Search the Community
Showing results for tags 'macos'.
Found 19 results
-
Hi I haven't used Eddie in awhile, and today when I tried to connect to a server it keeps disconnecting and retrying. I saw that some others solved this problem by going to the Eddie setup and entering a new value "eddie" but I am on MacOS and there's no place to do that on that network section. I am running the latest beta of Sequoia 15.1 maybe that's the problem? I'll include my log file if anyone could help that would awesome Thanks in advance Eddie System/Environment Report - 9/22/2024 - 6:57 PM UTC Eddie version: 2.21.8 Eddie OS build: macos_x64 Eddie architecture: x64 OS type: MacOS OS name: macOS 15.1 OS version: 15.1 (Build 24B5046f) OS architecture: x64 Mono /.Net Framework: v4.0.30319 OpenVPN: 2.5.5 - OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 (/Users/stevenlopes/Desktop/Eddie copy.app/Contents/MacOS/openvpn) Hummingbird: 3.3.2 - Hummingbird - AirVPN OpenVPN 3 Client 1.2.0 - 22 March 2022 (/Users/stevenlopes/Desktop/Eddie copy.app/Contents/MacOS/hummingbird) WireGuard: 1.0.20200827 SSH: OpenSSH_9.8p1, LibreSSL 3.3.6 (/usr/bin/ssh) SSL: stunnel 5.56 (/Users/stevenlopes/Desktop/Eddie copy.app/Contents/MacOS/stunnel) Profile path: /Users/stevenlopes/.config/eddie/default.profile Data path: /Users/stevenlopes/.config/eddie Application path: /Users/stevenlopes/Desktop/Eddie copy.app/Contents/MacOS Executable path: /Users/stevenlopes/Desktop/Eddie copy.app/Contents/MacOS/Eddie Command line arguments: (0 args) Network Lock Active: No Connected to VPN: No OS support IPv4: Yes OS support IPv6: Yes Detected DNS: 192.168.50.1 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 106 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Error: Fetch url error:Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True servers.locklast: True areas.allowlist: ch,ca,se,us,nl,no netlock.mode: osx_pf ui.unit: bytes ---------------------------- Logs: . 2024.09.22 14:55:44 - Eddie version: 2.21.8 / macos_x64, System: MacOS, Name: macOS 15.1, Version: 15.1 (Build 24B5046f), Mono/.Net: v4.0.30319 . 2024.09.22 14:55:44 - Raise system privileges . 2024.09.22 14:55:55 - Reading options from /Users/stevenlopes/.config/eddie/default.profile . 2024.09.22 14:55:58 - OpenVPN - Version: 2.5.5 - OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 (/Users/stevenlopes/Desktop/Eddie copy.app/Contents/MacOS/openvpn) . 2024.09.22 14:55:58 - SSH - Version: OpenSSH_9.8p1, LibreSSL 3.3.6 (/usr/bin/ssh) . 2024.09.22 14:55:58 - SSL - Version: stunnel 5.56 (/Users/stevenlopes/Desktop/Eddie copy.app/Contents/MacOS/stunnel) I 2024.09.22 14:55:58 - Ready . 2024.09.22 14:55:59 - Collect information about AirVPN completed ---------------------------- Network Interfaces and Routes: { "routes": [ { "destination": "0.0.0.0\/0", "expire": "", "flags": "UGScg", "gateway": "192.168.50.1", "interface": "en0", "mtu": "1500", "refs": "241", "rt_ifa": "192.168.50.90", "use": "735" }, { "destination": "127", "expire": "", "flags": "UCS", "gateway": "127.0.0.1", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "127.0.0.1", "use": "0" }, { "destination": "127.0.0.1\/32", "expire": "", "flags": "UH", "gateway": "127.0.0.1", "interface": "lo0", "mtu": "16384", "refs": "12", "rt_ifa": "127.0.0.1", "use": "8314" }, { "destination": "169.254\/32", "expire": "!", "flags": "UCS", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "192.168.50.90", "use": "0" }, { "destination": "192.168.50\/32", "expire": "!", "flags": "UCS", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "7", "rt_ifa": "192.168.50.90", "use": "0" }, { "destination": "192.168.50.1\/32", "expire": "!", "flags": "UCS", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "1", "rt_ifa": "192.168.50.90", "use": "0" }, { "destination": "192.168.50.1\/32", "expire": "1188", "flags": "UHLWIir", "gateway": "3c:7c:3f:cf:83:a0", "interface": "en0", "mtu": "1500", "refs": "240", "rt_ifa": "192.168.50.90", "use": "305" }, { "destination": "192.168.50.89\/32", "expire": "1183", "flags": "UHLWI", "gateway": "80:76:c2:8a:22:14", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "192.168.50.90", "use": "0" }, { "destination": "192.168.50.90\/32", "expire": "!", "flags": "UCS", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "192.168.50.90", "use": "0" }, { "destination": "192.168.50.135\/32", "expire": "1194", "flags": "UHLWI", "gateway": "d0:3f:27:36:2a:0", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "192.168.50.90", "use": "0" }, { "destination": "192.168.50.151\/32", "expire": "1014", "flags": "UHLWI", "gateway": "b0:f7:c4:37:b5:1c", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "192.168.50.90", "use": "0" }, { "destination": "192.168.50.153\/32", "expire": "1174", "flags": "UHLWIi", "gateway": "10:bf:48:8d:83:77", "interface": "en0", "mtu": "1500", "refs": "1", "rt_ifa": "192.168.50.90", "use": "30" }, { "destination": "192.168.50.175\/32", "expire": "898", "flags": "UHLWI", "gateway": "f2:22:f4:df:c:95", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "192.168.50.90", "use": "2" }, { "destination": "192.168.50.239\/32", "expire": "1200", "flags": "UHLWI", "gateway": "46:ae:30:6f:47:6b", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "192.168.50.90", "use": "0" }, { "destination": "192.168.50.255\/32", "expire": "!", "flags": "UHLWbI", "gateway": "ff:ff:ff:ff:ff:ff", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "192.168.50.90", "use": "28" }, { "destination": "224.0.0\/4", "expire": "!", "flags": "UmCS", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "1", "rt_ifa": "192.168.50.90", "use": "0" }, { "destination": "224.0.0.251\/32", "expire": "", "flags": "UHmLWI", "gateway": "1:0:5e:0:0:fb", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "192.168.50.90", "use": "0" }, { "destination": "255.255.255.255\/32", "expire": "!", "flags": "UCS", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "192.168.50.90", "use": "0" }, { "destination": "::\/0", "expire": "", "flags": "UGcIg", "gateway": "fe80::", "interface": "utun0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::f92c:c871:5509:3882%utun0", "use": "0" }, { "destination": "::\/0", "expire": "", "flags": "UGcIg", "gateway": "fe80::", "interface": "utun1", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::10a0:cf3e:5ac7:d00b%utun1", "use": "0" }, { "destination": "::\/0", "expire": "", "flags": "UGcIg", "gateway": "fe80::", "interface": "utun2", "mtu": "2000", "refs": "0", "rt_ifa": "fe80::e570:11df:3beb:8b1e%utun2", "use": "0" }, { "destination": "::\/0", "expire": "", "flags": "UGcIg", "gateway": "fe80::", "interface": "utun3", "mtu": "1000", "refs": "0", "rt_ifa": "fe80::ce81:b1c:bd2c:69e%utun3", "use": "0" }, { "destination": "::\/0", "expire": "", "flags": "UGcIg", "gateway": "2607:fb90:fa78:8400::", "interface": "ipsec0", "mtu": "1500", "refs": "8", "rt_ifa": "fe80::8837:95aa:2539:811%ipsec0", "use": "14" }, { "destination": "::\/0", "expire": "", "flags": "UGcIg", "gateway": "fe80::", "interface": "utun4", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::a413:c8c1:3fc5:9f31%utun4", "use": "0" }, { "destination": "::\/0", "expire": "", "flags": "UGcIg", "gateway": "fe80::", "interface": "utun5", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::cd04:9da8:3f24:8331%utun5", "use": "0" }, { "destination": "::\/0", "expire": "", "flags": "UGcIg", "gateway": "fe80::", "interface": "utun6", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::692c:ec4b:d7ab:9195%utun6", "use": "0" }, { "destination": "::1\/128", "expire": "", "flags": "UHL", "gateway": "::1", "interface": "lo0", "mtu": "16384", "refs": "1", "rt_ifa": "::1", "use": "14" }, { "destination": "2607:fb90:fa78:8400::\/64", "expire": "", "flags": "Uc", "gateway": "fe80::8837:95aa:2539:811", "interface": "ipsec0", "mtu": "1500", "refs": "2", "rt_ifa": "fe80::8837:95aa:2539:811%ipsec0", "use": "0" }, { "destination": "2607:fb90:fa78:8400:39bc:43b9:150:2e0d\/128", "expire": "", "flags": "UHL", "gateway": "link#22", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "2607:fb90:fa78:8400:39bc:43b9:150:2e0d", "use": "0" }, { "destination": "fda3:94bc:bece:1::\/64", "expire": "", "flags": "UGc", "gateway": "fe80::b2f7:c4ff:fe37:b51c", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::108d:d4d2:9644:b531%en0", "use": "0" }, { "destination": "fdbe:42cd:d28d:901e::\/64", "expire": "", "flags": "UC", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "2", "rt_ifa": "fe80::108d:d4d2:9644:b531%en0", "use": "0" }, { "destination": "fdbe:42cd:d28d:901e:ca4:37c9:4d0b:8648\/128", "expire": "", "flags": "UHLWI", "gateway": "f2:22:f4:df:c:95", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::108d:d4d2:9644:b531%en0", "use": "3" }, { "destination": "fdbe:42cd:d28d:901e:1cfc:28ac:a370:7765\/128", "expire": "", "flags": "UHL", "gateway": "7a:af:8f:b3:16:8c", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fdbe:42cd:d28d:901e:1cfc:28ac:a370:7765", "use": "0" }, { "destination": "fe80::\/64", "expire": "", "flags": "UcI", "gateway": "fe80::1", "interface": "lo0", "mtu": "16384", "refs": "1", "rt_ifa": "fe80::1%lo0", "use": "0" }, { "destination": "fe80::1\/128", "expire": "", "flags": "UHLI", "gateway": "link#1", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::1%lo0", "use": "0" }, { "destination": "fe80::\/64", "expire": "", "flags": "UCI", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "5", "rt_ifa": "fe80::108d:d4d2:9644:b531%en0", "use": "0" }, { "destination": "fe80::8ad:89cb:b422:4599\/128", "expire": "", "flags": "UHLWI", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::108d:d4d2:9644:b531%en0", "use": "0" }, { "destination": "fe80::8b9:5496:6228:6c10\/128", "expire": "", "flags": "UHLWIi", "gateway": "f2:22:f4:df:c:95", "interface": "en0", "mtu": "1500", "refs": "3", "rt_ifa": "fe80::108d:d4d2:9644:b531%en0", "use": "253" }, { "destination": "fe80::108d:d4d2:9644:b531\/128", "expire": "", "flags": "UHLI", "gateway": "7a:af:8f:b3:16:8c", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::108d:d4d2:9644:b531%en0", "use": "0" }, { "destination": "fe80::26ce:33ff:fea7:fa72\/128", "expire": "", "flags": "UHLWI", "gateway": "24:ce:33:a7:fa:72", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::108d:d4d2:9644:b531%en0", "use": "0" }, { "destination": "fe80::b2f7:c4ff:fe37:b51c\/128", "expire": "", "flags": "UHLWIi", "gateway": "b0:f7:c4:37:b5:1c", "interface": "en0", "mtu": "1500", "refs": "1", "rt_ifa": "fe80::108d:d4d2:9644:b531%en0", "use": "0" }, { "destination": "fe80::bcc8:37ff:fe53:ae24\/128", "expire": "", "flags": "UHLI", "gateway": "be:c8:37:53:ae:24", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::bcc8:37ff:fe53:ae24%awdl0", "use": "0" }, { "destination": "fe80::bcc8:37ff:fe53:ae24\/128", "expire": "", "flags": "UHLI", "gateway": "be:c8:37:53:ae:24", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::bcc8:37ff:fe53:ae24%llw0", "use": "0" }, { "destination": "fe80::\/64", "expire": "", "flags": "UcI", "gateway": "fe80::f92c:c871:5509:3882", "interface": "utun0", "mtu": "1500", "refs": "2", "rt_ifa": "fe80::f92c:c871:5509:3882%utun0", "use": "0" }, { "destination": "fe80::f92c:c871:5509:3882\/128", "expire": "", "flags": "UHLI", "gateway": "link#18", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::f92c:c871:5509:3882%utun0", "use": "0" }, { "destination": "fe80::\/64", "expire": "", "flags": "UcI", "gateway": "fe80::10a0:cf3e:5ac7:d00b", "interface": "utun1", "mtu": "1380", "refs": "2", "rt_ifa": "fe80::10a0:cf3e:5ac7:d00b%utun1", "use": "0" }, { "destination": "fe80::10a0:cf3e:5ac7:d00b\/128", "expire": "", "flags": "UHLI", "gateway": "link#19", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::10a0:cf3e:5ac7:d00b%utun1", "use": "0" }, { "destination": "fe80::\/64", "expire": "", "flags": "UcI", "gateway": "fe80::e570:11df:3beb:8b1e", "interface": "utun2", "mtu": "2000", "refs": "2", "rt_ifa": "fe80::e570:11df:3beb:8b1e%utun2", "use": "0" }, { "destination": "fe80::e570:11df:3beb:8b1e\/128", "expire": "", "flags": "UHLI", "gateway": "link#20", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::e570:11df:3beb:8b1e%utun2", "use": "0" }, { "destination": "fe80::\/64", "expire": "", "flags": "UcI", "gateway": "fe80::ce81:b1c:bd2c:69e", "interface": "utun3", "mtu": "1000", "refs": "2", "rt_ifa": "fe80::ce81:b1c:bd2c:69e%utun3", "use": "0" }, { "destination": "fe80::ce81:b1c:bd2c:69e\/128", "expire": "", "flags": "UHLI", "gateway": "link