data not pulled after connecting to server after high sierra upgrade

47 views
Skip to first unread message

rct...@gmail.com

unread,
Jan 7, 2018, 9:25:44 AM1/7/18
to tunnelblick-discuss
Hello, I upgraded to High Sierra and tunnelblick stopped working immediately after.  I am able to connect to server but not retrieve data (websites do not load).  I do not have this issue with private internet access program which are the servers I am connecting to with tunnelblick. PLease help. Log below.


*Tunnelblick: OS X 10.13.2; Tunnelblick 3.7.4b (build 4921); prior version 3.7.4a (build 4920); Admin user

Console Log:

2018-01-07 07:37:20 Tunnelblick[1465] Keychain item retrieved successfully for service = 'Tunnelblick-Auth-Group-Common' account = 'username'
2018-01-07 07:37:20 Tunnelblick[1465] Keychain item retrieved successfully for service = 'Tunnelblick-Auth-Group-Common' account = 'password'
2018-01-07 07:40:27 Tunnelblick[1465] Keychain item retrieved successfully for service = 'Tunnelblick-Auth-Group-Common' account = 'username'
2018-01-07 07:40:27 Tunnelblick[1465] Keychain item retrieved successfully for service = 'Tunnelblick-Auth-Group-Common' account = 'password'
2018-01-07 07:41:33 Tunnelblick[1465] Keychain item retrieved successfully for service = 'Tunnelblick-Auth-Group-Common' account = 'username'
2018-01-07 07:41:33 Tunnelblick[1465] Keychain item retrieved successfully for service = 'Tunnelblick-Auth-Group-Common' account = 'password'
2018-01-07 07:43:03 Tunnelblick[1465] Sparkle: ===== Tunnelblick.app =====
2018-01-07 07:43:03 Tunnelblick[1465] Sparkle: Verified appcast signature
2018-01-07 07:53:55 Tunnelblick[1465] Keychain item retrieved successfully for service = 'Tunnelblick-Auth-Group-Common' account = 'privateKey'
2018-01-07 09:01:58 Tunnelblick[1465] Sparkle: Verified appcast signature
2018-01-07 09:04:01 Tunnelblick[1465] Keychain item retrieved successfully for service = 'Tunnelblick-Auth-Group-Common' account = 'username'
2018-01-07 09:04:01 Tunnelblick[1465] Keychain item retrieved successfully for service = 'Tunnelblick-Auth-Group-Common' account = 'password'
2018-01-07 09:04:36 Tunnelblick[1465] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-07 09:04:36 Tunnelblick[1465] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-07 09:05:09 Tunnelblick[1465] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-07 09:05:09 Tunnelblick[1465] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'

rct...@gmail.com

unread,
Jan 8, 2018, 2:27:03 PM1/8/18
to tunnelblick-discuss
here is diagnostic log

*Tunnelblick: OS X 10.13.2; Tunnelblick 3.7.4b (build 4921); prior version 3.7.4a (build 4920); Admin user
git commit 88763bb2b2bfcc7debb3ddc78cdf5a350722717c


Configuration US East

"Sanitized" condensed configuration file for /Library/Application Support/Tunnelblick/Shared/US East.tblk:

client
dev tun
proto udp
resolv-retry infinite
nobind
persist-key
persist-tun
cipher aes-256-cbc
auth sha1
tls-client
remote-cert-tls server
auth-user-pass
comp-lzo
verb 1
reneg-sec 0
crl-verify crl.rsa.2048.pem
ca ca.rsa.2048.crt
disable-occ


================================================================================

Non-Apple kexts that are loaded:

Index Refs Address            Size       Wired      Name (Version) UUID <Linked Against>
  159    0 0xffffff7f85ab2000 0x3000     0x3000     com.avast.PacketForwarder (2.1) FB6F892E-E391-377D-9D46-A5F25E3C6675 <4 1>
  160    0 0xffffff7f85ab5000 0x88000    0x88000    com.avast.FileShield (4.0.0) BD8F6230-57BD-35CA-901E-1D3BD97C7BE4 <5 4 1>

