Connection / Authorisation Problems (username/password) after update to Tunnelblick 4.0.1 (build 5971)

332 views
Skip to first unread message

Florian H.

unread,
Mar 18, 2024, 1:13:05 AMMar 18
to tunnelblick-discuss
Hello, I updated to Tunnelblick 4.0.1 (build 5971) and now I am receiving authentication error messages consistently. The username and password are not being accepted by the remote server.
Screenshot.png

My last backed up version was Tunnelblick 3.8.8g (build 5779.3). I am certain that I updated Tunnelblick to newer versions after that, but I am unsure of which was the latest working version. However, in version 4.0.1, I am encountering error messages consistently. I have checked everything and confirmed that the VPN server is functioning properly with other devices.

The logfile has some red marked error messages. I hope it helps for bugfix.
Kind regards, Florian

Logfiles (cleared):

###########################################
BEFORE CONNECTION (server address and private information is cleared)


2024-03-18 05:34:12.232484 *Tunnelblick: macOS 14.2.1 (23C71); Tunnelblick 4.0.1 (build 5971); prior version 3.8.8e (build 5779.1)
2024-03-18 05:34:13.214503 *Tunnelblick: Attempting connection with VPNConfig_new; Set nameserver = 0x00000301; monitoring connection
2024-03-18 05:34:13.214935 *Tunnelblick: openvpnstart start VPNConfig_new.tblk 55661 0x00000301 0 3 0 0x0200c330 -ptADGNWradsgnw 2.6.9-openssl-3.0.13 <password>
2024-03-18 05:34:13.237036 *Tunnelblick: openvpnstart starting OpenVPN
2024-03-18 05:34:13.767221 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
2024-03-18 05:34:13.767390 WARNING: You have specified redirect-gateway and redirect-private at the same time (or the same option multiple times). This is not well supported and may lead to unexpected results
2024-03-18 05:34:13.771254 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305). OpenVPN ignores --cipher for cipher negotiations.
2024-03-18 05:34:13.771542 OpenVPN 2.6.9 x86_64-apple-darwin [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD]
2024-03-18 05:34:13.771566 library versions: OpenSSL 3.0.13 30 Jan 2024, LZO 2.10
2024-03-18 05:34:13.773186 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:55661
2024-03-18 05:34:13.773270 Need hold release from management interface, waiting...
2024-03-18 05:34:14.481261 *Tunnelblick: openvpnstart log:
     OpenVPN started successfully.
     Command used to start OpenVPN (one argument per displayed line):
          /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.6.9-openssl-3.0.13/openvpn
          --daemon
          --log-append /Library/Application Support/Tunnelblick/Logs/-SLibrary-SApplication Support-STunnelblick-SShared-SVPNConfig_new.tblk-SContents-SResources-Sconfig.ovpn.769_0_3_0_33604400.55661.openvpn.log
          --cd /Library/Application Support/Tunnelblick/Shared/VPNConfig_new.tblk/Contents/Resources
          --machine-readable-output
          --setenv IV_GUI_VER "net.tunnelblick.tunnelblick 5971 4.0.1 (build 5971)"
          --verb 3
          --config /Library/Application Support/Tunnelblick/Shared/VPNConfig_new.tblk/Contents/Resources/config.ovpn
          --setenv TUNNELBLICK_CONFIG_FOLDER /Library/Application Support/Tunnelblick/Shared/VPNConfig_new.tblk/Contents/Resources
          --verb 3
          --cd /Library/Application Support/Tunnelblick/Shared/VPNConfig_new.tblk/Contents/Resources
          --management 127.0.0.1 55661 /Library/Application Support/Tunnelblick/Mips/VPNConfig_new.tblk.mip
          --setenv IV_SSO webauth
          --management-query-passwords
          --management-hold
          --redirect-gateway def1
          --script-security 2
          --route-up /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -d -f -m -w -ptADGNWradsgnw
          --down /Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh -d -f -m -w -ptADGNWradsgnw
2024-03-18 05:34:14.482506 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:52094
2024-03-18 05:34:14.617922 MANAGEMENT: CMD 'pid'
2024-03-18 05:34:14.618056 MANAGEMENT: CMD 'auth-retry interact'
2024-03-18 05:34:14.618105 MANAGEMENT: CMD 'state on'
2024-03-18 05:34:14.618159 MANAGEMENT: CMD 'state'
2024-03-18 05:34:14.618216 MANAGEMENT: CMD 'bytecount 1'
2024-03-18 05:34:14.626626 *Tunnelblick: Established communication with OpenVPN
2024-03-18 05:34:14.628546 *Tunnelblick: >INFO:OpenVPN Management Interface Version 5 -- type 'help' for more info
2024-03-18 05:34:14.629689 MANAGEMENT: CMD 'hold release'
2024-03-18 05:34:29.555622 *Tunnelblick: Disconnecting; user cancelled authorization
2024-03-18 05:34:29.700357 *Tunnelblick: Disconnecting using 'kill'
2024-03-18 05:34:29.871488 MANAGEMENT: Client disconnected
2024-03-18 05:34:29.871523 ERROR: could not read Auth username/password/ok/string from management interface
2024-03-18 05:34:29.871538 Exiting due to fatal error
2024-03-18 05:34:31.531296 *Tunnelblick: Expected disconnection occurred.




