Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- *Tunnelblick: OS X 10.13.1; Tunnelblick 3.7.4b (build 4921); prior version 3.7.1b (build 4813); Admin user
- git commit 88763bb2b2bfcc7debb3ddc78cdf5a350722717c
- Configuration client2
- "Sanitized" condensed configuration file for /Library/Application Support/Tunnelblick/Shared/client2.tblk:
- client
- dev tun
- proto udp
- remote www.harnesk.net 1194
- resolv-retry infinite
- nobind
- user nobody
- group nogroup
- persist-key
- persist-tun
- remote-cert-tls server
- cipher AES-128-CBC
- auth SHA256
- comp-lzo
- verb 3
- key-direction 1
- <ca>
- [Security-related line(s) omitted]
- </ca>
- <cert>
- [Security-related line(s) omitted]
- </cert>
- <key>
- [Security-related line(s) omitted]
- </key>
- <tls-auth>
- [Security-related line(s) omitted]
- </tls-auth>
- ================================================================================
- Non-Apple kexts that are loaded:
- Index Refs Address Size Wired Name (Version) UUID <Linked Against>
- 22 0 0xffffff7f81007000 0xe000 0xe000 com.3dconnexion.driver (10.4.2) D1FC94C5-936D-3185-BECD-5AEA40D01AEC <21 20 16 5 4 3>
- 157 3 0xffffff7f83287000 0x61000 0x61000 org.virtualbox.kext.VBoxDrv (5.1.14) 08D6FFCF-2BDF-305C-8824-89E69602C30D <7 5 4 3 1>
- 165 0 0xffffff7f832e8000 0x8000 0x8000 org.virtualbox.kext.VBoxUSB (5.1.14) BF0B350D-C893-37DF-82F0-BE86ABA49D26 <164 157 20 7 5 4 3 1>
- 166 0 0xffffff7f832f0000 0x5000 0x5000 org.virtualbox.kext.VBoxNetFlt (5.1.14) 0291FFCC-8E46-3FFD-B674-BFA42D4E67E4 <157 7 5 4 3 1>
- 167 0 0xffffff7f832f5000 0x6000 0x6000 org.virtualbox.kext.VBoxNetAdp (5.1.14) EFBEE858-A3D7-3C61-86C0-F6AFDCA48229 <157 5 4 1>
- ================================================================================
- There are no unusual files in client2.tblk
- ================================================================================
- Configuration preferences:
- useDNS = 1
- -resetPrimaryInterfaceAfterDisconnect = 1
- -routeAllTrafficThroughVpn = 1
- -useRouteUpInsteadOfUp = 1
- -useDownRootPlugin = 1
- -loggingLevel = 3
- -lastConnectionSucceeded = 1
- -prependDomainNameToSearchDomains = 0
- ================================================================================
- Wildcard preferences:
- ================================================================================
- Program preferences:
- launchAtNextLogin = 1
- notOKToCheckThatIPAddressDidNotChangeAfterConnection = 0
- tunnelblickVersionHistory = (
- "3.7.4b (build 4921)",
- "3.7.1b (build 4813)",
- "3.7.1a (build 4812)",
- "3.7.0 (build 4790)"
- )
- lastLaunchTime = 534796556.019696
- lastLanguageAtLaunchWasRTL = 0
- connectionWindowDisplayCriteria = showWhenConnecting
- maxLogDisplaySize = 102400
- lastConnectedDisplayName = client2
- keyboardShortcutIndex = 1
- updateCheckAutomatically = 1
- NSWindow Frame SettingsSheetWindow = 429 192 829 524 0 0 1280 777
- NSWindow Frame ConnectingWindow = 445 442 389 187 0 0 1280 777
- NSWindow Frame SUStatusFrame = 786 359 400 129 0 0 1280 777
- NSWindow Frame SUUpdateAlert = 330 288 620 392 0 0 1280 777
- detailsWindowFrameVersion = 4921
- detailsWindowFrame = {{316, 150}, {920, 468}}
- detailsWindowLeftFrame = {{0, 0}, {165, 350}}
- detailsWindowViewIndex = 0
- detailsWindowConfigurationsTabIdentifier = settings
- leftNavSelectedDisplayName = client2
- AdvancedWindowTabIdentifier = connectingAndDisconnecting
- haveDealtWithOldTunTapPreferences = 1
- haveDealtWithOldLoginItem = 1
- SUEnableAutomaticChecks = 1
- SUScheduledCheckInterval = 86400
- SUSendProfileInfo = 1
- SULastCheckTime = 2017-12-12 18:35:57 +0000
- SULastProfileSubmissionDate = 2017-12-11 22:34:33 +0000
- SUHasLaunchedBefore = 1
- WebKitDefaultFontSize = 16
- WebKitStandardFont = Times
- askedUserIfOKToCheckThatIPAddressDidNotChangeAfterConnection = 1
- haveDealtWithSparkle1dot5b6 = 1
- updateSendProfileInfo = 1
- ================================================================================
- Tunnelblick Log:
- *Tunnelblick: OS X 10.13.1; Tunnelblick 3.7.4b (build 4921); prior version 3.7.1b (build 4813)
- 2017-12-14 19:53:29 *Tunnelblick: Attempting connection with client2; Set nameserver = 771; monitoring connection
- 2017-12-14 19:53:29 *Tunnelblick: openvpnstart start client2.tblk 1337 771 0 3 0 1165104 -ptADGNWradsgnw 2.3.18-openssl-1.0.2n
- 2017-12-14 19:53:29 *Tunnelblick: openvpnstart starting OpenVPN
- 2017-12-14 19:53:30 *Tunnelblick: openvpnstart log:
- Warning: Tunnelblick is using 'openvpn-down-root.so', so the route-pre-down script will not be used. You can override this by providing a custom route-pre-down script (which may be a copy of Tunnelblick's standard route-pre-down script) in a Tunnelblick VPN Configuration. However, that script will not be executed as root unless the 'user' and 'group' options are removed from the OpenVPN configuration file. If the 'user' and 'group' options are removed, then you don't need to use a custom route-pre-down script.OpenVPN started successfully. Command used to start OpenVPN (one argument per displayed line):
- /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.3.18-openssl-1.0.2n/openvpn
- --daemon
- --log
- /Library/Application Support/Tunnelblick/Logs/-SLibrary-SApplication Support-STunnelblick-SShared-Sclient2.tblk-SContents-SResources-Sconfig.ovpn.771_0_3_0_1165104.1337.openvpn.log
- --cd
- /Library/Application Support/Tunnelblick/Shared/client2.tblk/Contents/Resources
- --setenv
- IV_GUI_VER
- "net.tunnelblick.tunnelblick 4921 3.7.4b (build 4921)"
- --verb
- 3
- --config
- /Library/Application Support/Tunnelblick/Shared/client2.tblk/Contents/Resources/config.ovpn
- --verb
- 3
- --cd
- /Library/Application Support/Tunnelblick/Shared/client2.tblk/Contents/Resources
- --management
- 127.0.0.1
- 1337
- --management-query-passwords
- --management-hold
- --redirect-gateway
- def1
- --script-security
- 2
- --route-up
- /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -9 -d -f -m -o -r -w -ptADGNWradsgnw
- --plugin
- /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.3.18-openssl-1.0.2n/openvpn-down-root.so
- /Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh -9 -d -f -m -o -r -w -ptADGNWradsgnw
- 2017-12-14 19:53:30 *Tunnelblick: Established communication with OpenVPN
- 2017-12-14 19:53:30 OpenVPN 2.3.18 x86_64-apple-darwin [SSL (OpenSSL)] [LZO] [PKCS11] [MH] [IPv6] built on Dec 7 2017
- 2017-12-14 19:53:30 library versions: OpenSSL 1.0.2n 7 Dec 2017, LZO 2.10
- 2017-12-14 19:53:30 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:1337
- 2017-12-14 19:53:30 Need hold release from management interface, waiting...
