv6 restored on network adapter (iPhone USB)
    . 2018.03.24 07:53:31 - IPv6 restored on network adapter (Bluetooth PAN)
    . 2018.03.24 07:53:31 - IPv6 restored on network adapter (Thunderbolt Bridge)
    . 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
    . 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
    . 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
    . 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
    . 2018.03.24 07:53:31 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
    . 2018.03.24 07:53:32 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
    I 2018.03.24 07:53:35 - Checking authorization ...
    . 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Ethernet)
    . 2018.03.24 07:53:35 - IPv6 disabled on network adapter (FireWire)
    . 2018.03.24 07:53:35 - IPv6 disabled on network adapter (Wi-Fi)
    . 2018.03.24 07:53:36 - IPv6 disabled on network adapter (iPhone USB)
    . 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Bluetooth PAN)
    . 2018.03.24 07:53:36 - IPv6 disabled on network adapter (Thunderbolt Bridge)
    ! 2018.03.24 07:53:36 - Connecting to Arkab (Canada, Toronto, Ontario)
    . 2018.03.24 07:53:36 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
    . 2018.03.24 07:53:36 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
    . 2018.03.24 07:53:36 - Connection to OpenVPN Management Interface
    . 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
    . 2018.03.24 07:53:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.24 07:53:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.24 07:53:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.210:443
    . 2018.03.24 07:53:36 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
    . 2018.03.24 07:53:36 - OpenVPN > UDP link local: (not bound)
    . 2018.03.24 07:53:36 - OpenVPN > UDP link remote: [AF_INET]184.75.221.210:443
    . 2018.03.24 07:53:36 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.210:443, sid=4e4a3c2f c85b27ca
    . 2018.03.24 07:53:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
    . 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
    . 2018.03.24 07:53:36 - OpenVPN > VERIFY KU OK
    . 2018.03.24 07:53:36 - OpenVPN > Validating certificate extended key usage
    . 2018.03.24 07:53:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
    . 2018.03.24 07:53:36 - OpenVPN > VERIFY EKU OK
    . 2018.03.24 07:53:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
    . 2018.03.24 07:53:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
    . 2018.03.24 07:53:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.210:443
    . 2018.03.24 07:53:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
    . 2018.03.24 07:53:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.211 255.255.0.0'
    . 2018.03.24 07:53:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
    . 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
    . 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: compression parms modified
    . 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
    . 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: route-related options modified
    . 2018.03.24 07:53:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    . 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
    . 2018.03.24 07:53:38 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
    . 2018.03.24 07:53:38 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.24 07:53:38 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
    . 2018.03.24 07:53:38 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
    . 2018.03.24 07:53:38 - Above log line repeated 1 times more
    . 2018.03.24 07:53:38 - OpenVPN > Opened utun device utun2
    . 2018.03.24 07:53:38 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
    . 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 delete
    . 2018.03.24 07:53:38 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
    . 2018.03.24 07:53:38 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
    . 2018.03.24 07:53:38 - OpenVPN > /sbin/ifconfig utun2 10.4.2.211 10.4.2.211 netmask 255.255.0.0 mtu 1500 up
    . 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.2.211 255.255.0.0
    . 2018.03.24 07:53:38 - OpenVPN > add net 10.4.0.0: gateway 10.4.2.211
    . 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 184.75.221.210 192.168.50.1 255.255.255.255
    . 2018.03.24 07:53:38 - OpenVPN > add net 184.75.221.210: gateway 192.168.50.1
    . 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:53:38 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:53:38 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:53:38 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:53:38 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
    . 2018.03.24 07:53:38 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
    . 2018.03.24 07:53:38 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
    . 2018.03.24 07:53:39 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
    . 2018.03.24 07:53:39 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
    . 2018.03.24 07:53:39 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
    . 2018.03.24 07:53:39 - Routes, added a new route, 184.75.221.211 for gateway 10.4.0.1
    . 2018.03.24 07:53:39 - Flushing DNS
    I 2018.03.24 07:53:39 - Checking route IPv4
    . 2018.03.24 07:53:59 - curl: (28) Connection timed out after 20003 milliseconds
    . 2018.03.24 07:53:59 - Checking route (2° try)
    . 2018.03.24 07:54:20 - curl: (28) Connection timed out after 20003 milliseconds
    . 2018.03.24 07:54:20 - OpenVPN > Initialization Sequence Completed
    ! 2018.03.24 07:54:20 - Disconnecting
    . 2018.03.24 07:54:20 - Routes, removed a route previously added, 184.75.221.211 for gateway 10.4.0.1
    . 2018.03.24 07:54:20 - Sending management termination signal
    . 2018.03.24 07:54:20 - Management - Send 'signal SIGTERM'
    . 2018.03.24 07:54:21 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
    . 2018.03.24 07:54:21 - OpenVPN > SIGTERM received, sending exit notification to peer
    . 2018.03.24 07:54:25 - OpenVPN > /sbin/route delete -net 184.75.221.210 192.168.50.1 255.255.255.255
    . 2018.03.24 07:54:25 - OpenVPN > delete net 184.75.221.210: gateway 192.168.50.1
    . 2018.03.24 07:54:25 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:54:25 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:54:25 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:54:25 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:54:25 - OpenVPN > Closing TUN/TAP interface
    . 2018.03.24 07:54:25 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
    . 2018.03.24 07:54:25 - Connection terminated.
    . 2018.03.24 07:54:25 - IPv6 restored on network adapter (Ethernet)
    . 2018.03.24 07:54:25 - IPv6 restored on network adapter (FireWire)
    . 2018.03.24 07:54:25 - IPv6 restored on network adapter (Wi-Fi)
    . 2018.03.24 07:54:25 - IPv6 restored on network adapter (iPhone USB)
    . 2018.03.24 07:54:25 - IPv6 restored on network adapter (Bluetooth PAN)
    . 2018.03.24 07:54:25 - IPv6 restored on network adapter (Thunderbolt Bridge)
    . 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
    . 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
    . 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
    . 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
    . 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
    . 2018.03.24 07:54:26 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
    . 2018.03.24 07:54:26 - Flushing DNS
    I 2018.03.24 07:54:26 - Session terminated.
    . 2018.03.24 07:54:30 - Updating systems & servers data ...
    E 2018.03.24 07:54:31 - Object reference not set to an instance of an object
    . 2018.03.24 07:54:31 - Systems & servers data update completed
    I 2018.03.24 07:54:39 - Session starting.
    I 2018.03.24 07:54:39 - Checking authorization ...
    . 2018.03.24 07:54:40 - IPv6 disabled on network adapter (Ethernet)
    . 2018.03.24 07:54:40 - IPv6 disabled on network adapter (FireWire)
    . 2018.03.24 07:54:40 - IPv6 disabled on network adapter (Wi-Fi)
    . 2018.03.24 07:54:40 - IPv6 disabled on network adapter (iPhone USB)
    . 2018.03.24 07:54:41 - IPv6 disabled on network adapter (Bluetooth PAN)
    . 2018.03.24 07:54:41 - IPv6 disabled on network adapter (Thunderbolt Bridge)
    ! 2018.03.24 07:54:41 - Connecting to Alkurhah (Canada, Toronto, Ontario)
    . 2018.03.24 07:54:41 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
    . 2018.03.24 07:54:41 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
    . 2018.03.24 07:54:41 - Connection to OpenVPN Management Interface
    . 2018.03.24 07:54:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
    . 2018.03.24 07:54:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.24 07:54:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.24 07:54:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.202:443
    . 2018.03.24 07:54:41 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
    . 2018.03.24 07:54:41 - OpenVPN > UDP link local: (not bound)
    . 2018.03.24 07:54:41 - OpenVPN > UDP link remote: [AF_INET]184.75.221.202:443
    . 2018.03.24 07:54:41 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.202:443, sid=130e2fa4 7830b1a5
    . 2018.03.24 07:54:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
    . 2018.03.24 07:54:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
    . 2018.03.24 07:54:41 - OpenVPN > VERIFY KU OK
    . 2018.03.24 07:54:41 - OpenVPN > Validating certificate extended key usage
    . 2018.03.24 07:54:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
    . 2018.03.24 07:54:41 - OpenVPN > VERIFY EKU OK
    . 2018.03.24 07:54:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkurhah, emailAddress=info@airvpn.org
    . 2018.03.24 07:54:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
    . 2018.03.24 07:54:41 - OpenVPN > [Alkurhah] Peer Connection Initiated with [AF_INET]184.75.221.202:443
    . 2018.03.24 07:54:42 - OpenVPN > SENT CONTROL [Alkurhah]: 'PUSH_REQUEST' (status=1)
    . 2018.03.24 07:54:42 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.163 255.255.0.0,peer-id 5,cipher AES-256-GCM'
    . 2018.03.24 07:54:42 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
    . 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
    . 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: compression parms modified
    . 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
    . 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: route-related options modified
    . 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    . 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: peer-id set
    . 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
    . 2018.03.24 07:54:42 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
    . 2018.03.24 07:54:42 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
    . 2018.03.24 07:54:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
    . 2018.03.24 07:54:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
    . 2018.03.24 07:54:42 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
    . 2018.03.24 07:54:42 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
    . 2018.03.24 07:54:42 - Above log line repeated 1 times more
    . 2018.03.24 07:54:42 - OpenVPN > Opened utun device utun2
    . 2018.03.24 07:54:42 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
    . 2018.03.24 07:54:42 - OpenVPN > /sbin/ifconfig utun2 delete
    . 2018.03.24 07:54:42 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
    . 2018.03.24 07:54:42 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
    . 2018.03.24 07:54:42 - OpenVPN > /sbin/ifconfig utun2 10.4.1.163 10.4.1.163 netmask 255.255.0.0 mtu 1500 up
    . 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.163 255.255.0.0
    . 2018.03.24 07:54:42 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.163
    . 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 184.75.221.202 192.168.50.1 255.255.255.255
    . 2018.03.24 07:54:42 - OpenVPN > add net 184.75.221.202: gateway 192.168.50.1
    . 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:54:42 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:54:42 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:54:42 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:54:42 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
    . 2018.03.24 07:54:43 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
    . 2018.03.24 07:54:43 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
    . 2018.03.24 07:54:43 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
    . 2018.03.24 07:54:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
    . 2018.03.24 07:54:43 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
    . 2018.03.24 07:54:43 - Routes, added a new route, 184.75.221.203 for gateway 10.4.0.1
    . 2018.03.24 07:54:43 - Flushing DNS
    I 2018.03.24 07:54:43 - Checking route IPv4
    . 2018.03.24 07:55:03 - curl: (28) Connection timed out after 20003 milliseconds
    . 2018.03.24 07:55:03 - Checking route (2° try)
    . 2018.03.24 07:55:25 - curl: (28) Connection timed out after 20002 milliseconds
    . 2018.03.24 07:55:25 - Checking route (3° try)
    . 2018.03.24 07:55:47 - curl: (28) Connection timed out after 20000 milliseconds
    E 2018.03.24 07:55:47 - Checking route IPv4 failed.
    . 2018.03.24 07:55:47 - OpenVPN > Initialization Sequence Completed
    ! 2018.03.24 07:55:47 - Disconnecting
    . 2018.03.24 07:55:47 - Routes, removed a route previously added, 184.75.221.203 for gateway 10.4.0.1
    . 2018.03.24 07:55:47 - Sending management termination signal
    . 2018.03.24 07:55:47 - Management - Send 'signal SIGTERM'
    . 2018.03.24 07:55:47 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
    . 2018.03.24 07:55:47 - OpenVPN > SIGTERM received, sending exit notification to peer
    . 2018.03.24 07:55:52 - OpenVPN > /sbin/route delete -net 184.75.221.202 192.168.50.1 255.255.255.255
    . 2018.03.24 07:55:52 - OpenVPN > delete net 184.75.221.202: gateway 192.168.50.1
    . 2018.03.24 07:55:52 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:55:52 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:55:52 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:55:52 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:55:52 - OpenVPN > Closing TUN/TAP interface
    . 2018.03.24 07:55:52 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
    . 2018.03.24 07:55:52 - Connection terminated.
    . 2018.03.24 07:55:52 - IPv6 restored on network adapter (Ethernet)
    . 2018.03.24 07:55:52 - IPv6 restored on network adapter (FireWire)
    . 2018.03.24 07:55:52 - IPv6 restored on network adapter (Wi-Fi)
    . 2018.03.24 07:55:52 - IPv6 restored on network adapter (iPhone USB)
    . 2018.03.24 07:55:52 - IPv6 restored on network adapter (Bluetooth PAN)
    . 2018.03.24 07:55:52 - IPv6 restored on network adapter (Thunderbolt Bridge)
    . 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
    . 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (FireWire, to Automatic)
    . 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (Wi-Fi, to Automatic)
    . 2018.03.24 07:55:52 - DNS of a network adapter restored to original settings (iPhone USB, to Automatic)
    . 2018.03.24 07:55:53 - DNS of a network adapter restored to original settings (Bluetooth PAN, to Automatic)
    . 2018.03.24 07:55:53 - DNS of a network adapter restored to original settings (Thunderbolt Bridge, to Automatic)
    I 2018.03.24 07:55:56 - Checking authorization ...
    . 2018.03.24 07:55:56 - IPv6 disabled on network adapter (Ethernet)
    . 2018.03.24 07:55:56 - IPv6 disabled on network adapter (FireWire)
    . 2018.03.24 07:55:57 - IPv6 disabled on network adapter (Wi-Fi)
    . 2018.03.24 07:55:57 - IPv6 disabled on network adapter (iPhone USB)
    . 2018.03.24 07:55:57 - IPv6 disabled on network adapter (Bluetooth PAN)
    . 2018.03.24 07:55:57 - IPv6 disabled on network adapter (Thunderbolt Bridge)
    ! 2018.03.24 07:55:57 - Connecting to Alhena (Canada, Toronto, Ontario)
    . 2018.03.24 07:55:57 - OpenVPN > OpenVPN 2.4.4 x86_64-apple-darwin16.7.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Oct 25 2017
    . 2018.03.24 07:55:57 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
    . 2018.03.24 07:55:57 - Connection to OpenVPN Management Interface
    . 2018.03.24 07:55:57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3102
    . 2018.03.24 07:55:57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.24 07:55:57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.24 07:55:57 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]162.219.176.2:443
    . 2018.03.24 07:55:57 - OpenVPN > Socket Buffers: R=[196724->524288] S=[9216->524288]
    . 2018.03.24 07:55:57 - OpenVPN > UDP link local: (not bound)
    . 2018.03.24 07:55:57 - OpenVPN > UDP link remote: [AF_INET]162.219.176.2:443
    . 2018.03.24 07:55:57 - OpenVPN > TLS: Initial packet from [AF_INET]162.219.176.2:443, sid=90b230f1 b154ba27
    . 2018.03.24 07:55:57 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3102
    . 2018.03.24 07:55:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
    . 2018.03.24 07:55:57 - OpenVPN > VERIFY KU OK
    . 2018.03.24 07:55:57 - OpenVPN > Validating certificate extended key usage
    . 2018.03.24 07:55:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
    . 2018.03.24 07:55:57 - OpenVPN > VERIFY EKU OK
    . 2018.03.24 07:55:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
    . 2018.03.24 07:55:58 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
    . 2018.03.24 07:55:58 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]162.219.176.2:443
    . 2018.03.24 07:55:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
    . 2018.03.24 07:55:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.21.147 255.255.0.0'
    . 2018.03.24 07:55:59 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
    . 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
    . 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: compression parms modified
    . 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
    . 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: route-related options modified
    . 2018.03.24 07:55:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
    . 2018.03.24 07:55:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
    . 2018.03.24 07:55:59 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.24 07:55:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
    . 2018.03.24 07:55:59 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
    . 2018.03.24 07:55:59 - OpenVPN > ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=en1 HWADDR=ac:29:3a:e6:75:a8
    . 2018.03.24 07:55:59 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
    . 2018.03.24 07:55:59 - Above log line repeated 1 times more
    . 2018.03.24 07:55:59 - OpenVPN > Opened utun device utun2
    . 2018.03.24 07:55:59 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
    . 2018.03.24 07:55:59 - OpenVPN > /sbin/ifconfig utun2 delete
    . 2018.03.24 07:55:59 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
    . 2018.03.24 07:55:59 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
    . 2018.03.24 07:55:59 - OpenVPN > /sbin/ifconfig utun2 10.4.21.147 10.4.21.147 netmask 255.255.0.0 mtu 1500 up
    . 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.21.147 255.255.0.0
    . 2018.03.24 07:55:59 - OpenVPN > add net 10.4.0.0: gateway 10.4.21.147
    . 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 162.219.176.2 192.168.50.1 255.255.255.255
    . 2018.03.24 07:55:59 - OpenVPN > add net 162.219.176.2: gateway 192.168.50.1
    . 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:55:59 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:55:59 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
    . 2018.03.24 07:55:59 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
    . 2018.03.24 07:55:59 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
    . 2018.03.24 07:55:59 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
    . 2018.03.24 07:56:00 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
    . 2018.03.24 07:56:00 - DNS of a network adapter forced (iPhone USB, from Automatic to 10.4.0.1)
    . 2018.03.24 07:56:00 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
    . 2018.03.24 07:56:00 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
    . 2018.03.24 07:56:00 - Routes, added a new route, 162.219.176.3 for gateway 10.4.0.1
    . 2018.03.24 07:56:00 - Flushing DNS
    I 2018.03.24 07:56:00 - Checking route IPv4
    . 2018.03.24 07:56:20 - curl: (28) Connection timed out after 20000 milliseconds
    . 2018.03.24 07:56:20 - Checking route (2° try)

     
    The solution in the moment is to hit "Cancel" and then completely shut down and restart Eddie.  He's much happier to connect to a reocmmended server after that.
     
    Just wanted to pass this along in case it's relevant to the beta or in case there's something obvious that I can to change my setup a bit and smooth out the reconnecting process.
     
    Thanks!
  15. Like
    LZ1 reacted to NL99 in My impression after a few months   ...
    A few months ago i realized that torrenting with your isp ip is not a very good idea, so i read some stuff about vpn. Compared vpn providers and started a trial with one of the big well known providers, Easy to setup, good price, decent speeds and good support..i thought. Lots of positive reviews, must be good. So i tried it for a week. Many many servers in every part of the world..but only a few usable for p2p. Hmm well who cares, as long they are fast. But it turned out that around 40megabit was the maximum and there are no alternative ports to chose from besides the standard port. So i asked them for support, tips and tricks to get higher speeds. I was told that i should reinstall the client, and otherwise it would be my isp that is capping some ports. I stopped the trial and started looking for another provider. Someone at a techforum told me i should try a 3 days air-trial for an euro. Well why not?
     
    So in installed the client , was happily surprised that i could choose the port and protocol i want to use, did some speedtesting, tried some torrents and bam! >225 megabit. So it was possible. Time to get a low-energy consuming torrentpc. Connected both the torrentpc and the desktop to a router that i configured for openvpn. Hmm 10 megabit, something must go wrong. I read some fora and learned that vpnspeed is all about cpu-power and you need some decent single core perfomance, so it`s better to turn a pc into a router/firewall and connect your lan trough that tunnel.
    So i bought some new fanless mini itx hardware and an Intel dual nic and installed Pfsense, read lots of guides and how-to`s, encountered lots of problems, got some help on the airvpnforum and after a few days - connected! I`m totally noob with networkingstuff, so if i can get it working with some help and reading, i`m sure everyone can. My pfsense computer is even behind a non-bridged isp modemrouter but that seems no real problem. I can forward ports for torrents in pfsense and it works. Also have a gigabit wireless router behind the pfsense-box so my phone etc, is now behind the vpn as well.
     
    Hardware:
    Intel® Celeron® CPU J3355 @ 2.00GHz
    Current: 2000 MHz, Max: 2001 MHz
    2 CPUs: 1 package(s) x 2 core(s)
    ES-CBC,AES-XTS,AES-GCM,AES-ICM
    Memory usage 5% of 3715 MiB
     
    Speed:
    ISP: max 250mbit
    Most speedtests give 200+ while connected trough vpn
    Real life test: See screenshot below. Normally somewhere between 20 and 29 megabyte/s if some well seeded torrents are running. Cpu at pfsense box does 60~65% then.
     
    Thanks AIR


  16. Like
    LZ1 reacted to giganerd in Problems with minecraft   ...
    Solution
     
    Add this to your *.ovpn file or add them in Eddie preferences, "Routes" tab:
     
     
    Change 192.168.21.1 to your default gateway.
     
    If it does not work, check the addresses you get for both domain names via nslookup, host or dig while you are not connected. Change the IP if it deviates from what is above. Examples below.
     
     
     
  17. Like
    LZ1 reacted to NL99 in Recommendations for OpenVPN Router   ...
    I tried pfsense a few weeks ago, and i`m a total noob with networking and firewall stuff. Bought some hardware for a mini-itx system, an Intel dual nic card and it took many days of reading and trying to get it working. But now it works like i wanted (that`s almost 30MB/s trough vpn for the whole lan), without fans or moving parts so it`s totally silent, small and low-energy consuming.
  18. Like
    LZ1 reacted to Staff in Slow speed (sort of)   ...
    Hello!
     
    Please make sure that no QoS / packet filtering tools, both on your router and system, interfere with traffic, and also test (with the connection mode that could provide you with the highest throughput) different servers in various locations around you (prefer servers with lowest round trip time).
     
    We don't see any bad packet / packet error in the log entries, so we tend to rule out MTU size problems.
     
    Some users reported in the past interesting performance boost (in Windows) after having fine tuned the TCP/IP stack with TCPOptimizer. If all else fails, you could give it a try, please see here:
    https://airvpn.org/topic/24126-tcp-optimizer-for-windows
     
    It looks like that with some TCP/IP stack optimization Windows can partially fill the gap with the other systems in the tun/tap interface "performance". It is not easy in Windows to match the throughput you get in the tun/tap interface when compared to other systems (you don't have fast-io, you don't have any native tun/tap support and some other problems due to bad architecture), but with TCP Optimizer and the latest tun/tap driver throughput can be improved (of course, it is assumed that your system has a powerful enough CPU).
     
    120 Mbit/s is not bad anyway if you make a comparison with just 5-6 years ago, when beating 100 Mbit/s on the tun/tap interface with the old tun/tap driver in Windows was deemed as impossible.
     
    Kind regards
  19. Like
    LZ1 got a reaction from mani2 in VPN Mentor low score   ...
    Hello!
     
    It can be disregarded. Such is the nature of paid and/or biased reviews. It's the same story across multiple sites. From a different angle - such as quality and features - one could also argue Air is the cheapest for what you get.
  20. Like
    LZ1 reacted to Monotremata in Win - Mac - BSD Block traffic when VPN disconnects   ...
    Well hell that works! Thats really my only concern if it goes down. Might as well take care of that instead!
     
    EDIT: Holy crap that works!! I set it to uTun1 (thats what mine uses) restarted qBT, it started seeding something right away, I disconnected from Aquila and watched my upstream dwindle to nothing in Little Snitch hah. I have the network lock deactivated right now and am here editing this post, and qBT cant do a damn thing haha. Thanks LZ1! Ive seen this mentioned on here elsewhere but figured it was something Id probably screw up but that was easy!
  21. Like
    LZ1 reacted to RaineyPass in New 1 Gbit/s server available (US)   ...
    Found it.  Edited my post, maybe while you were replying.  Thanks, LZ1.
  22. Like
    LZ1 got a reaction from zagone in route gateway is not reachable on any active network adapters 10.4.0.1   ...
    Hello!
     
    Please:
     
    Ensure you're properly connected to your network. Whether through WiFi or a Wired connection. Go to Eddie's preferences>Protocols>Change to TCP 443. Go to Windows Internet and Sharing>Network Adapters>Right-click each adapter and go to its properties and uncheck IP6. In the same place, click the TAP adapter and disable it. Then re-enable it. Then connect with Eddie again. This is a quick fix for TAP issues. Check no third-party security software could be interfering. Otherwise you're welcome to try the experimental client. Instructions for how, can be found in the link in my signature .
  23. Like
    LZ1 got a reaction from Monotremata in Win - Mac - BSD Block traffic when VPN disconnects   ...
    Hello!
     
    For that bit at least, you can go to qBittorents Tools/Preferences>Advanced>Bind to Tun0 interface. Then it won't do anything if Eddie goes down.
  24. Like
    LZ1 reacted to go558a83nk in Ports no longer forwarded   ...
    Some people run an openvpn client on their router, etc.  In that case, ports do need to be opened on the router.  But, not using the usual port forward which goes from WAN to LAN but with iptables so you can specify TUN to LAN.
     
    When running Eddie on a PC the encrypted tunnel goes from your PC to the VPN server.  Your router only sees the 1 connection your PC and the VPN server communicate on.  Everything happens inside that 1 encrypted connection.  Thus it's called "tunnel".  So, please understand that your router isn't even capable of selectively allowing connections to be established from "outside" through that VPN tunnel because it doesn't even see all the connections happening inside that tunnel.
     
    Anyway, port forwarding is working for thousands of people as I write this.  If it were not so we'd see a LOT more posts about it.
  25. Like
    LZ1 reacted to Staff in route gateway is not reachable on any active network adapters 10.4.0.1   ...
    Hello!
     
    The tun/tap interface does not come up. In several cases the excellent recommendations by LZ1 will fix the problem. In some other cases, some additional steps are necessary, please see below.
    If the problem persists after you have disabled any third-party antivirus and firewall, and you have also ascertained that the tun/tap interface is "Enabled", please try to set the tun/tap interface to "Always connected":
    Go into device manager Find your TUN/TAP Adapter Right click on it Select "Properties" Select "Advanced Media Status" Set it to "Always Connected" Click "Ok" Reboot the computer. After the system has restarted, please insert the following directives in Eddie window "AirVPN" > "Preferences" > "OVPN Directives",  "Custom directives" box:
     
    route-method exe route-delay 5 120 and test again.

    Kind regards
×
×
  • Create New...