###########################################
AFTER CONNECTION (server address and private information is cleared)

2024-03-18 05:36:48.994336 *Tunnelblick: macOS 14.2.1 (23C71); Tunnelblick 4.0.1 (build 5971); prior version 3.8.8e (build 5779.1)
2024-03-18 05:36:49.446277 *Tunnelblick: Attempting connection with VPNConfig_new; Set nameserver = 0x00000301; monitoring connection
2024-03-18 05:36:49.447276 *Tunnelblick: openvpnstart start VPNConfig_new.tblk 56465 0x00000301 0 3 0 0x0200c330 -ptADGNWradsgnw 2.6.9-openssl-3.0.13 <password>
2024-03-18 05:36:49.470828 *Tunnelblick: openvpnstart starting OpenVPN
2024-03-18 05:36:50.080678 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
2024-03-18 05:36:50.080879 WARNING: You have specified redirect-gateway and redirect-private at the same time (or the same option multiple times). This is not well supported and may lead to unexpected results
2024-03-18 05:36:50.087569 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305). OpenVPN ignores --cipher for cipher negotiations.
2024-03-18 05:36:50.087887 OpenVPN 2.6.9 x86_64-apple-darwin [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD]
2024-03-18 05:36:50.087946 library versions: OpenSSL 3.0.13 30 Jan 2024, LZO 2.10
2024-03-18 05:36:50.089675 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:56465
2024-03-18 05:36:50.089776 Need hold release from management interface, waiting...
2024-03-18 05:36:50.712276 *Tunnelblick: openvpnstart log:
     OpenVPN started successfully.
     Command used to start OpenVPN (one argument per displayed line):
          /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.6.9-openssl-3.0.13/openvpn
          --daemon
          --log-append /Library/Application Support/Tunnelblick/Logs/-SLibrary-SApplication Support-STunnelblick-SShared-SVPNConfig_new.tblk-SContents-SResources-Sconfig.ovpn.769_0_3_0_33604400.56465.openvpn.log
          --cd /Library/Application Support/Tunnelblick/Shared/VPNConfig_new.tblk/Contents/Resources
          --machine-readable-output
          --setenv IV_GUI_VER "net.tunnelblick.tunnelblick 5971 4.0.1 (build 5971)"
          --verb 3
          --config /Library/Application Support/Tunnelblick/Shared/VPNConfig_new.tblk/Contents/Resources/config.ovpn
          --setenv TUNNELBLICK_CONFIG_FOLDER /Library/Application Support/Tunnelblick/Shared/VPNConfig_new.tblk/Contents/Resources
          --verb 3
          --cd /Library/Application Support/Tunnelblick/Shared/VPNConfig_new.tblk/Contents/Resources
          --management 127.0.0.1 56465 /Library/Application Support/Tunnelblick/Mips/VPNConfig_new.tblk.mip
          --setenv IV_SSO webauth
          --management-query-passwords
          --management-hold
          --redirect-gateway def1
          --script-security 2
          --route-up /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -d -f -m -w -ptADGNWradsgnw
          --down /Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh -d -f -m -w -ptADGNWradsgnw
2024-03-18 05:36:50.722107 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:52118
2024-03-18 05:36:50.767705 *Tunnelblick: Established communication with OpenVPN
2024-03-18 05:36:50.777388 MANAGEMENT: CMD 'pid'
2024-03-18 05:36:50.777458 MANAGEMENT: CMD 'auth-retry interact'
2024-03-18 05:36:50.777488 MANAGEMENT: CMD 'state on'
2024-03-18 05:36:50.777540 MANAGEMENT: CMD 'state'
2024-03-18 05:36:50.777585 MANAGEMENT: CMD 'bytecount 1'
2024-03-18 05:36:50.815532 *Tunnelblick: >INFO:OpenVPN Management Interface Version 5 -- type 'help' for more info
2024-03-18 05:36:50.817470 MANAGEMENT: CMD 'hold release'
2024-03-18 05:36:59.074724 MANAGEMENT: CMD 'username "Auth" „USERNAME“‘
2024-03-18 05:36:59.074790 MANAGEMENT: CMD 'password [...]'
2024-03-18 05:36:59.074942 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2024-03-18 05:36:59.074961 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2024-03-18 05:36:59.082499 MANAGEMENT: >STATE:1710736619,RESOLVE,,,,,,
2024-03-18 05:36:59.091811 TCP/UDP: Preserving recently used remote address: [AF_INET6]SERVER_ADDRESS
2024-03-18 05:36:59.091950 Socket Buffers: R=[786896->786896] S=[9216->9216]
2024-03-18 05:36:59.091978 UDPv6 link local: (not bound)
2024-03-18 05:36:59.091996 UDPv6 link remote: [AF_INET6]SERVER_ADDRESS
2024-03-18 05:36:59.092133 MANAGEMENT: >STATE:1710736619,WAIT,,,,,,
2024-03-18 05:36:59.206024 MANAGEMENT: >STATE:1710736619,AUTH,,,,,,
2024-03-18 05:36:59.206138 TLS: Initial packet from [AF_INET6]SERVER_ADDRESS, sid=34c6196c 7191c90f
2024-03-18 05:36:59.206346 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2024-03-18 05:36:59.306678 VERIFY OK: depth=2, C=US, O=Internet Security Research Group, CN=ISRG Root X1
2024-03-18 05:36:59.308861 VERIFY OK: depth=1, C=US, O=Let's Encrypt, CN=R3
2024-03-18 05:36:59.309312 VERIFY OK: depth=0, CN=SERVER_ADDRESS
2024-03-18 05:37:00.038187 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 3072 bits DH
2024-03-18 05:37:00.038260 [SERVER_ADDRESS] Peer Connection Initiated with [AF_INET6]SERVER_ADDRESS
2024-03-18 05:37:00.038288 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2024-03-18 05:37:00.038394 TLS: tls_multi_process: initial untrusted session promoted to trusted
2024-03-18 05:37:01.225954 MANAGEMENT: >STATE:1710736621,GET_CONFIG,,,,,,
2024-03-18 05:37:01.226150 SENT CONTROL [SERVER_ADDRESS]: 'PUSH_REQUEST' (status=1)
2024-03-18 05:37:01.298845 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route 10.8.0.0 255.255.255.0,route 10.8.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.8.0.6 10.8.0.5'
2024-03-18 05:37:01.299046 OPTIONS IMPORT: --ifconfig/up options modified
2024-03-18 05:37:01.299080 OPTIONS IMPORT: route options modified
2024-03-18 05:37:01.299108 OPTIONS ERROR: failed to negotiate cipher with server.  Add the server's cipher ('AES-256-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.
2024-03-18 05:37:01.299132 ERROR: Failed to apply push options
2024-03-18 05:37:01.299154 Failed to open tun/tap interface
2024-03-18 05:37:01.299591 SIGUSR1[soft,process-push-msg-failed] received, process restarting
2024-03-18 05:37:01.299655 MANAGEMENT: >STATE:1710736621,RECONNECTING,process-push-msg-failed,,,,,
2024-03-18 05:37:01.300814 MANAGEMENT: CMD 'hold release'
2024-03-18 05:37:01.300870 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2024-03-18 05:37:01.300885 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2024-03-18 05:37:01.302710 TCP/UDP: Preserving recently used remote address: [AF_INET]SERVER_ADDRESS
2024-03-18 05:37:01.302781 Socket Buffers: R=[786896->786896] S=[9216->9216]
2024-03-18 05:37:01.302798 UDPv4 link local: (not bound)
2024-03-18 05:37:01.302811 UDPv4 link remote: [AF_INET]SERVER_ADDRESS
2024-03-18 05:37:01.302845 MANAGEMENT: >STATE:1710736621,WAIT,,,,,,
2024-03-18 05:37:01.303139 MANAGEMENT: CMD 'hold release'
2024-03-18 05:37:01.376502 MANAGEMENT: >STATE:1710736621,AUTH,,,,,,