- 2017-12-14 19:53:30 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:1337
- 2017-12-14 19:53:30 MANAGEMENT: CMD 'pid'
- 2017-12-14 19:53:30 MANAGEMENT: CMD 'state on'
- 2017-12-14 19:53:30 MANAGEMENT: CMD 'state'
- 2017-12-14 19:53:30 MANAGEMENT: CMD 'bytecount 1'
- 2017-12-14 19:53:30 MANAGEMENT: CMD 'hold release'
- 2017-12-14 19:53:30 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2017-12-14 19:53:30 PLUGIN_INIT: POST /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.3.18-openssl-1.0.2n/openvpn-down-root.so '[/Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.3.18-openssl-1.0.2n/openvpn-down-root.so] [/Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh] [-9] [-d] [-f] [-m] [-o] [-r] [-w] [-ptADGNWradsgnw]' intercepted=PLUGIN_UP|PLUGIN_DOWN
- 2017-12-14 19:53:30 Control Channel Authentication: tls-auth using INLINE static key file
- 2017-12-14 19:53:30 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- 2017-12-14 19:53:30 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- 2017-12-14 19:53:30 Socket Buffers: R=[196724->196724] S=[9216->9216]
- 2017-12-14 19:53:30 MANAGEMENT: >STATE:1513277610,RESOLVE,,,
- 2017-12-14 19:53:31 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
- 2017-12-14 19:53:31 UDPv4 link local: [undef]
- 2017-12-14 19:53:31 UDPv4 link remote: [AF_INET]194.1.247.196:1194
- 2017-12-14 19:53:31 MANAGEMENT: >STATE:1513277611,WAIT,,,
- 2017-12-14 19:53:31 MANAGEMENT: >STATE:1513277611,AUTH,,,
- 2017-12-14 19:53:31 TLS: Initial packet from [AF_INET]194.1.247.196:1194, sid=861825ac d61cde41
- 2017-12-14 19:53:31 VERIFY OK: depth=1, C=SE, ST=SV, L=Stockholm, O=Fort-Pond, OU=Community, CN=Fort-Pond CA, name=server, emailAddress=jonas@harnesk.net
- 2017-12-14 19:53:31 Validating certificate key usage
- 2017-12-14 19:53:31 ++ Certificate has key usage 00a0, expects 00a0
- 2017-12-14 19:53:31 VERIFY KU OK
- 2017-12-14 19:53:31 Validating certificate extended key usage
- 2017-12-14 19:53:31 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- 2017-12-14 19:53:31 VERIFY EKU OK
- 2017-12-14 19:53:31 VERIFY OK: depth=0, C=SE, ST=SV, L=Stockholm, O=Fort-Pond, OU=Community, CN=server, name=server, emailAddress=jonas@harnesk.net
- 2017-12-14 19:53:31 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- 2017-12-14 19:53:31 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- 2017-12-14 19:53:31 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- 2017-12-14 19:53:31 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- 2017-12-14 19:53:31 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2017-12-14 19:53:31 [server] Peer Connection Initiated with [AF_INET]194.1.247.196:1194
- 2017-12-14 19:53:32 MANAGEMENT: >STATE:1513277612,GET_CONFIG,,,
- 2017-12-14 19:53:33 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- 2017-12-14 19:53:33 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.4.4,dhcp-option DNS 8.8.8.8,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5'
- 2017-12-14 19:53:33 OPTIONS IMPORT: timers and/or timeouts modified
- 2017-12-14 19:53:33 OPTIONS IMPORT: --ifconfig/up options modified
- 2017-12-14 19:53:33 OPTIONS IMPORT: route options modified
- 2017-12-14 19:53:33 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2017-12-14 19:53:33 Opening utun (connect(AF_SYS_CONTROL)): Resource busy
- 2017-12-14 19:53:33 Opened utun device utun1
- 2017-12-14 19:53:33 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- 2017-12-14 19:53:33 MANAGEMENT: >STATE:1513277613,ASSIGN_IP,,10.8.0.6,
- 2017-12-14 19:53:33 /sbin/ifconfig utun1 delete
- ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
- 2017-12-14 19:53:34 NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
- 2017-12-14 19:53:34 /sbin/ifconfig utun1 10.8.0.6 10.8.0.5 mtu 1500 netmask 255.255.255.255 up
- 2017-12-14 19:53:34 PLUGIN_CALL: POST /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.3.18-openssl-1.0.2n/openvpn-down-root.so/PLUGIN_UP status=0
- 2017-12-14 19:53:34 /sbin/route add -net 194.1.247.196 192.168.10.1 255.255.255.255
- route: writing to routing socket: File exists
- add net 194.1.247.196: gateway 192.168.10.1: File exists
- 2017-12-14 19:53:34 /sbin/route add -net 0.0.0.0 10.8.0.5 128.0.0.0
- add net 0.0.0.0: gateway 10.8.0.5
- 2017-12-14 19:53:34 /sbin/route add -net 128.0.0.0 10.8.0.5 128.0.0.0
- add net 128.0.0.0: gateway 10.8.0.5
- 2017-12-14 19:53:34 MANAGEMENT: >STATE:1513277614,ADD_ROUTES,,,
- 2017-12-14 19:53:34 /sbin/route add -net 10.8.0.1 10.8.0.5 255.255.255.255
- add net 10.8.0.1: gateway 10.8.0.5
- **********************************************
- Start of output from client.up.tunnelblick.sh
- Disabled IPv6 for 'Ethernet'
- Disabled IPv6 for 'FireWire'
- Disabled IPv6 for 'Wi-Fi'
- Disabled IPv6 for 'iPhone USB'
- Disabled IPv6 for 'Bluetooth PAN'
- Retrieved from OpenVPN: name server(s) [ 8.8.4.4 8.8.8.8 ], search domain(s) [ ] and SMB server(s) [ ] and using default domain name [ openvpn ]
- Not aggregating ServerAddresses because running on OS X 10.6 or higher
- Setting search domains to 'openvpn' because running under OS X 10.6 or higher and the search domains were not set manually (or are allowed to be changed) and 'Prepend domain name to search domains' was not selected
- Saved the DNS and SMB configurations so they can be restored
- Changed DNS ServerAddresses setting from '192.168.10.1' to '8.8.4.4 8.8.8.8'
- Changed DNS SearchDomains setting from '' to 'openvpn'
- Changed DNS DomainName setting from 'lan' to 'openvpn'
- Did not change SMB NetBIOSName setting of ''
- Did not change SMB Workgroup setting of 'pondlife'
- Did not change SMB WINSAddresses setting of ''
- DNS servers '8.8.4.4 8.8.8.8' will be used for DNS queries when the VPN is active
- The DNS servers include only free public DNS servers known to Tunnelblick.
- Flushed the DNS cache via dscacheutil
- /usr/sbin/discoveryutil not present. Not flushing the DNS cache via discoveryutil
- Notified mDNSResponder that the DNS cache was flushed
- Setting up to monitor system configuration with process-network-changes
- End of output from client.up.tunnelblick.sh
- **********************************************
- 2017-12-14 19:53:40 GID set to nogroup
- 2017-12-14 19:53:40 UID set to nobody
- 2017-12-14 19:53:40 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- 2017-12-14 19:53:40 Initialization Sequence Completed
- 2017-12-14 19:53:40 MANAGEMENT: >STATE:1513277620,CONNECTED,SUCCESS,10.8.0.6,194.1.247.196
- 2017-12-14 19:53:41 *Tunnelblick: No 'connected.sh' script to execute
- 2017-12-14 19:53:45 *Tunnelblick process-network-changes: A system configuration change was ignored
- 2017-12-14 19:54:21 *Tunnelblick: After 30.0 seconds, gave up trying to fetch IP address information using the ipInfo host's name after connecting.
- 2017-12-14 19:54:21 *Tunnelblick: fetched IP address information using the ipInfo host's IP address after connecting.
- 2017-12-14 19:54:31 *Tunnelblick: Disconnecting; notification window disconnect button pressed
- 2017-12-14 19:54:31 *Tunnelblick: No 'pre-disconnect.sh' script to execute
- 2017-12-14 19:54:31 *Tunnelblick: Disconnecting using 'kill'
- 2017-12-14 19:54:31 event_wait : Interrupted system call (code=4)
- 2017-12-14 19:54:31 /sbin/route delete -net 10.8.0.1 10.8.0.5 255.255.255.255
- route: must be root to alter routing table
- 2017-12-14 19:54:31 ERROR: OS X route delete command failed: external program exited with error status: 77
- 2017-12-14 19:54:31 /sbin/route delete -net 194.1.247.196 192.168.10.1 255.255.255.255
- route: must be root to alter routing table
- 2017-12-14 19:54:31 ERROR: OS X route delete command failed: external program exited with error status: 77
- 2017-12-14 19:54:31 /sbin/route delete -net 0.0.0.0 10.8.0.5 128.0.0.0
- route: must be root to alter routing table
- 2017-12-14 19:54:31 ERROR: OS X route delete command failed: external program exited with error status: 77
- 2017-12-14 19:54:31 /sbin/route delete -net 128.0.0.0 10.8.0.5 128.0.0.0
- route: must be root to alter routing table
- 2017-12-14 19:54:31 ERROR: OS X route delete command failed: external program exited with error status: 77
- 2017-12-14 19:54:31 Closing TUN/TAP interface
- 2017-12-14 19:54:36 PLUGIN_CALL: POST /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.3.18-openssl-1.0.2n/openvpn-down-root.so/PLUGIN_DOWN status=0
- 2017-12-14 19:54:36 PLUGIN_CLOSE: /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.3.18-openssl-1.0.2n/openvpn-down-root.so
- 2017-12-14 19:54:36 SIGTERM[hard,] received, process exiting
- 2017-12-14 19:54:36 MANAGEMENT: >STATE:1513277676,EXITING,SIGTERM,,
- 2017-12-14 19:54:37 *Tunnelblick: No 'post-disconnect.sh' script to execute
- 2017-12-14 19:54:37 *Tunnelblick: Expected disconnection occurred.
- ================================================================================
- "Sanitized" full configuration file
- ##############################################
- # Sample client-side OpenVPN 2.0 config file #
- # for connecting to multi-client server. #
- # #
- # This configuration can be used by multiple #
- # clients, however each client should have #
- # its own cert and key files. #
- # #
- # On Windows, you might want to rename this #
- # file so it has a .ovpn extension #
- ##############################################
- # Specify that we are a client and that we
- # will be pulling certain config file directives
- # from the server.
- client
- # Use the same setting as you are using on
- # the server.
- # On most systems, the VPN will not function
- # unless you partially or fully disable
- # the firewall for the TUN/TAP interface.
- ;dev tap
- dev tun
- # Windows needs the TAP-Win32 adapter name
- # from the Network Connections panel
- # if you have more than one. On XP SP2,
- # you may need to disable the firewall
- # for the TAP adapter.
- ;dev-node MyTap
- # Are we connecting to a TCP or
- # UDP server? Use the same setting as
- # on the server.
- ;proto tcp
- proto udp
- # The hostname/IP and port of the server.
- # You can have multiple remote entries
- # to load balance between the servers.
- remote www.harnesk.net 1194
- ;remote my-server-2 1194
- # Choose a random host from the remote
- # list for load-balancing. Otherwise
- # try hosts in the order specified.
- ;remote-random
- # Keep trying indefinitely to resolve the
- # host name of the OpenVPN server. Very useful
- # on machines which are not permanently connected
- # to the internet such as laptops.
- resolv-retry infinite
- # Most clients don't need to bind to
- # a specific local port number.
- nobind
- # Downgrade privileges after initialization (non-Windows only)
- user nobody
- group nogroup
- # Try to preserve some state across restarts.
- persist-key
- persist-tun
- # If you are connecting through an
- # HTTP proxy to reach the actual OpenVPN
- # server, put the proxy server/IP and
- # port number here. See the man page
- # if your proxy server requires
- # authentication.
- ;http-proxy-retry # retry on connection failures
- ;http-proxy [proxy server] [proxy port #]
- # Wireless networks often produce a lot
- # of duplicate packets. Set this flag
- # to silence duplicate packet warnings.
- ;mute-replay-warnings
- # SSL/TLS parms.
- # See the server config file for more
- # description. It's best to use
- # a separate .crt/.key file pair
- # for each client. A single ca
- # file can be used for all clients.
- #ca ca.crt
- #cert client.crt
- #key client.key
- # Verify server certificate by checking that the
- # certicate has the correct key usage set.
- # This is an important precaution to protect against
- # a potential attack discussed here:
- # http://openvpn.net/howto.html#mitm
- #
- # To use this feature, you will need to generate
- # your server certificates with the keyUsage set to
- # digitalSignature, keyEncipherment
- # and the extendedKeyUsage to
- # serverAuth
- # EasyRSA can do this for you.
- remote-cert-tls server
- # If a tls-auth key is used on the server
- # then every client must also have the key.
- ;tls-auth ta.key 1
- # Select a cryptographic cipher.
- # If the cipher option is used on the server
- # then you must also specify it here.
- cipher AES-128-CBC
- # Added this myself since i am note sure of need of tls or not
- auth SHA256
- # Enable compression on the VPN link.
- # Don't enable this unless it is also
- # enabled in the server config file.
- comp-lzo
- # Set log file verbosity.
- verb 3
- # Silence repeating messages
- ;mute 20
- key-direction 1
- <ca>
- [Security-related line(s) omitted]
- </ca>
- <cert>
- [Security-related line(s) omitted]
- </cert>
- <key>
- [Security-related line(s) omitted]
- </key>
- <tls-auth>
- [Security-related line(s) omitted]
- </tls-auth>
- ================================================================================
- ifconfig output:
- lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
- options=1203<RXCSUM,TXCSUM,TXSTATUS,SW_TIMESTAMP>
- inet 127.0.0.1 netmask 0xff000000
- inet6 ::1 prefixlen 128
- inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1
- inet 127.51.68.120 netmask 0xff000000
- nd6 options=201<PERFORMNUD,DAD>
- gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280
- stf0: flags=0<> mtu 1280
- OHC4: flags=0<> mtu 0
- OHC6: flags=0<> mtu 0
- EHC36: flags=0<> mtu 0
- EHC38: flags=0<> mtu 0
- en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
- options=b<RXCSUM,TXCSUM,VLAN_HWTAGGING>
- ether c8:bc:c8:91:36:3c
- nd6 options=201<PERFORMNUD,DAD>
- media: autoselect (none)
- status: inactive
- en1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
- ether 78:ca:39:bb:3e:b1
- inet6 fe80::14bc:9369:709c:c9e1%en1 prefixlen 64 secured scopeid 0x9
- inet 192.168.10.235 netmask 0xffffff00 broadcast 192.168.10.255
- nd6 options=201<PERFORMNUD,DAD>
- media: autoselect
- status: active
- p2p0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 2304
- ether 0a:ca:39:bb:3e:b1
- media: autoselect
- status: inactive
- fw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 4078
- lladdr 78:ca:39:ff:fe:28:67:d4
- nd6 options=201<PERFORMNUD,DAD>
- media: autoselect <full-duplex>
- status: inactive
- utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 2000
- options=6403<RXCSUM,TXCSUM,CHANNEL_IO,PARTIAL_CSUM,ZEROINVERT_CSUM>
- inet6 fe80::f310:ed0a:29c1:2113%utun0 prefixlen 64 scopeid 0xc
- nd6 options=201<PERFORMNUD,DAD>
- ================================================================================
- Console Log:
- 2017-12-14 18:59:47 ksinstall[14927] 2017-12-14 18:59:47.431 ksinstall[14927/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer started.
- 2017-12-14 18:59:47 ksinstall[14927] 2017-12-14 18:59:47.454 ksinstall[14927/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer starting Installation.
- 2017-12-14 18:59:54 ksinstall[14927] 2017-12-14 18:59:54.288 ksinstall[14927/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer ran successfully.
- 2017-12-14 19:02:54 ksinstall[14978] 2017-12-14 19:02:54.587 ksinstall[14978/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer started.
- 2017-12-14 19:02:54 ksinstall[14978] 2017-12-14 19:02:54.597 ksinstall[14978/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer starting Installation.
- 2017-12-14 19:03:00 ksinstall[14978] 2017-12-14 19:03:00.553 ksinstall[14978/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer ran successfully.
- 2017-12-14 19:05:04 ksinstall[15043] 2017-12-14 19:05:04.215 ksinstall[15043/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer started.
- 2017-12-14 19:05:04 ksinstall[15043] 2017-12-14 19:05:04.236 ksinstall[15043/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer starting Installation.
- 2017-12-14 19:05:07 ksinstall[15043] 2017-12-14 19:05:07.722 ksinstall[15043/0xa9a9a1c0] [lvl=2] -[KeystoneInstallTool main] Google Software Update installer ran successfully.
- 2017-12-14 19:54:21 Tunnelblick[3834] currentIPInfo(Name): IP address info could not be fetched within 35.1 seconds; the error was 'Error Domain=NSURLErrorDomain Code=-1001 "The request timed out." UserInfo={NSUnderlyingError=0x6040006429d0 {Error Domain=kCFErrorDomainCFNetwork Code=-1001 "The request timed out." UserInfo={NSErrorFailingURLStringKey=https://tunnelblick.net/ipinfo, NSErrorFailingURLKey=https://tunnelblick.net/ipinfo, _kCFStreamErrorCodeKey=-2102, _kCFStreamErrorDomainKey=4, NSLocalizedDescription=The request timed out.}}, NSErrorFailingURLStringKey=https://tunnelblick.net/ipinfo, NSErrorFailingURLKey=https://tunnelblick.net/ipinfo, _kCFStreamErrorDomainKey=4, _kCFStreamErrorCodeKey=-2102, NSLocalizedDescription=The request timed out.}'; the response was '(null)'
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement