Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ------------------------------------------
- Linux myservername 4.4.0-101-generic #124-Ubuntu SMP Fri Nov 10 18:29:59 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux
- ------------------------------------------
- /etc/openvpn/server.conf
- ------------------------------------------
- port 1194
- proto udp
- dev tun
- ca /etc/openvpn/ca.crt
- cert /etc/openvpn/server.crt
- key /etc/openvpn/server.key # This file should be kept secret
- dh dh2048.pem
- server 10.8.0.0 255.255.255.0
- ifconfig-pool-persist ipp.txt
- push "redirect-gateway def1 bypass-dhcp"
- push "dhcp-option DNS 8.8.4.4"
- push "dhcp-option DNS 8.8.8.8"
- keepalive 10 120
- tls-auth ta.key 0 # This file is secret
- key-direction 0
- cipher AES-128-CBC # AES
- auth SHA256
- comp-lzo
- user nobody
- group nogroup
- persist-key
- persist-tun
- status openvpn-status.log
- log-append openvpn.log
- verb 4
- crl-verify /etc/openvpn/crl.pem
- ------------------------------------------
- /etc/openvpn/openvpn.log
- ------------------------------------------
- Thu Dec 14 22:17:14 2017 us=693364 Current Parameter Settings:
- Thu Dec 14 22:17:14 2017 us=693405 config = '/etc/openvpn/server.conf'
- Thu Dec 14 22:17:14 2017 us=693412 mode = 1
- Thu Dec 14 22:17:14 2017 us=693416 persist_config = DISABLED
- Thu Dec 14 22:17:14 2017 us=693419 persist_mode = 1
- Thu Dec 14 22:17:14 2017 us=693437 show_ciphers = DISABLED
- Thu Dec 14 22:17:14 2017 us=693440 show_digests = DISABLED
- Thu Dec 14 22:17:14 2017 us=693444 show_engines = DISABLED
- Thu Dec 14 22:17:14 2017 us=693447 genkey = DISABLED
- Thu Dec 14 22:17:14 2017 us=693450 key_pass_file = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693453 show_tls_ciphers = DISABLED
- Thu Dec 14 22:17:14 2017 us=693457 Connection profiles [default]:
- Thu Dec 14 22:17:14 2017 us=693460 proto = udp
- Thu Dec 14 22:17:14 2017 us=693463 local = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693467 local_port = 1194
- Thu Dec 14 22:17:14 2017 us=693470 remote = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693473 remote_port = 1194
- Thu Dec 14 22:17:14 2017 us=693477 remote_float = DISABLED
- Thu Dec 14 22:17:14 2017 us=693480 bind_defined = DISABLED
- Thu Dec 14 22:17:14 2017 us=693483 bind_local = ENABLED
- Thu Dec 14 22:17:14 2017 us=693486 connect_retry_seconds = 5
- Thu Dec 14 22:17:14 2017 us=693489 connect_timeout = 10
- Thu Dec 14 22:17:14 2017 us=693493 connect_retry_max = 0
- Thu Dec 14 22:17:14 2017 us=693496 socks_proxy_server = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693499 socks_proxy_port = 0
- Thu Dec 14 22:17:14 2017 us=693502 socks_proxy_retry = DISABLED
- Thu Dec 14 22:17:14 2017 us=693506 tun_mtu = 1500
- Thu Dec 14 22:17:14 2017 us=693509 tun_mtu_defined = ENABLED
- Thu Dec 14 22:17:14 2017 us=693512 link_mtu = 1500
- Thu Dec 14 22:17:14 2017 us=693515 link_mtu_defined = DISABLED
- Thu Dec 14 22:17:14 2017 us=693532 tun_mtu_extra = 0
- Thu Dec 14 22:17:14 2017 us=693535 tun_mtu_extra_defined = DISABLED
- Thu Dec 14 22:17:14 2017 us=693538 mtu_discover_type = -1
- Thu Dec 14 22:17:14 2017 us=693541 fragment = 0
- Thu Dec 14 22:17:14 2017 us=693545 mssfix = 1450
- Thu Dec 14 22:17:14 2017 us=693548 explicit_exit_notification = 0
- Thu Dec 14 22:17:14 2017 us=693551 Connection profiles END
- Thu Dec 14 22:17:14 2017 us=693554 remote_random = DISABLED
- Thu Dec 14 22:17:14 2017 us=693557 ipchange = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693560 dev = 'tun'
- Thu Dec 14 22:17:14 2017 us=693563 dev_type = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693567 dev_node = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693570 lladdr = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693587 topology = 1
- Thu Dec 14 22:17:14 2017 us=693590 tun_ipv6 = DISABLED
- Thu Dec 14 22:17:14 2017 us=693593 ifconfig_local = '10.8.0.1'
- Thu Dec 14 22:17:14 2017 us=693596 ifconfig_remote_netmask = '10.8.0.2'
- Thu Dec 14 22:17:14 2017 us=693600 ifconfig_noexec = DISABLED
- Thu Dec 14 22:17:14 2017 us=693603 ifconfig_nowarn = DISABLED
- Thu Dec 14 22:17:14 2017 us=693606 ifconfig_ipv6_local = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693609 ifconfig_ipv6_netbits = 0
- Thu Dec 14 22:17:14 2017 us=693612 ifconfig_ipv6_remote = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693616 shaper = 0
- Thu Dec 14 22:17:14 2017 us=693619 mtu_test = 0
- Thu Dec 14 22:17:14 2017 us=693622 mlock = DISABLED
- Thu Dec 14 22:17:14 2017 us=693625 keepalive_ping = 10
- Thu Dec 14 22:17:14 2017 us=693628 keepalive_timeout = 120
- Thu Dec 14 22:17:14 2017 us=693632 inactivity_timeout = 0
- Thu Dec 14 22:17:14 2017 us=693635 ping_send_timeout = 10
- Thu Dec 14 22:17:14 2017 us=693638 ping_rec_timeout = 240
- Thu Dec 14 22:17:14 2017 us=693641 ping_rec_timeout_action = 2
- Thu Dec 14 22:17:14 2017 us=693644 ping_timer_remote = DISABLED
- Thu Dec 14 22:17:14 2017 us=693647 remap_sigusr1 = 0
- Thu Dec 14 22:17:14 2017 us=693651 persist_tun = ENABLED
- Thu Dec 14 22:17:14 2017 us=693654 persist_local_ip = DISABLED
- Thu Dec 14 22:17:14 2017 us=693657 persist_remote_ip = DISABLED
- Thu Dec 14 22:17:14 2017 us=693660 persist_key = ENABLED
- Thu Dec 14 22:17:14 2017 us=693663 passtos = DISABLED
- Thu Dec 14 22:17:14 2017 us=693679 resolve_retry_seconds = 1000000000
- Thu Dec 14 22:17:14 2017 us=693688 username = 'nobody'
- Thu Dec 14 22:17:14 2017 us=693692 groupname = 'nogroup'
- Thu Dec 14 22:17:14 2017 us=693695 chroot_dir = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693698 cd_dir = '/etc/openvpn'
- Thu Dec 14 22:17:14 2017 us=693701 writepid = '/run/openvpn/server.pid'
- Thu Dec 14 22:17:14 2017 us=693704 up_script = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693707 down_script = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693710 down_pre = DISABLED
- Thu Dec 14 22:17:14 2017 us=693712 up_restart = DISABLED
- Thu Dec 14 22:17:14 2017 us=693715 up_delay = DISABLED
- Thu Dec 14 22:17:14 2017 us=693718 daemon = ENABLED
- Thu Dec 14 22:17:14 2017 us=693735 inetd = 0
- Thu Dec 14 22:17:14 2017 us=693738 log = ENABLED
- Thu Dec 14 22:17:14 2017 us=693741 suppress_timestamps = DISABLED
- Thu Dec 14 22:17:14 2017 us=693744 nice = 0
- Thu Dec 14 22:17:14 2017 us=693747 verbosity = 4
- Thu Dec 14 22:17:14 2017 us=693750 mute = 0
- Thu Dec 14 22:17:14 2017 us=693753 gremlin = 0
- Thu Dec 14 22:17:14 2017 us=693756 status_file = 'openvpn-status.log'
- Thu Dec 14 22:17:14 2017 us=693759 status_file_version = 1
- Thu Dec 14 22:17:14 2017 us=693762 status_file_update_freq = 10
- Thu Dec 14 22:17:14 2017 us=693765 occ = ENABLED
- Thu Dec 14 22:17:14 2017 us=693768 rcvbuf = 0
- Thu Dec 14 22:17:14 2017 us=693771 sndbuf = 0
- Thu Dec 14 22:17:14 2017 us=693774 mark = 0
- Thu Dec 14 22:17:14 2017 us=693776 sockflags = 0
- Thu Dec 14 22:17:14 2017 us=693779 fast_io = DISABLED
- Thu Dec 14 22:17:14 2017 us=693782 lzo = 7