2024-03-18 05:37:01.376591 TLS: Initial packet from [AF_INET]SERVER_ADDRESS, sid=d4fda37a 7a7d6faf
2024-03-18 05:37:01.507192 VERIFY OK: depth=2, C=US, O=Internet Security Research Group, CN=ISRG Root X1
2024-03-18 05:37:01.507904 VERIFY OK: depth=1, C=US, O=Let's Encrypt, CN=R3
2024-03-18 05:37:01.508231 VERIFY OK: depth=0, CN=SERVER_ADDRESS
2024-03-18 05:37:02.391535 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 3072 bits DH
2024-03-18 05:37:02.391637 [SERVER_ADDRESS] Peer Connection Initiated with [AF_INET]SERVER_ADDRESS
2024-03-18 05:37:02.391678 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2024-03-18 05:37:02.391804 TLS: tls_multi_process: initial untrusted session promoted to trusted
2024-03-18 05:37:03.575879 MANAGEMENT: >STATE:1710736623,GET_CONFIG,,,,,,
2024-03-18 05:37:03.575939 SENT CONTROL [SERVER_ADDRESS]: 'PUSH_REQUEST' (status=1)
2024-03-18 05:37:03.642716 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route 10.8.0.0 255.255.255.0,route 10.8.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.8.0.10 10.8.0.9'
2024-03-18 05:37:03.642856 OPTIONS IMPORT: --ifconfig/up options modified
2024-03-18 05:37:03.642883 OPTIONS IMPORT: route options modified
2024-03-18 05:37:03.642904 OPTIONS ERROR: failed to negotiate cipher with server.  Add the server's cipher ('AES-256-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.
2024-03-18 05:37:03.642920 ERROR: Failed to apply push options
2024-03-18 05:37:03.642935 Failed to open tun/tap interface
2024-03-18 05:37:03.643354 SIGUSR1[soft,process-push-msg-failed] received, process restarting
2024-03-18 05:37:03.643406 MANAGEMENT: >STATE:1710736623,RECONNECTING,process-push-msg-failed,,,,,
2024-03-18 05:37:03.644492 MANAGEMENT: CMD 'hold release'
2024-03-18 05:37:03.644552 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2024-03-18 05:37:03.644570 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2024-03-18 05:37:03.646365 MANAGEMENT: >STATE:1710736623,RESOLVE,,,,,,
2024-03-18 05:37:03.648188 TCP/UDP: Preserving recently used remote address: [AF_INET6]SERVER_ADDRESS
2024-03-18 05:37:03.648250 Socket Buffers: R=[786896->786896] S=[9216->9216]
2024-03-18 05:37:03.648267 UDPv6 link local: (not bound)
2024-03-18 05:37:03.648280 UDPv6 link remote: [AF_INET6]SERVER_ADDRESS
2024-03-18 05:37:03.648310 MANAGEMENT: >STATE:1710736623,WAIT,,,,,,
2024-03-18 05:37:03.648602 MANAGEMENT: CMD 'hold release'
2024-03-18 05:37:03.724473 MANAGEMENT: >STATE:1710736623,AUTH,,,,,,
2024-03-18 05:37:03.724564 TLS: Initial packet from [AF_INET6]SERVER_ADDRESS, sid=043d6a80 67a57e65
2024-03-18 05:37:03.858010 VERIFY OK: depth=2, C=US, O=Internet Security Research Group, CN=ISRG Root X1
2024-03-18 05:37:03.858815 VERIFY OK: depth=1, C=US, O=Let's Encrypt, CN=R3
2024-03-18 05:37:03.859138 VERIFY OK: depth=0, CN=SERVER_ADDRESS
2024-03-18 05:37:04.541802 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 3072 bits DH
2024-03-18 05:37:04.541912 [SERVER_ADDRESS] Peer Connection Initiated with [AF_INET6]SERVER_ADDRESS
2024-03-18 05:37:04.541957 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2024-03-18 05:37:04.542078 TLS: tls_multi_process: initial untrusted session promoted to trusted
2024-03-18 05:37:05.635433 MANAGEMENT: >STATE:1710736625,GET_CONFIG,,,,,,
2024-03-18 05:37:05.635544 SENT CONTROL [SERVER_ADDRESS]: 'PUSH_REQUEST' (status=1)