================================================================================

There are no unusual files in US East.tblk

================================================================================

Configuration preferences:

-routeAllTrafficThroughVpn = 1
-keychainHasUsernameAndPassword = 1
-notOKToCheckThatIPAddressDidNotChangeAfterConnection = 1
-keepConnected = 1
-doNotDisconnectOnSleep = 1
-lastConnectionSucceeded = 1

================================================================================

Wildcard preferences:

-notOKToCheckThatIPAddressDidNotChangeAfterConnection = 1

================================================================================

Program preferences:

launchAtNextLogin = 1
notOKToCheckThatIPAddressDidNotChangeAfterConnection = 1
tunnelblickVersionHistory = (
    "3.7.4b (build 4921)",
    "3.7.4a (build 4920)",
    "3.7.4 (build 4900)",
    "3.7.3 (build 4880)",
    "3.7.2a (build 4851)",
    "3.7.2 (build 4850)",
    "3.7.1b (build 4813)",
    "3.7.1a (build 4812)"
)
statusDisplayNumber = 0
lastLaunchTime = 537128591.6613899
doNotShowConnectionSubmenus = 0
doNotShowSplashScreen = 1
showConnectedDurations = 0
lastLanguageAtLaunchWasRTL = 0
connectionWindowDisplayCriteria = neverShow
maxLogDisplaySize = 10485760
lastConnectedDisplayName = US East
keyboardShortcutIndex = 1
namedCredentialsThatAllConfigurationsUse = Common
updateCheckAutomatically = 1
NSWindow Frame SettingsSheetWindow = 611 157 829 524 0 0 1440 877 
NSWindow Frame ConnectingWindow = 754 579 412 297 0 0 1920 1057 
NSWindow Frame SUStatusFrame = 520 570 400 129 0 0 1440 877 
NSWindow Frame SUUpdateAlert = 410 373 620 392 0 0 1440 877 
detailsWindowFrameVersion = 4921
detailsWindowFrame = {{271, 304}, {920, 468}}
detailsWindowLeftFrame = {{0, 0}, {165, 350}}
detailsWindowViewIndex = 0
detailsWindowConfigurationsTabIdentifier = settings
leftNavSelectedDisplayName = US East
AdvancedWindowTabIdentifier = vpnCredentials
haveDealtWithOldTunTapPreferences = 1
haveDealtWithOldLoginItem = 1
SUEnableAutomaticChecks = 1
SUScheduledCheckInterval = 86400
SUSendProfileInfo = 0
SULastCheckTime = 2018-01-08 18:23:11 +0000
SUHasLaunchedBefore = 1
WebKitDefaultFontSize = 16
WebKitStandardFont = Times
askedUserIfOKToCheckThatIPAddressDidNotChangeAfterConnection = 1
haveDealtWithSparkle1dot5b6 = 1
updateSendProfileInfo = 0

================================================================================

Tunnelblick Log:

*Tunnelblick: OS X 10.13.2; Tunnelblick 3.7.4b (build 4921); prior version 3.7.4a (build 4920)
2018-01-08 14:25:22 *Tunnelblick: Attempting connection with US East; Set nameserver = 769; monitoring connection
2018-01-08 14:25:22 *Tunnelblick: openvpnstart start US\ East.tblk 1337 769 0 3 0 1065776 -ptADGNWradsgnw 2.4.4-openssl-1.0.2n
2018-01-08 14:25:22 *Tunnelblick: openvpnstart log:
     OpenVPN started successfully. Command used to start OpenVPN (one argument per displayed line):
     
          /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.4.4-openssl-1.0.2n/openvpn
          --daemon
          --log
          /Library/Application Support/Tunnelblick/Logs/-SLibrary-SApplication Support-STunnelblick-SShared-SUS East.tblk-SContents-SResources-Sconfig.ovpn.769_0_3_0_1065776.1337.openvpn.log
          --cd
          /Library/Application Support/Tunnelblick/Shared/US East.tblk/Contents/Resources
          --setenv
          IV_GUI_VER
          "net.tunnelblick.tunnelblick 4921 3.7.4b (build 4921)"
          --verb
          3
          --config
          /Library/Application Support/Tunnelblick/Shared/US East.tblk/Contents/Resources/config.ovpn
          --verb
          3
          --cd
          /Library/Application Support/Tunnelblick/Shared/US East.tblk/Contents/Resources
          --management
          127.0.0.1
          1337
          --management-query-passwords
          --management-hold
          --redirect-gateway
          def1
          --script-security
          2
          --up
          /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw
          --down
          /Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw

2018-01-08 14:25:22 OpenVPN 2.4.4 x86_64-apple-darwin [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Dec  7 2017
2018-01-08 14:25:22 library versions: OpenSSL 1.0.2n  7 Dec 2017, LZO 2.10
2018-01-08 14:25:22 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:1337
2018-01-08 14:25:22 Need hold release from management interface, waiting...
2018-01-08 14:25:22 *Tunnelblick: openvpnstart starting OpenVPN
2018-01-08 14:25:23 *Tunnelblick: Established communication with OpenVPN
2018-01-08 14:25:23 *Tunnelblick: Obtained VPN username and password from the Keychain
2018-01-08 14:25:23 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:1337
2018-01-08 14:25:23 MANAGEMENT: CMD 'pid'
2018-01-08 14:25:23 MANAGEMENT: CMD 'state on'
2018-01-08 14:25:23 MANAGEMENT: CMD 'state'
2018-01-08 14:25:23 MANAGEMENT: CMD 'bytecount 1'
2018-01-08 14:25:23 MANAGEMENT: CMD 'hold release'
2018-01-08 14:25:23 MANAGEMENT: CMD 'username "Auth" "p5753268"'
2018-01-08 14:25:23 MANAGEMENT: CMD 'password [...]'
2018-01-08 14:25:23 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2018-01-08 14:25:23 MANAGEMENT: >STATE:1515439523,RESOLVE,,,,,,
2018-01-08 14:25:23 TCP/UDP: Preserving recently used remote address: [AF_INET]66.55.144.251:1198
2018-01-08 14:25:23 Socket Buffers: R=[196724->196724] S=[9216->9216]
2018-01-08 14:25:23 UDP link local: (not bound)
2018-01-08 14:25:23 UDP link remote: [AF_INET]66.55.144.251:1198
2018-01-08 14:25:23 MANAGEMENT: >STATE:1515439523,WAIT,,,,,,
2018-01-08 14:25:23 MANAGEMENT: >STATE:1515439523,AUTH,,,,,,
2018-01-08 14:25:23 TLS: Initial packet from [AF_INET]66.55.144.251:1198, sid=9f4b9f9c 16ba294e
2018-01-08 14:25:23 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2018-01-08 14:25:23 VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=sec...@privateinternetaccess.com
2018-01-08 14:25:23 VERIFY KU OK
2018-01-08 14:25:23 Validating certificate extended key usage
2018-01-08 14:25:23 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2018-01-08 14:25:23 VERIFY EKU OK
2018-01-08 14:25:23 VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=da0555f5d84e9a1610bf00672e14f4d7, name=da0555f5d84e9a1610bf00672e14f4d7
2018-01-08 14:25:23 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
2018-01-08 14:25:23 [da0555f5d84e9a1610bf00672e14f4d7] Peer Connection Initiated with [AF_INET]66.55.144.251:1198
2018-01-08 14:25:24 MANAGEMENT: >STATE:1515439524,GET_CONFIG,,,,,,
2018-01-08 14:25:24 SENT CONTROL [da0555f5d84e9a1610bf00672e14f4d7]: 'PUSH_REQUEST' (status=1)
2018-01-08 14:25:24 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.40.10.1,topology net30,ifconfig 10.40.10.6 10.40.10.5,auth-token'
2018-01-08 14:25:24 OPTIONS IMPORT: timers and/or timeouts modified
2018-01-08 14:25:24 OPTIONS IMPORT: compression parms modified
2018-01-08 14:25:24 OPTIONS IMPORT: --ifconfig/up options modified
2018-01-08 14:25:24 OPTIONS IMPORT: route options modified
2018-01-08 14:25:24 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2018-01-08 14:25:24 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
2018-01-08 14:25:24 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
2018-01-08 14:25:24 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
2018-01-08 14:25:24 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
2018-01-08 14:25:24 Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
2018-01-08 14:25:24 Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
2018-01-08 14:25:24 Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)
2018-01-08 14:25:24 Opened utun device utun3
2018-01-08 14:25:24 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
2018-01-08 14:25:24 MANAGEMENT: >STATE:1515439524,ASSIGN_IP,,10.40.10.6,,,,
2018-01-08 14:25:24 /sbin/ifconfig utun3 delete
                                        ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address
2018-01-08 14:25:24 NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
2018-01-08 14:25:24 /sbin/ifconfig utun3 10.40.10.6 10.40.10.5 mtu 1500 netmask 255.255.255.255 up
2018-01-08 14:25:24 /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw utun3 1500 1558 10.40.10.6 10.40.10.5 init
                                        **********************************************
                                        Start of output from client.up.tunnelblick.sh
                                        Disabled IPv6 for 'Bluetooth PAN'
                                        Disabled IPv6 for 'LPSS Serial Adapter (1)'
                                        Disabled IPv6 for 'LPSS Serial Adapter (2)'
                                        Disabled IPv6 for 'Thunderbolt Ethernet'
                                        Disabled IPv6 for 'Apple USB Ethernet Adapter'
                                        Disabled IPv6 for 'iPhone USB'
                                        Disabled IPv6 for 'Wi-Fi'
                                        Disabled IPv6 for 'Thunderbolt Bridge'
                                        Disabled IPv6 for 'Private Internet Access L2TP'
                                        Retrieved from OpenVPN: name server(s) [ 209.222.18.222 209.222.18.218 ], search domain(s) [  ] and SMB server(s) [  ] and using default domain name [ openvpn ]
                                        WARNING: Ignoring ServerAddresses '209.222.18.222 209.222.18.218' because ServerAddresses was set manually and '-allowChangesToManuallySetNetworkSettings' was not specified
                                        Setting search domains to 'openvpn' because running under OS X 10.6 or higher and the search domains were not set manually (or are allowed to be changed) and 'Prepend domain name to search domains' was not selected
                                        Saved the DNS and SMB configurations so they can be restored
                                        Did not change DNS ServerAddresses setting of '209.222.18.222 209.222.18.218' (but re-set it)
                                        Changed DNS SearchDomains setting from '' to 'openvpn'
                                        Changed DNS DomainName setting from 'home' to 'openvpn'
                                        Did not change SMB NetBIOSName setting of ''
                                        Did not change SMB Workgroup setting of ''
                                        Did not change SMB WINSAddresses setting of ''
                                        DNS servers '209.222.18.222 209.222.18.218' were set manually
                                        DNS servers '209.222.18.222 209.222.18.218' will be used for DNS queries when the VPN is active
                                        NOTE: The DNS servers do not include any free public DNS servers known to Tunnelblick. This may cause DNS queries to fail or be intercepted or falsified even if they are directed through the VPN. Specify only known public DNS servers or DNS servers located on the VPN network to avoid such problems.
                                        Flushed the DNS cache via dscacheutil
                                        /usr/sbin/discoveryutil not present. Not flushing the DNS cache via discoveryutil
                                        Notified mDNSResponder that the DNS cache was flushed
                                        Setting up to monitor system configuration with process-network-changes
                                        End of output from client.up.tunnelblick.sh
                                        **********************************************
2018-01-08 14:25:29 *Tunnelblick: No 'connected.sh' script to execute
2018-01-08 14:25:29 /sbin/route add -net 66.55.144.251 10.135.92.31 255.255.255.255
                                        add net 66.55.144.251: gateway 10.135.92.31
2018-01-08 14:25:29 /sbin/route add -net 0.0.0.0 10.40.10.5 128.0.0.0
                                        add net 0.0.0.0: gateway 10.40.10.5
2018-01-08 14:25:29 /sbin/route add -net 128.0.0.0 10.40.10.5 128.0.0.0
                                        add net 128.0.0.0: gateway 10.40.10.5
2018-01-08 14:25:29 MANAGEMENT: >STATE:1515439529,ADD_ROUTES,,,,,,
2018-01-08 14:25:29 /sbin/route add -net 10.40.10.1 10.40.10.5 255.255.255.255
                                        add net 10.40.10.1: gateway 10.40.10.5
2018-01-08 14:25:29 Initialization Sequence Completed
2018-01-08 14:25:29 MANAGEMENT: >STATE:1515439529,CONNECTED,SUCCESS,10.40.10.6,66.55.144.251,1198,,
2018-01-08 14:25:36 Authenticate/Decrypt packet error: cipher final failed
2018-01-08 14:25:55 *Tunnelblick: Disconnecting; VPN Details… window disconnect button pressed
2018-01-08 14:25:55 *Tunnelblick: No 'pre-disconnect.sh' script to execute
2018-01-08 14:25:55 *Tunnelblick: Disconnecting using 'kill'
2018-01-08 14:25:55 event_wait : Interrupted system call (code=4)
2018-01-08 14:25:55 /sbin/route delete -net 10.40.10.1 10.40.10.5 255.255.255.255
                                        delete net 10.40.10.1: gateway 10.40.10.5
2018-01-08 14:25:55 /sbin/route delete -net 66.55.144.251 10.135.92.31 255.255.255.255
                                        delete net 66.55.144.251: gateway 10.135.92.31
2018-01-08 14:25:55 /sbin/route delete -net 0.0.0.0 10.40.10.5 128.0.0.0
                                        delete net 0.0.0.0: gateway 10.40.10.5
2018-01-08 14:25:55 /sbin/route delete -net 128.0.0.0 10.40.10.5 128.0.0.0
                                        delete net 128.0.0.0: gateway 10.40.10.5
2018-01-08 14:25:55 Closing TUN/TAP interface
2018-01-08 14:25:55 /Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw utun3 1500 1558 10.40.10.6 10.40.10.5 init
                                        **********************************************
                                        Start of output from client.down.tunnelblick.sh
                                        Cancelled monitoring of system configuration changes
                                        Restored the DNS and SMB configurations
                                        Re-enabled IPv6 (automatic) for 'Bluetooth PAN'
                                        Re-enabled IPv6 (automatic) for 'LPSS Serial Adapter (1)'
                                        Re-enabled IPv6 (automatic) for 'LPSS Serial Adapter (2)'
                                        Re-enabled IPv6 (automatic) for 'Thunderbolt Ethernet'
                                        Re-enabled IPv6 (automatic) for 'Apple USB Ethernet Adapter'
                                        Re-enabled IPv6 (automatic) for 'iPhone USB'
                                        Re-enabled IPv6 (automatic) for 'Wi-Fi'
                                        Re-enabled IPv6 (automatic) for 'Thunderbolt Bridge'
                                        Re-enabled IPv6 (automatic) for 'Private Internet Access L2TP'
                                        Flushed the DNS cache via dscacheutil
                                        /usr/sbin/discoveryutil not present. Not flushing the DNS cache via discoveryutil
                                        Notified mDNSResponder that the DNS cache was flushed
                                        End of output from client.down.tunnelblick.sh
                                        **********************************************
2018-01-08 14:25:57 SIGTERM[hard,] received, process exiting
2018-01-08 14:25:57 MANAGEMENT: >STATE:1515439557,EXITING,SIGTERM,,,,,
2018-01-08 14:25:57 *Tunnelblick: No 'post-disconnect.sh' script to execute
2018-01-08 14:25:57 *Tunnelblick: Expected disconnection occurred.

================================================================================

"Sanitized" full configuration file

client
dev tun
proto udp
resolv-retry infinite
nobind
persist-key
persist-tun
cipher aes-256-cbc
auth sha1
tls-client
remote-cert-tls server
auth-user-pass
comp-lzo
verb 1
reneg-sec 0
crl-verify crl.rsa.2048.pem
ca ca.rsa.2048.crt
disable-occ



================================================================================

ifconfig output:

lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
options=1203<RXCSUM,TXCSUM,TXSTATUS,SW_TIMESTAMP>
inet 127.0.0.1 netmask 0xff000000 
inet6 ::1 prefixlen 128 
inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1 
nd6 options=201<PERFORMNUD,DAD>
gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280
stf0: flags=0<> mtu 1280
XHC1: flags=0<> mtu 0
XHC0: flags=0<> mtu 0
XHC20: flags=0<> mtu 0
en3: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
options=60<TSO4,TSO6>
ether a2:00:a4:20:53:01 
media: autoselect <full-duplex>
status: inactive
en1: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
options=60<TSO4,TSO6>
ether a2:00:a4:20:53:00 
media: autoselect <full-duplex>
status: inactive
en4: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
options=60<TSO4,TSO6>
ether a2:00:a4:20:53:05 
media: autoselect <full-duplex>
status: inactive
en2: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
options=60<TSO4,TSO6>
ether a2:00:a4:20:53:04 
media: autoselect <full-duplex>
status: inactive
en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
ether 78:4f:43:4f:ee:3c 
inet 10.135.92.146 netmask 0xffffff00 broadcast 10.135.92.255
inet6 fe80::1c94:4085:4ed0:cefc%en0 prefixlen 64 secured scopeid 0xc 
nd6 options=201<PERFORMNUD,DAD>
media: autoselect
status: active
p2p0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 2304
ether 0a:4f:43:4f:ee:3c 
media: autoselect
status: inactive
awdl0: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1484
ether 4e:3f:a1:aa:3b:17 
inet6 fe80::4c3f:a1ff:feaa:3b17%awdl0 prefixlen 64 scopeid 0xe 
nd6 options=201<PERFORMNUD,DAD>
media: autoselect
status: active
bridge0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
options=63<RXCSUM,TXCSUM,TSO4,TSO6>
ether a2:00:a4:20:53:00 
Configuration:
id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0
maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200
root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0
ipfilter disabled flags 0x2
member: en1 flags=3<LEARNING,DISCOVER>
        ifmaxaddr 0 port 9 priority 0 path cost 0
member: en2 flags=3<LEARNING,DISCOVER>
        ifmaxaddr 0 port 11 priority 0 path cost 0
member: en3 flags=3<LEARNING,DISCOVER>
        ifmaxaddr 0 port 8 priority 0 path cost 0
member: en4 flags=3<LEARNING,DISCOVER>
        ifmaxaddr 0 port 10 priority 0 path cost 0
nd6 options=201<PERFORMNUD,DAD>
media: <unknown type>
status: inactive
utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 2000
inet6 fe80::6bb6:8e2c:bef3:86e4%utun0 prefixlen 64 scopeid 0x10 
nd6 options=201<PERFORMNUD,DAD>
utun1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380
inet6 fe80::6a58:c156:6e69:8c78%utun1 prefixlen 64 scopeid 0x11 
nd6 options=201<PERFORMNUD,DAD>
utun2: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380
inet6 fe80::ca7:ddfc:ea77:2aa2%utun2 prefixlen 64 scopeid 0x12 
nd6 options=201<PERFORMNUD,DAD>
en5: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
ether ac:de:48:00:11:22 
inet6 fe80::aede:48ff:fe00:1122%en5 prefixlen 64 scopeid 0x7 
nd6 options=201<PERFORMNUD,DAD>
media: autoselect
status: active

================================================================================

Console Log:

2018-01-08 13:17:58 Tunnelblick[26376] Keychain item retrieved successfully for service = 'Tunnelblick-Auth-Group-Common' account = 'username'
2018-01-08 13:17:58 Tunnelblick[26376] Keychain item retrieved successfully for service = 'Tunnelblick-Auth-Group-Common' account = 'password'
2018-01-08 13:19:11 Tunnelblick[26376] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-08 13:19:35 Tunnelblick[26376] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-08 13:20:19 Tunnelblick[26376] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-08 13:20:20 Tunnelblick[26376] Keychain item retrieved successfully for service = 'Tunnelblick-Auth-Group-Common' account = 'username'
2018-01-08 13:20:20 Tunnelblick[26376] Keychain item retrieved successfully for service = 'Tunnelblick-Auth-Group-Common' account = 'username'
2018-01-08 13:20:32 Tunnelblick[26376] Can't find Keychain item to delete for service = 'Tunnelblick-Auth-Group-Common' account = 'password' because it does not exist
2018-01-08 13:20:51 Tunnelblick[26376] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-08 13:22:31 Tunnelblick[26376] Can't find Keychain item to delete for service = 'Tunnelblick-Auth-Group-Common' account = 'username' because it does not exist
2018-01-08 13:22:31 Tunnelblick[26376] Can't find Keychain item to delete for service = 'Tunnelblick-Auth-Group-Common' account = 'password' because it does not exist
2018-01-08 13:22:51 Tunnelblick[26376] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-08 13:23:03 Tunnelblick[26376] applicationShouldTerminate: termination because of Quit; delayed until 'shutdownTunnelblick' finishes
2018-01-08 13:23:05 Tunnelblick[26376] pthread_mutex_lock( &unloadKextsMutex ) failed; status = 16, errno = 2
2018-01-08 13:23:06 Tunnelblick[26376] Finished shutting down Tunnelblick; allowing termination
2018-01-08 13:23:09 Tunnelblick[36044] Tunnelblick: OS X 10.13.2; Tunnelblick 3.7.4b (build 4921)
2018-01-08 13:23:09 Tunnelblick[36044] Warning: preferences contain unknown preference 'userAgreementVersionAgreedTo'
2018-01-08 13:23:11 Tunnelblick[36044] Sparkle: ===== Tunnelblick.app =====
2018-01-08 13:23:11 Tunnelblick[36044] Sparkle: Verified appcast signature
2018-01-08 13:23:50 Tunnelblick[36044] Keychain item retrieved successfully for service = 'Tunnelblick-Auth-Group-Common' account = 'username'
2018-01-08 13:23:50 Tunnelblick[36044] Keychain item retrieved successfully for service = 'Tunnelblick-Auth-Group-Common' account = 'password'
2018-01-08 13:24:34 Tunnelblick[36044] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-08 13:26:33 Tunnelblick[36044] Keychain item retrieved successfully for service = 'Tunnelblick-Auth-Group-Common' account = 'username'
2018-01-08 13:26:33 Tunnelblick[36044] Keychain item retrieved successfully for service = 'Tunnelblick-Auth-Group-Common' account = 'username'
2018-01-08 13:26:43 Tunnelblick[36044] Can't find Keychain item to delete for service = 'Tunnelblick-Auth-Group-Common' account = 'password' because it does not exist
2018-01-08 13:27:10 Tunnelblick[36044] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-08 13:27:10 Tunnelblick[36044] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-08 13:27:10 Tunnelblick[36044] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-08 13:27:10 Tunnelblick[36044] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-08 13:27:10 Tunnelblick[36044] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-08 13:27:19 Tunnelblick[36044] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-08 13:27:19 Tunnelblick[36044] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-08 13:27:19 Tunnelblick[36044] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-08 13:27:19 Tunnelblick[36044] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-08 13:27:19 Tunnelblick[36044] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-08 14:25:23 Tunnelblick[36044] Keychain item retrieved successfully for service = 'Tunnelblick-Auth-Group-Common' account = 'username'
2018-01-08 14:25:23 Tunnelblick[36044] Keychain item retrieved successfully for service = 'Tunnelblick-Auth-Group-Common' account = 'password'
2018-01-08 14:25:42 Tunnelblick[36044] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-08 14:25:42 Tunnelblick[36044] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-08 14:25:42 Tunnelblick[36044] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-08 14:25:42 Tunnelblick[36044] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-08 14:25:42 Tunnelblick[36044] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'
2018-01-08 14:25:42 Tunnelblick[36044] stringContainingRelevantConsoleLogEntries: string = nil; keyString = 'Message'

Tunnelblick developer

unread,
Jan 8, 2018, 2:55:13 PM1/8/18
to tunnelblick-discuss
You don't have your configuration set up to check the apparent public IP address before and after connecting, and your DNS setup is unusual, so it is hard to know what's going on (whether this is a DNS or a routing problem, for example).

I say your DNS setup is unusual because the logs show:

Retrieved from OpenVPN: name server(s) [ 209.222.18.222 209.222.18.218 ], search domain(s) [  ] and SMB server(s) [  ] and using default domain name [ openvpn ]
WARNING: Ignoring ServerAddresses '209.222.18.222 209.222.18.218' because ServerAddresses was set manually and '-allowChangesToManuallySetNetworkSettings' was not specified
and later
Did not change DNS ServerAddresses setting of '209.222.18.222 209.222.18.218' (but re-set it)

Together these entries mean that you had manually set (or some other program had set) the DNS to 209.222.18.222, which is a PIA nameserver. That's unusual; more commonly your nameserver is a public nameserver (Google, OpenDNS, etc.), or a nameserver specified by DHCP (typically a nameserver from your ISP).

You also seem to have a very complex hardware networking setup, with five Ethernet interfaces and four utun interfaces. I wonder if some program (maybe Tunnelblick, maybe PIA, maybe something else) is interfering with things.

I don't really have anything to suggest for such a complex networking environment. You might want to try disabling your Avast "security shield", which may be the cause of some of the complexity.

On Monday, January 8, 2018 at 2:27:03 PM UTC-5, <> wrote:
here is diagnostic log

*Tunnelblick: OS X 10.13.2; Tunnelblick 3.7.4b (build 4921); prior version 3.7.4a (build 4920); Admin user
git commit 88763bb2b2bfcc7debb3ddc78cdf5a350722717c
<snip>

rct...@gmail.com

unread,
Jan 8, 2018, 3:07:47 PM1/8/18
to tunnelblick-discuss
Thank you for the response.  I want all my traffic to go through Private Internet Access which is my VPN provider.  This configuration was working fine prior to high sierra upgrade.  I did not change anything else on my system prior to experiencing this issue.  I enabled "check the apparent public IP address before and after connecting" and retried, same issue. I disabled avast and it's still not working.  THe network adapters are just hotspots and other things I have used once.

Tunnelblick developer

unread,
Jan 8, 2018, 3:10:54 PM1/8/18
to tunnelblick-discuss
The reason for using "check the apparent public IP address" is to get the information that it provides in the logs, not to try to get the connection to work.

I'm sorry, but I don't think I can help you; maybe someone else can. You could try PIA, but they'd probably just tell you to use their app.
Reply all
Reply to author
Forward
0 new messages