- Thu Dec 14 22:17:14 2017 us=693785 route_script = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693788 route_default_gateway = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693791 route_default_metric = 0
- Thu Dec 14 22:17:14 2017 us=693795 route_noexec = DISABLED
- Thu Dec 14 22:17:14 2017 us=693798 route_delay = 0
- Thu Dec 14 22:17:14 2017 us=693801 route_delay_window = 30
- Thu Dec 14 22:17:14 2017 us=693804 route_delay_defined = DISABLED
- Thu Dec 14 22:17:14 2017 us=693807 route_nopull = DISABLED
- Thu Dec 14 22:17:14 2017 us=693810 route_gateway_via_dhcp = DISABLED
- Thu Dec 14 22:17:14 2017 us=693813 max_routes = 100
- Thu Dec 14 22:17:14 2017 us=693816 allow_pull_fqdn = DISABLED
- Thu Dec 14 22:17:14 2017 us=693833 route 10.8.0.0/255.255.255.0/nil/nil
- Thu Dec 14 22:17:14 2017 us=693836 management_addr = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693839 management_port = 0
- Thu Dec 14 22:17:14 2017 us=693842 management_user_pass = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693845 management_log_history_cache = 250
- Thu Dec 14 22:17:14 2017 us=693848 management_echo_buffer_size = 100
- Thu Dec 14 22:17:14 2017 us=693851 management_write_peer_info_file = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693854 management_client_user = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693857 management_client_group = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693860 management_flags = 0
- Thu Dec 14 22:17:14 2017 us=693863 shared_secret_file = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693867 key_direction = 1
- Thu Dec 14 22:17:14 2017 us=693870 ciphername_defined = ENABLED
- Thu Dec 14 22:17:14 2017 us=693887 ciphername = 'AES-128-CBC'
- Thu Dec 14 22:17:14 2017 us=693890 authname_defined = ENABLED
- Thu Dec 14 22:17:14 2017 us=693893 authname = 'SHA256'
- Thu Dec 14 22:17:14 2017 us=693896 prng_hash = 'SHA1'
- Thu Dec 14 22:17:14 2017 us=693899 prng_nonce_secret_len = 16
- Thu Dec 14 22:17:14 2017 us=693902 keysize = 0
- Thu Dec 14 22:17:14 2017 us=693905 engine = DISABLED
- Thu Dec 14 22:17:14 2017 us=693909 replay = ENABLED
- Thu Dec 14 22:17:14 2017 us=693912 mute_replay_warnings = DISABLED
- Thu Dec 14 22:17:14 2017 us=693915 replay_window = 64
- Thu Dec 14 22:17:14 2017 us=693918 replay_time = 15
- Thu Dec 14 22:17:14 2017 us=693921 packet_id_file = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693924 use_iv = ENABLED
- Thu Dec 14 22:17:14 2017 us=693927 test_crypto = DISABLED
- Thu Dec 14 22:17:14 2017 us=693930 tls_server = ENABLED
- Thu Dec 14 22:17:14 2017 us=693933 tls_client = DISABLED
- Thu Dec 14 22:17:14 2017 us=693939 key_method = 2
- Thu Dec 14 22:17:14 2017 us=693942 ca_file = '/etc/openvpn/ca.crt'
- Thu Dec 14 22:17:14 2017 us=693945 ca_path = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693948 dh_file = 'dh2048.pem'
- Thu Dec 14 22:17:14 2017 us=693951 cert_file = '/etc/openvpn/server.crt'
- Thu Dec 14 22:17:14 2017 us=693954 extra_certs_file = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693958 priv_key_file = '/etc/openvpn/server.key'
- Thu Dec 14 22:17:14 2017 us=693961 pkcs12_file = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693964 cipher_list = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693980 tls_verify = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693983 tls_export_cert = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693986 verify_x509_type = 0
- Thu Dec 14 22:17:14 2017 us=693989 verify_x509_name = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=693992 crl_file = '/etc/openvpn/crl.pem'
- Thu Dec 14 22:17:14 2017 us=693995 ns_cert_type = 0
- Thu Dec 14 22:17:14 2017 us=693998 remote_cert_ku[i] = 0
- Thu Dec 14 22:17:14 2017 us=694001 remote_cert_ku[i] = 0
- Thu Dec 14 22:17:14 2017 us=694004 remote_cert_ku[i] = 0
- Thu Dec 14 22:17:14 2017 us=694007 remote_cert_ku[i] = 0
- Thu Dec 14 22:17:14 2017 us=694010 remote_cert_ku[i] = 0
- Thu Dec 14 22:17:14 2017 us=694013 remote_cert_ku[i] = 0
- Thu Dec 14 22:17:14 2017 us=694016 remote_cert_ku[i] = 0
- Thu Dec 14 22:17:14 2017 us=694019 remote_cert_ku[i] = 0
- Thu Dec 14 22:17:14 2017 us=694035 remote_cert_ku[i] = 0
- Thu Dec 14 22:17:14 2017 us=694038 remote_cert_ku[i] = 0
- Thu Dec 14 22:17:14 2017 us=694041 remote_cert_ku[i] = 0
- Thu Dec 14 22:17:14 2017 us=694044 remote_cert_ku[i] = 0
- Thu Dec 14 22:17:14 2017 us=694047 remote_cert_ku[i] = 0
- Thu Dec 14 22:17:14 2017 us=694050 remote_cert_ku[i] = 0
- Thu Dec 14 22:17:14 2017 us=694053 remote_cert_ku[i] = 0
- Thu Dec 14 22:17:14 2017 us=694056 remote_cert_ku[i] = 0
- Thu Dec 14 22:17:14 2017 us=694058 remote_cert_eku = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=694062 ssl_flags = 0
- Thu Dec 14 22:17:14 2017 us=694065 tls_timeout = 2
- Thu Dec 14 22:17:14 2017 us=694067 renegotiate_bytes = 0
- Thu Dec 14 22:17:14 2017 us=694070 renegotiate_packets = 0
- Thu Dec 14 22:17:14 2017 us=694073 renegotiate_seconds = 3600
- Thu Dec 14 22:17:14 2017 us=694076 handshake_window = 60
- Thu Dec 14 22:17:14 2017 us=694079 transition_window = 3600
- Thu Dec 14 22:17:14 2017 us=694083 single_session = DISABLED
- Thu Dec 14 22:17:14 2017 us=694086 push_peer_info = DISABLED
- Thu Dec 14 22:17:14 2017 us=694089 tls_exit = DISABLED
- Thu Dec 14 22:17:14 2017 us=694092 tls_auth_file = 'ta.key'
- Thu Dec 14 22:17:14 2017 us=694095 pkcs11_protected_authentication = DISABLED
- Thu Dec 14 22:17:14 2017 us=694098 pkcs11_protected_authentication = DISABLED
- Thu Dec 14 22:17:14 2017 us=694101 pkcs11_protected_authentication = DISABLED
- Thu Dec 14 22:17:14 2017 us=694104 pkcs11_protected_authentication = DISABLED
- Thu Dec 14 22:17:14 2017 us=694107 pkcs11_protected_authentication = DISABLED
- Thu Dec 14 22:17:14 2017 us=694110 pkcs11_protected_authentication = DISABLED
- Thu Dec 14 22:17:14 2017 us=694113 pkcs11_protected_authentication = DISABLED
- Thu Dec 14 22:17:14 2017 us=694129 pkcs11_protected_authentication = DISABLED
- Thu Dec 14 22:17:14 2017 us=694132 pkcs11_protected_authentication = DISABLED
- Thu Dec 14 22:17:14 2017 us=694135 pkcs11_protected_authentication = DISABLED
- Thu Dec 14 22:17:14 2017 us=694138 pkcs11_protected_authentication = DISABLED
- Thu Dec 14 22:17:14 2017 us=694142 pkcs11_protected_authentication = DISABLED
- Thu Dec 14 22:17:14 2017 us=694145 pkcs11_protected_authentication = DISABLED
- Thu Dec 14 22:17:14 2017 us=694148 pkcs11_protected_authentication = DISABLED
- Thu Dec 14 22:17:14 2017 us=694151 pkcs11_protected_authentication = DISABLED
- Thu Dec 14 22:17:14 2017 us=694154 pkcs11_protected_authentication = DISABLED
- Thu Dec 14 22:17:14 2017 us=694158 pkcs11_private_mode = 00000000
- Thu Dec 14 22:17:14 2017 us=694161 pkcs11_private_mode = 00000000
- Thu Dec 14 22:17:14 2017 us=694164 pkcs11_private_mode = 00000000
- Thu Dec 14 22:17:14 2017 us=694182 pkcs11_private_mode = 00000000
- Thu Dec 14 22:17:14 2017 us=694185 pkcs11_private_mode = 00000000
- Thu Dec 14 22:17:14 2017 us=694188 pkcs11_private_mode = 00000000
- Thu Dec 14 22:17:14 2017 us=694191 pkcs11_private_mode = 00000000
- Thu Dec 14 22:17:14 2017 us=694194 pkcs11_private_mode = 00000000
- Thu Dec 14 22:17:14 2017 us=694197 pkcs11_private_mode = 00000000
- Thu Dec 14 22:17:14 2017 us=694200 pkcs11_private_mode = 00000000
- Thu Dec 14 22:17:14 2017 us=694203 pkcs11_private_mode = 00000000
- Thu Dec 14 22:17:14 2017 us=694206 pkcs11_private_mode = 00000000
- Thu Dec 14 22:17:14 2017 us=694209 pkcs11_private_mode = 00000000
- Thu Dec 14 22:17:14 2017 us=694212 pkcs11_private_mode = 00000000
- Thu Dec 14 22:17:14 2017 us=694215 pkcs11_private_mode = 00000000
- Thu Dec 14 22:17:14 2017 us=694217 pkcs11_private_mode = 00000000
- Thu Dec 14 22:17:14 2017 us=694220 pkcs11_cert_private = DISABLED
- Thu Dec 14 22:17:14 2017 us=694223 pkcs11_cert_private = DISABLED
- Thu Dec 14 22:17:14 2017 us=694226 pkcs11_cert_private = DISABLED
- Thu Dec 14 22:17:14 2017 us=694229 pkcs11_cert_private = DISABLED
- Thu Dec 14 22:17:14 2017 us=694232 pkcs11_cert_private = DISABLED
- Thu Dec 14 22:17:14 2017 us=694235 pkcs11_cert_private = DISABLED
- Thu Dec 14 22:17:14 2017 us=694238 pkcs11_cert_private = DISABLED
- Thu Dec 14 22:17:14 2017 us=694241 pkcs11_cert_private = DISABLED
- Thu Dec 14 22:17:14 2017 us=694244 pkcs11_cert_private = DISABLED
- Thu Dec 14 22:17:14 2017 us=694247 pkcs11_cert_private = DISABLED
- Thu Dec 14 22:17:14 2017 us=694250 pkcs11_cert_private = DISABLED
- Thu Dec 14 22:17:14 2017 us=694252 pkcs11_cert_private = DISABLED
- Thu Dec 14 22:17:14 2017 us=694255 pkcs11_cert_private = DISABLED
- Thu Dec 14 22:17:14 2017 us=694258 pkcs11_cert_private = DISABLED
- Thu Dec 14 22:17:14 2017 us=694261 pkcs11_cert_private = DISABLED
- Thu Dec 14 22:17:14 2017 us=694278 pkcs11_cert_private = DISABLED
- Thu Dec 14 22:17:14 2017 us=694281 pkcs11_pin_cache_period = -1
- Thu Dec 14 22:17:14 2017 us=694284 pkcs11_id = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=694287 pkcs11_id_management = DISABLED
- Thu Dec 14 22:17:14 2017 us=694291 server_network = 10.8.0.0
- Thu Dec 14 22:17:14 2017 us=694294 server_netmask = 255.255.255.0
- Thu Dec 14 22:17:14 2017 us=694298 server_network_ipv6 = ::
- Thu Dec 14 22:17:14 2017 us=694301 server_netbits_ipv6 = 0
- Thu Dec 14 22:17:14 2017 us=694305 server_bridge_ip = 0.0.0.0
- Thu Dec 14 22:17:14 2017 us=694308 server_bridge_netmask = 0.0.0.0
- Thu Dec 14 22:17:14 2017 us=694311 server_bridge_pool_start = 0.0.0.0
- Thu Dec 14 22:17:14 2017 us=694315 server_bridge_pool_end = 0.0.0.0
- Thu Dec 14 22:17:14 2017 us=694332 push_entry = 'redirect-gateway def1 bypass-dhcp'
- Thu Dec 14 22:17:14 2017 us=694335 push_entry = 'dhcp-option DNS 8.8.4.4'
- Thu Dec 14 22:17:14 2017 us=694338 push_entry = 'dhcp-option DNS 8.8.8.8'
- Thu Dec 14 22:17:14 2017 us=694341 push_entry = 'route 10.8.0.1'
- Thu Dec 14 22:17:14 2017 us=694344 push_entry = 'topology net30'
- Thu Dec 14 22:17:14 2017 us=694347 push_entry = 'ping 10'
- Thu Dec 14 22:17:14 2017 us=694350 push_entry = 'ping-restart 120'
- Thu Dec 14 22:17:14 2017 us=694353 ifconfig_pool_defined = ENABLED
- Thu Dec 14 22:17:14 2017 us=694356 ifconfig_pool_start = 10.8.0.4
- Thu Dec 14 22:17:14 2017 us=694360 ifconfig_pool_end = 10.8.0.251
- Thu Dec 14 22:17:14 2017 us=694363 ifconfig_pool_netmask = 0.0.0.0
- Thu Dec 14 22:17:14 2017 us=694366 ifconfig_pool_persist_filename = 'ipp.txt'
- Thu Dec 14 22:17:14 2017 us=694369 ifconfig_pool_persist_refresh_freq = 600
- Thu Dec 14 22:17:14 2017 us=694372 ifconfig_ipv6_pool_defined = DISABLED
- Thu Dec 14 22:17:14 2017 us=694376 ifconfig_ipv6_pool_base = ::
- Thu Dec 14 22:17:14 2017 us=694379 ifconfig_ipv6_pool_netbits = 0
- Thu Dec 14 22:17:14 2017 us=694382 n_bcast_buf = 256
- Thu Dec 14 22:17:14 2017 us=694385 tcp_queue_limit = 64
- Thu Dec 14 22:17:14 2017 us=694388 real_hash_size = 256
- Thu Dec 14 22:17:14 2017 us=694391 virtual_hash_size = 256
- Thu Dec 14 22:17:14 2017 us=694394 client_connect_script = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=694399 learn_address_script = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=694402 client_disconnect_script = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=694405 client_config_dir = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=694408 ccd_exclusive = DISABLED
- Thu Dec 14 22:17:14 2017 us=694411 tmp_dir = '/tmp'
- Thu Dec 14 22:17:14 2017 us=694428 push_ifconfig_defined = DISABLED
- Thu Dec 14 22:17:14 2017 us=694431 push_ifconfig_local = 0.0.0.0
- Thu Dec 14 22:17:14 2017 us=694434 push_ifconfig_remote_netmask = 0.0.0.0
- Thu Dec 14 22:17:14 2017 us=694437 push_ifconfig_ipv6_defined = DISABLED
- Thu Dec 14 22:17:14 2017 us=694441 push_ifconfig_ipv6_local = ::/0
- Thu Dec 14 22:17:14 2017 us=694444 push_ifconfig_ipv6_remote = ::
- Thu Dec 14 22:17:14 2017 us=694447 enable_c2c = DISABLED
- Thu Dec 14 22:17:14 2017 us=694450 duplicate_cn = DISABLED
- Thu Dec 14 22:17:14 2017 us=694453 cf_max = 0
- Thu Dec 14 22:17:14 2017 us=694456 cf_per = 0
- Thu Dec 14 22:17:14 2017 us=694459 max_clients = 1024
- Thu Dec 14 22:17:14 2017 us=694462 max_routes_per_client = 256
- Thu Dec 14 22:17:14 2017 us=694465 auth_user_pass_verify_script = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=694483 auth_user_pass_verify_script_via_file = DISABLED
- Thu Dec 14 22:17:14 2017 us=694486 port_share_host = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=694489 port_share_port = 0
- Thu Dec 14 22:17:14 2017 us=694492 client = DISABLED
- Thu Dec 14 22:17:14 2017 us=694495 pull = DISABLED
- Thu Dec 14 22:17:14 2017 us=694498 auth_user_pass_file = '[UNDEF]'
- Thu Dec 14 22:17:14 2017 us=694502 OpenVPN 2.3.10 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Jun 22 2017
- Thu Dec 14 22:17:14 2017 us=694508 library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08
- Thu Dec 14 22:17:14 2017 us=695155 Diffie-Hellman initialized with 2048 bit key
- Thu Dec 14 22:17:14 2017 us=695419 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file
- Thu Dec 14 22:17:14 2017 us=695433 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu Dec 14 22:17:14 2017 us=695438 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu Dec 14 22:17:14 2017 us=695445 TLS-Auth MTU parms [ L:1570 D:1172 EF:78 EB:0 ET:0 EL:3 ]
- Thu Dec 14 22:17:14 2017 us=695452 Socket Buffers: R=[212992->212992] S=[212992->212992]
- Thu Dec 14 22:17:14 2017 us=695509 ROUTE_GATEWAY 194.1.247.193/255.255.255.224 IFACE=ens4 HWADDR=ca:bf:e3:82:ab:73
- Thu Dec 14 22:17:14 2017 us=695686 TUN/TAP device tun0 opened
- Thu Dec 14 22:17:14 2017 us=695695 TUN/TAP TX queue length set to 100
- Thu Dec 14 22:17:14 2017 us=695720 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Thu Dec 14 22:17:14 2017 us=695731 /sbin/ip link set dev tun0 up mtu 1500
- Thu Dec 14 22:17:14 2017 us=696923 /sbin/ip addr add dev tun0 local 10.8.0.1 peer 10.8.0.2
- Thu Dec 14 22:17:14 2017 us=698214 /sbin/ip route add 10.8.0.0/24 via 10.8.0.2
- Thu Dec 14 22:17:14 2017 us=698877 Data Channel MTU parms [ L:1570 D:1450 EF:70 EB:143 ET:0 EL:3 AF:3/1 ]
- Thu Dec 14 22:17:14 2017 us=699197 GID set to nogroup
- Thu Dec 14 22:17:14 2017 us=699208 UID set to nobody
- Thu Dec 14 22:17:14 2017 us=699214 UDPv4 link local (bound): [undef]
- Thu Dec 14 22:17:14 2017 us=699231 UDPv4 link remote: [undef]
- Thu Dec 14 22:17:14 2017 us=699237 MULTI: multi_init called, r=256 v=256
- Thu Dec 14 22:17:14 2017 us=699251 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
- Thu Dec 14 22:17:14 2017 us=699258 ifconfig_pool_read(), in='client2,10.8.0.4', TODO: IPv6
- Thu Dec 14 22:17:14 2017 us=699263 succeeded -> ifconfig_pool_set()
- Thu Dec 14 22:17:14 2017 us=699267 IFCONFIG POOL LIST
- Thu Dec 14 22:17:14 2017 us=699285 client2,10.8.0.4
- Thu Dec 14 22:17:14 2017 us=699298 Initialization Sequence Completed
- Thu Dec 14 22:22:11 2017 us=935169 MULTI: multi_create_instance called
- Thu Dec 14 22:22:11 2017 us=935217 84.217.125.43:51112 Re-using SSL/TLS context
- Thu Dec 14 22:22:11 2017 us=935252 84.217.125.43:51112 LZO compression initialized
- Thu Dec 14 22:22:11 2017 us=935320 84.217.125.43:51112 Control Channel MTU parms [ L:1570 D:1172 EF:78 EB:0 ET:0 EL:3 ]
- Thu Dec 14 22:22:11 2017 us=935327 84.217.125.43:51112 Data Channel MTU parms [ L:1570 D:1450 EF:70 EB:143 ET:0 EL:3 AF:3/1 ]
- Thu Dec 14 22:22:11 2017 us=935339 84.217.125.43:51112 Local Options String: 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-128-CBC,auth SHA256,keysize 128,tls-auth,key-method 2,tls-server'
- Thu Dec 14 22:22:11 2017 us=935343 84.217.125.43:51112 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-128-CBC,auth SHA256,keysize 128,tls-auth,key-method 2,tls-client'
- Thu Dec 14 22:22:11 2017 us=935351 84.217.125.43:51112 Local Options hash (VER=V4): '1089825c'
- Thu Dec 14 22:22:11 2017 us=935356 84.217.125.43:51112 Expected Remote Options hash (VER=V4): '6907942a'
- Thu Dec 14 22:22:11 2017 us=935384 84.217.125.43:51112 TLS: Initial packet from [AF_INET]84.217.125.43:51112, sid=09431be2 04e4be84
- Thu Dec 14 22:22:12 2017 us=97602 84.217.125.43:51112 CRL CHECK OK: C=SE, ST=SV, L=Stockholm, O=Fort-Pond, OU=Community, CN=Fort-Pond CA, name=server, emailAddress=myuser@myservername.net
- Thu Dec 14 22:22:12 2017 us=97648 84.217.125.43:51112 VERIFY OK: depth=1, C=SE, ST=SV, L=Stockholm, O=Fort-Pond, OU=Community, CN=Fort-Pond CA, name=server, emailAddress=myuser@myservername.net
- Thu Dec 14 22:22:12 2017 us=97788 84.217.125.43:51112 CRL CHECK OK: C=SE, ST=SV, L=Stockholm, O=Fort-Pond, OU=Community, CN=client2, name=server, emailAddress=myuser@myservername.net
- Thu Dec 14 22:22:12 2017 us=97799 84.217.125.43:51112 VERIFY OK: depth=0, C=SE, ST=SV, L=Stockholm, O=Fort-Pond, OU=Community, CN=client2, name=server, emailAddress=myuser@myservername.net
- Thu Dec 14 22:22:12 2017 us=105179 84.217.125.43:51112 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Thu Dec 14 22:22:12 2017 us=105194 84.217.125.43:51112 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu Dec 14 22:22:12 2017 us=105199 84.217.125.43:51112 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Thu Dec 14 22:22:12 2017 us=105204 84.217.125.43:51112 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu Dec 14 22:22:12 2017 us=126639 84.217.125.43:51112 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Thu Dec 14 22:22:12 2017 us=126673 84.217.125.43:51112 [client2] Peer Connection Initiated with [AF_INET]84.217.125.43:51112
- Thu Dec 14 22:22:12 2017 us=126685 client2/84.217.125.43:51112 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
- Thu Dec 14 22:22:12 2017 us=126704 client2/84.217.125.43:51112 MULTI: Learn: 10.8.0.6 -> client2/84.217.125.43:51112
- Thu Dec 14 22:22:12 2017 us=126709 client2/84.217.125.43:51112 MULTI: primary virtual IP for client2/84.217.125.43:51112: 10.8.0.6
- Thu Dec 14 22:22:14 2017 us=489580 client2/84.217.125.43:51112 PUSH: Received control message: 'PUSH_REQUEST'
- Thu Dec 14 22:22:14 2017 us=489609 client2/84.217.125.43:51112 send_push_reply(): safe_cap=940
- Thu Dec 14 22:22:14 2017 us=489620 client2/84.217.125.43:51112 SENT CONTROL [client2]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.4.4,dhcp-option DNS 8.8.8.8,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
- ------------------------------------------
- /etc/openvpn/openvpn-status.log
- ------------------------------------------
- OpenVPN CLIENT LIST
- Updated,Thu Dec 14 22:23:24 2017
- Common Name,Real Address,Bytes Received,Bytes Sent,Connected Since
- client2,84.217.125.43:51112,137526,218179,Thu Dec 14 22:22:11 2017
- ROUTING TABLE
- Virtual Address,Common Name,Real Address,Last Ref
- 10.8.0.6,client2,84.217.125.43:51112,Thu Dec 14 22:23:21 2017
- GLOBAL STATS
- Max bcast/mcast queue length,0
- END
- ------------------------------------------
- iptables -S
- ------------------------------------------
- -P INPUT DROP
- -P FORWARD DROP
- -P OUTPUT DROP
- -A INPUT -i lo -j ACCEPT
- -A INPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT
- -A INPUT -p icmp -m icmp --icmp-type 0 -j ACCEPT
- -A INPUT -i ens4 -p udp -m udp --sport 53 -j ACCEPT
- -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
- -A INPUT -m conntrack --ctstate INVALID -j DROP
- -A INPUT -p tcp -m tcp --dport 22 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
- -A INPUT -p tcp -m tcp --sport 22 -m conntrack --ctstate ESTABLISHED -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 5000 -j ACCEPT
- -A INPUT -p udp -m udp --dport 1194 -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 80 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 8080 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 80 -m limit --limit 25/min --limit-burst 100 -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 25 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 143 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 993 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 110 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 995 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
- -A INPUT -p tcp -m tcp --sport 443 -m conntrack --ctstate ESTABLISHED -j ACCEPT
- -A INPUT -p tcp -m tcp --dport 8000 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
- -A INPUT -i tun+ -j ACCEPT
- -A INPUT -i ens4 -p udp -m state --state NEW -m udp --dport 1194 -j ACCEPT
- -A FORWARD -i tun+ -j ACCEPT
- -A FORWARD -i tun+ -o ens4 -m state --state RELATED,ESTABLISHED -j ACCEPT
- -A FORWARD -i ens4 -o tun+ -m state --state RELATED,ESTABLISHED -j ACCEPT
- -A OUTPUT -o lo -j ACCEPT
- -A OUTPUT -p icmp -m icmp --icmp-type 0 -j ACCEPT
- -A OUTPUT -p icmp -m icmp --icmp-type 8 -j ACCEPT
- -A OUTPUT -o ens4 -p udp -m udp --dport 53 -j ACCEPT
- -A OUTPUT -m conntrack --ctstate ESTABLISHED -j ACCEPT
- -A OUTPUT -p tcp -m tcp --sport 22 -m conntrack --ctstate ESTABLISHED -j ACCEPT
- -A OUTPUT -p tcp -m tcp --dport 22 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
- -A OUTPUT -p tcp -m tcp --sport 80 -m conntrack --ctstate ESTABLISHED -j ACCEPT
- -A OUTPUT -p tcp -m tcp --sport 8080 -m conntrack --ctstate ESTABLISHED -j ACCEPT
- -A OUTPUT -p tcp -m tcp --dport 25 -j REJECT --reject-with icmp-port-unreachable
- -A OUTPUT -p tcp -m tcp --sport 25 -m conntrack --ctstate ESTABLISHED -j ACCEPT
- -A OUTPUT -p tcp -m tcp --sport 143 -m conntrack --ctstate ESTABLISHED -j ACCEPT
- -A OUTPUT -p tcp -m tcp --sport 993 -m conntrack --ctstate ESTABLISHED -j ACCEPT
- -A OUTPUT -p tcp -m tcp --sport 110 -m conntrack --ctstate ESTABLISHED -j ACCEPT
- -A OUTPUT -p tcp -m tcp --sport 995 -m conntrack --ctstate ESTABLISHED -j ACCEPT
- -A OUTPUT -p tcp -m tcp --dport 6667 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
- -A OUTPUT -p tcp -m tcp --dport 443 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT
- -A OUTPUT -p tcp -m tcp --sport 8000 -m conntrack --ctstate ESTABLISHED -j ACCEPT
- -A OUTPUT -o tun+ -j ACCEPT
- *Tunnelblick: OS X 10.13.1; Tunnelblick 3.7.4b (build 4921); prior version 3.7.1b (build 4813); Admin user
- git commit 88763bb2b2bfcc7debb3ddc78cdf5a350722717c
- Configuration client2
- "Sanitized" condensed configuration file for /Library/Application Support/Tunnelblick/Shared/client2.tblk:
- client
- dev tun
- proto udp
- remote www.myservername.net 1194
- resolv-retry infinite
- nobind
- user nobody
- group nogroup
- persist-key
- persist-tun
- remote-cert-tls server
- cipher AES-128-CBC
- auth SHA256
- comp-lzo
- verb 3
- key-direction 1
- <ca>
- [Security-related line(s) omitted]
- </ca>
- <cert>
- [Security-related line(s) omitted]
- </cert>
- <key>
- [Security-related line(s) omitted]
- </key>
- <tls-auth>
- [Security-related line(s) omitted]
- </tls-auth>
- ================================================================================
- Non-Apple kexts that are loaded:
- Index Refs Address Size Wired Name (Version) UUID <Linked Against>
- 22 0 0xffffff7f81007000 0xe000 0xe000 com.3dconnexion.driver (10.4.2) D1FC94C5-936D-3185-BECD-5AEA40D01AEC <21 20 16 5 4 3>
- 157 3 0xffffff7f83287000 0x61000 0x61000 org.virtualbox.kext.VBoxDrv (5.1.14) 08D6FFCF-2BDF-305C-8824-89E69602C30D <7 5 4 3 1>
- 165 0 0xffffff7f832e8000 0x8000 0x8000 org.virtualbox.kext.VBoxUSB (5.1.14) BF0B350D-C893-37DF-82F0-BE86ABA49D26 <164 157 20 7 5 4 3 1>
- 166 0 0xffffff7f832f0000 0x5000 0x5000 org.virtualbox.kext.VBoxNetFlt (5.1.14) 0291FFCC-8E46-3FFD-B674-BFA42D4E67E4 <157 7 5 4 3 1>
- 167 0 0xffffff7f832f5000 0x6000 0x6000 org.virtualbox.kext.VBoxNetAdp (5.1.14) EFBEE858-A3D7-3C61-86C0-F6AFDCA48229 <157 5 4 1>
- ================================================================================
- There are no unusual files in client2.tblk
- ================================================================================
- Configuration preferences:
- useDNS = 1
- -resetPrimaryInterfaceAfterDisconnect = 1
- -routeAllTrafficThroughVpn = 1
- -useRouteUpInsteadOfUp = 1
- -useDownRootPlugin = 1
- -loggingLevel = 3
- -lastConnectionSucceeded = 1
- -prependDomainNameToSearchDomains = 0
- ================================================================================
- Wildcard preferences:
- ================================================================================
- Program preferences:
- launchAtNextLogin = 1
- notOKToCheckThatIPAddressDidNotChangeAfterConnection = 0
- tunnelblickVersionHistory = (
- "3.7.4b (build 4921)",
- "3.7.1b (build 4813)",
- "3.7.1a (build 4812)",
- "3.7.0 (build 4790)"
- )
- lastLaunchTime = 534974552.135567
- lastLanguageAtLaunchWasRTL = 0
- connectionWindowDisplayCriteria = showWhenConnecting
- maxLogDisplaySize = 102400
- lastConnectedDisplayName = client2
- keyboardShortcutIndex = 1
- updateCheckAutomatically = 1
- NSWindow Frame SettingsSheetWindow = 429 192 829 524 0 0 1280 777
- NSWindow Frame ConnectingWindow = 445 442 389 187 0 0 1280 777
- NSWindow Frame SUStatusFrame = 786 359 400 129 0 0 1280 777
- NSWindow Frame SUUpdateAlert = 330 288 620 392 0 0 1280 777
- detailsWindowFrameVersion = 4921
- detailsWindowFrame = {{301, 197}, {920, 468}}
- detailsWindowLeftFrame = {{0, 0}, {165, 350}}
- detailsWindowViewIndex = 0
- detailsWindowConfigurationsTabIdentifier = log
- leftNavSelectedDisplayName = client2
- AdvancedWindowTabIdentifier = connectingAndDisconnecting
- haveDealtWithOldTunTapPreferences = 1
- haveDealtWithOldLoginItem = 1
- SUEnableAutomaticChecks = 1
- SUScheduledCheckInterval = 86400
- SUSendProfileInfo = 1
- SULastCheckTime = 2017-12-14 20:02:35 +0000
- SULastProfileSubmissionDate = 2017-12-11 22:34:33 +0000
- SUHasLaunchedBefore = 1
- WebKitDefaultFontSize = 16
- WebKitStandardFont = Times
- askedUserIfOKToCheckThatIPAddressDidNotChangeAfterConnection = 1
- haveDealtWithSparkle1dot5b6 = 1
- updateSendProfileInfo = 1
- ================================================================================
- Tunnelblick Log:
- *Tunnelblick: OS X 10.13.1; Tunnelblick 3.7.4b (build 4921); prior version 3.7.1b (build 4813)
- 2017-12-14 22:22:11 *Tunnelblick: Attempting connection with client2; Set nameserver = 771; monitoring connection
- 2017-12-14 22:22:11 *Tunnelblick: openvpnstart start client2.tblk 1337 771 0 3 0 1099568 -ptADGNWradsgnw 2.3.18-openssl-1.0.2n
- 2017-12-14 22:22:11 *Tunnelblick: openvpnstart log:
- Warning: Tunnelblick is using 'openvpn-down-root.so', so the route-pre-down script will not be used. You can override this by providing a custom route-pre-down script (which may be a copy of Tunnelblick's standard route-pre-down script) in a Tunnelblick VPN Configuration. However, that script will not be executed as root unless the 'user' and 'group' options are removed from the OpenVPN configuration file. If the 'user' and 'group' options are removed, then you don't need to use a custom route-pre-down script.OpenVPN started successfully. Command used to start OpenVPN (one argument per displayed line):
- /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.3.18-openssl-1.0.2n/openvpn
- --daemon
- --log
- /Library/Application Support/Tunnelblick/Logs/-SLibrary-SApplication Support-STunnelblick-SShared-Sclient2.tblk-SContents-SResources-Sconfig.ovpn.771_0_3_0_1099568.1337.openvpn.log
- --cd
- /Library/Application Support/Tunnelblick/Shared/client2.tblk/Contents/Resources
- --setenv
- IV_GUI_VER
- "net.tunnelblick.tunnelblick 4921 3.7.4b (build 4921)"
- --verb
- 3
- --config
- /Library/Application Support/Tunnelblick/Shared/client2.tblk/Contents/Resources/config.ovpn
- --verb
- 3
- --cd
- /Library/Application Support/Tunnelblick/Shared/client2.tblk/Contents/Resources
- --management
- 127.0.0.1
- 1337
- --management-query-passwords
- --management-hold
- --redirect-gateway
- def1
- --script-security
- 2
- --route-up
- /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -9 -d -f -m -r -w -ptADGNWradsgnw
- --plugin
- /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.3.18-openssl-1.0.2n/openvpn-down-root.so
- /Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh -9 -d -f -m -r -w -ptADGNWradsgnw
- 2017-12-14 22:22:11 OpenVPN 2.3.18 x86_64-apple-darwin [SSL (OpenSSL)] [LZO] [PKCS11] [MH] [IPv6] built on Dec 7 2017
- 2017-12-14 22:22:11 library versions: OpenSSL 1.0.2n 7 Dec 2017, LZO 2.10
- 2017-12-14 22:22:11 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:1337
- 2017-12-14 22:22:11 Need hold release from management interface, waiting...
- 2017-12-14 22:22:11 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:1337
- 2017-12-14 22:22:11 MANAGEMENT: CMD 'pid'
- 2017-12-14 22:22:11 MANAGEMENT: CMD 'state on'
- 2017-12-14 22:22:11 MANAGEMENT: CMD 'state'
- 2017-12-14 22:22:11 MANAGEMENT: CMD 'bytecount 1'
- 2017-12-14 22:22:11 MANAGEMENT: CMD 'hold release'
- 2017-12-14 22:22:11 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2017-12-14 22:22:11 PLUGIN_INIT: POST /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.3.18-openssl-1.0.2n/openvpn-down-root.so '[/Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.3.18-openssl-1.0.2n/openvpn-down-root.so] [/Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh] [-9] [-d] [-f] [-m] [-r] [-w] [-ptADGNWradsgnw]' intercepted=PLUGIN_UP|PLUGIN_DOWN
- 2017-12-14 22:22:11 *Tunnelblick: openvpnstart starting OpenVPN
- 2017-12-14 22:22:11 *Tunnelblick: Established communication with OpenVPN
- 2017-12-14 22:22:11 Control Channel Authentication: tls-auth using INLINE static key file
- 2017-12-14 22:22:11 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- 2017-12-14 22:22:11 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- 2017-12-14 22:22:11 Socket Buffers: R=[196724->196724] S=[9216->9216]
- 2017-12-14 22:22:11 MANAGEMENT: >STATE:1513286531,RESOLVE,,,
- 2017-12-14 22:22:11 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
- 2017-12-14 22:22:11 UDPv4 link local: [undef]
- 2017-12-14 22:22:11 UDPv4 link remote: [AF_INET]194.1.247.196:1194
- 2017-12-14 22:22:11 MANAGEMENT: >STATE:1513286531,WAIT,,,
- 2017-12-14 22:22:11 MANAGEMENT: >STATE:1513286531,AUTH,,,
- 2017-12-14 22:22:11 TLS: Initial packet from [AF_INET]194.1.247.196:1194, sid=7ce6612a f17f242f
- 2017-12-14 22:22:11 VERIFY OK: depth=1, C=SE, ST=SV, L=Stockholm, O=Fort-Pond, OU=Community, CN=Fort-Pond CA, name=server, emailAddress=myuser@myservername.net
- 2017-12-14 22:22:11 Validating certificate key usage
- 2017-12-14 22:22:11 ++ Certificate has key usage 00a0, expects 00a0
- 2017-12-14 22:22:11 VERIFY KU OK
- 2017-12-14 22:22:11 Validating certificate extended key usage
- 2017-12-14 22:22:11 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- 2017-12-14 22:22:12 VERIFY EKU OK
- 2017-12-14 22:22:12 VERIFY OK: depth=0, C=SE, ST=SV, L=Stockholm, O=Fort-Pond, OU=Community, CN=server, name=server, emailAddress=myuser@myservername.net
- 2017-12-14 22:22:12 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- 2017-12-14 22:22:12 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- 2017-12-14 22:22:12 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- 2017-12-14 22:22:12 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- 2017-12-14 22:22:12 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2017-12-14 22:22:12 [server] Peer Connection Initiated with [AF_INET]194.1.247.196:1194
- 2017-12-14 22:22:13 MANAGEMENT: >STATE:1513286533,GET_CONFIG,,,
- 2017-12-14 22:22:14 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- 2017-12-14 22:22:14 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.4.4,dhcp-option DNS 8.8.8.8,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5'
- 2017-12-14 22:22:14 OPTIONS IMPORT: timers and/or timeouts modified
- 2017-12-14 22:22:14 OPTIONS IMPORT: --ifconfig/up options modified
- 2017-12-14 22:22:14 OPTIONS IMPORT: route options modified
- 2017-12-14 22:22:14 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2017-12-14 22:22:14 Opening utun (connect(AF_SYS_CONTROL)): Resource busy
- 2017-12-14 22:22:14 Opened utun device utun1
- 2017-12-14 22:22:14 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- 2017-12-14 22:22:14 MANAGEMENT: >STATE:1513286534,ASSIGN_IP,,10.8.0.6,
- 2017-12-14 22:22:14 /sbin/ifconfig utun1 delete
- ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
- 2017-12-14 22:22:14 NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
- 2017-12-14 22:22:14 /sbin/ifconfig utun1 10.8.0.6 10.8.0.5 mtu 1500 netmask 255.255.255.255 up
- 2017-12-14 22:22:14 PLUGIN_CALL: POST /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.3.18-openssl-1.0.2n/openvpn-down-root.so/PLUGIN_UP status=0
- 2017-12-14 22:22:14 /sbin/route add -net 194.1.247.196 192.168.10.1 255.255.255.255
- route: writing to routing socket: File exists
- add net 194.1.247.196: gateway 192.168.10.1: File exists
- 2017-12-14 22:22:14 /sbin/route add -net 0.0.0.0 10.8.0.5 128.0.0.0
- add net 0.0.0.0: gateway 10.8.0.5
- 2017-12-14 22:22:14 /sbin/route add -net 128.0.0.0 10.8.0.5 128.0.0.0
- add net 128.0.0.0: gateway 10.8.0.5
- 2017-12-14 22:22:14 MANAGEMENT: >STATE:1513286534,ADD_ROUTES,,,
- 2017-12-14 22:22:14 /sbin/route add -net 10.8.0.1 10.8.0.5 255.255.255.255
- add net 10.8.0.1: gateway 10.8.0.5
- **********************************************
- Start of output from client.up.tunnelblick.sh
- Disabled IPv6 for 'Ethernet'
- Disabled IPv6 for 'FireWire'
- Disabled IPv6 for 'Wi-Fi'
- Disabled IPv6 for 'iPhone USB'
- Disabled IPv6 for 'Bluetooth PAN'
- Retrieved from OpenVPN: name server(s) [ 8.8.4.4 8.8.8.8 ], search domain(s) [ ] and SMB server(s) [ ] and using default domain name [ openvpn ]
- Not aggregating ServerAddresses because running on OS X 10.6 or higher
- Setting search domains to 'openvpn' because running under OS X 10.6 or higher and the search domains were not set manually (or are allowed to be changed) and 'Prepend domain name to search domains' was not selected
- Saved the DNS and SMB configurations so they can be restored
- Changed DNS ServerAddresses setting from '192.168.10.1' to '8.8.4.4 8.8.8.8'
- Changed DNS SearchDomains setting from '' to 'openvpn'
- Changed DNS DomainName setting from 'lan' to 'openvpn'
- Did not change SMB NetBIOSName setting of ''
- Did not change SMB Workgroup setting of 'pondlife'
- Did not change SMB WINSAddresses setting of ''
- DNS servers '8.8.4.4 8.8.8.8' will be used for DNS queries when the VPN is active
- The DNS servers include only free public DNS servers known to Tunnelblick.
- Flushed the DNS cache via dscacheutil
- /usr/sbin/discoveryutil not present. Not flushing the DNS cache via discoveryutil
- Notified mDNSResponder that the DNS cache was flushed
- Setting up to monitor system configuration with process-network-changes
- End of output from client.up.tunnelblick.sh
- **********************************************
- 2017-12-14 22:22:19 *Tunnelblick: No 'connected.sh' script to execute
- 2017-12-14 22:22:19 GID set to nogroup
- 2017-12-14 22:22:19 UID set to nobody
- 2017-12-14 22:22:19 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- 2017-12-14 22:22:19 Initialization Sequence Completed
- 2017-12-14 22:22:19 MANAGEMENT: >STATE:1513286539,CONNECTED,SUCCESS,10.8.0.6,194.1.247.196
- 2017-12-14 22:22:23 *Tunnelblick process-network-changes: A system configuration change was ignored
- 2017-12-14 22:22:59 *Tunnelblick: After 30.0 seconds, gave up trying to fetch IP address information using the ipInfo host's name after connecting.
- 2017-12-14 22:23:00 *Tunnelblick: fetched IP address information using the ipInfo host's IP address after connecting.
- 2017-12-14 22:23:11 *Tunnelblick: Disconnecting; VPN Details… window disconnect button pressed
- 2017-12-14 22:23:12 *Tunnelblick: No 'pre-disconnect.sh' script to execute
- 2017-12-14 22:23:12 *Tunnelblick: Disconnecting using 'kill'
- 2017-12-14 22:23:12 event_wait : Interrupted system call (code=4)
- 2017-12-14 22:23:12 /sbin/route delete -net 10.8.0.1 10.8.0.5 255.255.255.255
- route: must be root to alter routing table
- 2017-12-14 22:23:12 ERROR: OS X route delete command failed: external program exited with error status: 77
- 2017-12-14 22:23:12 /sbin/route delete -net 194.1.247.196 192.168.10.1 255.255.255.255
- route: must be root to alter routing table
- 2017-12-14 22:23:12 ERROR: OS X route delete command failed: external program exited with error status: 77
- 2017-12-14 22:23:12 /sbin/route delete -net 0.0.0.0 10.8.0.5 128.0.0.0
- route: must be root to alter routing table
- 2017-12-14 22:23:12 ERROR: OS X route delete command failed: external program exited with error status: 77
- 2017-12-14 22:23:12 /sbin/route delete -net 128.0.0.0 10.8.0.5 128.0.0.0
- route: must be root to alter routing table
- 2017-12-14 22:23:12 ERROR: OS X route delete command failed: external program exited with error status: 77
- 2017-12-14 22:23:12 Closing TUN/TAP interface
- 2017-12-14 22:23:16 PLUGIN_CALL: POST /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.3.18-openssl-1.0.2n/openvpn-down-root.so/PLUGIN_DOWN status=0
- 2017-12-14 22:23:16 PLUGIN_CLOSE: /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.3.18-openssl-1.0.2n/openvpn-down-root.so
- 2017-12-14 22:23:16 SIGTERM[hard,] received, process exiting
- 2017-12-14 22:23:16 MANAGEMENT: >STATE:1513286596,EXITING,SIGTERM,,
- 2017-12-14 22:23:17 *Tunnelblick: No 'post-disconnect.sh' script to execute
- 2017-12-14 22:23:17 *Tunnelblick: Expected disconnection occurred.
- ================================================================================
- "Sanitized" full configuration file
- ##############################################
- # Sample client-side OpenVPN 2.0 config file #
- # for connecting to multi-client server. #
- # #
- # This configuration can be used by multiple #
- # clients, however each client should have #
- # its own cert and key files. #
- # #
- # On Windows, you might want to rename this #
- # file so it has a .ovpn extension #
- ##############################################
- # Specify that we are a client and that we
- # will be pulling certain config file directives
- # from the server.
- client
- # Use the same setting as you are using on
- # the server.
- # On most systems, the VPN will not function
- # unless you partially or fully disable
- # the firewall for the TUN/TAP interface.
- ;dev tap
- dev tun
- # Windows needs the TAP-Win32 adapter name
- # from the Network Connections panel
- # if you have more than one. On XP SP2,
- # you may need to disable the firewall
- # for the TAP adapter.
- ;dev-node MyTap
- # Are we connecting to a TCP or
- # UDP server? Use the same setting as
- # on the server.
- ;proto tcp
- proto udp
- # The hostname/IP and port of the server.
- # You can have multiple remote entries
- # to load balance between the servers.
- remote www.myservername.net 1194
- ;remote my-server-2 1194
- # Choose a random host from the remote
- # list for load-balancing. Otherwise
- # try hosts in the order specified.
- ;remote-random
- # Keep trying indefinitely to resolve the
- # host name of the OpenVPN server. Very useful
- # on machines which are not permanently connected
- # to the internet such as laptops.
- resolv-retry infinite
- # Most clients don't need to bind to
- # a specific local port number.
- nobind
- # Downgrade privileges after initialization (non-Windows only)
- user nobody
- group nogroup
- # Try to preserve some state across restarts.
- persist-key
- persist-tun
- # If you are connecting through an
- # HTTP proxy to reach the actual OpenVPN
- # server, put the proxy server/IP and
- # port number here. See the man page
- # if your proxy server requires
- # authentication.
- ;http-proxy-retry # retry on connection failures
- ;http-proxy [proxy server] [proxy port #]
- # Wireless networks often produce a lot
- # of duplicate packets. Set this flag
- # to silence duplicate packet warnings.
- ;mute-replay-warnings
- # SSL/TLS parms.
- # See the server config file for more
- # description. It's best to use
- # a separate .crt/.key file pair
- # for each client. A single ca
- # file can be used for all clients.
- #ca ca.crt
- #cert client.crt
- #key client.key
- # Verify server certificate by checking that the
- # certicate has the correct key usage set.
- # This is an important precaution to protect against
- # a potential attack discussed here:
- # http://openvpn.net/howto.html#mitm
- #
- # To use this feature, you will need to generate
- # your server certificates with the keyUsage set to
- # digitalSignature, keyEncipherment
- # and the extendedKeyUsage to
- # serverAuth
- # EasyRSA can do this for you.
- remote-cert-tls server
- # If a tls-auth key is used on the server
- # then every client must also have the key.
- ;tls-auth ta.key 1
- # Select a cryptographic cipher.
- # If the cipher option is used on the server
- # then you must also specify it here.
- cipher AES-128-CBC
- # Added this myself since i am note sure of need of tls or not
- auth SHA256
- # Enable compression on the VPN link.
- # Don't enable this unless it is also
- # enabled in the server config file.
- comp-lzo
- # Set log file verbosity.
- verb 3
- # Silence repeating messages
- ;mute 20
- key-direction 1
- <ca>
- [Security-related line(s) omitted]
- </ca>
- <cert>
- [Security-related line(s) omitted]
- </cert>
- <key>
- [Security-related line(s) omitted]
- </key>
- <tls-auth>
- [Security-related line(s) omitted]
- </tls-auth>
- ================================================================================
- ifconfig output:
- lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
- options=1203<RXCSUM,TXCSUM,TXSTATUS,SW_TIMESTAMP>
- inet 127.0.0.1 netmask 0xff000000
- inet6 ::1 prefixlen 128
- inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1
- inet 127.51.68.120 netmask 0xff000000
- nd6 options=201<PERFORMNUD,DAD>
- gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280
- stf0: flags=0<> mtu 1280
- EHC36: flags=0<> mtu 0
- OHC6: flags=0<> mtu 0
- EHC38: flags=0<> mtu 0
- OHC4: flags=0<> mtu 0
- en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
- options=b<RXCSUM,TXCSUM,VLAN_HWTAGGING>
- ether c8:bc:c8:91:36:3c
- nd6 options=201<PERFORMNUD,DAD>
- media: autoselect (none)
- status: inactive
- en1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
- ether 78:ca:39:bb:3e:b1
- inet6 fe80::8cc:c83b:5031:9f85%en1 prefixlen 64 secured scopeid 0x9
- inet 192.168.10.235 netmask 0xffffff00 broadcast 192.168.10.255
- nd6 options=201<PERFORMNUD,DAD>
- media: autoselect
- status: active
- p2p0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 2304
- ether 0a:ca:39:bb:3e:b1
- media: autoselect
- status: inactive
- fw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 4078
- lladdr 78:ca:39:ff:fe:28:67:d4
- nd6 options=201<PERFORMNUD,DAD>
- media: autoselect <full-duplex>
- status: inactive
- utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 2000
- options=6403<RXCSUM,TXCSUM,CHANNEL_IO,PARTIAL_CSUM,ZEROINVERT_CSUM>
- inet6 fe80::93fa:de43:6967:9d49%utun0 prefixlen 64 scopeid 0xc
- nd6 options=201<PERFORMNUD,DAD>
- ================================================================================
- Console Log:
- 2017-12-14 18:59:47 ksinstall[14927] 2017-12-14 18:59:47.431 ksinstall[14927/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer started.
- 2017-12-14 18:59:47 ksinstall[14927] 2017-12-14 18:59:47.454 ksinstall[14927/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer starting Installation.
- 2017-12-14 18:59:54 ksinstall[14927] 2017-12-14 18:59:54.288 ksinstall[14927/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer ran successfully.
- 2017-12-14 19:02:54 ksinstall[14978] 2017-12-14 19:02:54.587 ksinstall[14978/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer started.
- 2017-12-14 19:02:54 ksinstall[14978] 2017-12-14 19:02:54.597 ksinstall[14978/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer starting Installation.
- 2017-12-14 19:03:00 ksinstall[14978] 2017-12-14 19:03:00.553 ksinstall[14978/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer ran successfully.
- 2017-12-14 19:05:04 ksinstall[15043] 2017-12-14 19:05:04.215 ksinstall[15043/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer started.
- 2017-12-14 19:05:04 ksinstall[15043] 2017-12-14 19:05:04.236 ksinstall[15043/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer starting Installation.
- 2017-12-14 19:05:07 ksinstall[15043] 2017-12-14 19:05:07.722 ksinstall[15043/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer ran successfully.
- 2017-12-14 19:54:21 Tunnelblick[3834] currentIPInfo(Name): IP address info could not be fetched within 35.1 seconds; the error was 'Error Domain=NSURLErrorDomain Code=-1001 "The request timed out." UserInfo={NSUnderlyingError=0x6040006429d0 {Error Domain=kCFErrorDomainCFNetwork Code=-1001 "The request timed out." UserInfo={NSErrorFailingURLStringKey=https://tunnelblick.net/ipinfo, NSErrorFailingURLKey=https://tunnelblick.net/ipinfo, _kCFStreamErrorCodeKey=-2102, _kCFStreamErrorDomainKey=4, NSLocalizedDescription=The request timed out.}}, NSErrorFailingURLStringKey=https://tunnelblick.net/ipinfo, NSErrorFailingURLKey=https://tunnelblick.net/ipinfo, _kCFStreamErrorDomainKey=4, _kCFStreamErrorCodeKey=-2102, NSLocalizedDescription=The request timed out.}'; the response was '(null)'
- 2017-12-14 20:17:10 Tunnelblick[3834] applicationShouldTerminate: termination because of restart; delayed until 'shutdownTunnelblick' finishes
- 2017-12-14 20:17:10 Tunnelblick[3834] Finished shutting down Tunnelblick; allowing termination
- 2017-12-14 20:32:27 Tunnelblick[572] Tunnelblick: OS X 10.13.1; Tunnelblick 3.7.4b (build 4921)
- 2017-12-14 20:32:39 Tunnelblick[572] Warning: preferences contain unknown preference 'client2-allowChangesToManuallySetNetworkSettings'
- 2017-12-14 20:35:01 Tunnelblick[572] Sparkle: ===== Tunnelblick =====
- 2017-12-14 20:35:01 Tunnelblick[572] Sparkle: Verified appcast signature
- 2017-12-14 20:35:30 Tunnelblick[572] runTunnelblickd: no data available from tunnelblickd socket; sleeping 5.000000 seconds...
- 2017-12-14 20:35:35 Tunnelblick[572] runTunnelblickd: no data available from tunnelblickd socket; sleeping 5.000000 seconds...
- 2017-12-14 20:36:59 Tunnelblick[572] currentIPInfo(Name): IP address info could not be fetched within 35.8 seconds; the error was 'Error Domain=NSURLErrorDomain Code=-1001 "The request timed out." UserInfo={NSUnderlyingError=0x604000245340 {Error Domain=kCFErrorDomainCFNetwork Code=-1001 "The request timed out." UserInfo={NSErrorFailingURLStringKey=https://tunnelblick.net/ipinfo, NSErrorFailingURLKey=https://tunnelblick.net/ipinfo, _kCFStreamErrorCodeKey=-2102, _kCFStreamErrorDomainKey=4, NSLocalizedDescription=The request timed out.}}, NSErrorFailingURLStringKey=https://tunnelblick.net/ipinfo, NSErrorFailingURLKey=https://tunnelblick.net/ipinfo, _kCFStreamErrorDomainKey=4, _kCFStreamErrorCodeKey=-2102, NSLocalizedDescription=The request timed out.}'; the response was '(null)'
- 2017-12-14 20:37:36 Tunnelblick[572] startDisconnectingUserKnows: while already disconnecting 'client2'; OpenVPN state = 'DISCONNECTING'
- 2017-12-14 20:37:38 tunnelblickd[829] Status = 248 from tunnelblick-helper command 'kill 606'
- 2017-12-14 20:37:38 Tunnelblick[572] tunnelblickd status from kill: 248
- tunnelblickd stderr:
- 'killOneOpenvpn(606): Process does not exist
- '
- 2017-12-14 20:39:39 Tunnelblick[572] currentIPInfo(Name): IP address info could not be fetched within 35.1 seconds; the error was 'Error Domain=NSURLErrorDomain Code=-1001 "The request timed out." UserInfo={NSUnderlyingError=0x600000455f00 {Error Domain=kCFErrorDomainCFNetwork Code=-1001 "The request timed out." UserInfo={NSErrorFailingURLStringKey=https://tunnelblick.net/ipinfo, NSErrorFailingURLKey=https://tunnelblick.net/ipinfo, _kCFStreamErrorCodeKey=-2102, _kCFStreamErrorDomainKey=4, NSLocalizedDescription=The request timed out.}}, NSErrorFailingURLStringKey=https://tunnelblick.net/ipinfo, NSErrorFailingURLKey=https://tunnelblick.net/ipinfo, _kCFStreamErrorDomainKey=4, _kCFStreamErrorCodeKey=-2102, NSLocalizedDescription=The request timed out.}'; the response was '(null)'
- 2017-12-14 20:42:30 ksinstall[1349] 2017-12-14 20:42:30.677 ksinstall[1349/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer started.
- 2017-12-14 20:42:31 ksinstall[1349] 2017-12-14 20:42:30.994 ksinstall[1349/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer starting Installation.
- 2017-12-14 20:42:35 ksinstall[1349] 2017-12-14 20:42:35.305 ksinstall[1349/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer ran successfully.
- 2017-12-14 20:47:18 Tunnelblick[572] applicationShouldTerminate: termination because of restart; delayed until 'shutdownTunnelblick' finishes
- 2017-12-14 20:47:18 Tunnelblick[572] Finished shutting down Tunnelblick; allowing termination
- 2017-12-14 20:54:31 ksinstall[373] 2017-12-14 20:54:31.068 ksinstall[373/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer started.
- 2017-12-14 20:54:33 ksinstall[373] 2017-12-14 20:54:33.530 ksinstall[373/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer starting Installation.
- 2017-12-14 20:55:14 ksinstall[373] 2017-12-14 20:55:14.122 ksinstall[373/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer ran successfully.
- 2017-12-14 21:02:04 Tunnelblick[564] Tunnelblick: OS X 10.13.1; Tunnelblick 3.7.4b (build 4921)
- 2017-12-14 21:02:08 Tunnelblick[564] Warning: preferences contain unknown preference 'client2-allowChangesToManuallySetNetworkSettings'
- 2017-12-14 21:02:34 Tunnelblick[564] Sparkle: ===== Tunnelblick =====
- 2017-12-14 21:02:34 Tunnelblick[564] Sparkle: Verified appcast signature
- 2017-12-14 21:04:56 Tunnelblick[564] currentIPInfo(Name): IP address info could not be fetched within 35.5 seconds; the error was 'Error Domain=NSURLErrorDomain Code=-1001 "The request timed out." UserInfo={NSUnderlyingError=0x600000259bc0 {Error Domain=kCFErrorDomainCFNetwork Code=-1001 "The request timed out." UserInfo={NSErrorFailingURLStringKey=https://tunnelblick.net/ipinfo, NSErrorFailingURLKey=https://tunnelblick.net/ipinfo, _kCFStreamErrorCodeKey=-2102, _kCFStreamErrorDomainKey=4, NSLocalizedDescription=The request timed out.}}, NSErrorFailingURLStringKey=https://tunnelblick.net/ipinfo, NSErrorFailingURLKey=https://tunnelblick.net/ipinfo, _kCFStreamErrorDomainKey=4, _kCFStreamErrorCodeKey=-2102, NSLocalizedDescription=The request timed out.}'; the response was '(null)'
- 2017-12-14 21:05:04 Tunnelblick[564] startDisconnectingUserKnows: while already disconnecting 'client2'; OpenVPN state = 'DISCONNECTING'
- 2017-12-14 21:06:22 Tunnelblick[564] currentIPInfo(Name): IP address info could not be fetched within 35.4 seconds; the error was 'Error Domain=NSURLErrorDomain Code=-1001 "The request timed out." UserInfo={NSUnderlyingError=0x60400024edc0 {Error Domain=kCFErrorDomainCFNetwork Code=-1001 "The request timed out." UserInfo={NSErrorFailingURLStringKey=https://tunnelblick.net/ipinfo, NSErrorFailingURLKey=https://tunnelblick.net/ipinfo, _kCFStreamErrorCodeKey=-2102, _kCFStreamErrorDomainKey=4, NSLocalizedDescription=The request timed out.}}, NSErrorFailingURLStringKey=https://tunnelblick.net/ipinfo, NSErrorFailingURLKey=https://tunnelblick.net/ipinfo, _kCFStreamErrorDomainKey=4, _kCFStreamErrorCodeKey=-2102, NSLocalizedDescription=The request timed out.}'; the response was '(null)'
- 2017-12-14 21:06:50 Tunnelblick[564] startDisconnectingUserKnows: while already disconnecting 'client2'; OpenVPN state = 'DISCONNECTING'
- 2017-12-14 21:22:10 Tunnelblick[564] currentIPInfo(Name): IP address info could not be fetched within 35.1 seconds; the error was 'Error Domain=NSURLErrorDomain Code=-1001 "The request timed out." UserInfo={NSUnderlyingError=0x604000255c00 {Error Domain=kCFErrorDomainCFNetwork Code=-1001 "The request timed out." UserInfo={NSErrorFailingURLStringKey=https://tunnelblick.net/ipinfo, NSErrorFailingURLKey=https://tunnelblick.net/ipinfo, _kCFStreamErrorCodeKey=-2102, _kCFStreamErrorDomainKey=4, NSLocalizedDescription=The request timed out.}}, NSErrorFailingURLStringKey=https://tunnelblick.net/ipinfo, NSErrorFailingURLKey=https://tunnelblick.net/ipinfo, _kCFStreamErrorDomainKey=4, _kCFStreamErrorCodeKey=-2102, NSLocalizedDescription=The request timed out.}'; the response was '(null)'
- 2017-12-14 22:22:59 Tunnelblick[564] currentIPInfo(Name): IP address info could not be fetched within 35.1 seconds; the error was 'Error Domain=NSURLErrorDomain Code=-1001 "The request timed out." UserInfo={NSUnderlyingError=0x600000440720 {Error Domain=kCFErrorDomainCFNetwork Code=-1001 "The request timed out." UserInfo={NSErrorFailingURLStringKey=https://tunnelblick.net/ipinfo, NSErrorFailingURLKey=https://tunnelblick.net/ipinfo, _kCFStreamErrorCodeKey=-2102, _kCFStreamErrorDomainKey=4, NSLocalizedDescription=The request timed out.}}, NSErrorFailingURLStringKey=https://tunnelblick.net/ipinfo, NSErrorFailingURLKey=https://tunnelblick.net/ipinfo, _kCFStreamErrorDomainKey=4, _kCFStreamErrorCodeKey=-2102, NSLocalizedDescription=The request timed out.}'; the response was '(null)'
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement