I am trying to use Tunnelblick with the OpenVPN configuration files that are prepared by Private Internet Access. For example:
us-east.ovpn:
=========================================================
client
dev tun
remote us-east.privateinternetaccess.com 1198 udp
remote us-east.privateinternetaccess.com 502 tcp
resolv-retry infinite
nobind
persist-key
persist-tun
setenv CLIENT_CERT 0
<ca>
-----BEGIN CERTIFICATE-----
[data removed]
-----END CERTIFICATE-----
</ca>
cipher aes-128-cbc
auth sha1
tls-client
remote-cert-tls server
auth-user-pass
comp-lzo
verb 1
reneg-sec 0
<crl-verify>
-----BEGIN X509 CRL-----
[data removed]
-----END X509 CRL-----
</crl-verify>
=========================================================
This is what I get:
=========================================================
*Tunnelblick: OS X 10.12.2; Tunnelblick 3.6.9 (build 4685)
2017-01-06 09:28:11 *Tunnelblick: Attempting connection with us-east; Set nameserver = 769; monitoring connection
2017-01-06 09:28:11 *Tunnelblick: openvpnstart start us-east.tblk 1337 769 0 3 0 1065264 -ptADGNWradsgnw 2.3.12-openssl-1.0.2j
2017-01-06 09:28:11 *Tunnelblick:
Could not start OpenVPN (openvpnstart returned with status #251)
Contents of the openvpnstart log:
*Tunnelblick: openvpnstart log:
OpenVPN returned with status 1, errno = 0:
Undefined error: 0
Command used to start OpenVPN (one argument per displayed line):
/Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.3.12-openssl-1.0.2j/openvpn
--daemon
--log
/Library/Application Support/Tunnelblick/Logs/-SLibrary-SApplication Support-STunnelblick-SShared-Sus--east.tblk-SContents-SResources-Sconfig.ovpn.769_0_3_0_1065264.1337.openvpn.log
--cd
/Library/Application Support/Tunnelblick/Shared/us-east.tblk/Contents/Resources
--verb
3
--config
/Library/Application Support/Tunnelblick/Shared/us-east.tblk/Contents/Resources/config.ovpn
--verb
3
--cd
/Library/Application Support/Tunnelblick/Shared/us-east.tblk/Contents/Resources
--management
127.0.0.1
1337
--management-query-passwords
--management-hold
--script-security
2
--up
/Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw
--down
/Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw
Contents of the OpenVPN log:
Options error: --crl-verify fails with '[[INLINE]]': No such file or directory
Options error: Please correct these errors.
Use --help for more information.
More details may be in the Console Log's "All Messages"
--crl-verify crl ['dir']Check peer certificate against the file crl in PEM format.A CRL (certificate revocation list) is used when a particular key is compromised but when the overall PKI is still intact.Suppose you had a PKI consisting of a CA, root certificate, and a number of client certificates. Suppose a laptop computer containing a client key and certificate was stolen. By adding the stolen certificate to the CRL file, you could reject any connection which attempts to use it, while preserving the overall integrity of the PKI.The only time when it would be necessary to rebuild the entire PKI from scratch would be if the root certificate key itself was compromised.If the optional dir flag is specified, enable a different mode where crl is a directory containing files named as revoked serial numbers (the files may be empty, the contents are never read). If a client requests a connection, where the client certificate serial number (decimal string) is the name of a file present in the directory, it will be rejected.Note: As the crl file (or directory) is read every time a peer connects, if you are dropping root privileges with --user, make sure that this user has sufficient privileges to read the file.
[dos] 7L, 146C
For a LF-only file, it just shows:
7L, 139C