#21", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::ce81:b1c:bd2c:69e%utun3", "use": "0" }, { "destination": "fe80::\/64", "expire": "", "flags": "UcI", "gateway": "fe80::8837:95aa:2539:811", "interface": "ipsec0", "mtu": "1500", "refs": "1", "rt_ifa": "fe80::8837:95aa:2539:811%ipsec0", "use": "0" }, { "destination": "fe80::8837:95aa:2539:811\/128", "expire": "", "flags": "UHLI", "gateway": "link#22", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::8837:95aa:2539:811%ipsec0", "use": "0" }, { "destination": "fe80::\/64", "expire": "", "flags": "UcI", "gateway": "fe80::a413:c8c1:3fc5:9f31", "interface": "utun4", "mtu": "1380", "refs": "2", "rt_ifa": "fe80::a413:c8c1:3fc5:9f31%utun4", "use": "0" }, { "destination": "fe80::a413:c8c1:3fc5:9f31\/128", "expire": "", "flags": "UHLI", "gateway": "link#23", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::a413:c8c1:3fc5:9f31%utun4", "use": "0" }, { "destination": "fe80::\/64", "expire": "", "flags": "UcI", "gateway": "fe80::cd04:9da8:3f24:8331", "interface": "utun5", "mtu": "1380", "refs": "3", "rt_ifa": "fe80::cd04:9da8:3f24:8331%utun5", "use": "0" }, { "destination": "fe80::cd04:9da8:3f24:8331\/128", "expire": "", "flags": "UHLI", "gateway": "link#24", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::cd04:9da8:3f24:8331%utun5", "use": "0" }, { "destination": "fe80::\/64", "expire": "", "flags": "UcI", "gateway": "fe80::692c:ec4b:d7ab:9195", "interface": "utun6", "mtu": "1380", "refs": "2", "rt_ifa": "fe80::692c:ec4b:d7ab:9195%utun6", "use": "0" }, { "destination": "fe80::692c:ec4b:d7ab:9195\/128", "expire": "", "flags": "UHLI", "gateway": "link#25", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "fe80::692c:ec4b:d7ab:9195%utun6", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "::1", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "::1", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::c26:a304:9193:5217%en0", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "link#16", "interface": "awdl0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::10a8:85ff:fe44:1984%awdl0", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "link#17", "interface": "llw0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::10a8:85ff:fe44:1984%llw0", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "fe80::f92c:c871:5509:3882", "interface": "utun0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::f92c:c871:5509:3882%utun0", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "fe80::10a0:cf3e:5ac7:d00b", "interface": "utun1", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::10a0:cf3e:5ac7:d00b%utun1", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "fe80::e570:11df:3beb:8b1e", "interface": "utun2", "mtu": "2000", "refs": "0", "rt_ifa": "fe80::e570:11df:3beb:8b1e%utun2", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "fe80::ce81:b1c:bd2c:69e", "interface": "utun3", "mtu": "1000", "refs": "0", "rt_ifa": "fe80::ce81:b1c:bd2c:69e%utun3", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "fe80::8837:95aa:2539:811", "interface": "ipsec0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::8837:95aa:2539:811%ipsec0", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "fe80::a413:c8c1:3fc5:9f31", "interface": "utun4", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::a413:c8c1:3fc5:9f31%utun4", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "fe80::cd04:9da8:3f24:8331", "interface": "utun5", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::cd04:9da8:3f24:8331%utun5", "use": "0" }, { "destination": "ff00::\/8", "expire": "", "flags": "UmCI", "gateway": "fe80::692c:ec4b:d7ab:9195", "interface": "utun6", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::692c:ec4b:d7ab:9195%utun6", "use": "0" }, { "destination": "ff01::\/32", "expire": "", "flags": "UmCI", "gateway": "::1", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "::1", "use": "0" }, { "destination": "ff01::\/32", "expire": "", "flags": "UmCI", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::c26:a304:9193:5217%en0", "use": "0" }, { "destination": "ff01::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::f92c:c871:5509:3882", "interface": "utun0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::f92c:c871:5509:3882%utun0", "use": "0" }, { "destination": "ff01::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::10a0:cf3e:5ac7:d00b", "interface": "utun1", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::10a0:cf3e:5ac7:d00b%utun1", "use": "0" }, { "destination": "ff01::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::e570:11df:3beb:8b1e", "interface": "utun2", "mtu": "2000", "refs": "0", "rt_ifa": "fe80::e570:11df:3beb:8b1e%utun2", "use": "0" }, { "destination": "ff01::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::ce81:b1c:bd2c:69e", "interface": "utun3", "mtu": "1000", "refs": "0", "rt_ifa": "fe80::ce81:b1c:bd2c:69e%utun3", "use": "0" }, { "destination": "ff01::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::8837:95aa:2539:811", "interface": "ipsec0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::8837:95aa:2539:811%ipsec0", "use": "0" }, { "destination": "ff01::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::a413:c8c1:3fc5:9f31", "interface": "utun4", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::a413:c8c1:3fc5:9f31%utun4", "use": "0" }, { "destination": "ff01::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::cd04:9da8:3f24:8331", "interface": "utun5", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::cd04:9da8:3f24:8331%utun5", "use": "0" }, { "destination": "ff01::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::692c:ec4b:d7ab:9195", "interface": "utun6", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::692c:ec4b:d7ab:9195%utun6", "use": "0" }, { "destination": "ff02::\/32", "expire": "", "flags": "UmCI", "gateway": "::1", "interface": "lo0", "mtu": "16384", "refs": "0", "rt_ifa": "::1", "use": "0" }, { "destination": "ff02::\/32", "expire": "", "flags": "UmCI", "gateway": "link#14", "interface": "en0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::c26:a304:9193:5217%en0", "use": "0" }, { "destination": "ff02::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::f92c:c871:5509:3882", "interface": "utun0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::f92c:c871:5509:3882%utun0", "use": "0" }, { "destination": "ff02::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::10a0:cf3e:5ac7:d00b", "interface": "utun1", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::10a0:cf3e:5ac7:d00b%utun1", "use": "0" }, { "destination": "ff02::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::e570:11df:3beb:8b1e", "interface": "utun2", "mtu": "2000", "refs": "0", "rt_ifa": "fe80::e570:11df:3beb:8b1e%utun2", "use": "0" }, { "destination": "ff02::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::ce81:b1c:bd2c:69e", "interface": "utun3", "mtu": "1000", "refs": "0", "rt_ifa": "fe80::ce81:b1c:bd2c:69e%utun3", "use": "0" }, { "destination": "ff02::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::8837:95aa:2539:811", "interface": "ipsec0", "mtu": "1500", "refs": "0", "rt_ifa": "fe80::8837:95aa:2539:811%ipsec0", "use": "0" }, { "destination": "ff02::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::a413:c8c1:3fc5:9f31", "interface": "utun4", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::a413:c8c1:3fc5:9f31%utun4", "use": "0" }, { "destination": "ff02::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::cd04:9da8:3f24:8331", "interface": "utun5", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::cd04:9da8:3f24:8331%utun5", "use": "0" }, { "destination": "ff02::\/32", "expire": "", "flags": "UmCI", "gateway": "fe80::692c:ec4b:d7ab:9195", "interface": "utun6", "mtu": "1380", "refs": "0", "rt_ifa": "fe80::692c:ec4b:d7ab:9195%utun6", "use": "0" } ], "ipv4-default-gateway": "192.168.50.1", "ipv4-default-interface": "en0", "ipv6-default-gateway": "fe80::", "ipv6-default-interface": "utun0", "interfaces": [ { "friendly": "lo0", "id": "lo0", "name": "lo0", "description": "lo0", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "127.0.0.1", "::1", "fe80::1" ], "bind": true }, { "friendly": "gif0", "id": "gif0", "name": "gif0", "description": "gif0", "type": "Unknown", "status": "Unknown", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "stf0", "id": "stf0", "name": "stf0", "description": "stf0", "type": "Unknown", "status": "Unknown", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "anpi2", "id": "anpi2", "name": "anpi2", "description": "anpi2", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "anpi0", "id": "anpi0", "name": "anpi0", "description": "anpi0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "anpi1", "id": "anpi1", "name": "anpi1", "description": "anpi1", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "Ethernet Adapter (en4)", "id": "en4", "name": "en4", "description": "en4", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "Ethernet Adapter (en5)", "id": "en5", "name": "en5", "description": "en5", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "Ethernet Adapter (en6)", "id": "en6", "name": "en6", "description": "en6", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "Thunderbolt 1", "id": "en1", "name": "en1", "description": "en1", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "Thunderbolt 2", "id": "en2", "name": "en2", "description": "en2", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "Thunderbolt 3", "id": "en3", "name": "en3", "description": "en3", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "ap1", "id": "ap1", "name": "ap1", "description": "ap1", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "Wi-Fi", "id": "en0", "name": "en0", "description": "en0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::108d:d4d2:9644:b531", "fdbe:42cd:d28d:901e:1cfc:28ac:a370:7765", "192.168.50.90" ], "bind": true }, { "friendly": "Thunderbolt Bridge", "id": "bridge0", "name": "bridge0", "description": "bridge0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [], "bind": false }, { "friendly": "awdl0", "id": "awdl0", "name": "awdl0", "description": "awdl0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::bcc8:37ff:fe53:ae24" ], "bind": true }, { "friendly": "llw0", "id": "llw0", "name": "llw0", "description": "llw0", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::bcc8:37ff:fe53:ae24" ], "bind": true }, { "friendly": "utun0", "id": "utun0", "name": "utun0", "description": "utun0", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::f92c:c871:5509:3882" ], "bind": true }, { "friendly": "utun1", "id": "utun1", "name": "utun1", "description": "utun1", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::10a0:cf3e:5ac7:d00b" ], "bind": true }, { "friendly": "utun2", "id": "utun2", "name": "utun2", "description": "utun2", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::e570:11df:3beb:8b1e" ], "bind": true }, { "friendly": "utun3", "id": "utun3", "name": "utun3", "description": "utun3", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::ce81:b1c:bd2c:69e" ], "bind": true }, { "friendly": "ipsec0", "id": "ipsec0", "name": "ipsec0", "description": "ipsec0", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::8837:95aa:2539:811", "2607:fb90:fa78:8400:39bc:43b9:150:2e0d" ], "bind": true }, { "friendly": "utun4", "id": "utun4", "name": "utun4", "description": "utun4", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::a413:c8c1:3fc5:9f31" ], "bind": true }, { "friendly": "utun5", "id": "utun5", "name": "utun5", "description": "utun5", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::cd04:9da8:3f24:8331" ], "bind": true }, { "friendly": "utun6", "id": "utun6", "name": "utun6", "description": "utun6", "type": "Unknown", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::692c:ec4b:d7ab:9195" ], "bind": true } ] } ---------------------------- ifconfig: lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384 options=1203<RXCSUM,TXCSUM,TXSTATUS,SW_TIMESTAMP> inet 127.0.0.1 netmask 0xff000000 inet6 ::1 prefixlen 128 inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1 nd6 options=201<PERFORMNUD,DAD> gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280 stf0: flags=0<> mtu 1280 anpi2: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=400<CHANNEL_IO> ether 5e:c1:8b:ed:25:92 media: none status: inactive anpi0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=400<CHANNEL_IO> ether 5e:c1:8b:ed:25:90 media: none status: inactive anpi1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=400<CHANNEL_IO> ether 5e:c1:8b:ed:25:91 media: none status: inactive en4: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=400<CHANNEL_IO> ether 5e:c1:8b:ed:25:70 nd6 options=201<PERFORMNUD,DAD> media: none status: inactive en5: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=400<CHANNEL_IO> ether 5e:c1:8b:ed:25:71 nd6 options=201<PERFORMNUD,DAD> media: none status: inactive en6: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=400<CHANNEL_IO> ether 5e:c1:8b:ed:25:72 nd6 options=201<PERFORMNUD,DAD> media: none status: inactive en1: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500 options=460<TSO4,TSO6,CHANNEL_IO> ether 36:07:d0:2c:3c:c0 media: autoselect <full-duplex> status: inactive en2: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500 options=460<TSO4,TSO6,CHANNEL_IO> ether 36:07:d0:2c:3c:c4 media: autoselect <full-duplex> status: inactive en3: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500 options=460<TSO4,TSO6,CHANNEL_IO> ether 36:07:d0:2c:3c:c8 media: autoselect <full-duplex> status: inactive ap1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=6460<TSO4,TSO6,CHANNEL_IO,PARTIAL_CSUM,ZEROINVERT_CSUM> ether a6:17:6d:71:0f:bd nd6 options=201<PERFORMNUD,DAD> media: autoselect (none) status: inactive en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=6460<TSO4,TSO6,CHANNEL_IO,PARTIAL_CSUM,ZEROINVERT_CSUM> ether 7a:af:8f:b3:16:8c inet6 fe80::108d:d4d2:9644:b531%en0 prefixlen 64 secured scopeid 0xe inet6 fdbe:42cd:d28d:901e:1cfc:28ac:a370:7765 prefixlen 64 autoconf secured inet 192.168.50.90 netmask 0xffffff00 broadcast 192.168.50.255 nd6 options=201<PERFORMNUD,DAD> media: autoselect status: active bridge0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=63<RXCSUM,TXCSUM,TSO4,TSO6> ether 36:07:d0:2c:3c:c0 Configuration: id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0 maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200 root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0 ipfilter disabled flags 0x0 member: en1 flags=3<LEARNING,DISCOVER> ifmaxaddr 0 port 10 priority 0 path cost 0 member: en2 flags=3<LEARNING,DISCOVER> ifmaxaddr 0 port 11 priority 0 path cost 0 member: en3 flags=3<LEARNING,DISCOVER> ifmaxaddr 0 port 12 priority 0 path cost 0 nd6 options=201<PERFORMNUD,DAD> media: <unknown type> status: inactive awdl0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=6460<TSO4,TSO6,CHANNEL_IO,PARTIAL_CSUM,ZEROINVERT_CSUM> ether be:c8:37:53:ae:24 inet6 fe80::bcc8:37ff:fe53:ae24%awdl0 prefixlen 64 scopeid 0x10 nd6 options=201<PERFORMNUD,DAD> media: autoselect status: active llw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500 options=400<CHANNEL_IO> ether be:c8:37:53:ae:24 inet6 fe80::bcc8:37ff:fe53:ae24%llw0 prefixlen 64 scopeid 0x11 nd6 options=201<PERFORMNUD,DAD> media: autoselect (none) utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500 inet6 fe80::f92c:c871:5509:3882%utun0 prefixlen 64 scopeid 0x12 nd6 options=201<PERFORMNUD,DAD> utun1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380 inet6 fe80::10a0:cf3e:5ac7:d00b%utun1 prefixlen 64 scopeid 0x13 nd6 options=201<PERFORMNUD,DAD> utun2: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 2000 inet6 fe80::e570:11df:3beb:8b1e%utun2 prefixlen 64 scopeid 0x14 nd6 options=201<PERFORMNUD,DAD> utun3: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1000 inet6 fe80::ce81:b1c:bd2c:69e%utun3 prefixlen 64 scopeid 0x15 nd6 options=201<PERFORMNUD,DAD> ipsec0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500 options=6460<TSO4,TSO6,CHANNEL_IO,PARTIAL_CSUM,ZEROINVERT_CSUM> inet6 fe80::8837:95aa:2539:811%ipsec0 prefixlen 64 scopeid 0x16 inet6 2607:fb90:fa78:8400:39bc:43b9:150:2e0d prefixlen 64 nd6 options=201<PERFORMNUD,DAD> utun4: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380 inet6 fe80::a413:c8c1:3fc5:9f31%utun4 prefixlen 64 scopeid 0x17 nd6 options=201<PERFORMNUD,DAD> utun5: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380 inet6 fe80::cd04:9da8:3f24:8331%utun5 prefixlen 64 scopeid 0x18 nd6 options=201<PERFORMNUD,DAD> utun6: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380 inet6 fe80::692c:ec4b:d7ab:9195%utun6 prefixlen 64 scopeid 0x19 nd6 options=201<PERFORMNUD,DAD>
-
I'm on macOS sonoma, using Eddie with network lock and port forwarding set up in qbittorrent. I'm not getting any transfer activity. The interface list in the advanced settings doesn't have "eddie" like it does on pc. I've been trying them all, but nothing seems to enable transfers. I've attached a screenshot of the options available to me. I have a feeling it's one of the utun0-6, but I can't get it to work. Any help?
- ...
- 8 replies
-
- network lock
- bind
- qbittorent
- binding
- leak
- safe
- safety
- mac
- (and 10 more)
-
I have a mac running MacOS 12.3 that shares internet to other devices. Eddie 2.20 is installed on the mac, however once eddie is turned on internet sharing stops working. With the network lock on, the other devices are blocked from everything - the internet and local things like screen sharing. With network lock off, the internet works but local things are hit or miss. What are the best settings for eddie to get internet sharing to work? I don't care if the other devices go through the tunnel or not, I just care that they have access to the internet and local network. Thank you!
-
Hi Legends, I've got an odd issue happening...eddie will work initially, and then if I go to close it, it hangs. I have to force quit it, and when I do and restart, it hangs at session starting. Any ideas??
-
Hi everybody, I have a strange problem: I can't access any site with my cable provider until I start a VPN using Eddie :-( I usually use Eddie permanently but in some cases (system diagnostics) I have to switch off VPN and deactivate network lock. It seems to lock the network even when closed now for me :-( restarted a few times and tried different browsers and email. hope you can help thank you very much! best tom
-
Hello, So here is my predicament. I have a cloud machine (dedicated machine in a 3rd party facility somewhere in the world). This machine runs macOS and I connect to it using VNC to run some software that is macOS-only. Now, when I use the browser while VNC'ed in this machine I don't want its real location to be known by the websites I visit. For that reason I put it behind VPN (VNC ports are forwarded of course so I can connect to the machine while it is in VPN.). I would like to activate the network lock feature so if AirVPN disconnects for some reason while I'm browsing the real IP is not leaked. However, I'm concerned that, if AirVPN disconnects and cannot reconnect for some reason, I will in fact loose all connection *into* this machine. It will be completely unreachable. So, I was thinking I could allow some ports (VNC port, SSH port) through the network lock (i.e. not going through the tunnel). This is OK for me since I mostly care about the browser not leaking the real IP to the websites I visit. How can I achieve this using the Eddie client? Is it possible at all? Thanks in advance!
-
Hello everyone, new AirVPN user here. On my Macbook Pro, I use OpenVPN CLI client from Homebrew package manager instead of Eddie or Tunnelblick. I can connect to AirVPN server but can't browse any thing. From the terminal I can ping IP addresses but can't ping any website. This led me to think that something wrong with DNS. Some excerpts from CLI log: Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16) Opened utun device utun1 do_ifconfig, tt->did_ifconfig_ipv6_setup=0 /sbin/ifconfig utun1 delete ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure sudo route flush after turning off Wifi on my machine does not solve the problem. I can fix this by manually adding Google DNS (8.8.8.8 and 8.8.4.4) to my network preference. It is weird because I already set these DNS servers on my home router. In contrast, on my Windows machine, with official OpenVPN GUI client, I have no problem at all. And I don't need to manually config DNS server on the network adapter as I have to with my Mac. As far as I know, all AirVPN exit nodes enforce their own DNS server on their side, so I don't know why not setting DNS servers on my network interface causes the problem. Would using public DNS servers in my fix undermine my privacy, such as DNS leak? Also, is there any other fix for my Mac that does not require me to change DNS server on the network interface?
-
After the Eddie 2.13.6 to 2.16.3 update on an iMac (Retina 4K, 21.5-inch, Late 2015) with macOS 10.13.6, there is no more: AFP to computer names, just ip-addresses (likewise as for incoming connections)Screen Sharing to computer names, just ip-addresses (likewise as for incoming connections)AirPlay to an AirPort Express, its AirPort Utility connection invariably fails as well (unlike iOS devices with OpenVPN Connect 3.0.1, an AppleTV4 or 'Eddie-less' macOS computers)Also, its iTunes needs to relaunch for the AppleTV4 to reconnect after sleep every time. To remedy this most annoying hiccup a forums poster once suggested, if memory serves, to enter some 'Bonjour multicast address' (?) or other into Addresses Allowed of Network Lock Preferences. And rightly so!At the moment though, that field is blank, whereas it wasn't prior to the current version, but the post in question seems untraceable. Can anyone confirm the workaround still holds and point to the info required? If not, what is the proper way to deal with said wonkiness (bar disabling the network lock)? cheers,
-
for some days now i can´t get a connection to any server with my macbook pro runs at macOS High Sierra 10.13.6 Hope someone can help me If i forgot smth to tell u ask^^ https://i.imgur.com/Fc71vPn.jpg
-
Everyone knows Firefox. It's an extremely popular browser known for its versatility and a bit of a focus on privacy/security. Just a bit because Mozilla made the news with some questionable things, especially the Sponsored Tiles may have surprised some regular users. Still, Firefox is on top of everything since it's (mostly) open source and very extension-friendly - something other browsers just can't say about themselves (if they could talk ). The Chromium part of Chrome might be open source, but Google built in many proprietary parts.Opera is just based on an open source renderer, the rest is proprietary.Internet Explorer, or Edge, is proprietary software in its entirety.Every other browser you might have heard of is likely to be based on the Firefox codebase, so you don't have much options if you are looking for a FLOSS browser on your PC - it will be some flavor of Firefox, where every flavor alters/hardcodes something else in comparison to the original. Waterfox is no exception: It's based on Firefox. It's even so much based on it, you could think this is Firefox. So what does Waterfox change, and why am I writing about it? One of the annoyances of Firefox is that Mozilla doesn't offer a 64-bit version officially, there's only a beta. Waterfox is designed to run on those systems, even on 64-bit versions of Windows XP. Also, a few benchmarks have shown that Waterfox increases the browser's performance. But I wouldn't write about Waterfox if there weren't changes related to your "sense of openness" or privacy. So, in comparison to Firefox, there are no Sponsored Tiles - they were completely removed. all Telemetry/data collection things were removed.Encrypted Media Extensions (the proprietary DRM part) are disabled.the Pocket integration (also proprietary) was removed.the plugin whitelist was removed, containing mostly proprietary plugins (on install, those plugins will be enabled without the user explicitly enabling them; I think this tech is no longer used in Firefox, anyway, but stlll). As a result, unsigned extensions are allowed to be installed again. Less secure for normal users, but gives you back your freedom of plugin choice AND your ability to run older plugins Want to test it out? Just install it. It uses your existing Firefox profile, so when you launch it you will find everything right where you left it. You can independently uninstall Firefox or Waterfox without issues. Download it from the website or just compile it yourself. -- Update 01.01.2017 -- As of Waterfox 50.0, it is possible to build Waterfox on Linux, making Waterfox available for all major platforms. I'm now considering Waterfox again.
-
On macOS, Eddie often fails reconnecting to AirVPN when recovering from sleeping mode. Either Eddie crashes completely or the routing checking fails.
-
Hello all, First, sorry for my English. I'll try as best as I can to make it clear. I have trouble logging thru Eddie official AirVPN client (last MacOS stable version 2.11.15). Before you ask, I am 100% sure I entered the right password.I tried to reinstall the client twice and deleting all the config files with AppCleaner. Didn't work. Then I tried to reset the airvpn.xml file too. Now I'm on full default config and still can't log in. I really don't know what to do. The client stopped working yesterday for like "no reason" (no apps updates, no system update, nothing changed recently. I can successfully use AirVPN via Tunnelblick, but I really prefer the classic Eddie AirVPN client. Anybody got an idea of what to I can do ? I joined last logs to help. Thanks ----------------------------------------------------------------------------------------------- LAST LOGS AFTER A FRESH INSTALL and reset airvpn.xml. (Anonymised paths). ----------------------------------------------------------------------------------------------- I 2017.02.22 00:21:04 - Eddie client version: 2.11.15 / osx_x64, System: OSX, Name: 10.12.3, Mono/.Net Framework: v4.0.30319. 2017.02.22 00:21:04 - Reading options from /XXXXXX/.airvpn/AirVPN.xml. 2017.02.22 00:21:04 - Profile options not found, using defaults.. 2017.02.22 00:21:05 - Data path: /XXXXXX/.airvpn. 2017.02.22 00:21:05 - Application path: /Applications/Eddie.app/Contents/MacOS. 2017.02.22 00:21:05 - Executable path: /Applications/Eddie.app/Contents/MacOS/Eddie. 2017.02.22 00:21:05 - Command line arguments (0):. 2017.02.22 00:21:05 - Operating System: Unix 16.4.0.0 - Darwin XXXXXX.local 16.4.0 Darwin Kernel Version 16.4.0: Thu Dec 22 22:53:21 PST 2016; root:xnu-3789.41.3~3/RELEASE_X86_64 x86_64I 2017.02.22 00:21:05 - OpenVPN Driver - ExpectedI 2017.02.22 00:21:05 - OpenVPN - Version: 2.4.0 - OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09 (/Applications/Eddie.app/Contents/MacOS/openvpn)I 2017.02.22 00:21:05 - SSH - Version: OpenSSH_7.3p1, LibreSSL 2.4.1 (/usr/bin/ssh)I 2017.02.22 00:21:05 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)! 2017.02.22 00:21:05 - Ready. 2017.02.22 00:21:05 - Updating systems & servers data .... 2017.02.22 00:21:09 - Systems & servers data update completedI 2017.02.22 00:21:31 - Checking login ...F 2017.02.22 00:22:11 - Cannot login. (The request timed out)
-
I am having an issue configuring AirVPN SSL to work with Tunnelblick and Stunnel on my macbook. I got it to work about a month ago, but I can't remember how I did it. I am pretty sure the issue is stunnel, but I can't figure out how to configure the proper files. 1. I have imported the .ovpn into tunnelblick 2. moved the .ssl and .crt into stunnel file 3. changed the .ssl in stunnel to .conf when I try to connect to the server via tunnelblick i receive this error: TCP: connect to [AF_INET]127.0.0.1:1413 failed, will try again in 5 seconds: Connection refused If you need any further information or files, please let me know. Thank you in advance for your assistance. connection_error.txt
-
Hi all, I've been having issues with the latency tests lately using Eddie v. 2.11.15 on MacOS 10.12.3. The first issue is that while the latency test used to be super fast (<15 sec), now they are taking forever to be done (~>45 seconds), making me wait before I can effectively connect to a server. Even worse, the server list now only shows dots (.....) instead of latency times in the latency column. The list of servers therefore does not update itself and is left in alphabetical order. Last but not least, when I click on "connect to recommended server", authentification fails on the first attempt before succeeding on the second every time, making me wait an additional 30-45 seconds before I am connected. My connection then works as usual, but it's a pain not being able to know which servers are best for me and also having to wait so long before I can browse the net safely. Anyone happen to have the same problem and maybe a solution to go along with it ? Thanks, 2d8
-
I've got a Premium subscription, and working on an iMac (macOS Sierra 10.12.1). I only managed to connect to a server the first time I used AirVPN (few weeks ago) but since then it won't connect to any server. Any idea what is going on? Your help is much appreciated. Matt . 2016.11.19 21:06:47 - Connection terminated. I 2016.11.19 21:06:47 - DNS of a network adapter restored to original settings (Ethernet)I 2016.11.19 21:06:47 - DNS of a network adapter restored to original settings (FireWire)I 2016.11.19 21:06:47 - DNS of a network adapter restored to original settings (Wi-Fi)I 2016.11.19 21:06:47 - DNS of a network adapter restored to original settings (iPhone USB)I 2016.11.19 21:06:47 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2016.11.19 21:06:47 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2016.11.19 21:06:50 - Checking authorization ...! 2016.11.19 21:06:50 - Connecting to Hatysa (Sweden, Uppsala). 2016.11.19 21:06:50 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.11.19 21:06:50 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.19 21:06:50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2016.11.19 21:06:50 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.19 21:06:50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:06:50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:06:50 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2016.11.19 21:06:50 - OpenVPN > UDPv4 link local: [undef]. 2016.11.19 21:06:50 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.144:443. 2016.11.19 21:06:50 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.144:443, sid=3d16dbec 5605ff83. 2016.11.19 21:06:50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.19 21:06:50 - OpenVPN > Validating certificate key usage. 2016.11.19 21:06:50 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.19 21:06:50 - OpenVPN > VERIFY KU OK. 2016.11.19 21:06:50 - OpenVPN > Validating certificate extended key usage. 2016.11.19 21:06:50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.19 21:06:50 - OpenVPN > VERIFY EKU OK. 2016.11.19 21:06:50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.19 21:06:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:06:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:06:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:06:55 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:06:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.19 21:06:55 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.144:443. 2016.11.19 21:06:58 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.19 21:06:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.34.235 255.255.0.0'. 2016.11.19 21:06:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.19 21:06:58 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.19 21:06:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.19 21:06:58 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.19 21:06:58 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.19 21:06:58 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.19 21:06:58 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2016.11.19 21:06:58 - OpenVPN > Opened utun device utun3. 2016.11.19 21:06:58 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.19 21:06:58 - OpenVPN > /sbin/ifconfig utun3 delete. 2016.11.19 21:06:58 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2016.11.19 21:06:58 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2016.11.19 21:06:58 - OpenVPN > /sbin/ifconfig utun3 10.4.34.235 10.4.34.235 netmask 255.255.0.0 mtu 1500 up. 2016.11.19 21:06:58 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.34.235 255.255.0.0. 2016.11.19 21:06:58 - OpenVPN > route: writing to routing socket: File exists. 2016.11.19 21:06:58 - OpenVPN > add net 10.4.0.0: gateway 10.4.34.235: File exists. 2016.11.19 21:06:58 - OpenVPN > /sbin/route add -net 62.102.148.144 192.168.0.1 255.255.255.255. 2016.11.19 21:06:58 - OpenVPN > add net 62.102.148.144: gateway 192.168.0.1. 2016.11.19 21:06:58 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:06:58 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:06:58 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:06:58 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:06:58 - Starting Management Interface. 2016.11.19 21:06:58 - OpenVPN > Initialization Sequence CompletedI 2016.11.19 21:06:58 - DNS of a network adapter forced (Ethernet)I 2016.11.19 21:06:58 - DNS of a network adapter forced (FireWire)I 2016.11.19 21:06:58 - DNS of a network adapter forced (Wi-Fi)I 2016.11.19 21:06:58 - DNS of a network adapter forced (iPhone USB)I 2016.11.19 21:06:58 - DNS of a network adapter forced (Bluetooth PAN)I 2016.11.19 21:06:58 - DNS of a network adapter forced (Thunderbolt Bridge)I 2016.11.19 21:06:58 - Flushing DNSI 2016.11.19 21:06:58 - Checking routeE 2016.11.19 21:06:58 - Routing checking failed.. 2016.11.19 21:06:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101! 2016.11.19 21:06:59 - Disconnecting. 2016.11.19 21:06:59 - Management - Send 'signal SIGTERM'. 2016.11.19 21:06:59 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.19 21:06:59 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.19 21:06:59 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.11.19 21:07:04 - OpenVPN > /sbin/route delete -net 62.102.148.144 192.168.0.1 255.255.255.255. 2016.11.19 21:07:04 - OpenVPN > delete net 62.102.148.144: gateway 192.168.0.1. 2016.11.19 21:07:04 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:07:04 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:07:04 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:07:04 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:07:04 - OpenVPN > Closing TUN/TAP interface. 2016.11.19 21:07:04 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.11.19 21:07:04 - Connection terminated.I 2016.11.19 21:07:04 - DNS of a network adapter restored to original settings (Ethernet)I 2016.11.19 21:07:04 - DNS of a network adapter restored to original settings (FireWire)I 2016.11.19 21:07:04 - DNS of a network adapter restored to original settings (Wi-Fi)I 2016.11.19 21:07:04 - DNS of a network adapter restored to original settings (iPhone USB)I 2016.11.19 21:07:04 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2016.11.19 21:07:04 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2016.11.19 21:07:07 - Checking authorization ...! 2016.11.19 21:07:08 - Connecting to Zaniah (Sweden, Uppsala). 2016.11.19 21:07:08 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.11.19 21:07:08 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.19 21:07:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2016.11.19 21:07:08 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.19 21:07:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:07:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:07:08 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2016.11.19 21:07:08 - OpenVPN > UDPv4 link local: [undef]. 2016.11.19 21:07:08 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.136:443. 2016.11.19 21:07:08 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.136:443, sid=223c091a 91ebbf19. 2016.11.19 21:07:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.19 21:07:08 - OpenVPN > Validating certificate key usage. 2016.11.19 21:07:08 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.19 21:07:08 - OpenVPN > VERIFY KU OK. 2016.11.19 21:07:08 - OpenVPN > Validating certificate extended key usage. 2016.11.19 21:07:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.19 21:07:08 - OpenVPN > VERIFY EKU OK. 2016.11.19 21:07:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.19 21:07:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:07:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:07:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:07:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:07:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.19 21:07:08 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.136:443. 2016.11.19 21:07:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.19 21:07:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.44 255.255.0.0'. 2016.11.19 21:07:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.19 21:07:10 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.19 21:07:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.19 21:07:10 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.19 21:07:10 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.19 21:07:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.19 21:07:10 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2016.11.19 21:07:10 - OpenVPN > Opened utun device utun3. 2016.11.19 21:07:10 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.19 21:07:10 - OpenVPN > /sbin/ifconfig utun3 delete. 2016.11.19 21:07:10 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2016.11.19 21:07:10 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2016.11.19 21:07:10 - OpenVPN > /sbin/ifconfig utun3 10.4.68.44 10.4.68.44 netmask 255.255.0.0 mtu 1500 up. 2016.11.19 21:07:10 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.44 255.255.0.0. 2016.11.19 21:07:10 - OpenVPN > route: writing to routing socket: File exists. 2016.11.19 21:07:10 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.44: File exists. 2016.11.19 21:07:10 - OpenVPN > /sbin/route add -net 62.102.148.136 192.168.0.1 255.255.255.255. 2016.11.19 21:07:10 - OpenVPN > add net 62.102.148.136: gateway 192.168.0.1. 2016.11.19 21:07:10 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:07:10 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:07:10 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:07:10 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:07:10 - Starting Management Interface. 2016.11.19 21:07:10 - OpenVPN > Initialization Sequence CompletedI 2016.11.19 21:07:11 - DNS of a network adapter forced (Ethernet)I 2016.11.19 21:07:11 - DNS of a network adapter forced (FireWire)I 2016.11.19 21:07:11 - DNS of a network adapter forced (Wi-Fi)I 2016.11.19 21:07:11 - DNS of a network adapter forced (iPhone USB)I 2016.11.19 21:07:11 - DNS of a network adapter forced (Bluetooth PAN)I 2016.11.19 21:07:11 - DNS of a network adapter forced (Thunderbolt Bridge)I 2016.11.19 21:07:11 - Flushing DNSI 2016.11.19 21:07:11 - Checking routeE 2016.11.19 21:07:12 - Routing checking failed.. 2016.11.19 21:07:12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101! 2016.11.19 21:07:12 - Disconnecting. 2016.11.19 21:07:12 - Management - Send 'signal SIGTERM'. 2016.11.19 21:07:12 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.19 21:07:12 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.19 21:07:12 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.11.19 21:07:17 - OpenVPN > /sbin/route delete -net 62.102.148.136 192.168.0.1 255.255.255.255. 2016.11.19 21:07:17 - OpenVPN > delete net 62.102.148.136: gateway 192.168.0.1. 2016.11.19 21:07:17 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:07:17 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:07:17 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:07:17 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:07:17 - OpenVPN > Closing TUN/TAP interface. 2016.11.19 21:07:17 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.11.19 21:07:18 - Connection terminated.I 2016.11.19 21:07:18 - DNS of a network adapter restored to original settings (Ethernet)I 2016.11.19 21:07:18 - DNS of a network adapter restored to original settings (FireWire)I 2016.11.19 21:07:18 - DNS of a network adapter restored to original settings (Wi-Fi)I 2016.11.19 21:07:18 - DNS of a network adapter restored to original settings (iPhone USB)I 2016.11.19 21:07:18 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2016.11.19 21:07:18 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2016.11.19 21:07:21 - Checking authorization ...! 2016.11.19 21:07:21 - Connecting to Menkab (Sweden, Uppsala). 2016.11.19 21:07:21 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.11.19 21:07:21 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.19 21:07:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2016.11.19 21:07:21 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.19 21:07:21 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:07:21 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:07:21 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2016.11.19 21:07:21 - OpenVPN > UDPv4 link local: [undef]. 2016.11.19 21:07:21 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.143:443. 2016.11.19 21:07:21 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.143:443, sid=a36e0c44 522795b0. 2016.11.19 21:07:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.19 21:07:21 - OpenVPN > Validating certificate key usage. 2016.11.19 21:07:21 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.19 21:07:21 - OpenVPN > VERIFY KU OK. 2016.11.19 21:07:21 - OpenVPN > Validating certificate extended key usage. 2016.11.19 21:07:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.19 21:07:21 - OpenVPN > VERIFY EKU OK. 2016.11.19 21:07:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.19 21:07:24 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:07:24 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:07:24 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:07:24 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:07:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.19 21:07:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.143:443. 2016.11.19 21:07:26 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.19 21:07:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.36.163 255.255.0.0'. 2016.11.19 21:07:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.19 21:07:26 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.19 21:07:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.19 21:07:26 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.19 21:07:26 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.19 21:07:26 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.19 21:07:26 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2016.11.19 21:07:26 - OpenVPN > Opened utun device utun3. 2016.11.19 21:07:26 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2016.11.19 21:07:26 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.19 21:07:26 - OpenVPN > route: writing to routing socket: File exists. 2016.11.19 21:07:26 - OpenVPN > /sbin/ifconfig utun3 delete. 2016.11.19 21:07:26 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2016.11.19 21:07:26 - OpenVPN > /sbin/ifconfig utun3 10.4.36.163 10.4.36.163 netmask 255.255.0.0 mtu 1500 up. 2016.11.19 21:07:26 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.36.163 255.255.0.0. 2016.11.19 21:07:26 - OpenVPN > add net 10.4.0.0: gateway 10.4.36.163: File exists. 2016.11.19 21:07:26 - OpenVPN > /sbin/route add -net 62.102.148.143 192.168.0.1 255.255.255.255. 2016.11.19 21:07:26 - OpenVPN > add net 62.102.148.143: gateway 192.168.0.1. 2016.11.19 21:07:26 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:07:26 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:07:26 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:07:26 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:07:26 - Starting Management Interface. 2016.11.19 21:07:26 - OpenVPN > Initialization Sequence CompletedI 2016.11.19 21:07:26 - DNS of a network adapter forced (Ethernet)I 2016.11.19 21:07:26 - DNS of a network adapter forced (FireWire)I 2016.11.19 21:07:26 - DNS of a network adapter forced (Wi-Fi)I 2016.11.19 21:07:26 - DNS of a network adapter forced (iPhone USB)I 2016.11.19 21:07:26 - DNS of a network adapter forced (Bluetooth PAN)I 2016.11.19 21:07:26 - DNS of a network adapter forced (Thunderbolt Bridge)I 2016.11.19 21:07:26 - Flushing DNSI 2016.11.19 21:07:26 - Checking routeE 2016.11.19 21:07:27 - Routing checking failed.. 2016.11.19 21:07:27 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101! 2016.11.19 21:07:27 - Disconnecting. 2016.11.19 21:07:27 - Management - Send 'signal SIGTERM'. 2016.11.19 21:07:27 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.19 21:07:27 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.19 21:07:27 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.11.19 21:07:32 - OpenVPN > /sbin/route delete -net 62.102.148.143 192.168.0.1 255.255.255.255. 2016.11.19 21:07:32 - OpenVPN > delete net 62.102.148.143: gateway 192.168.0.1. 2016.11.19 21:07:32 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:07:32 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:07:32 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:07:32 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:07:32 - OpenVPN > Closing TUN/TAP interface. 2016.11.19 21:07:32 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.11.19 21:07:32 - Connection terminated.I 2016.11.19 21:07:32 - DNS of a network adapter restored to original settings (Ethernet)I 2016.11.19 21:07:32 - DNS of a network adapter restored to original settings (FireWire)I 2016.11.19 21:07:33 - DNS of a network adapter restored to original settings (Wi-Fi)I 2016.11.19 21:07:33 - DNS of a network adapter restored to original settings (iPhone USB)I 2016.11.19 21:07:33 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2016.11.19 21:07:33 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2016.11.19 21:07:36 - Checking authorization ...! 2016.11.19 21:07:36 - Connecting to Zaniah (Sweden, Uppsala). 2016.11.19 21:07:36 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.11.19 21:07:36 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.19 21:07:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2016.11.19 21:07:36 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.19 21:07:36 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:07:36 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:07:36 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2016.11.19 21:07:36 - OpenVPN > UDPv4 link local: [undef]. 2016.11.19 21:07:36 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.136:443. 2016.11.19 21:07:36 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.136:443, sid=e7030ad6 27d91bbb. 2016.11.19 21:07:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.19 21:07:36 - OpenVPN > Validating certificate key usage. 2016.11.19 21:07:36 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.19 21:07:36 - OpenVPN > VERIFY KU OK. 2016.11.19 21:07:36 - OpenVPN > Validating certificate extended key usage. 2016.11.19 21:07:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.19 21:07:36 - OpenVPN > VERIFY EKU OK. 2016.11.19 21:07:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.19 21:07:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:07:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:07:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:07:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:07:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.19 21:07:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.136:443. 2016.11.19 21:07:39 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.19 21:07:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.44 255.255.0.0'. 2016.11.19 21:07:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.19 21:07:39 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2016.11.19 21:07:39 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.19 21:07:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.19 21:07:39 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.19 21:07:39 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.19 21:07:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.19 21:07:39 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2016.11.19 21:07:39 - OpenVPN > Opened utun device utun3. 2016.11.19 21:07:39 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.19 21:07:39 - OpenVPN > /sbin/ifconfig utun3 delete. 2016.11.19 21:07:39 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2016.11.19 21:07:39 - OpenVPN > /sbin/ifconfig utun3 10.4.68.44 10.4.68.44 netmask 255.255.0.0 mtu 1500 up. 2016.11.19 21:07:39 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.44 255.255.0.0. 2016.11.19 21:07:39 - OpenVPN > route: writing to routing socket: File exists. 2016.11.19 21:07:39 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.44: File exists. 2016.11.19 21:07:39 - OpenVPN > /sbin/route add -net 62.102.148.136 192.168.0.1 255.255.255.255. 2016.11.19 21:07:39 - OpenVPN > add net 62.102.148.136: gateway 192.168.0.1. 2016.11.19 21:07:39 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:07:39 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:07:39 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:07:39 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:07:39 - Starting Management Interface. 2016.11.19 21:07:39 - OpenVPN > Initialization Sequence CompletedI 2016.11.19 21:07:39 - DNS of a network adapter forced (Ethernet)I 2016.11.19 21:07:39 - DNS of a network adapter forced (FireWire)I 2016.11.19 21:07:39 - DNS of a network adapter forced (Wi-Fi)I 2016.11.19 21:07:39 - DNS of a network adapter forced (iPhone USB)I 2016.11.19 21:07:39 - DNS of a network adapter forced (Bluetooth PAN)I 2016.11.19 21:07:39 - DNS of a network adapter forced (Thunderbolt Bridge)I 2016.11.19 21:07:39 - Flushing DNSI 2016.11.19 21:07:40 - Checking routeE 2016.11.19 21:07:40 - Routing checking failed.. 2016.11.19 21:07:40 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101! 2016.11.19 21:07:40 - Disconnecting. 2016.11.19 21:07:40 - Management - Send 'signal SIGTERM'. 2016.11.19 21:07:40 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.19 21:07:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.19 21:07:40 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.11.19 21:07:45 - OpenVPN > /sbin/route delete -net 62.102.148.136 192.168.0.1 255.255.255.255. 2016.11.19 21:07:45 - OpenVPN > delete net 62.102.148.136: gateway 192.168.0.1. 2016.11.19 21:07:45 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:07:45 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:07:45 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:07:45 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:07:45 - OpenVPN > Closing TUN/TAP interface. 2016.11.19 21:07:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.11.19 21:07:45 - Connection terminated.I 2016.11.19 21:07:45 - DNS of a network adapter restored to original settings (Ethernet)I 2016.11.19 21:07:45 - DNS of a network adapter restored to original settings (FireWire)I 2016.11.19 21:07:45 - DNS of a network adapter restored to original settings (Wi-Fi)I 2016.11.19 21:07:45 - DNS of a network adapter restored to original settings (iPhone USB)I 2016.11.19 21:07:45 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2016.11.19 21:07:45 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2016.11.19 21:07:48 - Checking authorization ...! 2016.11.19 21:07:48 - Connecting to Zaniah (Sweden, Uppsala). 2016.11.19 21:07:48 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.11.19 21:07:48 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.19 21:07:48 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2016.11.19 21:07:48 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.19 21:07:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:07:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:07:48 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2016.11.19 21:07:48 - OpenVPN > UDPv4 link local: [undef]. 2016.11.19 21:07:48 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.136:443. 2016.11.19 21:07:48 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.136:443, sid=df083b0d 655d699f. 2016.11.19 21:07:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.19 21:07:48 - OpenVPN > Validating certificate key usage. 2016.11.19 21:07:48 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.19 21:07:48 - OpenVPN > VERIFY KU OK. 2016.11.19 21:07:48 - OpenVPN > Validating certificate extended key usage. 2016.11.19 21:07:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.19 21:07:48 - OpenVPN > VERIFY EKU OK. 2016.11.19 21:07:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.19 21:07:50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:07:50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:07:50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:07:50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:07:50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.19 21:07:50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.136:443. 2016.11.19 21:07:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.19 21:07:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.44 255.255.0.0'. 2016.11.19 21:07:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.19 21:07:52 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2016.11.19 21:07:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.19 21:07:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.19 21:07:52 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.19 21:07:52 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.19 21:07:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.19 21:07:52 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2016.11.19 21:07:52 - OpenVPN > Opened utun device utun3. 2016.11.19 21:07:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.19 21:07:52 - OpenVPN > /sbin/ifconfig utun3 delete. 2016.11.19 21:07:52 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2016.11.19 21:07:52 - OpenVPN > /sbin/ifconfig utun3 10.4.68.44 10.4.68.44 netmask 255.255.0.0 mtu 1500 up. 2016.11.19 21:07:52 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.44 255.255.0.0. 2016.11.19 21:07:52 - OpenVPN > route: writing to routing socket: File exists. 2016.11.19 21:07:52 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.44: File exists. 2016.11.19 21:07:52 - OpenVPN > /sbin/route add -net 62.102.148.136 192.168.0.1 255.255.255.255. 2016.11.19 21:07:52 - OpenVPN > add net 62.102.148.136: gateway 192.168.0.1. 2016.11.19 21:07:52 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:07:52 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:07:52 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:07:52 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:07:52 - Starting Management Interface. 2016.11.19 21:07:52 - OpenVPN > Initialization Sequence CompletedI 2016.11.19 21:07:53 - DNS of a network adapter forced (Ethernet)I 2016.11.19 21:07:53 - DNS of a network adapter forced (FireWire)I 2016.11.19 21:07:53 - DNS of a network adapter forced (Wi-Fi)I 2016.11.19 21:07:53 - DNS of a network adapter forced (iPhone USB)I 2016.11.19 21:07:53 - DNS of a network adapter forced (Bluetooth PAN)I 2016.11.19 21:07:53 - DNS of a network adapter forced (Thunderbolt Bridge)I 2016.11.19 21:07:53 - Flushing DNSI 2016.11.19 21:07:53 - Checking routeE 2016.11.19 21:07:53 - Routing checking failed.. 2016.11.19 21:07:53 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101! 2016.11.19 21:07:53 - Disconnecting. 2016.11.19 21:07:53 - Management - Send 'signal SIGTERM'. 2016.11.19 21:07:53 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.19 21:07:53 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.19 21:07:53 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.11.19 21:07:58 - OpenVPN > /sbin/route delete -net 62.102.148.136 192.168.0.1 255.255.255.255. 2016.11.19 21:07:58 - OpenVPN > delete net 62.102.148.136: gateway 192.168.0.1. 2016.11.19 21:07:58 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:07:58 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:07:58 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:07:58 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:07:58 - OpenVPN > Closing TUN/TAP interface. 2016.11.19 21:07:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.11.19 21:07:58 - Connection terminated.I 2016.11.19 21:07:58 - DNS of a network adapter restored to original settings (Ethernet)I 2016.11.19 21:07:58 - DNS of a network adapter restored to original settings (FireWire)I 2016.11.19 21:07:58 - DNS of a network adapter restored to original settings (Wi-Fi)I 2016.11.19 21:07:58 - DNS of a network adapter restored to original settings (iPhone USB)I 2016.11.19 21:07:58 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2016.11.19 21:07:58 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2016.11.19 21:08:01 - Checking authorization ...! 2016.11.19 21:08:02 - Connecting to Zaniah (Sweden, Uppsala). 2016.11.19 21:08:02 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.11.19 21:08:02 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.19 21:08:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2016.11.19 21:08:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.19 21:08:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:08:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:08:02 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2016.11.19 21:08:02 - OpenVPN > UDPv4 link local: [undef]. 2016.11.19 21:08:02 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.136:443. 2016.11.19 21:08:02 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.136:443, sid=b48f60ad 86d1e4d1. 2016.11.19 21:08:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.19 21:08:02 - OpenVPN > Validating certificate key usage. 2016.11.19 21:08:02 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.19 21:08:02 - OpenVPN > VERIFY KU OK. 2016.11.19 21:08:02 - OpenVPN > Validating certificate extended key usage. 2016.11.19 21:08:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.19 21:08:02 - OpenVPN > VERIFY EKU OK. 2016.11.19 21:08:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.19 21:08:05 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:08:05 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:08:05 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:08:05 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:08:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.19 21:08:05 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.136:443. 2016.11.19 21:08:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.19 21:08:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.44 255.255.0.0'. 2016.11.19 21:08:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.19 21:08:07 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2016.11.19 21:08:07 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.19 21:08:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.19 21:08:07 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.19 21:08:07 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.19 21:08:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.19 21:08:07 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2016.11.19 21:08:07 - OpenVPN > Opened utun device utun3. 2016.11.19 21:08:07 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.19 21:08:07 - OpenVPN > /sbin/ifconfig utun3 delete. 2016.11.19 21:08:07 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2016.11.19 21:08:07 - OpenVPN > route: writing to routing socket: File exists. 2016.11.19 21:08:07 - OpenVPN > /sbin/ifconfig utun3 10.4.68.44 10.4.68.44 netmask 255.255.0.0 mtu 1500 up. 2016.11.19 21:08:07 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.44 255.255.0.0. 2016.11.19 21:08:07 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.44: File exists. 2016.11.19 21:08:07 - OpenVPN > /sbin/route add -net 62.102.148.136 192.168.0.1 255.255.255.255. 2016.11.19 21:08:07 - OpenVPN > add net 62.102.148.136: gateway 192.168.0.1. 2016.11.19 21:08:07 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:08:07 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:08:07 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:08:07 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:08:07 - Starting Management Interface. 2016.11.19 21:08:07 - OpenVPN > Initialization Sequence CompletedI 2016.11.19 21:08:07 - DNS of a network adapter forced (Ethernet)I 2016.11.19 21:08:07 - DNS of a network adapter forced (FireWire)I 2016.11.19 21:08:07 - DNS of a network adapter forced (Wi-Fi)I 2016.11.19 21:08:07 - DNS of a network adapter forced (iPhone USB)I 2016.11.19 21:08:07 - DNS of a network adapter forced (Bluetooth PAN)I 2016.11.19 21:08:08 - DNS of a network adapter forced (Thunderbolt Bridge)I 2016.11.19 21:08:08 - Flushing DNSI 2016.11.19 21:08:08 - Checking routeE 2016.11.19 21:08:08 - Routing checking failed.. 2016.11.19 21:08:08 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101! 2016.11.19 21:08:08 - Disconnecting. 2016.11.19 21:08:08 - Management - Send 'signal SIGTERM'. 2016.11.19 21:08:08 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.19 21:08:08 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.19 21:08:08 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.11.19 21:08:13 - OpenVPN > /sbin/route delete -net 62.102.148.136 192.168.0.1 255.255.255.255. 2016.11.19 21:08:13 - OpenVPN > delete net 62.102.148.136: gateway 192.168.0.1. 2016.11.19 21:08:13 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:08:13 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:08:13 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:08:13 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:08:13 - OpenVPN > Closing TUN/TAP interface. 2016.11.19 21:08:13 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.11.19 21:08:13 - Connection terminated.I 2016.11.19 21:08:13 - DNS of a network adapter restored to original settings (Ethernet)I 2016.11.19 21:08:13 - DNS of a network adapter restored to original settings (FireWire)I 2016.11.19 21:08:13 - DNS of a network adapter restored to original settings (Wi-Fi)I 2016.11.19 21:08:13 - DNS of a network adapter restored to original settings (iPhone USB)I 2016.11.19 21:08:14 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2016.11.19 21:08:14 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2016.11.19 21:08:17 - Checking authorization ...! 2016.11.19 21:08:17 - Connecting to Zaniah (Sweden, Uppsala). 2016.11.19 21:08:17 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.11.19 21:08:17 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.19 21:08:17 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2016.11.19 21:08:17 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.19 21:08:17 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:08:17 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:08:17 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2016.11.19 21:08:17 - OpenVPN > UDPv4 link local: [undef]. 2016.11.19 21:08:17 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.136:443. 2016.11.19 21:08:17 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.136:443, sid=3cd46dad ab7cd641. 2016.11.19 21:08:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.19 21:08:17 - OpenVPN > Validating certificate key usage. 2016.11.19 21:08:17 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.19 21:08:17 - OpenVPN > VERIFY KU OK. 2016.11.19 21:08:17 - OpenVPN > Validating certificate extended key usage. 2016.11.19 21:08:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.19 21:08:17 - OpenVPN > VERIFY EKU OK. 2016.11.19 21:08:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.19 21:08:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:08:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:08:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:08:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:08:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.19 21:08:20 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.136:443. 2016.11.19 21:08:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.19 21:08:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.44 255.255.0.0'. 2016.11.19 21:08:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.19 21:08:22 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.19 21:08:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.19 21:08:22 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.19 21:08:22 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.19 21:08:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.19 21:08:22 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2016.11.19 21:08:22 - OpenVPN > Opened utun device utun3. 2016.11.19 21:08:22 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.19 21:08:22 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2016.11.19 21:08:22 - OpenVPN > /sbin/ifconfig utun3 delete. 2016.11.19 21:08:22 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2016.11.19 21:08:22 - OpenVPN > /sbin/ifconfig utun3 10.4.68.44 10.4.68.44 netmask 255.255.0.0 mtu 1500 up. 2016.11.19 21:08:22 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.44 255.255.0.0. 2016.11.19 21:08:22 - OpenVPN > route: writing to routing socket: File exists. 2016.11.19 21:08:22 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.44: File exists. 2016.11.19 21:08:22 - OpenVPN > /sbin/route add -net 62.102.148.136 192.168.0.1 255.255.255.255. 2016.11.19 21:08:22 - OpenVPN > add net 62.102.148.136: gateway 192.168.0.1. 2016.11.19 21:08:22 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:08:22 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:08:22 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:08:22 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:08:22 - Starting Management Interface. 2016.11.19 21:08:22 - OpenVPN > Initialization Sequence CompletedI 2016.11.19 21:08:22 - DNS of a network adapter forced (Ethernet)I 2016.11.19 21:08:22 - DNS of a network adapter forced (FireWire)I 2016.11.19 21:08:22 - DNS of a network adapter forced (Wi-Fi)I 2016.11.19 21:08:22 - DNS of a network adapter forced (iPhone USB)I 2016.11.19 21:08:22 - DNS of a network adapter forced (Bluetooth PAN)I 2016.11.19 21:08:22 - DNS of a network adapter forced (Thunderbolt Bridge)I 2016.11.19 21:08:22 - Flushing DNSI 2016.11.19 21:08:22 - Checking routeE 2016.11.19 21:08:22 - Routing checking failed.. 2016.11.19 21:08:22 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101! 2016.11.19 21:08:23 - Disconnecting. 2016.11.19 21:08:23 - Management - Send 'signal SIGTERM'. 2016.11.19 21:08:23 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.19 21:08:23 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.19 21:08:23 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.11.19 21:08:28 - OpenVPN > /sbin/route delete -net 62.102.148.136 192.168.0.1 255.255.255.255. 2016.11.19 21:08:28 - OpenVPN > delete net 62.102.148.136: gateway 192.168.0.1. 2016.11.19 21:08:28 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:08:28 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:08:28 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:08:28 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:08:28 - OpenVPN > Closing TUN/TAP interface. 2016.11.19 21:08:28 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.11.19 21:08:28 - Connection terminated.I 2016.11.19 21:08:28 - DNS of a network adapter restored to original settings (Ethernet)I 2016.11.19 21:08:28 - DNS of a network adapter restored to original settings (FireWire)I 2016.11.19 21:08:28 - DNS of a network adapter restored to original settings (Wi-Fi)I 2016.11.19 21:08:28 - DNS of a network adapter restored to original settings (iPhone USB)I 2016.11.19 21:08:28 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2016.11.19 21:08:28 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2016.11.19 21:08:31 - Checking authorization ...! 2016.11.19 21:08:31 - Connecting to Zaniah (Sweden, Uppsala). 2016.11.19 21:08:31 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.11.19 21:08:31 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.19 21:08:31 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2016.11.19 21:08:31 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.19 21:08:31 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:08:31 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:08:31 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2016.11.19 21:08:31 - OpenVPN > UDPv4 link local: [undef]. 2016.11.19 21:08:31 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.136:443. 2016.11.19 21:08:31 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.136:443, sid=012fffa6 9b59565c. 2016.11.19 21:08:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.19 21:08:31 - OpenVPN > Validating certificate key usage. 2016.11.19 21:08:31 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.19 21:08:31 - OpenVPN > VERIFY KU OK. 2016.11.19 21:08:31 - OpenVPN > Validating certificate extended key usage. 2016.11.19 21:08:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.19 21:08:31 - OpenVPN > VERIFY EKU OK. 2016.11.19 21:08:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.19 21:08:37 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:08:37 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:08:37 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:08:37 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:08:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.19 21:08:37 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.136:443. 2016.11.19 21:08:39 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.19 21:08:39 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.44 255.255.0.0'. 2016.11.19 21:08:39 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.19 21:08:39 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.19 21:08:39 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.19 21:08:39 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.19 21:08:39 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.19 21:08:39 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.19 21:08:39 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2016.11.19 21:08:39 - OpenVPN > Opened utun device utun3. 2016.11.19 21:08:39 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.19 21:08:39 - OpenVPN > /sbin/ifconfig utun3 delete. 2016.11.19 21:08:39 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2016.11.19 21:08:39 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2016.11.19 21:08:39 - OpenVPN > /sbin/ifconfig utun3 10.4.68.44 10.4.68.44 netmask 255.255.0.0 mtu 1500 up. 2016.11.19 21:08:39 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.44 255.255.0.0. 2016.11.19 21:08:39 - OpenVPN > route: writing to routing socket: File exists. 2016.11.19 21:08:39 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.44: File exists. 2016.11.19 21:08:39 - OpenVPN > /sbin/route add -net 62.102.148.136 192.168.0.1 255.255.255.255. 2016.11.19 21:08:39 - OpenVPN > add net 62.102.148.136: gateway 192.168.0.1. 2016.11.19 21:08:39 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:08:39 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:08:39 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:08:39 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:08:39 - Starting Management Interface. 2016.11.19 21:08:39 - OpenVPN > Initialization Sequence CompletedI 2016.11.19 21:08:39 - DNS of a network adapter forced (Ethernet)I 2016.11.19 21:08:39 - DNS of a network adapter forced (FireWire)I 2016.11.19 21:08:39 - DNS of a network adapter forced (Wi-Fi)I 2016.11.19 21:08:40 - DNS of a network adapter forced (iPhone USB)I 2016.11.19 21:08:40 - DNS of a network adapter forced (Bluetooth PAN)I 2016.11.19 21:08:40 - DNS of a network adapter forced (Thunderbolt Bridge)I 2016.11.19 21:08:40 - Flushing DNSI 2016.11.19 21:08:40 - Checking routeE 2016.11.19 21:08:40 - Routing checking failed.. 2016.11.19 21:08:40 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101! 2016.11.19 21:08:40 - Disconnecting. 2016.11.19 21:08:40 - Management - Send 'signal SIGTERM'. 2016.11.19 21:08:40 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.19 21:08:40 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.19 21:08:40 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.11.19 21:08:45 - OpenVPN > /sbin/route delete -net 62.102.148.136 192.168.0.1 255.255.255.255. 2016.11.19 21:08:45 - OpenVPN > delete net 62.102.148.136: gateway 192.168.0.1. 2016.11.19 21:08:45 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:08:45 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:08:45 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:08:45 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:08:45 - OpenVPN > Closing TUN/TAP interface. 2016.11.19 21:08:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.11.19 21:08:45 - Connection terminated.I 2016.11.19 21:08:45 - DNS of a network adapter restored to original settings (Ethernet)I 2016.11.19 21:08:45 - DNS of a network adapter restored to original settings (FireWire)I 2016.11.19 21:08:45 - DNS of a network adapter restored to original settings (Wi-Fi)I 2016.11.19 21:08:45 - DNS of a network adapter restored to original settings (iPhone USB)I 2016.11.19 21:08:45 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2016.11.19 21:08:46 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2016.11.19 21:08:49 - Checking authorization ...! 2016.11.19 21:08:49 - Connecting to Zaniah (Sweden, Uppsala). 2016.11.19 21:08:49 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.11.19 21:08:49 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.19 21:08:49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2016.11.19 21:08:49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.19 21:08:49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:08:49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:08:49 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2016.11.19 21:08:49 - OpenVPN > UDPv4 link local: [undef]. 2016.11.19 21:08:49 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.136:443. 2016.11.19 21:08:49 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.136:443, sid=a1236962 b28e5610. 2016.11.19 21:08:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.19 21:08:49 - OpenVPN > Validating certificate key usage. 2016.11.19 21:08:49 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.19 21:08:49 - OpenVPN > VERIFY KU OK. 2016.11.19 21:08:49 - OpenVPN > Validating certificate extended key usage. 2016.11.19 21:08:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.19 21:08:49 - OpenVPN > VERIFY EKU OK. 2016.11.19 21:08:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.19 21:08:49 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:08:49 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:08:49 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:08:49 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:08:49 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.19 21:08:49 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.136:443. 2016.11.19 21:08:52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.19 21:08:52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.44 255.255.0.0'. 2016.11.19 21:08:52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.19 21:08:52 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2016.11.19 21:08:52 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.19 21:08:52 - OpenVPN > route: writing to routing socket: File exists. 2016.11.19 21:08:52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.19 21:08:52 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.19 21:08:52 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.19 21:08:52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.19 21:08:52 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2016.11.19 21:08:52 - OpenVPN > Opened utun device utun3. 2016.11.19 21:08:52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.19 21:08:52 - OpenVPN > /sbin/ifconfig utun3 delete. 2016.11.19 21:08:52 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2016.11.19 21:08:52 - OpenVPN > /sbin/ifconfig utun3 10.4.68.44 10.4.68.44 netmask 255.255.0.0 mtu 1500 up. 2016.11.19 21:08:52 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.44 255.255.0.0. 2016.11.19 21:08:52 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.44: File exists. 2016.11.19 21:08:52 - OpenVPN > /sbin/route add -net 62.102.148.136 192.168.0.1 255.255.255.255. 2016.11.19 21:08:52 - OpenVPN > add net 62.102.148.136: gateway 192.168.0.1. 2016.11.19 21:08:52 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:08:52 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:08:52 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:08:52 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:08:52 - Starting Management Interface. 2016.11.19 21:08:52 - OpenVPN > Initialization Sequence CompletedI 2016.11.19 21:08:52 - DNS of a network adapter forced (Ethernet)I 2016.11.19 21:08:52 - DNS of a network adapter forced (FireWire)I 2016.11.19 21:08:52 - DNS of a network adapter forced (Wi-Fi)I 2016.11.19 21:08:52 - DNS of a network adapter forced (iPhone USB)I 2016.11.19 21:08:52 - DNS of a network adapter forced (Bluetooth PAN)I 2016.11.19 21:08:52 - DNS of a network adapter forced (Thunderbolt Bridge)I 2016.11.19 21:08:52 - Flushing DNSI 2016.11.19 21:08:52 - Checking routeE 2016.11.19 21:08:53 - Routing checking failed.. 2016.11.19 21:08:53 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101! 2016.11.19 21:08:53 - Disconnecting. 2016.11.19 21:08:53 - Management - Send 'signal SIGTERM'. 2016.11.19 21:08:53 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.19 21:08:53 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.19 21:08:53 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.11.19 21:08:58 - OpenVPN > /sbin/route delete -net 62.102.148.136 192.168.0.1 255.255.255.255. 2016.11.19 21:08:58 - OpenVPN > delete net 62.102.148.136: gateway 192.168.0.1. 2016.11.19 21:08:58 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:08:58 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:08:58 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:08:58 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:08:58 - OpenVPN > Closing TUN/TAP interface. 2016.11.19 21:08:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.11.19 21:08:58 - Connection terminated.I 2016.11.19 21:08:58 - DNS of a network adapter restored to original settings (Ethernet)I 2016.11.19 21:08:58 - DNS of a network adapter restored to original settings (FireWire)I 2016.11.19 21:08:58 - DNS of a network adapter restored to original settings (Wi-Fi)I 2016.11.19 21:08:58 - DNS of a network adapter restored to original settings (iPhone USB)I 2016.11.19 21:08:58 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2016.11.19 21:08:58 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2016.11.19 21:09:01 - Checking authorization ...! 2016.11.19 21:09:01 - Connecting to Zaniah (Sweden, Uppsala). 2016.11.19 21:09:01 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.11.19 21:09:01 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.19 21:09:01 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2016.11.19 21:09:01 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.19 21:09:01 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:09:01 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:09:01 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2016.11.19 21:09:01 - OpenVPN > UDPv4 link local: [undef]. 2016.11.19 21:09:01 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.136:443. 2016.11.19 21:09:01 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.136:443, sid=576166c8 fe1ca682. 2016.11.19 21:09:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.19 21:09:01 - OpenVPN > Validating certificate key usage. 2016.11.19 21:09:01 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.19 21:09:01 - OpenVPN > VERIFY KU OK. 2016.11.19 21:09:01 - OpenVPN > Validating certificate extended key usage. 2016.11.19 21:09:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.19 21:09:01 - OpenVPN > VERIFY EKU OK. 2016.11.19 21:09:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.19 21:09:02 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:09:02 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:09:02 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:09:02 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:09:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.19 21:09:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.136:443. 2016.11.19 21:09:04 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.19 21:09:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.44 255.255.0.0'. 2016.11.19 21:09:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.19 21:09:04 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.19 21:09:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.19 21:09:04 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.19 21:09:04 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.19 21:09:04 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.19 21:09:04 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2016.11.19 21:09:04 - OpenVPN > Opened utun device utun3. 2016.11.19 21:09:04 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.19 21:09:04 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2016.11.19 21:09:04 - OpenVPN > /sbin/ifconfig utun3 delete. 2016.11.19 21:09:04 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2016.11.19 21:09:04 - OpenVPN > /sbin/ifconfig utun3 10.4.68.44 10.4.68.44 netmask 255.255.0.0 mtu 1500 up. 2016.11.19 21:09:04 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.44 255.255.0.0. 2016.11.19 21:09:04 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.44: File exists. 2016.11.19 21:09:04 - OpenVPN > route: writing to routing socket: File exists. 2016.11.19 21:09:04 - OpenVPN > /sbin/route add -net 62.102.148.136 192.168.0.1 255.255.255.255. 2016.11.19 21:09:04 - OpenVPN > add net 62.102.148.136: gateway 192.168.0.1. 2016.11.19 21:09:04 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:09:04 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:09:04 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:09:04 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:09:04 - Starting Management Interface. 2016.11.19 21:09:04 - OpenVPN > Initialization Sequence CompletedI 2016.11.19 21:09:04 - DNS of a network adapter forced (Ethernet)I 2016.11.19 21:09:04 - DNS of a network adapter forced (FireWire)I 2016.11.19 21:09:05 - DNS of a network adapter forced (Wi-Fi)I 2016.11.19 21:09:05 - DNS of a network adapter forced (iPhone USB)I 2016.11.19 21:09:05 - DNS of a network adapter forced (Bluetooth PAN)I 2016.11.19 21:09:05 - DNS of a network adapter forced (Thunderbolt Bridge)I 2016.11.19 21:09:05 - Flushing DNSI 2016.11.19 21:09:05 - Checking routeE 2016.11.19 21:09:05 - Routing checking failed.. 2016.11.19 21:09:05 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101! 2016.11.19 21:09:05 - Disconnecting. 2016.11.19 21:09:05 - Management - Send 'signal SIGTERM'. 2016.11.19 21:09:05 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.19 21:09:05 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.19 21:09:05 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.11.19 21:09:10 - OpenVPN > /sbin/route delete -net 62.102.148.136 192.168.0.1 255.255.255.255. 2016.11.19 21:09:10 - OpenVPN > delete net 62.102.148.136: gateway 192.168.0.1. 2016.11.19 21:09:10 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:09:10 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:09:10 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:09:10 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:09:10 - OpenVPN > Closing TUN/TAP interface. 2016.11.19 21:09:10 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.11.19 21:09:10 - Connection terminated.I 2016.11.19 21:09:10 - DNS of a network adapter restored to original settings (Ethernet)I 2016.11.19 21:09:10 - DNS of a network adapter restored to original settings (FireWire)I 2016.11.19 21:09:10 - DNS of a network adapter restored to original settings (Wi-Fi)I 2016.11.19 21:09:10 - DNS of a network adapter restored to original settings (iPhone USB)I 2016.11.19 21:09:10 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2016.11.19 21:09:10 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2016.11.19 21:09:13 - Checking authorization ...! 2016.11.19 21:09:13 - Connecting to Zaniah (Sweden, Uppsala). 2016.11.19 21:09:13 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.11.19 21:09:13 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.19 21:09:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2016.11.19 21:09:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.19 21:09:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:09:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:09:13 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2016.11.19 21:09:13 - OpenVPN > UDPv4 link local: [undef]. 2016.11.19 21:09:13 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.136:443. 2016.11.19 21:09:13 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.136:443, sid=e4eb9024 50e3a7ef. 2016.11.19 21:09:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.19 21:09:13 - OpenVPN > Validating certificate key usage. 2016.11.19 21:09:13 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.19 21:09:13 - OpenVPN > VERIFY KU OK. 2016.11.19 21:09:13 - OpenVPN > Validating certificate extended key usage. 2016.11.19 21:09:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.19 21:09:13 - OpenVPN > VERIFY EKU OK. 2016.11.19 21:09:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.19 21:09:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:09:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:09:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:09:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:09:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.19 21:09:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.136:443. 2016.11.19 21:09:21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.19 21:09:21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.44 255.255.0.0'. 2016.11.19 21:09:21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.19 21:09:21 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2016.11.19 21:09:21 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.19 21:09:21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.19 21:09:21 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.19 21:09:21 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.19 21:09:21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.19 21:09:21 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2016.11.19 21:09:21 - OpenVPN > Opened utun device utun3. 2016.11.19 21:09:21 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.19 21:09:21 - OpenVPN > /sbin/ifconfig utun3 delete. 2016.11.19 21:09:21 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2016.11.19 21:09:21 - OpenVPN > /sbin/ifconfig utun3 10.4.68.44 10.4.68.44 netmask 255.255.0.0 mtu 1500 up. 2016.11.19 21:09:21 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.44 255.255.0.0. 2016.11.19 21:09:21 - OpenVPN > route: writing to routing socket: File exists. 2016.11.19 21:09:21 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.44: File exists. 2016.11.19 21:09:21 - OpenVPN > /sbin/route add -net 62.102.148.136 192.168.0.1 255.255.255.255. 2016.11.19 21:09:21 - OpenVPN > add net 62.102.148.136: gateway 192.168.0.1. 2016.11.19 21:09:21 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:09:21 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:09:21 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:09:21 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:09:21 - Starting Management Interface. 2016.11.19 21:09:21 - OpenVPN > Initialization Sequence CompletedI 2016.11.19 21:09:22 - DNS of a network adapter forced (Ethernet)I 2016.11.19 21:09:22 - DNS of a network adapter forced (FireWire)I 2016.11.19 21:09:22 - DNS of a network adapter forced (Wi-Fi)I 2016.11.19 21:09:22 - DNS of a network adapter forced (iPhone USB)I 2016.11.19 21:09:22 - DNS of a network adapter forced (Bluetooth PAN)I 2016.11.19 21:09:22 - DNS of a network adapter forced (Thunderbolt Bridge)I 2016.11.19 21:09:22 - Flushing DNSI 2016.11.19 21:09:22 - Checking routeE 2016.11.19 21:09:22 - Routing checking failed.. 2016.11.19 21:09:22 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101! 2016.11.19 21:09:22 - Disconnecting. 2016.11.19 21:09:22 - Management - Send 'signal SIGTERM'. 2016.11.19 21:09:22 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.19 21:09:22 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.19 21:09:22 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.11.19 21:09:27 - OpenVPN > /sbin/route delete -net 62.102.148.136 192.168.0.1 255.255.255.255. 2016.11.19 21:09:27 - OpenVPN > delete net 62.102.148.136: gateway 192.168.0.1. 2016.11.19 21:09:27 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:09:27 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:09:27 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:09:27 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:09:27 - OpenVPN > Closing TUN/TAP interface. 2016.11.19 21:09:27 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2016.11.19 21:09:27 - Connection terminated.I 2016.11.19 21:09:27 - DNS of a network adapter restored to original settings (Ethernet)I 2016.11.19 21:09:27 - DNS of a network adapter restored to original settings (FireWire)I 2016.11.19 21:09:27 - DNS of a network adapter restored to original settings (Wi-Fi)I 2016.11.19 21:09:27 - DNS of a network adapter restored to original settings (iPhone USB)I 2016.11.19 21:09:27 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2016.11.19 21:09:27 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2016.11.19 21:09:30 - Checking authorization ...! 2016.11.19 21:09:30 - Connecting to Zaniah (Sweden, Uppsala). 2016.11.19 21:09:30 - OpenVPN > OpenVPN 2.3.8 x86_64-apple-darwin14.4.0 [sSL (OpenSSL)] [LZO] [MH] [iPv6] built on Aug 13 2015. 2016.11.19 21:09:30 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.11.19 21:09:30 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101. 2016.11.19 21:09:30 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.11.19 21:09:30 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:09:30 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:09:30 - OpenVPN > Socket Buffers: R=[196724->131072] S=[9216->131072]. 2016.11.19 21:09:30 - OpenVPN > UDPv4 link local: [undef]. 2016.11.19 21:09:30 - OpenVPN > UDPv4 link remote: [AF_INET]62.102.148.136:443. 2016.11.19 21:09:30 - OpenVPN > TLS: Initial packet from [AF_INET]62.102.148.136:443, sid=c907c49e e8a2e572. 2016.11.19 21:09:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.11.19 21:09:30 - OpenVPN > Validating certificate key usage. 2016.11.19 21:09:30 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.11.19 21:09:30 - OpenVPN > VERIFY KU OK. 2016.11.19 21:09:30 - OpenVPN > Validating certificate extended key usage. 2016.11.19 21:09:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.11.19 21:09:30 - OpenVPN > VERIFY EKU OK. 2016.11.19 21:09:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.11.19 21:09:31 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:09:31 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:09:31 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.11.19 21:09:31 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.11.19 21:09:31 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.11.19 21:09:31 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]62.102.148.136:443. 2016.11.19 21:09:33 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.11.19 21:09:33 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.68.44 255.255.0.0'. 2016.11.19 21:09:33 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.11.19 21:09:33 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address. 2016.11.19 21:09:33 - OpenVPN > route: writing to routing socket: File exists. 2016.11.19 21:09:33 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.11.19 21:09:33 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.11.19 21:09:33 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.11.19 21:09:33 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.11.19 21:09:33 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.11.19 21:09:33 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy. 2016.11.19 21:09:33 - OpenVPN > Opened utun device utun3. 2016.11.19 21:09:33 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.11.19 21:09:33 - OpenVPN > /sbin/ifconfig utun3 delete. 2016.11.19 21:09:33 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure. 2016.11.19 21:09:33 - OpenVPN > /sbin/ifconfig utun3 10.4.68.44 10.4.68.44 netmask 255.255.0.0 mtu 1500 up. 2016.11.19 21:09:33 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.68.44 255.255.0.0. 2016.11.19 21:09:33 - OpenVPN > add net 10.4.0.0: gateway 10.4.68.44: File exists. 2016.11.19 21:09:33 - OpenVPN > /sbin/route add -net 62.102.148.136 192.168.0.1 255.255.255.255. 2016.11.19 21:09:33 - OpenVPN > add net 62.102.148.136: gateway 192.168.0.1. 2016.11.19 21:09:33 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:09:33 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:09:33 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:09:33 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1. 2016.11.19 21:09:33 - Starting Management Interface. 2016.11.19 21:09:33 - OpenVPN > Initialization Sequence CompletedI 2016.11.19 21:09:33 - DNS of a network adapter forced (Ethernet)I 2016.11.19 21:09:33 - DNS of a network adapter forced (FireWire)I 2016.11.19 21:09:33 - DNS of a network adapter forced (Wi-Fi)I 2016.11.19 21:09:33 - DNS of a network adapter forced (iPhone USB)I 2016.11.19 21:09:33 - DNS of a network adapter forced (Bluetooth PAN)I 2016.11.19 21:09:33 - DNS of a network adapter forced (Thunderbolt Bridge)I 2016.11.19 21:09:33 - Flushing DNSI 2016.11.19 21:09:34 - Checking routeE 2016.11.19 21:09:34 - Routing checking failed.. 2016.11.19 21:09:34 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101! 2016.11.19 21:09:34 - Disconnecting. 2016.11.19 21:09:34 - Management - Send 'signal SIGTERM'. 2016.11.19 21:09:34 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.11.19 21:09:34 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.11.19 21:09:34 - OpenVPN > SIGTERM received, sending exit notification to peer. 2016.11.19 21:09:39 - OpenVPN > /sbin/route delete -net 62.102.148.136 192.168.0.1 255.255.255.255. 2016.11.19 21:09:39 - OpenVPN > delete net 62.102.148.136: gateway 192.168.0.1. 2016.11.19 21:09:39 - OpenVPN > /sbin/route delete -net 0.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:09:39 - OpenVPN > delete net 0.0.0.0: gateway 10.4.0.1. 2016.11.19 21:09:39 - Connection terminated.I 2016.11.19 21:09:39 - DNS of a network adapter restored to original settings (Ethernet). 2016.11.19 21:09:39 - OpenVPN > /sbin/route delete -net 128.0.0.0 10.4.0.1 128.0.0.0. 2016.11.19 21:09:39 - OpenVPN > delete net 128.0.0.0: gateway 10.4.0.1I 2016.11.19 21:09:39 - DNS of a network adapter restored to original settings (FireWire). 2016.11.19 21:09:39 - OpenVPN > Closing TUN/TAP interfaceI 2016.11.19 21:09:39 - DNS of a network adapter restored to original settings (Wi-Fi). 2016.11.19 21:09:39 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exitingI 2016.11.19 21:09:39 - DNS of a network adapter restored to original settings (iPhone USB)I 2016.11.19 21:09:39 - DNS of a network adapter restored to original settings (Bluetooth PAN)I 2016.11.19 21:09:40 - DNS of a network adapter restored to original settings (Thunderbolt Bridge)I 2016.11.19 21:09:40 - Cancel requested.I 2016.11.19 21:09:40 - IPv6 restored on network adapter (Ethernet)I 2016.11.19 21:09:40 - IPv6 restored on network adapter (FireWire)I 2016.11.19 21:09:40 - IPv6 restored on network adapter (Wi-Fi)I 2016.11.19 21:09:40 - IPv6 restored on network adapter (iPhone USB)I 2016.11.19 21:09:40 - IPv6 restored on network adapter (Bluetooth PAN)I 2016.11.19 21:09:40 - IPv6 restored on network adapter (Thunderbolt Bridge)! 2016.11.19 21:09:40 - Session terminated.
-
Hi, I downloaded the latest Eddie (2.11.5, package installer), installed, and upon application launch, found the application stuck at Starting. The menu bar icon's menu which normally displays connection status reads: 'Eddie client veresion 2.11.5 / osx_x64, System: OSX, Name: 10.12.1' After five minutes of waiting, it does not shift from the above. However, going to the server list and forcing a refresh brought up this error in a window which then crashed the client after I clicked OK: Unexpected error. Please contact our support staff. - Object reference not set to an instance of an object - at Eddie.UI.Osx.MainWindowController.ServersRefresh () <0x0003d> at Eddie.UI.Osx.MainWindowController.<AwakeFromNib>m__E (object,System.EventArgs) <0x00013> at MonoMac.AppKit.ActionDispatcher.OnActivated (MonoMac.Foundation.NSObject) <0x00021> at (wrapper dynamic-method) object.[MonoMac.AppKit.ActionDispatcher.Void OnActivated(MonoMac.Foundation.NSObject)] (MonoMac.Foundation.NSObject,MonoMac.ObjCRuntime.Selector,MonoMac.Foundation.NSObject) <0x00033> at (wrapper native-to-managed) object.[MonoMac.AppKit.ActionDispatcher.Void OnActivated(MonoMac.Foundation.NSObject)] (MonoMac.Foundation.NSObject,MonoMac.ObjCRuntime.Selector,MonoMac.Foundation.NSObject) <0x000db> at (wrapper managed-to-native) MonoMac.AppKit.NSApplication.NSApplicationMain (int,string[]) <0x00012> at MonoMac.AppKit.NSApplication.Main (string[]) <0x00097> at Eddie.UI.Osx.MainClass.Main (string[]) <0x0017f>