Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- *Tunnelblick: macOS 10.14.2; Tunnelblick 3.7.8 (build 5180); prior version 3.7.7 (build 5150)
- 2019-01-13 12:49:02 *Tunnelblick: Attempting connection with pfSense using shadow copy; Set nameserver = 769; monitoring connection
- 2019-01-13 12:49:02 *Tunnelblick: openvpnstart start pfSense.tblk 65299 769 0 1 0 1065264 -ptADGNWradsgnw 2.4.6-openssl-1.0.2q
- 2019-01-13 12:49:02 *Tunnelblick: openvpnstart log:
- OpenVPN started successfully. Command used to start OpenVPN (one argument per displayed line):
- /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.4.6-openssl-1.0.2q/openvpn
- --daemon
- --log /Library/Application Support/Tunnelblick/Logs/-SUsers-Snick-SLibrary-SApplication Support-STunnelblick-SConfigurations-SpfSense.tblk-SContents-SResources-Sconfig.ovpn.769_0_1_0_1065264.65299.openvpn.log
- --cd /Library/Application Support/Tunnelblick/Users/nick/pfSense.tblk/Contents/Resources
- --setenv IV_GUI_VER "net.tunnelblick.tunnelblick 5180 3.7.8 (build 5180)"
- --verb 3
- --config /Library/Application Support/Tunnelblick/Users/nick/pfSense.tblk/Contents/Resources/config.ovpn
- --setenv TUNNELBLICK_CONFIG_FOLDER /Library/Application Support/Tunnelblick/Users/nick/pfSense.tblk/Contents/Resources
- --verb 3
- --cd /Library/Application Support/Tunnelblick/Users/nick/pfSense.tblk/Contents/Resources
- --management 127.0.0.1 65299 /Library/Application Support/Tunnelblick/iiijbpaohjlaacjbpkidocndnnempdnebgonfhod.mip
- --management-query-passwords
- --management-hold
- --script-security 2
- --up /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw
- --down /Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw
- 2019-01-13 12:49:02 OpenVPN 2.4.6 x86_64-apple-darwin [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Nov 29 2018
- 2019-01-13 12:49:02 library versions: OpenSSL 1.0.2q 20 Nov 2018, LZO 2.10
- 2019-01-13 12:49:02 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:65299
- 2019-01-13 12:49:02 Need hold release from management interface, waiting...
- 2019-01-13 12:49:02 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:65299
- 2019-01-13 12:49:02 *Tunnelblick: openvpnstart starting OpenVPN
- 2019-01-13 12:49:03 *Tunnelblick: Established communication with OpenVPN
- 2019-01-13 12:49:03 >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
- 2019-01-13 12:49:03 MANAGEMENT: CMD 'pid'
- 2019-01-13 12:49:03 MANAGEMENT: CMD 'auth-retry interact'
- 2019-01-13 12:49:03 MANAGEMENT: CMD 'state on'
- 2019-01-13 12:49:03 MANAGEMENT: CMD 'state'
- 2019-01-13 12:49:03 MANAGEMENT: CMD 'bytecount 1'
- 2019-01-13 12:49:03 MANAGEMENT: CMD 'hold release'
- 2019-01-13 12:49:03 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2019-01-13 12:49:03 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2019-01-13 12:49:03 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2019-01-13 12:49:03 MANAGEMENT: >STATE:1547383743,RESOLVE,,,,,,
- 2019-01-13 12:49:03 TCP/UDP: Preserving recently used remote address: [AF_INET6]64:ff9b::5207:1a24:1194
- 2019-01-13 12:49:03 Socket Buffers: R=[786896->786896] S=[9216->9216]
- 2019-01-13 12:49:03 setsockopt(IPV6_V6ONLY=0)
- 2019-01-13 12:49:03 UDP link local (bound): [AF_INET6][undef]:0
- 2019-01-13 12:49:03 UDP link remote: [AF_INET6]64:ff9b::5207:1a24:1194
- 2019-01-13 12:49:03 MANAGEMENT: >STATE:1547383743,WAIT,,,,,,
- 2019-01-13 12:49:03 MANAGEMENT: >STATE:1547383743,AUTH,,,,,,
- 2019-01-13 12:49:03 TLS: Initial packet from [AF_INET6]64:ff9b::5207:1a24:1194, sid=a98fa080 fdc8ed83
- 2019-01-13 12:49:03 VERIFY OK: depth=1, CN=internal-ca
- 2019-01-13 12:49:03 VERIFY KU OK
- 2019-01-13 12:49:03 Validating certificate extended key usage
- 2019-01-13 12:49:03 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- 2019-01-13 12:49:03 VERIFY EKU OK
- 2019-01-13 12:49:03 VERIFY X509NAME OK: CN=int.l###.co, C=GB, ST=London, L=London, O=LS
- 2019-01-13 12:49:03 VERIFY OK: depth=0, CN=int.l###.co, C=GB, ST=London, L=London, O=LS
- 2019-01-13 12:49:03 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- 2019-01-13 12:49:03 [int.l###.co] Peer Connection Initiated with [AF_INET6]64:ff9b::5207:1a24:1194
- 2019-01-13 12:49:04 MANAGEMENT: >STATE:1547383744,GET_CONFIG,,,,,,
- 2019-01-13 12:49:04 SENT CONTROL [int.l###.co]: 'PUSH_REQUEST' (status=1)
- 2019-01-13 12:49:04 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.0.100.1,redirect-gateway def1,route-gateway 10.0.100.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.0.100.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
- 2019-01-13 12:49:04 OPTIONS IMPORT: timers and/or timeouts modified
- 2019-01-13 12:49:04 OPTIONS IMPORT: --ifconfig/up options modified
- 2019-01-13 12:49:04 OPTIONS IMPORT: route options modified
- 2019-01-13 12:49:04 OPTIONS IMPORT: route-related options modified
- 2019-01-13 12:49:04 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2019-01-13 12:49:04 OPTIONS IMPORT: peer-id set
- 2019-01-13 12:49:04 OPTIONS IMPORT: adjusting link_mtu to 1624
- 2019-01-13 12:49:04 OPTIONS IMPORT: data channel crypto options modified
- 2019-01-13 12:49:04 Data Channel: using negotiated cipher 'AES-256-GCM'
- 2019-01-13 12:49:04 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 2019-01-13 12:49:04 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 2019-01-13 12:49:04 Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
- 2019-01-13 12:49:04 Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
- 2019-01-13 12:49:04 Opened utun device utun2
- 2019-01-13 12:49:04 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- 2019-01-13 12:49:04 MANAGEMENT: >STATE:1547383744,ASSIGN_IP,,10.0.100.2,,,,
- 2019-01-13 12:49:04 /sbin/ifconfig utun2 delete
- ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
- 2019-01-13 12:49:04 NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
- 2019-01-13 12:49:04 /sbin/ifconfig utun2 10.0.100.2 10.0.100.2 netmask 255.255.255.0 mtu 1500 up
- 2019-01-13 12:49:04 /sbin/route add -net 10.0.100.0 10.0.100.2 255.255.255.0
- add net 10.0.100.0: gateway 10.0.100.2
- 2019-01-13 12:49:04 /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw utun2 1500 1552 10.0.100.2 255.255.255.0 init
- **********************************************
- Start of output from client.up.tunnelblick.sh
- Disabled IPv6 for 'Arduino Due 2'
- Disabled IPv6 for 'Arduino Due'
- Disabled IPv6 for 'FT232R USB UART'
- Disabled IPv6 for 'Arduino Due 3'
- Disabled IPv6 for 'FT232R USB UART 2'
- Disabled IPv6 for 'iPhone USB 2'
- Disabled IPv6 for 'iPhone USB 3'
- Disabled IPv6 for 'Thunderbolt Ethernet Slot 1'
- Disabled IPv6 for 'AX88x72A'
- Retrieved from OpenVPN: name server(s) [ 10.0.100.1 ], search domain(s) [ ] and SMB server(s) [ ] and using default domain name [ openvpn ]
- Not aggregating ServerAddresses because running on macOS 10.6 or higher
- Setting search domains to 'openvpn' because the search domains were not set manually (or are allowed to be changed) and 'Prepend domain name to search domains' was not selected
- Saved the DNS and SMB configurations so they can be restored
- Changed DNS ServerAddresses setting from '172.20.10.1' to '10.0.100.1'
- Changed DNS SearchDomains setting from '' to 'openvpn'
- Changed DNS DomainName setting from '' to 'openvpn'
- Did not change SMB NetBIOSName setting of ''
- Did not change SMB Workgroup setting of ''
- Did not change SMB WINSAddresses setting of ''
- DNS servers '10.0.100.1' will be used for DNS queries when the VPN is active
- NOTE: The DNS servers do not include any free public DNS servers known to Tunnelblick. This may cause DNS queries to fail or be intercepted or falsified even if they are directed through the VPN. Specify only known public DNS servers or DNS servers located on the VPN network to avoid such problems.
- Flushed the DNS cache via dscacheutil
- /usr/sbin/discoveryutil not present. Not flushing the DNS cache via discoveryutil
- Notified mDNSResponder that the DNS cache was flushed
- Not notifying mDNSResponderHelper that the DNS cache was flushed because it is not running
- Setting up to monitor system configuration with process-network-changes
- End of output from client.up.tunnelblick.sh
- **********************************************
- 2019-01-13 12:49:09 *Tunnelblick: No 'connected.sh' script to execute
- 2019-01-13 12:49:09 /sbin/route add -net 0.0.0.0 10.0.100.1 128.0.0.0
- add net 0.0.0.0: gateway 10.0.100.1
- 2019-01-13 12:49:09 /sbin/route add -net 128.0.0.0 10.0.100.1 128.0.0.0
- add net 128.0.0.0: gateway 10.0.100.1
- 2019-01-13 12:49:09 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- 2019-01-13 12:49:09 Initialization Sequence Completed
- 2019-01-13 12:49:09 MANAGEMENT: >STATE:1547383749,CONNECTED,SUCCESS,10.0.100.2,64:ff9b::5207:1a24,1194,,
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:09 write UDP: No route to host (code=65)
- 2019-01-13 12:49:10 write UDP: No route to host (code=65)
- 2019-01-13 12:49:10 write UDP: No route to host (code=65)
- 2019-01-13 12:49:10 write UDP: No route to host (code=65)
- 2019-01-13 12:49:10 write UDP: No route to host (code=65)
- 2019-01-13 12:49:10 write UDP: No route to host (code=65)
- 2019-01-13 12:49:10 write UDP: No route to host (code=65)
- 2019-01-13 12:49:10 write UDP: No route to host (code=65)
- 2019-01-13 12:49:10 write UDP: No route to host (code=65)
- 2019-01-13 12:49:10 write UDP: No route to host (code=65)
- 2019-01-13 12:49:10 write UDP: No route to host (code=65)
- 2019-01-13 12:49:10 write UDP: No route to host (code=65)
- 2019-01-13 12:49:10 write UDP: No route to host (code=65)
- 2019-01-13 12:49:10 write UDP: No route to host (code=65)
- 2019-01-13 12:49:10 write UDP: No route to host (code=65)
- 2019-01-13 12:49:10 write UDP: No route to host (code=65)
- 2019-01-13 12:49:10 write UDP: No route to host (code=65)
- 2019-01-13 12:49:10 write UDP: No route to host (code=65)
- 2019-01-13 12:49:10 write UDP: No route to host (code=65)
- 2019-01-13 12:49:10 write UDP: No route to host (code=65)
- 2019-01-13 12:49:11 write UDP: No route to host (code=65)
- 2019-01-13 12:49:11 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:12 write UDP: No route to host (code=65)
- 2019-01-13 12:49:13 write UDP: No route to host (code=65)
- 2019-01-13 12:49:13 write UDP: No route to host (code=65)
- 2019-01-13 12:49:13 write UDP: No route to host (code=65)
- 2019-01-13 12:49:13 write UDP: No route to host (code=65)
- 2019-01-13 12:49:13 *Tunnelblick: Disconnecting; VPN Details… window disconnect button pressed
- 2019-01-13 12:49:13 *Tunnelblick: No 'pre-disconnect.sh' script to execute
- 2019-01-13 12:49:13 *Tunnelblick: Disconnecting using 'kill'
- 2019-01-13 12:49:13 write UDP: No route to host (code=65)
- 2019-01-13 12:49:14 event_wait : Interrupted system call (code=4)
- 2019-01-13 12:49:14 /sbin/route delete -net 0.0.0.0 10.0.100.1 128.0.0.0
- delete net 0.0.0.0: gateway 10.0.100.1
- 2019-01-13 12:49:14 /sbin/route delete -net 128.0.0.0 10.0.100.1 128.0.0.0
- delete net 128.0.0.0: gateway 10.0.100.1
- 2019-01-13 12:49:14 Closing TUN/TAP interface
- 2019-01-13 12:49:14 /Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw utun2 1500 1552 10.0.100.2 255.255.255.0 init
- **********************************************
- Start of output from client.down.tunnelblick.sh
- Cancelled monitoring of system configuration changes
- Restored the DNS and SMB configurations
- Re-enabled IPv6 (automatic) for 'Arduino Due 2'
- Re-enabled IPv6 (automatic) for 'Arduino Due'
- Re-enabled IPv6 (automatic) for 'FT232R USB UART'
- Re-enabled IPv6 (automatic) for 'Arduino Due 3'
- Re-enabled IPv6 (automatic) for 'FT232R USB UART 2'
- Re-enabled IPv6 (automatic) for 'iPhone USB 2'
- Re-enabled IPv6 (automatic) for 'iPhone USB 3'
- Re-enabled IPv6 (automatic) for 'Thunderbolt Ethernet Slot 1'
- Re-enabled IPv6 (automatic) for 'AX88x72A'
- Flushed the DNS cache via dscacheutil
- /usr/sbin/discoveryutil not present. Not flushing the DNS cache via discoveryutil
- Notified mDNSResponder that the DNS cache was flushed
- Not notifying mDNSResponderHelper that the DNS cache was flushed because it is not running
- /Library/Application Support/Tunnelblick/expect-disconnect/ALL does not exist
- End of output from client.down.tunnelblick.sh
- **********************************************
- 2019-01-13 12:49:14 SIGTERM[hard,] received, process exiting
- 2019-01-13 12:49:14 MANAGEMENT: >STATE:1547383754,EXITING,SIGTERM,,,,,
- 2019-01-13 12:49:15 *Tunnelblick: No 'post-disconnect.sh' script to execute
- 2019-01-13 12:49:15 *Tunnelblick: Expected disconnection occurred.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement