Just got a new modem/router. Ran tests on IPleak.net. My MacBook Pro connecting via WiFi passes the ipv6 tests just fine but my iMac, using ethernet, does not. Any suggestions? Log can be posted if necessary.
OK, here is my log:
. 2019.02.10 15:14:54 - Eddie version: 2.17.2 / macos_x64, System: MacOS, Name: 10.11.6, Version: Darwin madrat.local 15.6.0 Darwin Kernel Version 15.6.0: Thu Jun 21 20:07:40 PDT 2018; root:xnu-3248.73.11~1/RELEASE_X86_64 x86_64, Mono/.Net: v4.0.30319
. 2019.02.10 15:14:56 - Reading options from /Users/madrat/.airvpn/default.xml
. 2019.02.10 15:15:03 - Command line arguments (0):
. 2019.02.10 15:15:05 - Profile path: /Users/madrat/.airvpn/default.xml
. 2019.02.10 15:15:17 - OpenVPN Driver - Expected
. 2019.02.10 15:15:17 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 (/Applications/Eddie.app/Contents/MacOS/openvpn)
. 2019.02.10 15:15:17 - SSH - Version: OpenSSH_6.9p1, LibreSSL 2.1.8 (/usr/bin/ssh)
. 2019.02.10 15:15:17 - SSL - Version: stunnel 5.48 (/Applications/Eddie.app/Contents/MacOS/stunnel)
. 2019.02.10 15:15:17 - curl - Version: 7.43.0 (/usr/bin/curl)
. 2019.02.10 15:15:17 - Certification Authorities: /Applications/Eddie.app/Contents/MacOS/../Resources/cacert.pem
. 2019.02.10 15:15:18 - Recovery. Unexpected crash?
. 2019.02.10 15:15:18 - Routes, added a new route, 192.30.89.62 for gateway 192.168.1.254
. 2019.02.10 15:15:18 - Routes, added a new route, 192.30.89.59 for gateway 10.20.75.1
. 2019.02.10 15:15:18 - Routes, added a new route, 2606:9580:100:d:2bd7:c37b:24c2:c069 for gateway fde6:7a:7d20:104b::1
! 2019.02.10 15:15:18 - Activation of Network Lock - macOS - PF
. 2019.02.10 15:15:18 - macOS - PF rules updated, reloading
. 2019.02.10 15:15:21 - Above log line repeated 1 times more
I 2019.02.10 15:15:21 - Ready
I 2019.02.10 15:15:21 - Session starting.
. 2019.02.10 15:15:21 - Collect information about providers ...
. 2019.02.10 15:15:22 - Collect information about AirVPN completed
I 2019.02.10 15:15:35 - Checking authorization ...
! 2019.02.10 15:15:36 - Connecting to Pisces (Canada, Vancouver)
. 2019.02.10 15:15:36 - Routes, added a new route, 192.30.89.145 for gateway 192.168.1.254
. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: stunnel 5.48 on x86_64-apple-darwin17.6.0 platform
. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: Compiled/running with OpenSSL 1.0.2o 27 Mar 2018
. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: Threading:PTHREAD Sockets:POLL,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: Reading configuration from file /Users/madrat/.airvpn/1904f759113dfa396f0740cce3d1cf1e4af1043b869ca307ec83e5c63034bea8.tmp.ssl
. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: UTF-8 byte order mark detected
. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG6[ui]: Initializing service [openvpn]
. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG4[ui]: Service [openvpn] needs authentication to prevent MITM attacks
. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG5[ui]: Configuration successful
. 2019.02.10 15:15:36 - SSL > 2019.02.10 15:15:36 LOG6[ui]: Service [openvpn] (FD=6) bound to 127.0.0.1:49293
. 2019.02.10 15:15:36 - OpenVPN > OpenVPN 2.4.6 x86_64-apple-darwin17.6.0 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Jul 29 2018
. 2019.02.10 15:15:36 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
. 2019.02.10 15:15:36 - Connection to OpenVPN Management Interface
. 2019.02.10 15:15:36 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2019.02.10 15:15:36 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.02.10 15:15:36 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.02.10 15:15:36 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
. 2019.02.10 15:15:36 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
. 2019.02.10 15:15:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]127.0.0.1:49293
. 2019.02.10 15:15:36 - OpenVPN > Socket Buffers: R=[131072->262144] S=[131072->262144]
. 2019.02.10 15:15:36 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:49293 [nonblock]
. 2019.02.10 15:15:36 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:49293
. 2019.02.10 15:15:36 - OpenVPN > TCP_CLIENT link local: (not bound)
. 2019.02.10 15:15:36 - OpenVPN > TCP_CLIENT link remote: [AF_INET]127.0.0.1:49293
. 2019.02.10 15:15:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:49216
. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: s_connect: connecting 192.30.89.145:443
. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG5[0]: s_connect: connected 192.30.89.145:443
. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.64:49218
. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: SNI: sending servername: 192.30.89.145
. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: Peer certificate not required
. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: Certificate verification disabled
. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:36 LOG6[0]: Client certificate not requested
. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:37 LOG6[0]: TLS connected: new session negotiated
. 2019.02.10 15:15:37 - SSL > 2019.02.10 15:15:37 LOG6[0]: TLSv1.2 ciphersuite: ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2019.02.10 15:15:37 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:49293, sid=ae1b4ca3 68a8738a
. 2019.02.10 15:15:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.10 15:15:37 - OpenVPN > VERIFY KU OK
. 2019.02.10 15:15:37 - OpenVPN > Validating certificate extended key usage
. 2019.02.10 15:15:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.10 15:15:37 - OpenVPN > VERIFY EKU OK
. 2019.02.10 15:15:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.10 15:15:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.10 15:15:37 - OpenVPN > [Pisces] Peer Connection Initiated with [AF_INET]127.0.0.1:49293
. 2019.02.10 15:15:38 - OpenVPN > SENT CONTROL [Pisces]: 'PUSH_REQUEST' (status=1)
. 2019.02.10 15:15:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.15.227.1,dhcp-option DNS6 fde6:7a:7d20:be3::1,tun-ipv6,route-gateway 10.15.227.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:be3::101a/64 fde6:7a:7d20:be3::1,ifconfig 10.15.227.28 255.255.255.0,peer-id 0,cipher AES-256-GCM'
. 2019.02.10 15:15:38 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp'
. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1627
. 2019.02.10 15:15:38 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2019.02.10 15:15:38 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2019.02.10 15:15:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 15:15:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 15:15:38 - OpenVPN > ROUTE_GATEWAY 192.168.1.254/255.255.255.0 IFACE=en0 HWADDR=00:23:df:8c:a0:ae
. 2019.02.10 15:15:38 - OpenVPN > GDG6: remote_host_ipv6=n/a
. 2019.02.10 15:15:38 - OpenVPN > ROUTE6_GATEWAY fe80::9e1e:95ff:fed2:4590 IFACE=en0
. 2019.02.10 15:15:38 - OpenVPN > Opened utun device utun0
. 2019.02.10 15:15:39 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1
. 2019.02.10 15:15:39 - OpenVPN > /sbin/ifconfig utun0 delete
. 2019.02.10 15:15:39 - OpenVPN > ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
. 2019.02.10 15:15:39 - OpenVPN > NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
. 2019.02.10 15:15:39 - OpenVPN > /sbin/ifconfig utun0 10.15.227.28 10.15.227.28 netmask 255.255.255.0 mtu 1500 up
. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -net 10.15.227.0 10.15.227.28 255.255.255.0
. 2019.02.10 15:15:39 - OpenVPN > add net 10.15.227.0: gateway 10.15.227.28
. 2019.02.10 15:15:39 - OpenVPN > /sbin/ifconfig utun0 inet6 fde6:7a:7d20:be3::101a/64
. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(fde6:7a:7d20:be3::/64 -> fde6:7a:7d20:be3::101a metric 0) dev utun0
. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 fde6:7a:7d20:be3:: -prefixlen 64 -iface utun0
. 2019.02.10 15:15:39 - OpenVPN > route: writing to routing socket: File exists
. 2019.02.10 15:15:39 - OpenVPN > add net fde6:7a:7d20:be3::: gateway utun0: File exists
. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -net 127.0.0.1 192.168.1.254 255.255.255.255
. 2019.02.10 15:15:39 - OpenVPN > add net 127.0.0.1: gateway 192.168.1.254
. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -net 0.0.0.0 10.15.227.1 128.0.0.0
. 2019.02.10 15:15:39 - OpenVPN > add net 0.0.0.0: gateway 10.15.227.1
. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -net 128.0.0.0 10.15.227.1 128.0.0.0
. 2019.02.10 15:15:39 - OpenVPN > add net 128.0.0.0: gateway 10.15.227.1
. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:be3::1 metric -1) dev utun0
. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 :: -prefixlen 3 -iface utun0
. 2019.02.10 15:15:39 - OpenVPN > add net ::: gateway utun0
. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:be3::1 metric -1) dev utun0
. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 2000:: -prefixlen 4 -iface utun0
. 2019.02.10 15:15:39 - OpenVPN > add net 2000::: gateway utun0
. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:be3::1 metric -1) dev utun0
. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 3000:: -prefixlen 4 -iface utun0
. 2019.02.10 15:15:39 - OpenVPN > add net 3000::: gateway utun0
. 2019.02.10 15:15:39 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:be3::1 metric -1) dev utun0
. 2019.02.10 15:15:39 - OpenVPN > /sbin/route add -inet6 fc00:: -prefixlen 7 -iface utun0
. 2019.02.10 15:15:39 - OpenVPN > add net fc00::: gateway utun0
. 2019.02.10 15:15:39 - DNS of a network adapter forced (SAMSUNG Modem, from Automatic to 10.15.227.1, fde6:7a:7d20:be3::1)
. 2019.02.10 15:15:39 - DNS of a network adapter forced (Ethernet, from Automatic to 10.15.227.1, fde6:7a:7d20:be3::1)
. 2019.02.10 15:15:40 - DNS of a network adapter forced (FireWire, from 10.4.0.1 to 10.15.227.1, fde6:7a:7d20:be3::1)
. 2019.02.10 15:15:40 - DNS of a network adapter forced (Wi-Fi, from 10.4.0.1 to 10.15.227.1, fde6:7a:7d20:be3::1)
. 2019.02.10 15:15:40 - Routes, added a new route, 192.30.89.142 for gateway 10.15.227.1
. 2019.02.10 15:15:40 - Routes, added a new route, 2606:9580:100:a:ee16:9283:a03e:5f18 for gateway fde6:7a:7d20:be3::1
. 2019.02.10 15:15:40 - Flushing DNS
. 2019.02.10 15:15:40 - macOS - PF rules updated, reloading
I 2019.02.10 15:15:42 - Checking route IPv4
I 2019.02.10 15:15:42 - Checking route IPv6
I 2019.02.10 15:15:43 - Checking DNS
! 2019.02.10 15:15:44 - Connected.
. 2019.02.10 15:15:44 - OpenVPN > Initialization Sequence Completed
. 2019.02.10 15:16:36 - SSL > 2019.02.10 15:16:36 LOG6[cron]: Executing cron jobs
. 2019.02.10 15:16:36 - SSL > 2019.02.10 15:16:36 LOG6[cron]: Cron jobs completed in 0 seconds
. 2019.02.10 15:45:26 - Collect information about AirVPN completed
. 2019.02.10 16:15:37 - Above log line repeated 1 times more
. 2019.02.10 16:15:37 - OpenVPN > TLS: soft reset sec=0 bytes=33901532/-1 pkts=64984/0
. 2019.02.10 16:15:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.10 16:15:37 - OpenVPN > VERIFY KU OK
. 2019.02.10 16:15:37 - OpenVPN > Validating certificate extended key usage
. 2019.02.10 16:15:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.10 16:15:37 - OpenVPN > VERIFY EKU OK
. 2019.02.10 16:15:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.10 16:15:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 16:15:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 16:15:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.10 16:45:33 - Collect information about AirVPN completed
. 2019.02.10 17:05:33 - macOS - PF rules updated, reloading
. 2019.02.10 17:15:36 - Collect information about AirVPN completed
. 2019.02.10 17:15:37 - OpenVPN > TLS: soft reset sec=0 bytes=25042350/-1 pkts=45420/0
. 2019.02.10 17:15:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.10 17:15:37 - OpenVPN > VERIFY KU OK
. 2019.02.10 17:15:37 - OpenVPN > Validating certificate extended key usage
. 2019.02.10 17:15:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.10 17:15:37 - OpenVPN > VERIFY EKU OK
. 2019.02.10 17:15:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.10 17:15:37 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 17:15:37 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 17:15:37 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.10 17:45:39 - Collect information about AirVPN completed
. 2019.02.10 18:15:37 - OpenVPN > TLS: soft reset sec=0 bytes=53370209/-1 pkts=76612/0
. 2019.02.10 18:15:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.10 18:15:37 - OpenVPN > VERIFY KU OK
. 2019.02.10 18:15:37 - OpenVPN > Validating certificate extended key usage
. 2019.02.10 18:15:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.10 18:15:37 - OpenVPN > VERIFY EKU OK
. 2019.02.10 18:15:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.10 18:15:38 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 18:15:38 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 18:15:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.10 18:15:44 - Collect information about AirVPN completed
. 2019.02.10 19:15:37 - Above log line repeated 1 times more
. 2019.02.10 19:15:37 - Renewing TLS key
. 2019.02.10 19:15:37 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.02.10 19:15:38 - OpenVPN > TLS: soft reset sec=0 bytes=44320495/-1 pkts=62553/0
. 2019.02.10 19:15:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.10 19:15:38 - OpenVPN > VERIFY KU OK
. 2019.02.10 19:15:38 - OpenVPN > Validating certificate extended key usage
. 2019.02.10 19:15:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.10 19:15:38 - OpenVPN > VERIFY EKU OK
. 2019.02.10 19:15:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.10 19:15:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 19:15:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 19:15:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.10 19:15:51 - Collect information about AirVPN completed
. 2019.02.10 20:15:38 - Above log line repeated 1 times more
. 2019.02.10 20:15:38 - Renewing TLS key
. 2019.02.10 20:15:38 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.02.10 20:15:39 - OpenVPN > TLS: soft reset sec=0 bytes=62520637/-1 pkts=95955/0
. 2019.02.10 20:15:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.10 20:15:39 - OpenVPN > VERIFY KU OK
. 2019.02.10 20:15:39 - OpenVPN > Validating certificate extended key usage
. 2019.02.10 20:15:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.10 20:15:39 - OpenVPN > VERIFY EKU OK
. 2019.02.10 20:15:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.10 20:15:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 20:15:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 20:15:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.10 20:15:56 - Collect information about AirVPN completed
. 2019.02.10 21:15:39 - Above log line repeated 1 times more
. 2019.02.10 21:15:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.10 21:15:39 - OpenVPN > VERIFY KU OK
. 2019.02.10 21:15:39 - OpenVPN > Validating certificate extended key usage
. 2019.02.10 21:15:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.10 21:15:39 - OpenVPN > VERIFY EKU OK
. 2019.02.10 21:15:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.10 21:15:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 21:15:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 21:15:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.10 21:16:03 - Collect information about AirVPN completed
. 2019.02.10 22:15:41 - Above log line repeated 1 times more
. 2019.02.10 22:15:41 - Renewing TLS key
. 2019.02.10 22:15:41 - OpenVPN > TLS: tls_process: killed expiring key
. 2019.02.10 22:15:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.10 22:15:41 - OpenVPN > VERIFY KU OK
. 2019.02.10 22:15:41 - OpenVPN > Validating certificate extended key usage
. 2019.02.10 22:15:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.10 22:15:41 - OpenVPN > VERIFY EKU OK
. 2019.02.10 22:15:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.10 22:15:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 22:15:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 22:15:41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.10 22:16:23 - Collect information about AirVPN completed
. 2019.02.10 23:15:56 - Above log line repeated 1 times more
. 2019.02.10 23:15:56 - OpenVPN > TLS: soft reset sec=0 bytes=807836511/-1 pkts=1346319/0
. 2019.02.10 23:15:56 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.10 23:15:56 - OpenVPN > VERIFY KU OK
. 2019.02.10 23:15:56 - OpenVPN > Validating certificate extended key usage
. 2019.02.10 23:15:56 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.10 23:15:56 - OpenVPN > VERIFY EKU OK
. 2019.02.10 23:15:56 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.10 23:15:56 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 23:15:56 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.10 23:15:56 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.10 23:16:39 - Collect information about AirVPN completed
. 2019.02.11 00:15:39 - Above log line repeated 1 times more
. 2019.02.11 00:15:39 - OpenVPN > TLS: soft reset sec=0 bytes=105877702/-1 pkts=316886/0
. 2019.02.11 00:15:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.11 00:15:39 - OpenVPN > VERIFY KU OK
. 2019.02.11 00:15:39 - OpenVPN > Validating certificate extended key usage
. 2019.02.11 00:15:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.11 00:15:39 - OpenVPN > VERIFY EKU OK
. 2019.02.11 00:15:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.11 00:15:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 00:15:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 00:15:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.11 00:16:54 - Collect information about AirVPN completed
. 2019.02.11 01:15:52 - Above log line repeated 1 times more
. 2019.02.11 01:15:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.11 01:15:52 - OpenVPN > VERIFY KU OK
. 2019.02.11 01:15:52 - OpenVPN > Validating certificate extended key usage
. 2019.02.11 01:15:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.11 01:15:52 - OpenVPN > VERIFY EKU OK
. 2019.02.11 01:15:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.11 01:15:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 01:15:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 01:15:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.11 01:17:23 - Collect information about AirVPN completed
. 2019.02.11 02:15:54 - Above log line repeated 1 times more
. 2019.02.11 02:15:54 - OpenVPN > TLS: soft reset sec=0 bytes=6345530/-1 pkts=28324/0
. 2019.02.11 02:15:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.11 02:15:54 - OpenVPN > VERIFY KU OK
. 2019.02.11 02:15:54 - OpenVPN > Validating certificate extended key usage
. 2019.02.11 02:15:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.11 02:15:54 - OpenVPN > VERIFY EKU OK
. 2019.02.11 02:15:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.11 02:15:54 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 02:15:54 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 02:15:54 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.11 02:17:37 - Collect information about AirVPN completed
. 2019.02.11 02:17:56 - macOS - PF rules updated, reloading
. 2019.02.11 02:47:43 - Collect information about AirVPN completed
. 2019.02.11 03:15:55 - OpenVPN > TLS: soft reset sec=0 bytes=7025610/-1 pkts=30229/0
. 2019.02.11 03:15:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.11 03:15:55 - OpenVPN > VERIFY KU OK
. 2019.02.11 03:15:55 - OpenVPN > Validating certificate extended key usage
. 2019.02.11 03:15:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.11 03:15:55 - OpenVPN > VERIFY EKU OK
. 2019.02.11 03:15:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.11 03:15:55 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 03:15:55 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 03:15:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.11 03:17:43 - Collect information about AirVPN completed
. 2019.02.11 04:15:57 - Above log line repeated 1 times more
. 2019.02.11 04:15:57 - OpenVPN > TLS: soft reset sec=0 bytes=7306290/-1 pkts=31474/0
. 2019.02.11 04:15:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.11 04:15:57 - OpenVPN > VERIFY KU OK
. 2019.02.11 04:15:57 - OpenVPN > Validating certificate extended key usage
. 2019.02.11 04:15:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.11 04:15:57 - OpenVPN > VERIFY EKU OK
. 2019.02.11 04:15:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.11 04:15:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 04:15:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 04:15:57 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.11 04:17:43 - Collect information about AirVPN completed
. 2019.02.11 05:15:59 - Above log line repeated 1 times more
. 2019.02.11 05:15:59 - OpenVPN > TLS: soft reset sec=0 bytes=10408363/-1 pkts=35413/0
. 2019.02.11 05:15:59 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.11 05:15:59 - OpenVPN > VERIFY KU OK
. 2019.02.11 05:15:59 - OpenVPN > Validating certificate extended key usage
. 2019.02.11 05:15:59 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.11 05:15:59 - OpenVPN > VERIFY EKU OK
. 2019.02.11 05:15:59 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.11 05:15:59 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 05:15:59 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 05:15:59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.11 05:18:02 - Collect information about AirVPN completed
. 2019.02.11 06:15:40 - Above log line repeated 1 times more
. 2019.02.11 06:15:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.11 06:15:40 - OpenVPN > VERIFY KU OK
. 2019.02.11 06:15:40 - OpenVPN > Validating certificate extended key usage
. 2019.02.11 06:15:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.11 06:15:40 - OpenVPN > VERIFY EKU OK
. 2019.02.11 06:15:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.11 06:15:40 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 06:15:40 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 06:15:40 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.11 06:18:02 - Collect information about AirVPN completed
. 2019.02.11 07:15:39 - Above log line repeated 1 times more
. 2019.02.11 07:15:39 - OpenVPN > TLS: soft reset sec=0 bytes=21970673/-1 pkts=57358/0
. 2019.02.11 07:15:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2019.02.11 07:15:39 - OpenVPN > VERIFY KU OK
. 2019.02.11 07:15:39 - OpenVPN > Validating certificate extended key usage
. 2019.02.11 07:15:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2019.02.11 07:15:39 - OpenVPN > VERIFY EKU OK
. 2019.02.11 07:15:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Pisces, emailAddress=info@airvpn.org
. 2019.02.11 07:15:39 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 07:15:39 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2019.02.11 07:15:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2019.02.11 07:18:07 - Collect information about AirVPN completed