Jump to content
Not connected, Your IP: 3.141.3.178
Sign in to follow this  
madrat

ANSWERED Connecting on MacBook Pro causes connection on iMac to disconnect

Recommended Posts

Booted up my Macbook Pro running 10.12.6 and latest Eddie. While trying to connect to recommended server (Vancouver), I hear my iMac running 10.11.6 and latest Eddie, disconnect. Both eventually connected, but this is definitely a new problem as of today, although I have not booted my Mac Pro for a while. Both computers are set to default settings (other than network lock, which I always have activated. Here is the log from my Macbook Pro:

I 2017.10.28 12:02:42 - Eddie version: 2.13.6 / macos_x64, System: MacOS, Name: 10.12.6, Version: Darwin Martys-MBP.home 16.7.0 Darwin Kernel Version 16.7.0: Thu Jun 15 17:36:27 PDT 2017; root:xnu-3789.70.16~2/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319
. 2017.10.28 12:02:43 - Reading options from /Users/martytaylor/.airvpn/AirVPN.xml
. 2017.10.28 12:02:43 - Command line arguments (0):
I 2017.10.28 12:02:45 - OpenVPN Driver - Expected
I 2017.10.28 12:02:45 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)
I 2017.10.28 12:02:45 - SSH - Version: OpenSSH_7.4p1, LibreSSL 2.5.0 (/usr/bin/ssh)
I 2017.10.28 12:02:45 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)
I 2017.10.28 12:02:45 - curl - Version: 7.54.0 (/usr/bin/curl)
I 2017.10.28 12:02:45 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/cacert.pem
! 2017.10.28 12:02:45 - Activation of Network Lock - OS X - PF
. 2017.10.28 12:02:45 - OS X - PF rules updated, reloading
. 2017.10.28 12:02:45 - Updating systems & servers data ...
. 2017.10.28 12:02:45 - OS X - PF rules updated, reloading
I 2017.10.28 12:02:45 - Session starting.
. 2017.10.28 12:02:46 - IPv6 disabled on network adapter (Thunderbolt Bridge)
. 2017.10.28 12:02:46 - Systems & servers data update completed
I 2017.10.28 12:02:57 - Checking authorization ...
! 2017.10.28 12:02:58 - Connecting to Cynosura (Canada, Vancouver)
. 2017.10.28 12:02:58 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017
. 2017.10.28 12:02:58 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2017.10.28 12:02:58 - Connection to OpenVPN Management Interface
. 2017.10.28 12:02:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.10.28 12:02:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 12:02:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 12:02:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443
. 2017.10.28 12:02:58 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2017.10.28 12:02:58 - OpenVPN > UDP link local: (not bound)
. 2017.10.28 12:02:58 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443
. 2017.10.28 12:02:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.10.28 12:03:00 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=6c1d5e72 2b59de21
. 2017.10.28 12:03:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.28 12:03:00 - OpenVPN > VERIFY KU OK
. 2017.10.28 12:03:00 - OpenVPN > Validating certificate extended key usage
. 2017.10.28 12:03:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.28 12:03:00 - OpenVPN > VERIFY EKU OK
. 2017.10.28 12:03:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org
. 2017.10.28 12:03:32 - OpenVPN > [Cynosura] Inactivity timeout (--ping-exit), exiting
. 2017.10.28 12:03:32 - OpenVPN > SIGTERM received, sending exit notification to peer
! 2017.10.28 12:03:37 - Disconnecting
. 2017.10.28 12:03:37 - Connection terminated.
I 2017.10.28 12:03:40 - Checking authorization ...
! 2017.10.28 12:03:41 - Connecting to Mimosa (Canada, Vancouver)
. 2017.10.28 12:03:41 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017
. 2017.10.28 12:03:41 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2017.10.28 12:03:41 - Connection to OpenVPN Management Interface
. 2017.10.28 12:03:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.10.28 12:03:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 12:03:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 12:03:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.251.247:443
. 2017.10.28 12:03:41 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2017.10.28 12:03:41 - OpenVPN > UDP link local: (not bound)
. 2017.10.28 12:03:41 - OpenVPN > UDP link remote: [AF_INET]71.19.251.247:443
. 2017.10.28 12:03:41 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.251.247:443, sid=318b1212 16d7d082
. 2017.10.28 12:03:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.10.28 12:03:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.28 12:03:41 - OpenVPN > VERIFY KU OK
. 2017.10.28 12:03:41 - OpenVPN > Validating certificate extended key usage
. 2017.10.28 12:03:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.28 12:03:41 - OpenVPN > VERIFY EKU OK
. 2017.10.28 12:03:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.10.28 12:03:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.28 12:03:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.251.247:443
. 2017.10.28 12:03:43 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2017.10.28 12:03:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.167 255.255.0.0'
. 2017.10.28 12:03:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.10.28 12:03:43 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.10.28 12:03:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.10.28 12:03:43 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.10.28 12:03:43 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.10.28 12:03:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.10.28 12:03:43 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 12:03:43 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 12:03:43 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 12:03:43 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 12:03:43 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en1 HWADDR=e4:ce:8f:33:33:72
. 2017.10.28 12:03:43 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy
. 2017.10.28 12:03:43 - OpenVPN > Opened utun device utun1
. 2017.10.28 12:03:43 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.10.28 12:03:43 - OpenVPN > /sbin/ifconfig utun1 delete
. 2017.10.28 12:03:43 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2017.10.28 12:03:43 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2017.10.28 12:03:43 - OpenVPN > /sbin/ifconfig utun1 10.4.0.167 10.4.0.167 netmask 255.255.0.0 mtu 1500 up
. 2017.10.28 12:03:43 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.167 255.255.0.0
. 2017.10.28 12:03:43 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.167
. 2017.10.28 12:03:43 - OpenVPN > /sbin/route add -net 71.19.251.247 192.168.1.254 255.255.255.255
. 2017.10.28 12:03:43 - OpenVPN > add net 71.19.251.247: gateway 192.168.1.254
. 2017.10.28 12:03:43 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2017.10.28 12:03:43 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2017.10.28 12:03:43 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2017.10.28 12:03:43 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2017.10.28 12:03:43 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2017.10.28 12:03:43 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2017.10.28 12:03:43 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2017.10.28 12:03:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2017.10.28 12:03:44 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2017.10.28 12:03:44 - Flushing DNS
. 2017.10.28 12:03:44 - OS X - PF rules updated, reloading
I 2017.10.28 12:03:44 - Checking route
I 2017.10.28 12:03:44 - Checking DNS
! 2017.10.28 12:03:45 - Connected.
. 2017.10.28 12:03:45 - OpenVPN > Initialization Sequence Completed
. 2017.10.28 12:12:51 - Updating systems & servers data ...
. 2017.10.28 12:12:53 - Systems & servers data update completed

 

Share this post


Link to post

Here is the log from my iMac:

Booted up my Macbook Pro running 10.12.6 and latest Eddie. While trying to connect to recommended server (Vancouver), I hear my iMac running 10.11.6 and latest Eddie, disconnect. Both eventually connected, but this is definitely a new problem as of today, although I have not booted my Mac Pro for a while. Both computers are set to default settings (other than network lock, which I always have activated. Here is the log from my Macbook Pro:

I 2017.10.28 12:02:42 - Eddie version: 2.13.6 / macos_x64, System: MacOS, Name: 10.12.6, Version: Darwin Martys-MBP.home 16.7.0 Darwin Kernel Version 16.7.0: Thu Jun 15 17:36:27 PDT 2017; root:xnu-3789.70.16~2/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319
. 2017.10.28 12:02:43 - Reading options from /Users/martytaylor/.airvpn/AirVPN.xml
. 2017.10.28 12:02:43 - Command line arguments (0):
I 2017.10.28 12:02:45 - OpenVPN Driver - Expected
I 2017.10.28 12:02:45 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)
I 2017.10.28 12:02:45 - SSH - Version: OpenSSH_7.4p1, LibreSSL 2.5.0 (/usr/bin/ssh)
I 2017.10.28 12:02:45 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)
I 2017.10.28 12:02:45 - curl - Version: 7.54.0 (/usr/bin/curl)
I 2017.10.28 12:02:45 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/cacert.pem
! 2017.10.28 12:02:45 - Activation of Network Lock - OS X - PF
. 2017.10.28 12:02:45 - OS X - PF rules updated, reloading
. 2017.10.28 12:02:45 - Updating systems & servers data ...
. 2017.10.28 12:02:45 - OS X - PF rules updated, reloading
I 2017.10.28 12:02:45 - Session starting.
. 2017.10.28 12:02:46 - IPv6 disabled on network adapter (Thunderbolt Bridge)
. 2017.10.28 12:02:46 - Systems & servers data update completed
I 2017.10.28 12:02:57 - Checking authorization ...
! 2017.10.28 12:02:58 - Connecting to Cynosura (Canada, Vancouver)
. 2017.10.28 12:02:58 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017
. 2017.10.28 12:02:58 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2017.10.28 12:02:58 - Connection to OpenVPN Management Interface
. 2017.10.28 12:02:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.10.28 12:02:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 12:02:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 12:02:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443
. 2017.10.28 12:02:58 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2017.10.28 12:02:58 - OpenVPN > UDP link local: (not bound)
. 2017.10.28 12:02:58 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443
. 2017.10.28 12:02:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.10.28 12:03:00 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=6c1d5e72 2b59de21
. 2017.10.28 12:03:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.28 12:03:00 - OpenVPN > VERIFY KU OK
. 2017.10.28 12:03:00 - OpenVPN > Validating certificate extended key usage
. 2017.10.28 12:03:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.28 12:03:00 - OpenVPN > VERIFY EKU OK
. 2017.10.28 12:03:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org
. 2017.10.28 12:03:32 - OpenVPN > [Cynosura] Inactivity timeout (--ping-exit), exiting
. 2017.10.28 12:03:32 - OpenVPN > SIGTERM received, sending exit notification to peer
! 2017.10.28 12:03:37 - Disconnecting
. 2017.10.28 12:03:37 - Connection terminated.
I 2017.10.28 12:03:40 - Checking authorization ...
! 2017.10.28 12:03:41 - Connecting to Mimosa (Canada, Vancouver)
. 2017.10.28 12:03:41 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017
. 2017.10.28 12:03:41 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2017.10.28 12:03:41 - Connection to OpenVPN Management Interface
. 2017.10.28 12:03:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.10.28 12:03:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 12:03:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 12:03:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.251.247:443
. 2017.10.28 12:03:41 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2017.10.28 12:03:41 - OpenVPN > UDP link local: (not bound)
. 2017.10.28 12:03:41 - OpenVPN > UDP link remote: [AF_INET]71.19.251.247:443
. 2017.10.28 12:03:41 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.251.247:443, sid=318b1212 16d7d082
. 2017.10.28 12:03:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.10.28 12:03:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.28 12:03:41 - OpenVPN > VERIFY KU OK
. 2017.10.28 12:03:41 - OpenVPN > Validating certificate extended key usage
. 2017.10.28 12:03:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.28 12:03:41 - OpenVPN > VERIFY EKU OK
. 2017.10.28 12:03:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.10.28 12:03:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.28 12:03:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.251.247:443
. 2017.10.28 12:03:43 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2017.10.28 12:03:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.167 255.255.0.0'
. 2017.10.28 12:03:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.10.28 12:03:43 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.10.28 12:03:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.10.28 12:03:43 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.10.28 12:03:43 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.10.28 12:03:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.10.28 12:03:43 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 12:03:43 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 12:03:43 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 12:03:43 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 12:03:43 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en1 HWADDR=e4:ce:8f:33:33:72
. 2017.10.28 12:03:43 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy
. 2017.10.28 12:03:43 - OpenVPN > Opened utun device utun1
. 2017.10.28 12:03:43 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.10.28 12:03:43 - OpenVPN > /sbin/ifconfig utun1 delete
. 2017.10.28 12:03:43 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2017.10.28 12:03:43 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2017.10.28 12:03:43 - OpenVPN > /sbin/ifconfig utun1 10.4.0.167 10.4.0.167 netmask 255.255.0.0 mtu 1500 up
. 2017.10.28 12:03:43 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.167 255.255.0.0
. 2017.10.28 12:03:43 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.167
. 2017.10.28 12:03:43 - OpenVPN > /sbin/route add -net 71.19.251.247 192.168.1.254 255.255.255.255
. 2017.10.28 12:03:43 - OpenVPN > add net 71.19.251.247: gateway 192.168.1.254
. 2017.10.28 12:03:43 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2017.10.28 12:03:43 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2017.10.28 12:03:43 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2017.10.28 12:03:43 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2017.10.28 12:03:43 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2017.10.28 12:03:43 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)
. 2017.10.28 12:03:43 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)
. 2017.10.28 12:03:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)
. 2017.10.28 12:03:44 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)
. 2017.10.28 12:03:44 - Flushing DNS
. 2017.10.28 12:03:44 - OS X - PF rules updated, reloading
I 2017.10.28 12:03:44 - Checking route
I 2017.10.28 12:03:44 - Checking DNS
! 2017.10.28 12:03:45 - Connected.
. 2017.10.28 12:03:45 - OpenVPN > Initialization Sequence Completed
. 2017.10.28 12:12:51 - Updating systems & servers data ...
. 2017.10.28 12:12:53 - Systems & servers data update completed

 

Here's my log fro my iMac:


. 2017.10.28 00:00:24 - Updating systems & servers data ...
. 2017.10.28 00:00:26 - Systems & servers data update completed
. 2017.10.28 00:15:00 - Updating systems & servers data ...
. 2017.10.28 00:15:02 - Systems & servers data update completed
. 2017.10.28 00:34:52 - Updating systems & servers data ...
. 2017.10.28 00:34:54 - Systems & servers data update completed
. 2017.10.28 00:50:49 - OpenVPN > TLS: soft reset sec=0 bytes=14500295/-1 pkts=95636/0
. 2017.10.28 00:50:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.28 00:50:49 - OpenVPN > VERIFY KU OK
. 2017.10.28 00:50:49 - OpenVPN > Validating certificate extended key usage
. 2017.10.28 00:50:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.28 00:50:49 - OpenVPN > VERIFY EKU OK
. 2017.10.28 00:50:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.10.28 00:50:49 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 00:50:49 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 00:50:49 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 00:50:49 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 00:50:49 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.28 00:52:07 - Updating systems & servers data ...
. 2017.10.28 00:52:09 - Systems & servers data update completed
. 2017.10.28 01:12:01 - Updating systems & servers data ...
. 2017.10.28 01:12:03 - Systems & servers data update completed
. 2017.10.28 01:27:19 - Updating systems & servers data ...
. 2017.10.28 01:27:21 - Systems & servers data update completed
. 2017.10.28 01:48:48 - Updating systems & servers data ...
. 2017.10.28 01:48:49 - Systems & servers data update completed
I 2017.10.28 01:50:41 - Renewing TLS key
. 2017.10.28 01:50:41 - OpenVPN > TLS: tls_process: killed expiring key
. 2017.10.28 01:50:41 - OpenVPN > TLS: soft reset sec=0 bytes=14387845/-1 pkts=95944/0
. 2017.10.28 01:50:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.28 01:50:41 - OpenVPN > VERIFY KU OK
. 2017.10.28 01:50:41 - OpenVPN > Validating certificate extended key usage
. 2017.10.28 01:50:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.28 01:50:41 - OpenVPN > VERIFY EKU OK
. 2017.10.28 01:50:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.10.28 01:50:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 01:50:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 01:50:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 01:50:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 01:50:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.28 02:42:47 - Updating systems & servers data ...
. 2017.10.28 02:42:49 - Systems & servers data update completed
. 2017.10.28 02:50:41 - OpenVPN > TLS: soft reset sec=0 bytes=14910751/-1 pkts=102748/0
. 2017.10.28 02:50:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.28 02:50:41 - OpenVPN > VERIFY KU OK
. 2017.10.28 02:50:41 - OpenVPN > Validating certificate extended key usage
. 2017.10.28 02:50:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.28 02:50:41 - OpenVPN > VERIFY EKU OK
. 2017.10.28 02:50:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.10.28 02:50:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 02:50:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 02:50:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 02:50:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 02:50:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.28 03:00:00 - Updating systems & servers data ...
. 2017.10.28 03:00:02 - Systems & servers data update completed
. 2017.10.28 03:38:19 - Updating systems & servers data ...
. 2017.10.28 03:38:20 - Systems & servers data update completed
. 2017.10.28 03:50:38 - OpenVPN > TLS: soft reset sec=0 bytes=15523315/-1 pkts=105591/0
. 2017.10.28 03:50:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.28 03:50:38 - OpenVPN > VERIFY KU OK
. 2017.10.28 03:50:38 - OpenVPN > Validating certificate extended key usage
. 2017.10.28 03:50:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.28 03:50:38 - OpenVPN > VERIFY EKU OK
. 2017.10.28 03:50:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.10.28 03:50:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 03:50:38 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 03:50:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 03:50:38 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 03:50:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.28 03:56:33 - Updating systems & servers data ...
. 2017.10.28 03:56:35 - Systems & servers data update completed
. 2017.10.28 04:12:33 - Updating systems & servers data ...
. 2017.10.28 04:12:35 - Systems & servers data update completed
. 2017.10.28 04:29:02 - Updating systems & servers data ...
. 2017.10.28 04:29:03 - Systems & servers data update completed
. 2017.10.28 04:46:00 - Updating systems & servers data ...
. 2017.10.28 04:46:02 - Systems & servers data update completed
. 2017.10.28 04:50:39 - OpenVPN > TLS: soft reset sec=0 bytes=20473607/-1 pkts=113796/0
. 2017.10.28 04:50:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.28 04:50:39 - OpenVPN > VERIFY KU OK
. 2017.10.28 04:50:39 - OpenVPN > Validating certificate extended key usage
. 2017.10.28 04:50:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.28 04:50:39 - OpenVPN > VERIFY EKU OK
. 2017.10.28 04:50:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.10.28 04:50:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 04:50:39 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 04:50:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 04:50:39 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 04:50:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.28 05:01:00 - Updating systems & servers data ...
. 2017.10.28 05:01:02 - Systems & servers data update completed
. 2017.10.28 05:18:01 - Updating systems & servers data ...
. 2017.10.28 05:18:02 - Systems & servers data update completed
. 2017.10.28 05:32:01 - Updating systems & servers data ...
. 2017.10.28 05:32:03 - Systems & servers data update completed
. 2017.10.28 05:42:03 - Updating systems & servers data ...
. 2017.10.28 05:42:04 - Systems & servers data update completed
. 2017.10.28 05:50:42 - OpenVPN > TLS: soft reset sec=0 bytes=17187258/-1 pkts=117885/0
. 2017.10.28 05:50:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.28 05:50:42 - OpenVPN > VERIFY KU OK
. 2017.10.28 05:50:42 - OpenVPN > Validating certificate extended key usage
. 2017.10.28 05:50:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.28 05:50:42 - OpenVPN > VERIFY EKU OK
. 2017.10.28 05:50:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.10.28 05:50:42 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 05:50:42 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 05:50:42 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 05:50:42 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 05:50:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.28 06:03:00 - Updating systems & servers data ...
. 2017.10.28 06:03:02 - Systems & servers data update completed
. 2017.10.28 06:20:00 - Updating systems & servers data ...
. 2017.10.28 06:20:02 - Systems & servers data update completed
. 2017.10.28 06:42:01 - Updating systems & servers data ...
. 2017.10.28 06:42:02 - Systems & servers data update completed
I 2017.10.28 06:50:45 - Renewing TLS key
. 2017.10.28 06:50:45 - OpenVPN > TLS: tls_process: killed expiring key
. 2017.10.28 06:50:45 - OpenVPN > TLS: soft reset sec=0 bytes=16884550/-1 pkts=116805/0
. 2017.10.28 06:50:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.28 06:50:45 - OpenVPN > VERIFY KU OK
. 2017.10.28 06:50:45 - OpenVPN > Validating certificate extended key usage
. 2017.10.28 06:50:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.28 06:50:45 - OpenVPN > VERIFY EKU OK
. 2017.10.28 06:50:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.10.28 06:50:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 06:50:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 06:50:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 06:50:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 06:50:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.28 06:56:46 - Updating systems & servers data ...
. 2017.10.28 06:56:48 - Systems & servers data update completed
. 2017.10.28 07:06:55 - Updating systems & servers data ...
. 2017.10.28 07:06:57 - Systems & servers data update completed
. 2017.10.28 07:17:02 - Updating systems & servers data ...
. 2017.10.28 07:17:04 - Systems & servers data update completed
. 2017.10.28 07:27:09 - Updating systems & servers data ...
. 2017.10.28 07:27:11 - Systems & servers data update completed
. 2017.10.28 07:37:17 - Updating systems & servers data ...
. 2017.10.28 07:37:19 - Systems & servers data update completed
. 2017.10.28 07:47:24 - Updating systems & servers data ...
. 2017.10.28 07:47:26 - Systems & servers data update completed
. 2017.10.28 07:50:35 - OpenVPN > TLS: soft reset sec=0 bytes=52843132/-1 pkts=171795/0
. 2017.10.28 07:50:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.28 07:50:35 - OpenVPN > VERIFY KU OK
. 2017.10.28 07:50:35 - OpenVPN > Validating certificate extended key usage
. 2017.10.28 07:50:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.28 07:50:35 - OpenVPN > VERIFY EKU OK
. 2017.10.28 07:50:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.10.28 07:50:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 07:50:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 07:50:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 07:50:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 07:50:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.28 07:57:32 - Updating systems & servers data ...
. 2017.10.28 07:57:33 - Systems & servers data update completed
. 2017.10.28 08:07:39 - Updating systems & servers data ...
. 2017.10.28 08:07:41 - Systems & servers data update completed
. 2017.10.28 08:17:47 - Updating systems & servers data ...
. 2017.10.28 08:17:48 - Systems & servers data update completed
. 2017.10.28 08:27:54 - Updating systems & servers data ...
. 2017.10.28 08:27:55 - Systems & servers data update completed
. 2017.10.28 08:38:01 - Updating systems & servers data ...
. 2017.10.28 08:38:03 - Systems & servers data update completed
. 2017.10.28 08:48:08 - Updating systems & servers data ...
. 2017.10.28 08:48:10 - Systems & servers data update completed
. 2017.10.28 08:50:35 - OpenVPN > TLS: soft reset sec=0 bytes=32493286/-1 pkts=137920/0
. 2017.10.28 08:50:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.28 08:50:35 - OpenVPN > VERIFY KU OK
. 2017.10.28 08:50:35 - OpenVPN > Validating certificate extended key usage
. 2017.10.28 08:50:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.28 08:50:35 - OpenVPN > VERIFY EKU OK
. 2017.10.28 08:50:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.10.28 08:50:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 08:50:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 08:50:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 08:50:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 08:50:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.28 08:58:16 - Updating systems & servers data ...
. 2017.10.28 08:58:17 - Systems & servers data update completed
. 2017.10.28 09:08:23 - Updating systems & servers data ...
. 2017.10.28 09:08:25 - Systems & servers data update completed
. 2017.10.28 09:18:47 - Updating systems & servers data ...
. 2017.10.28 09:18:49 - Systems & servers data update completed
. 2017.10.28 09:37:00 - Updating systems & servers data ...
. 2017.10.28 09:37:01 - Systems & servers data update completed
. 2017.10.28 09:50:38 - OpenVPN > TLS: soft reset sec=0 bytes=25835688/-1 pkts=124895/0
. 2017.10.28 09:50:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.28 09:50:38 - OpenVPN > VERIFY KU OK
. 2017.10.28 09:50:38 - OpenVPN > Validating certificate extended key usage
. 2017.10.28 09:50:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.28 09:50:38 - OpenVPN > VERIFY EKU OK
. 2017.10.28 09:50:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.10.28 09:50:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 09:50:38 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 09:50:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 09:50:38 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 09:50:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.28 09:53:01 - Updating systems & servers data ...
. 2017.10.28 09:53:03 - Systems & servers data update completed
. 2017.10.28 10:07:37 - Updating systems & servers data ...
. 2017.10.28 10:07:38 - Systems & servers data update completed
. 2017.10.28 10:18:57 - Updating systems & servers data ...
. 2017.10.28 10:19:00 - Systems & servers data update completed
. 2017.10.28 10:37:46 - Updating systems & servers data ...
. 2017.10.28 10:37:47 - Systems & servers data update completed
. 2017.10.28 10:50:54 - OpenVPN > TLS: soft reset sec=0 bytes=15674024/-1 pkts=109033/0
. 2017.10.28 10:50:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.28 10:50:54 - OpenVPN > VERIFY KU OK
. 2017.10.28 10:50:54 - OpenVPN > Validating certificate extended key usage
. 2017.10.28 10:50:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.28 10:50:54 - OpenVPN > VERIFY EKU OK
. 2017.10.28 10:50:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.10.28 10:50:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 10:50:54 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 10:50:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 10:50:54 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 10:50:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.28 11:03:00 - Updating systems & servers data ...
. 2017.10.28 11:03:03 - Systems & servers data update completed
. 2017.10.28 11:19:47 - Updating systems & servers data ...
. 2017.10.28 11:19:49 - Systems & servers data update completed
. 2017.10.28 11:30:37 - Updating systems & servers data ...
. 2017.10.28 11:30:39 - Systems & servers data update completed
. 2017.10.28 11:40:44 - Updating systems & servers data ...
. 2017.10.28 11:40:46 - Systems & servers data update completed
. 2017.10.28 11:50:35 - OpenVPN > TLS: soft reset sec=0 bytes=24570574/-1 pkts=124980/0
. 2017.10.28 11:50:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.28 11:50:35 - OpenVPN > VERIFY KU OK
. 2017.10.28 11:50:35 - OpenVPN > Validating certificate extended key usage
. 2017.10.28 11:50:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.28 11:50:35 - OpenVPN > VERIFY EKU OK
. 2017.10.28 11:50:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.10.28 11:50:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 11:50:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 11:50:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 11:50:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 11:50:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.28 11:50:51 - Updating systems & servers data ...
. 2017.10.28 11:50:54 - Systems & servers data update completed
. 2017.10.28 11:55:16 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2017.10.28 11:55:16 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2017.10.28 11:55:16 - OpenVPN > Restart pause, 5 second(s)
! 2017.10.28 11:55:16 - Disconnecting
. 2017.10.28 11:55:16 - Sending management termination signal
. 2017.10.28 11:55:16 - Management - Send 'signal SIGTERM'
. 2017.10.28 11:55:16 - Connection terminated.
. 2017.10.28 11:55:17 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)
. 2017.10.28 11:55:17 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
I 2017.10.28 11:55:26 - Checking authorization ...
! 2017.10.28 11:55:27 - Connecting to Cynosura (Canada, Vancouver)
. 2017.10.28 11:55:27 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017
. 2017.10.28 11:55:27 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2017.10.28 11:55:27 - Connection to OpenVPN Management Interface
. 2017.10.28 11:55:27 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.10.28 11:55:27 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 11:55:27 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 11:55:27 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443
. 2017.10.28 11:55:27 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2017.10.28 11:55:27 - OpenVPN > UDP link local: (not bound)
. 2017.10.28 11:55:27 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443
. 2017.10.28 11:55:27 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.10.28 11:55:27 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=59359929 f8195d0c
. 2017.10.28 11:55:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.28 11:55:27 - OpenVPN > VERIFY KU OK
. 2017.10.28 11:55:27 - OpenVPN > Validating certificate extended key usage
. 2017.10.28 11:55:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.28 11:55:27 - OpenVPN > VERIFY EKU OK
. 2017.10.28 11:55:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org
. 2017.10.28 11:55:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.28 11:55:28 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]71.19.252.21:443
. 2017.10.28 11:55:29 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1)
. 2017.10.28 11:55:35 - Above log line repeated 1 times more
. 2017.10.28 11:55:35 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.175 255.255.0.0,peer-id 28,cipher AES-256-GCM'
. 2017.10.28 11:55:35 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.10.28 11:55:35 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.10.28 11:55:35 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.10.28 11:55:35 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.10.28 11:55:35 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.10.28 11:55:35 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.10.28 11:55:35 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2017.10.28 11:55:35 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2017.10.28 11:55:35 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2017.10.28 11:55:35 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2017.10.28 11:55:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.10.28 11:55:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2017.10.28 11:55:35 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2017.10.28 11:55:35 - OpenVPN > Opened utun device utun0
. 2017.10.28 11:55:35 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.10.28 11:55:35 - OpenVPN > /sbin/ifconfig utun0 delete
. 2017.10.28 11:55:35 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2017.10.28 11:55:35 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2017.10.28 11:55:35 - OpenVPN > /sbin/ifconfig utun0 10.4.1.175 10.4.1.175 netmask 255.255.0.0 mtu 1500 up
. 2017.10.28 11:55:35 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.175 255.255.0.0
. 2017.10.28 11:55:35 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.175
. 2017.10.28 11:55:35 - OpenVPN > /sbin/route add -net 71.19.252.21 192.168.1.254 255.255.255.255
. 2017.10.28 11:55:35 - OpenVPN > add net 71.19.252.21: gateway 192.168.1.254
. 2017.10.28 11:55:35 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2017.10.28 11:55:35 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2017.10.28 11:55:35 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2017.10.28 11:55:35 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2017.10.28 11:55:36 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)
. 2017.10.28 11:55:36 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2017.10.28 11:55:36 - Flushing DNS
I 2017.10.28 11:55:36 - Checking route
I 2017.10.28 11:55:38 - Checking DNS
. 2017.10.28 11:55:43 - Checking DNS failed: nmuiqzjjljyvlilsheiczaxjueeoerpv
. 2017.10.28 11:55:43 - Checking DNS (2° try)
. 2017.10.28 11:55:45 - Checking DNS failed: nmuiqzjjljyvlilsheiczaxjueeoerpv
. 2017.10.28 11:55:45 - Checking DNS (3° try)
. 2017.10.28 11:55:54 - Checking DNS failed: nmuiqzjjljyvlilsheiczaxjueeoerpv
E 2017.10.28 11:55:54 - Checking DNS failed.
. 2017.10.28 11:55:54 - OpenVPN > Initialization Sequence Completed
! 2017.10.28 11:55:55 - Disconnecting
. 2017.10.28 11:55:55 - Sending management termination signal
. 2017.10.28 11:55:55 - Management - Send 'signal SIGTERM'
. 2017.10.28 11:56:01 - Connection terminated.
. 2017.10.28 11:56:01 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)
. 2017.10.28 11:56:01 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
I 2017.10.28 11:56:04 - Checking authorization ...
! 2017.10.28 11:56:04 - Connecting to Gemma (Canada, Vancouver)
. 2017.10.28 11:56:04 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017
. 2017.10.28 11:56:04 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2017.10.28 11:56:04 - Connection to OpenVPN Management Interface
. 2017.10.28 11:56:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.10.28 11:56:04 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 11:56:04 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 11:56:04 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.113:443
. 2017.10.28 11:56:04 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2017.10.28 11:56:04 - OpenVPN > UDP link local: (not bound)
. 2017.10.28 11:56:04 - OpenVPN > UDP link remote: [AF_INET]71.19.252.113:443
. 2017.10.28 11:56:04 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.10.28 11:56:05 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=3318898a 267f93b4
. 2017.10.28 11:56:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.28 11:56:05 - OpenVPN > VERIFY KU OK
. 2017.10.28 11:56:05 - OpenVPN > Validating certificate extended key usage
. 2017.10.28 11:56:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.28 11:56:05 - OpenVPN > VERIFY EKU OK
. 2017.10.28 11:56:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.10.28 11:56:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.28 11:56:05 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443
. 2017.10.28 11:56:06 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2017.10.28 11:56:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.5.71 255.255.0.0'
. 2017.10.28 11:56:08 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.10.28 11:56:08 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.10.28 11:56:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.10.28 11:56:08 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.10.28 11:56:08 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.10.28 11:56:08 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.10.28 11:56:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 11:56:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 11:56:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 11:56:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 11:56:08 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2017.10.28 11:56:08 - OpenVPN > Opened utun device utun0
. 2017.10.28 11:56:08 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.10.28 11:56:08 - OpenVPN > /sbin/ifconfig utun0 delete
. 2017.10.28 11:56:08 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2017.10.28 11:56:08 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2017.10.28 11:56:08 - OpenVPN > /sbin/ifconfig utun0 10.4.5.71 10.4.5.71 netmask 255.255.0.0 mtu 1500 up
. 2017.10.28 11:56:08 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.5.71 255.255.0.0
. 2017.10.28 11:56:08 - OpenVPN > add net 10.4.0.0: gateway 10.4.5.71
. 2017.10.28 11:56:08 - OpenVPN > /sbin/route add -net 71.19.252.113 192.168.1.254 255.255.255.255
. 2017.10.28 11:56:08 - OpenVPN > add net 71.19.252.113: gateway 192.168.1.254
. 2017.10.28 11:56:08 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2017.10.28 11:56:08 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2017.10.28 11:56:08 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2017.10.28 11:56:08 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2017.10.28 11:56:09 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)
. 2017.10.28 11:56:09 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2017.10.28 11:56:09 - Flushing DNS
I 2017.10.28 11:56:09 - Checking route
I 2017.10.28 11:56:10 - Checking DNS
! 2017.10.28 11:56:11 - Connected.
. 2017.10.28 11:56:11 - OpenVPN > Initialization Sequence Completed
. 2017.10.28 11:58:13 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2017.10.28 11:58:13 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2017.10.28 11:58:13 - OpenVPN > Restart pause, 5 second(s)
! 2017.10.28 11:58:13 - Disconnecting
. 2017.10.28 11:58:13 - Sending management termination signal
. 2017.10.28 11:58:13 - Management - Send 'signal SIGTERM'
. 2017.10.28 11:58:13 - Connection terminated.
. 2017.10.28 11:58:13 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)
. 2017.10.28 11:58:14 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)
I 2017.10.28 11:58:17 - Checking authorization ...
! 2017.10.28 11:58:17 - Connecting to Mintaka (Canada, Toronto, Ontario)
. 2017.10.28 11:58:17 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017
. 2017.10.28 11:58:17 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
. 2017.10.28 11:58:17 - Connection to OpenVPN Management Interface
. 2017.10.28 11:58:17 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2017.10.28 11:58:17 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 11:58:17 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 11:58:17 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.218:443
. 2017.10.28 11:58:17 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]
. 2017.10.28 11:58:17 - OpenVPN > UDP link local: (not bound)
. 2017.10.28 11:58:17 - OpenVPN > UDP link remote: [AF_INET]184.75.223.218:443
. 2017.10.28 11:58:17 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2017.10.28 11:58:17 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.218:443, sid=e3b7c778 d46ff9b0
. 2017.10.28 11:58:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2017.10.28 11:58:18 - OpenVPN > VERIFY KU OK
. 2017.10.28 11:58:18 - OpenVPN > Validating certificate extended key usage
. 2017.10.28 11:58:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2017.10.28 11:58:18 - OpenVPN > VERIFY EKU OK
. 2017.10.28 11:58:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2017.10.28 11:58:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2017.10.28 11:58:18 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.218:443
. 2017.10.28 11:58:19 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2017.10.28 11:58:19 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.18.174 255.255.0.0'
. 2017.10.28 11:58:19 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2017.10.28 11:58:19 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2017.10.28 11:58:19 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2017.10.28 11:58:19 - OpenVPN > OPTIONS IMPORT: route options modified
. 2017.10.28 11:58:19 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2017.10.28 11:58:19 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2017.10.28 11:58:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 11:58:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 11:58:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2017.10.28 11:58:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2017.10.28 11:58:19 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2017.10.28 11:58:19 - OpenVPN > Opened utun device utun0
. 2017.10.28 11:58:19 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2017.10.28 11:58:19 - OpenVPN > /sbin/ifconfig utun0 delete
. 2017.10.28 11:58:19 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2017.10.28 11:58:19 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2017.10.28 11:58:19 - OpenVPN > /sbin/ifconfig utun0 10.4.18.174 10.4.18.174 netmask 255.255.0.0 mtu 1500 up
. 2017.10.28 11:58:19 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.18.174 255.255.0.0
. 2017.10.28 11:58:19 - OpenVPN > add net 10.4.0.0: gateway 10.4.18.174
. 2017.10.28 11:58:19 - OpenVPN > /sbin/route add -net 184.75.223.218 192.168.1.254 255.255.255.255
. 2017.10.28 11:58:19 - OpenVPN > add net 184.75.223.218: gateway 192.168.1.254
. 2017.10.28 11:58:19 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0
. 2017.10.28 11:58:19 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1
. 2017.10.28 11:58:19 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0
. 2017.10.28 11:58:19 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1
. 2017.10.28 11:58:20 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)
. 2017.10.28 11:58:20 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)
. 2017.10.28 11:58:20 - Flushing DNS
I 2017.10.28 11:58:20 - Checking route
I 2017.10.28 11:58:47 - Checking DNS
! 2017.10.28 11:58:48 - Connected.
. 2017.10.28 11:58:48 - OpenVPN > Initialization Sequence Completed
. 2017.10.28 12:01:00 - Updating systems & servers data ...
. 2017.10.28 12:01:01 - Systems & servers data update completed
. 2017.10.28 12:11:06 - Updating systems & servers data ...
. 2017.10.28 12:11:08 - Systems & servers data update completed

Share this post


Link to post

Here is the log from my iMac:

Booted up my Macbook Pro running 10.12.6 and latest Eddie. While trying to connect to recommended server (Vancouver), I hear my iMac running 10.11.6 and latest Eddie, disconnect. Both eventually connected, but this is definitely a new problem as of today, although I have not booted my Mac Pro for a while. Both computers are set to default settings (other than network lock, which I always have activated. Here is the log from my Macbook Pro:

I 2017.10.28 12:02:42 - Eddie version: 2.13.6 / macos_x64, System: MacOS, Name: 10.12.6, Version: Darwin Martys-MBP.home 16.7.0 Darwin Kernel Version 16.7.0: Thu Jun 15 17:36:27 PDT 2017; root:xnu-3789.70.16~2/RELEASE_X86_64 x86_64, Mono/.Net Framework: v4.0.30319

. 2017.10.28 12:02:43 - Reading options from /Users/martytaylor/.airvpn/AirVPN.xml

. 2017.10.28 12:02:43 - Command line arguments (0):

I 2017.10.28 12:02:45 - OpenVPN Driver - Expected

I 2017.10.28 12:02:45 - OpenVPN - Version: 2.4.3 - OpenSSL 1.0.2l  25 May 2017, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)

I 2017.10.28 12:02:45 - SSH - Version: OpenSSH_7.4p1, LibreSSL 2.5.0 (/usr/bin/ssh)

I 2017.10.28 12:02:45 - SSL - Version: stunnel 5.40 (/Applications/Eddie.app/Contents/MacOS/stunnel)

I 2017.10.28 12:02:45 - curl - Version: 7.54.0 (/usr/bin/curl)

I 2017.10.28 12:02:45 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/cacert.pem

! 2017.10.28 12:02:45 - Activation of Network Lock - OS X - PF

. 2017.10.28 12:02:45 - OS X - PF rules updated, reloading

. 2017.10.28 12:02:45 - Updating systems & servers data ...

. 2017.10.28 12:02:45 - OS X - PF rules updated, reloading

I 2017.10.28 12:02:45 - Session starting.

. 2017.10.28 12:02:46 - IPv6 disabled on network adapter (Thunderbolt Bridge)

. 2017.10.28 12:02:46 - Systems & servers data update completed

I 2017.10.28 12:02:57 - Checking authorization ...

! 2017.10.28 12:02:58 - Connecting to Cynosura (Canada, Vancouver)

. 2017.10.28 12:02:58 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017

. 2017.10.28 12:02:58 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2017.10.28 12:02:58 - Connection to OpenVPN Management Interface

. 2017.10.28 12:02:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2017.10.28 12:02:58 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 12:02:58 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 12:02:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443

. 2017.10.28 12:02:58 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2017.10.28 12:02:58 - OpenVPN > UDP link local: (not bound)

. 2017.10.28 12:02:58 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443

. 2017.10.28 12:02:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2017.10.28 12:03:00 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=6c1d5e72 2b59de21

. 2017.10.28 12:03:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.10.28 12:03:00 - OpenVPN > VERIFY KU OK

. 2017.10.28 12:03:00 - OpenVPN > Validating certificate extended key usage

. 2017.10.28 12:03:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.10.28 12:03:00 - OpenVPN > VERIFY EKU OK

. 2017.10.28 12:03:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org

. 2017.10.28 12:03:32 - OpenVPN > [Cynosura] Inactivity timeout (--ping-exit), exiting

. 2017.10.28 12:03:32 - OpenVPN > SIGTERM received, sending exit notification to peer

! 2017.10.28 12:03:37 - Disconnecting

. 2017.10.28 12:03:37 - Connection terminated.

I 2017.10.28 12:03:40 - Checking authorization ...

! 2017.10.28 12:03:41 - Connecting to Mimosa (Canada, Vancouver)

. 2017.10.28 12:03:41 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017

. 2017.10.28 12:03:41 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2017.10.28 12:03:41 - Connection to OpenVPN Management Interface

. 2017.10.28 12:03:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2017.10.28 12:03:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 12:03:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 12:03:41 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.251.247:443

. 2017.10.28 12:03:41 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2017.10.28 12:03:41 - OpenVPN > UDP link local: (not bound)

. 2017.10.28 12:03:41 - OpenVPN > UDP link remote: [AF_INET]71.19.251.247:443

. 2017.10.28 12:03:41 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.251.247:443, sid=318b1212 16d7d082

. 2017.10.28 12:03:41 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2017.10.28 12:03:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.10.28 12:03:41 - OpenVPN > VERIFY KU OK

. 2017.10.28 12:03:41 - OpenVPN > Validating certificate extended key usage

. 2017.10.28 12:03:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.10.28 12:03:41 - OpenVPN > VERIFY EKU OK

. 2017.10.28 12:03:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.10.28 12:03:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.10.28 12:03:41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.251.247:443

. 2017.10.28 12:03:43 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2017.10.28 12:03:43 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.167 255.255.0.0'

. 2017.10.28 12:03:43 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2017.10.28 12:03:43 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2017.10.28 12:03:43 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2017.10.28 12:03:43 - OpenVPN > OPTIONS IMPORT: route options modified

. 2017.10.28 12:03:43 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2017.10.28 12:03:43 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2017.10.28 12:03:43 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 12:03:43 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 12:03:43 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 12:03:43 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 12:03:43 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en1 HWADDR=e4:ce:8f:33:33:72

. 2017.10.28 12:03:43 - OpenVPN > Opening utun (connect(AF_SYS_CONTROL)): Resource busy

. 2017.10.28 12:03:43 - OpenVPN > Opened utun device utun1

. 2017.10.28 12:03:43 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2017.10.28 12:03:43 - OpenVPN > /sbin/ifconfig utun1 delete

. 2017.10.28 12:03:43 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2017.10.28 12:03:43 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2017.10.28 12:03:43 - OpenVPN > /sbin/ifconfig utun1 10.4.0.167 10.4.0.167 netmask 255.255.0.0 mtu 1500 up

. 2017.10.28 12:03:43 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.0.167 255.255.0.0

. 2017.10.28 12:03:43 - OpenVPN > add net 10.4.0.0: gateway 10.4.0.167

. 2017.10.28 12:03:43 - OpenVPN > /sbin/route add -net 71.19.251.247 192.168.1.254 255.255.255.255

. 2017.10.28 12:03:43 - OpenVPN > add net 71.19.251.247: gateway 192.168.1.254

. 2017.10.28 12:03:43 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2017.10.28 12:03:43 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2017.10.28 12:03:43 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2017.10.28 12:03:43 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2017.10.28 12:03:43 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2017.10.28 12:03:43 - DNS of a network adapter forced (FireWire, from Automatic to 10.4.0.1)

. 2017.10.28 12:03:43 - DNS of a network adapter forced (Wi-Fi, from Automatic to 10.4.0.1)

. 2017.10.28 12:03:43 - DNS of a network adapter forced (Bluetooth PAN, from Automatic to 10.4.0.1)

. 2017.10.28 12:03:44 - DNS of a network adapter forced (Thunderbolt Bridge, from Automatic to 10.4.0.1)

. 2017.10.28 12:03:44 - Flushing DNS

. 2017.10.28 12:03:44 - OS X - PF rules updated, reloading

I 2017.10.28 12:03:44 - Checking route

I 2017.10.28 12:03:44 - Checking DNS

! 2017.10.28 12:03:45 - Connected.

. 2017.10.28 12:03:45 - OpenVPN > Initialization Sequence Completed

. 2017.10.28 12:12:51 - Updating systems & servers data ...

. 2017.10.28 12:12:53 - Systems & servers data update completed

 

Here's my log fro my iMac:

. 2017.10.28 00:00:24 - Updating systems & servers data ...

. 2017.10.28 00:00:26 - Systems & servers data update completed

. 2017.10.28 00:15:00 - Updating systems & servers data ...

. 2017.10.28 00:15:02 - Systems & servers data update completed

. 2017.10.28 00:34:52 - Updating systems & servers data ...

. 2017.10.28 00:34:54 - Systems & servers data update completed

. 2017.10.28 00:50:49 - OpenVPN > TLS: soft reset sec=0 bytes=14500295/-1 pkts=95636/0

. 2017.10.28 00:50:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.10.28 00:50:49 - OpenVPN > VERIFY KU OK

. 2017.10.28 00:50:49 - OpenVPN > Validating certificate extended key usage

. 2017.10.28 00:50:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.10.28 00:50:49 - OpenVPN > VERIFY EKU OK

. 2017.10.28 00:50:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.10.28 00:50:49 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 00:50:49 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 00:50:49 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 00:50:49 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 00:50:49 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.10.28 00:52:07 - Updating systems & servers data ...

. 2017.10.28 00:52:09 - Systems & servers data update completed

. 2017.10.28 01:12:01 - Updating systems & servers data ...

. 2017.10.28 01:12:03 - Systems & servers data update completed

. 2017.10.28 01:27:19 - Updating systems & servers data ...

. 2017.10.28 01:27:21 - Systems & servers data update completed

. 2017.10.28 01:48:48 - Updating systems & servers data ...

. 2017.10.28 01:48:49 - Systems & servers data update completed

I 2017.10.28 01:50:41 - Renewing TLS key

. 2017.10.28 01:50:41 - OpenVPN > TLS: tls_process: killed expiring key

. 2017.10.28 01:50:41 - OpenVPN > TLS: soft reset sec=0 bytes=14387845/-1 pkts=95944/0

. 2017.10.28 01:50:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.10.28 01:50:41 - OpenVPN > VERIFY KU OK

. 2017.10.28 01:50:41 - OpenVPN > Validating certificate extended key usage

. 2017.10.28 01:50:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.10.28 01:50:41 - OpenVPN > VERIFY EKU OK

. 2017.10.28 01:50:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.10.28 01:50:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 01:50:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 01:50:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 01:50:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 01:50:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.10.28 02:42:47 - Updating systems & servers data ...

. 2017.10.28 02:42:49 - Systems & servers data update completed

. 2017.10.28 02:50:41 - OpenVPN > TLS: soft reset sec=0 bytes=14910751/-1 pkts=102748/0

. 2017.10.28 02:50:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.10.28 02:50:41 - OpenVPN > VERIFY KU OK

. 2017.10.28 02:50:41 - OpenVPN > Validating certificate extended key usage

. 2017.10.28 02:50:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.10.28 02:50:41 - OpenVPN > VERIFY EKU OK

. 2017.10.28 02:50:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.10.28 02:50:41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 02:50:41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 02:50:41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 02:50:41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 02:50:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.10.28 03:00:00 - Updating systems & servers data ...

. 2017.10.28 03:00:02 - Systems & servers data update completed

. 2017.10.28 03:38:19 - Updating systems & servers data ...

. 2017.10.28 03:38:20 - Systems & servers data update completed

. 2017.10.28 03:50:38 - OpenVPN > TLS: soft reset sec=0 bytes=15523315/-1 pkts=105591/0

. 2017.10.28 03:50:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.10.28 03:50:38 - OpenVPN > VERIFY KU OK

. 2017.10.28 03:50:38 - OpenVPN > Validating certificate extended key usage

. 2017.10.28 03:50:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.10.28 03:50:38 - OpenVPN > VERIFY EKU OK

. 2017.10.28 03:50:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.10.28 03:50:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 03:50:38 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 03:50:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 03:50:38 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 03:50:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.10.28 03:56:33 - Updating systems & servers data ...

. 2017.10.28 03:56:35 - Systems & servers data update completed

. 2017.10.28 04:12:33 - Updating systems & servers data ...

. 2017.10.28 04:12:35 - Systems & servers data update completed

. 2017.10.28 04:29:02 - Updating systems & servers data ...

. 2017.10.28 04:29:03 - Systems & servers data update completed

. 2017.10.28 04:46:00 - Updating systems & servers data ...

. 2017.10.28 04:46:02 - Systems & servers data update completed

. 2017.10.28 04:50:39 - OpenVPN > TLS: soft reset sec=0 bytes=20473607/-1 pkts=113796/0

. 2017.10.28 04:50:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.10.28 04:50:39 - OpenVPN > VERIFY KU OK

. 2017.10.28 04:50:39 - OpenVPN > Validating certificate extended key usage

. 2017.10.28 04:50:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.10.28 04:50:39 - OpenVPN > VERIFY EKU OK

. 2017.10.28 04:50:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.10.28 04:50:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 04:50:39 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 04:50:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 04:50:39 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 04:50:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.10.28 05:01:00 - Updating systems & servers data ...

. 2017.10.28 05:01:02 - Systems & servers data update completed

. 2017.10.28 05:18:01 - Updating systems & servers data ...

. 2017.10.28 05:18:02 - Systems & servers data update completed

. 2017.10.28 05:32:01 - Updating systems & servers data ...

. 2017.10.28 05:32:03 - Systems & servers data update completed

. 2017.10.28 05:42:03 - Updating systems & servers data ...

. 2017.10.28 05:42:04 - Systems & servers data update completed

. 2017.10.28 05:50:42 - OpenVPN > TLS: soft reset sec=0 bytes=17187258/-1 pkts=117885/0

. 2017.10.28 05:50:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.10.28 05:50:42 - OpenVPN > VERIFY KU OK

. 2017.10.28 05:50:42 - OpenVPN > Validating certificate extended key usage

. 2017.10.28 05:50:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.10.28 05:50:42 - OpenVPN > VERIFY EKU OK

. 2017.10.28 05:50:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.10.28 05:50:42 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 05:50:42 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 05:50:42 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 05:50:42 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 05:50:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.10.28 06:03:00 - Updating systems & servers data ...

. 2017.10.28 06:03:02 - Systems & servers data update completed

. 2017.10.28 06:20:00 - Updating systems & servers data ...

. 2017.10.28 06:20:02 - Systems & servers data update completed

. 2017.10.28 06:42:01 - Updating systems & servers data ...

. 2017.10.28 06:42:02 - Systems & servers data update completed

I 2017.10.28 06:50:45 - Renewing TLS key

. 2017.10.28 06:50:45 - OpenVPN > TLS: tls_process: killed expiring key

. 2017.10.28 06:50:45 - OpenVPN > TLS: soft reset sec=0 bytes=16884550/-1 pkts=116805/0

. 2017.10.28 06:50:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.10.28 06:50:45 - OpenVPN > VERIFY KU OK

. 2017.10.28 06:50:45 - OpenVPN > Validating certificate extended key usage

. 2017.10.28 06:50:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.10.28 06:50:45 - OpenVPN > VERIFY EKU OK

. 2017.10.28 06:50:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.10.28 06:50:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 06:50:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 06:50:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 06:50:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 06:50:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.10.28 06:56:46 - Updating systems & servers data ...

. 2017.10.28 06:56:48 - Systems & servers data update completed

. 2017.10.28 07:06:55 - Updating systems & servers data ...

. 2017.10.28 07:06:57 - Systems & servers data update completed

. 2017.10.28 07:17:02 - Updating systems & servers data ...

. 2017.10.28 07:17:04 - Systems & servers data update completed

. 2017.10.28 07:27:09 - Updating systems & servers data ...

. 2017.10.28 07:27:11 - Systems & servers data update completed

. 2017.10.28 07:37:17 - Updating systems & servers data ...

. 2017.10.28 07:37:19 - Systems & servers data update completed

. 2017.10.28 07:47:24 - Updating systems & servers data ...

. 2017.10.28 07:47:26 - Systems & servers data update completed

. 2017.10.28 07:50:35 - OpenVPN > TLS: soft reset sec=0 bytes=52843132/-1 pkts=171795/0

. 2017.10.28 07:50:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.10.28 07:50:35 - OpenVPN > VERIFY KU OK

. 2017.10.28 07:50:35 - OpenVPN > Validating certificate extended key usage

. 2017.10.28 07:50:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.10.28 07:50:35 - OpenVPN > VERIFY EKU OK

. 2017.10.28 07:50:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.10.28 07:50:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 07:50:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 07:50:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 07:50:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 07:50:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.10.28 07:57:32 - Updating systems & servers data ...

. 2017.10.28 07:57:33 - Systems & servers data update completed

. 2017.10.28 08:07:39 - Updating systems & servers data ...

. 2017.10.28 08:07:41 - Systems & servers data update completed

. 2017.10.28 08:17:47 - Updating systems & servers data ...

. 2017.10.28 08:17:48 - Systems & servers data update completed

. 2017.10.28 08:27:54 - Updating systems & servers data ...

. 2017.10.28 08:27:55 - Systems & servers data update completed

. 2017.10.28 08:38:01 - Updating systems & servers data ...

. 2017.10.28 08:38:03 - Systems & servers data update completed

. 2017.10.28 08:48:08 - Updating systems & servers data ...

. 2017.10.28 08:48:10 - Systems & servers data update completed

. 2017.10.28 08:50:35 - OpenVPN > TLS: soft reset sec=0 bytes=32493286/-1 pkts=137920/0

. 2017.10.28 08:50:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.10.28 08:50:35 - OpenVPN > VERIFY KU OK

. 2017.10.28 08:50:35 - OpenVPN > Validating certificate extended key usage

. 2017.10.28 08:50:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.10.28 08:50:35 - OpenVPN > VERIFY EKU OK

. 2017.10.28 08:50:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.10.28 08:50:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 08:50:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 08:50:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 08:50:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 08:50:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.10.28 08:58:16 - Updating systems & servers data ...

. 2017.10.28 08:58:17 - Systems & servers data update completed

. 2017.10.28 09:08:23 - Updating systems & servers data ...

. 2017.10.28 09:08:25 - Systems & servers data update completed

. 2017.10.28 09:18:47 - Updating systems & servers data ...

. 2017.10.28 09:18:49 - Systems & servers data update completed

. 2017.10.28 09:37:00 - Updating systems & servers data ...

. 2017.10.28 09:37:01 - Systems & servers data update completed

. 2017.10.28 09:50:38 - OpenVPN > TLS: soft reset sec=0 bytes=25835688/-1 pkts=124895/0

. 2017.10.28 09:50:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.10.28 09:50:38 - OpenVPN > VERIFY KU OK

. 2017.10.28 09:50:38 - OpenVPN > Validating certificate extended key usage

. 2017.10.28 09:50:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.10.28 09:50:38 - OpenVPN > VERIFY EKU OK

. 2017.10.28 09:50:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.10.28 09:50:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 09:50:38 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 09:50:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 09:50:38 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 09:50:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.10.28 09:53:01 - Updating systems & servers data ...

. 2017.10.28 09:53:03 - Systems & servers data update completed

. 2017.10.28 10:07:37 - Updating systems & servers data ...

. 2017.10.28 10:07:38 - Systems & servers data update completed

. 2017.10.28 10:18:57 - Updating systems & servers data ...

. 2017.10.28 10:19:00 - Systems & servers data update completed

. 2017.10.28 10:37:46 - Updating systems & servers data ...

. 2017.10.28 10:37:47 - Systems & servers data update completed

. 2017.10.28 10:50:54 - OpenVPN > TLS: soft reset sec=0 bytes=15674024/-1 pkts=109033/0

. 2017.10.28 10:50:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.10.28 10:50:54 - OpenVPN > VERIFY KU OK

. 2017.10.28 10:50:54 - OpenVPN > Validating certificate extended key usage

. 2017.10.28 10:50:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.10.28 10:50:54 - OpenVPN > VERIFY EKU OK

. 2017.10.28 10:50:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.10.28 10:50:54 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 10:50:54 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 10:50:54 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 10:50:54 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 10:50:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.10.28 11:03:00 - Updating systems & servers data ...

. 2017.10.28 11:03:03 - Systems & servers data update completed

. 2017.10.28 11:19:47 - Updating systems & servers data ...

. 2017.10.28 11:19:49 - Systems & servers data update completed

. 2017.10.28 11:30:37 - Updating systems & servers data ...

. 2017.10.28 11:30:39 - Systems & servers data update completed

. 2017.10.28 11:40:44 - Updating systems & servers data ...

. 2017.10.28 11:40:46 - Systems & servers data update completed

. 2017.10.28 11:50:35 - OpenVPN > TLS: soft reset sec=0 bytes=24570574/-1 pkts=124980/0

. 2017.10.28 11:50:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.10.28 11:50:35 - OpenVPN > VERIFY KU OK

. 2017.10.28 11:50:35 - OpenVPN > Validating certificate extended key usage

. 2017.10.28 11:50:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.10.28 11:50:35 - OpenVPN > VERIFY EKU OK

. 2017.10.28 11:50:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.10.28 11:50:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 11:50:35 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 11:50:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 11:50:35 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 11:50:35 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.10.28 11:50:51 - Updating systems & servers data ...

. 2017.10.28 11:50:54 - Systems & servers data update completed

. 2017.10.28 11:55:16 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2017.10.28 11:55:16 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2017.10.28 11:55:16 - OpenVPN > Restart pause, 5 second(s)

! 2017.10.28 11:55:16 - Disconnecting

. 2017.10.28 11:55:16 - Sending management termination signal

. 2017.10.28 11:55:16 - Management - Send 'signal SIGTERM'

. 2017.10.28 11:55:16 - Connection terminated.

. 2017.10.28 11:55:17 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)

. 2017.10.28 11:55:17 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

I 2017.10.28 11:55:26 - Checking authorization ...

! 2017.10.28 11:55:27 - Connecting to Cynosura (Canada, Vancouver)

. 2017.10.28 11:55:27 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017

. 2017.10.28 11:55:27 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2017.10.28 11:55:27 - Connection to OpenVPN Management Interface

. 2017.10.28 11:55:27 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2017.10.28 11:55:27 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 11:55:27 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 11:55:27 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.21:443

. 2017.10.28 11:55:27 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2017.10.28 11:55:27 - OpenVPN > UDP link local: (not bound)

. 2017.10.28 11:55:27 - OpenVPN > UDP link remote: [AF_INET]71.19.252.21:443

. 2017.10.28 11:55:27 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2017.10.28 11:55:27 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.21:443, sid=59359929 f8195d0c

. 2017.10.28 11:55:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.10.28 11:55:27 - OpenVPN > VERIFY KU OK

. 2017.10.28 11:55:27 - OpenVPN > Validating certificate extended key usage

. 2017.10.28 11:55:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.10.28 11:55:27 - OpenVPN > VERIFY EKU OK

. 2017.10.28 11:55:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cynosura, emailAddress=info@airvpn.org

. 2017.10.28 11:55:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.10.28 11:55:28 - OpenVPN > [Cynosura] Peer Connection Initiated with [AF_INET]71.19.252.21:443

. 2017.10.28 11:55:29 - OpenVPN > SENT CONTROL [Cynosura]: 'PUSH_REQUEST' (status=1)

. 2017.10.28 11:55:35 - Above log line repeated 1 times more

. 2017.10.28 11:55:35 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.1.175 255.255.0.0,peer-id 28,cipher AES-256-GCM'

. 2017.10.28 11:55:35 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2017.10.28 11:55:35 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2017.10.28 11:55:35 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2017.10.28 11:55:35 - OpenVPN > OPTIONS IMPORT: route options modified

. 2017.10.28 11:55:35 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2017.10.28 11:55:35 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2017.10.28 11:55:35 - OpenVPN > OPTIONS IMPORT: peer-id set

. 2017.10.28 11:55:35 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625

. 2017.10.28 11:55:35 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified

. 2017.10.28 11:55:35 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'

. 2017.10.28 11:55:35 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2017.10.28 11:55:35 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key

. 2017.10.28 11:55:35 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2017.10.28 11:55:35 - OpenVPN > Opened utun device utun0

. 2017.10.28 11:55:35 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2017.10.28 11:55:35 - OpenVPN > /sbin/ifconfig utun0 delete

. 2017.10.28 11:55:35 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2017.10.28 11:55:35 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2017.10.28 11:55:35 - OpenVPN > /sbin/ifconfig utun0 10.4.1.175 10.4.1.175 netmask 255.255.0.0 mtu 1500 up

. 2017.10.28 11:55:35 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.1.175 255.255.0.0

. 2017.10.28 11:55:35 - OpenVPN > add net 10.4.0.0: gateway 10.4.1.175

. 2017.10.28 11:55:35 - OpenVPN > /sbin/route add -net 71.19.252.21 192.168.1.254 255.255.255.255

. 2017.10.28 11:55:35 - OpenVPN > add net 71.19.252.21: gateway 192.168.1.254

. 2017.10.28 11:55:35 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2017.10.28 11:55:35 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2017.10.28 11:55:35 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2017.10.28 11:55:35 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2017.10.28 11:55:36 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2017.10.28 11:55:36 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2017.10.28 11:55:36 - Flushing DNS

I 2017.10.28 11:55:36 - Checking route

I 2017.10.28 11:55:38 - Checking DNS

. 2017.10.28 11:55:43 - Checking DNS failed: nmuiqzjjljyvlilsheiczaxjueeoerpv

. 2017.10.28 11:55:43 - Checking DNS (2° try)

. 2017.10.28 11:55:45 - Checking DNS failed: nmuiqzjjljyvlilsheiczaxjueeoerpv

. 2017.10.28 11:55:45 - Checking DNS (3° try)

. 2017.10.28 11:55:54 - Checking DNS failed: nmuiqzjjljyvlilsheiczaxjueeoerpv

E 2017.10.28 11:55:54 - Checking DNS failed.

. 2017.10.28 11:55:54 - OpenVPN > Initialization Sequence Completed

! 2017.10.28 11:55:55 - Disconnecting

. 2017.10.28 11:55:55 - Sending management termination signal

. 2017.10.28 11:55:55 - Management - Send 'signal SIGTERM'

. 2017.10.28 11:56:01 - Connection terminated.

. 2017.10.28 11:56:01 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)

. 2017.10.28 11:56:01 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

I 2017.10.28 11:56:04 - Checking authorization ...

! 2017.10.28 11:56:04 - Connecting to Gemma (Canada, Vancouver)

. 2017.10.28 11:56:04 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017

. 2017.10.28 11:56:04 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2017.10.28 11:56:04 - Connection to OpenVPN Management Interface

. 2017.10.28 11:56:04 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2017.10.28 11:56:04 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 11:56:04 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 11:56:04 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]71.19.252.113:443

. 2017.10.28 11:56:04 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2017.10.28 11:56:04 - OpenVPN > UDP link local: (not bound)

. 2017.10.28 11:56:04 - OpenVPN > UDP link remote: [AF_INET]71.19.252.113:443

. 2017.10.28 11:56:04 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2017.10.28 11:56:05 - OpenVPN > TLS: Initial packet from [AF_INET]71.19.252.113:443, sid=3318898a 267f93b4

. 2017.10.28 11:56:05 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.10.28 11:56:05 - OpenVPN > VERIFY KU OK

. 2017.10.28 11:56:05 - OpenVPN > Validating certificate extended key usage

. 2017.10.28 11:56:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.10.28 11:56:05 - OpenVPN > VERIFY EKU OK

. 2017.10.28 11:56:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.10.28 11:56:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.10.28 11:56:05 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]71.19.252.113:443

. 2017.10.28 11:56:06 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2017.10.28 11:56:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.5.71 255.255.0.0'

. 2017.10.28 11:56:08 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2017.10.28 11:56:08 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2017.10.28 11:56:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2017.10.28 11:56:08 - OpenVPN > OPTIONS IMPORT: route options modified

. 2017.10.28 11:56:08 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2017.10.28 11:56:08 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2017.10.28 11:56:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 11:56:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 11:56:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 11:56:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 11:56:08 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2017.10.28 11:56:08 - OpenVPN > Opened utun device utun0

. 2017.10.28 11:56:08 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2017.10.28 11:56:08 - OpenVPN > /sbin/ifconfig utun0 delete

. 2017.10.28 11:56:08 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2017.10.28 11:56:08 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2017.10.28 11:56:08 - OpenVPN > /sbin/ifconfig utun0 10.4.5.71 10.4.5.71 netmask 255.255.0.0 mtu 1500 up

. 2017.10.28 11:56:08 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.5.71 255.255.0.0

. 2017.10.28 11:56:08 - OpenVPN > add net 10.4.0.0: gateway 10.4.5.71

. 2017.10.28 11:56:08 - OpenVPN > /sbin/route add -net 71.19.252.113 192.168.1.254 255.255.255.255

. 2017.10.28 11:56:08 - OpenVPN > add net 71.19.252.113: gateway 192.168.1.254

. 2017.10.28 11:56:08 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2017.10.28 11:56:08 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2017.10.28 11:56:08 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2017.10.28 11:56:08 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2017.10.28 11:56:09 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2017.10.28 11:56:09 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2017.10.28 11:56:09 - Flushing DNS

I 2017.10.28 11:56:09 - Checking route

I 2017.10.28 11:56:10 - Checking DNS

! 2017.10.28 11:56:11 - Connected.

. 2017.10.28 11:56:11 - OpenVPN > Initialization Sequence Completed

. 2017.10.28 11:58:13 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting

. 2017.10.28 11:58:13 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting

. 2017.10.28 11:58:13 - OpenVPN > Restart pause, 5 second(s)

! 2017.10.28 11:58:13 - Disconnecting

. 2017.10.28 11:58:13 - Sending management termination signal

. 2017.10.28 11:58:13 - Management - Send 'signal SIGTERM'

. 2017.10.28 11:58:13 - Connection terminated.

. 2017.10.28 11:58:13 - DNS of a network adapter restored to original settings (SAMSUNG Modem, to Automatic)

. 2017.10.28 11:58:14 - DNS of a network adapter restored to original settings (Ethernet, to Automatic)

I 2017.10.28 11:58:17 - Checking authorization ...

! 2017.10.28 11:58:17 - Connecting to Mintaka (Canada, Toronto, Ontario)

. 2017.10.28 11:58:17 - OpenVPN > OpenVPN 2.4.3 x86_64-apple-darwin16.6.0 [sSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 23 2017

. 2017.10.28 11:58:17 - OpenVPN > library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10

. 2017.10.28 11:58:17 - Connection to OpenVPN Management Interface

. 2017.10.28 11:58:17 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2017.10.28 11:58:17 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 11:58:17 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 11:58:17 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.218:443

. 2017.10.28 11:58:17 - OpenVPN > Socket Buffers: R=[196724->262144] S=[9216->262144]

. 2017.10.28 11:58:17 - OpenVPN > UDP link local: (not bound)

. 2017.10.28 11:58:17 - OpenVPN > UDP link remote: [AF_INET]184.75.223.218:443

. 2017.10.28 11:58:17 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2017.10.28 11:58:17 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.223.218:443, sid=e3b7c778 d46ff9b0

. 2017.10.28 11:58:18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2017.10.28 11:58:18 - OpenVPN > VERIFY KU OK

. 2017.10.28 11:58:18 - OpenVPN > Validating certificate extended key usage

. 2017.10.28 11:58:18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2017.10.28 11:58:18 - OpenVPN > VERIFY EKU OK

. 2017.10.28 11:58:18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2017.10.28 11:58:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

. 2017.10.28 11:58:18 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.223.218:443

. 2017.10.28 11:58:19 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2017.10.28 11:58:19 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.18.174 255.255.0.0'

. 2017.10.28 11:58:19 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2017.10.28 11:58:19 - OpenVPN > OPTIONS IMPORT: compression parms modified

. 2017.10.28 11:58:19 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2017.10.28 11:58:19 - OpenVPN > OPTIONS IMPORT: route options modified

. 2017.10.28 11:58:19 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2017.10.28 11:58:19 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2017.10.28 11:58:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 11:58:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 11:58:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2017.10.28 11:58:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2017.10.28 11:58:19 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae

. 2017.10.28 11:58:19 - OpenVPN > Opened utun device utun0

. 2017.10.28 11:58:19 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0

. 2017.10.28 11:58:19 - OpenVPN > /sbin/ifconfig utun0 delete

. 2017.10.28 11:58:19 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

. 2017.10.28 11:58:19 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

. 2017.10.28 11:58:19 - OpenVPN > /sbin/ifconfig utun0 10.4.18.174 10.4.18.174 netmask 255.255.0.0 mtu 1500 up

. 2017.10.28 11:58:19 - OpenVPN > /sbin/route add -net 10.4.0.0 10.4.18.174 255.255.0.0

. 2017.10.28 11:58:19 - OpenVPN > add net 10.4.0.0: gateway 10.4.18.174

. 2017.10.28 11:58:19 - OpenVPN > /sbin/route add -net 184.75.223.218 192.168.1.254 255.255.255.255

. 2017.10.28 11:58:19 - OpenVPN > add net 184.75.223.218: gateway 192.168.1.254

. 2017.10.28 11:58:19 - OpenVPN > /sbin/route add -net 0.0.0.0 10.4.0.1 128.0.0.0

. 2017.10.28 11:58:19 - OpenVPN > add net 0.0.0.0: gateway 10.4.0.1

. 2017.10.28 11:58:19 - OpenVPN > /sbin/route add -net 128.0.0.0 10.4.0.1 128.0.0.0

. 2017.10.28 11:58:19 - OpenVPN > add net 128.0.0.0: gateway 10.4.0.1

. 2017.10.28 11:58:20 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.4.0.1)

. 2017.10.28 11:58:20 - DNS of a network adapter forced (Ethernet, from Automatic to 10.4.0.1)

. 2017.10.28 11:58:20 - Flushing DNS

I 2017.10.28 11:58:20 - Checking route

I 2017.10.28 11:58:47 - Checking DNS

! 2017.10.28 11:58:48 - Connected.

. 2017.10.28 11:58:48 - OpenVPN > Initialization Sequence Completed

. 2017.10.28 12:01:00 - Updating systems & servers data ...

. 2017.10.28 12:01:01 - Systems & servers data update completed

. 2017.10.28 12:11:06 - Updating systems & servers data ...

. 2017.10.28 12:11:08 - Systems & servers data update completed

This seems to have been a one time problem, so I'm considering it a solved problem, so to speak.

Share this post


Link to post
Guest
This topic is now closed to further replies.
Sign in to follow this  

×
×
  • Create New...