2024-03-18 05:37:05.741489 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route 10.8.0.0 255.255.255.0,route 10.8.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.8.0.14 10.8.0.13'
2024-03-18 05:37:05.741619 OPTIONS IMPORT: --ifconfig/up options modified
2024-03-18 05:37:05.741644 OPTIONS IMPORT: route options modified
2024-03-18 05:37:05.741665 OPTIONS ERROR: failed to negotiate cipher with server.  Add the server's cipher ('AES-256-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.
2024-03-18 05:37:05.741681 ERROR: Failed to apply push options
2024-03-18 05:37:05.741696 Failed to open tun/tap interface
2024-03-18 05:37:05.742091 SIGUSR1[soft,process-push-msg-failed] received, process restarting
2024-03-18 05:37:05.742126 MANAGEMENT: >STATE:1710736625,RECONNECTING,process-push-msg-failed,,,,,
2024-03-18 05:37:05.743339 MANAGEMENT: CMD 'hold release'
2024-03-18 05:37:05.743397 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
2024-03-18 05:37:05.743418 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2024-03-18 05:37:05.744934 TCP/UDP: Preserving recently used remote address: [AF_INET]SERVER_ADDRESS
2024-03-18 05:37:05.745035 Socket Buffers: R=[786896->786896] S=[9216->9216]
2024-03-18 05:37:05.745062 UDPv4 link local: (not bound)
2024-03-18 05:37:05.745079 UDPv4 link remote: [AF_INET]SERVER_ADDRESS
2024-03-18 05:37:05.745113 MANAGEMENT: >STATE:1710736625,WAIT,,,,,,
2024-03-18 05:37:05.745401 MANAGEMENT: CMD 'hold release'
2024-03-18 05:37:05.809303 MANAGEMENT: >STATE:1710736625,AUTH,,,,,,
2024-03-18 05:37:05.809392 TLS: Initial packet from [AF_INET]SERVER_ADDRESS, sid=935f415c a0105d83
2024-03-18 05:37:05.935200 VERIFY OK: depth=2, C=US, O=Internet Security Research Group, CN=ISRG Root X1
2024-03-18 05:37:05.935922 VERIFY OK: depth=1, C=US, O=Let's Encrypt, CN=R3
2024-03-18 05:37:05.936246 VERIFY OK: depth=0, CN=SERVER_ADDRESS
2024-03-18 05:37:07.203927 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 3072 bits DH
2024-03-18 05:37:07.204032 [SERVER_ADDRESS] Peer Connection Initiated with [AF_INET]SERVER_ADDRESS
2024-03-18 05:37:07.204074 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2024-03-18 05:37:07.204174 TLS: tls_multi_process: initial untrusted session promoted to trusted
2024-03-18 05:37:08.432134 MANAGEMENT: >STATE:1710736628,GET_CONFIG,,,,,,
2024-03-18 05:37:08.432204 SENT CONTROL [SERVER_ADDRESS]: 'PUSH_REQUEST' (status=1)
2024-03-18 05:37:08.496928 AUTH: Received control message: AUTH_FAILED
2024-03-18 05:37:08.497368 SIGUSR1[soft,auth-failure] received, process restarting
2024-03-18 05:37:08.497409 MANAGEMENT: >STATE:1710736628,RECONNECTING,auth-failure,,,,,
2024-03-18 05:37:09.756326 *Tunnelblick: Disconnecting; user cancelled authorization or there was an error obtaining authorization
2024-03-18 05:37:09.900146 *Tunnelblick: Disconnecting using 'kill'
2024-03-18 05:37:10.067164 SIGTERM[hard,init_instance] received, process exiting
2024-03-18 05:37:10.067202 MANAGEMENT: >STATE:1710736630,EXITING,init_instance,,,,,
2024-03-18 05:37:11.980702 *Tunnelblick: Expected disconnection occurred.

Florian H.

unread,
Mar 18, 2024, 1:15:49 AMMar 18
to tunnelblick-discuss
OS: MacOS Sonoma 14.2.1 on MBP 2019 16"

Tunnelblick developer

unread,
Mar 18, 2024, 7:32:45 AMMar 18
to tunnelblick-discuss
Please see Tunnelblick 4.

If you encounter other problems, please post the Diagnostic Info by following the instructions at Before You Post.

Mark

unread,
Jul 2, 2024, 3:56:40 PMJul 2
to tunnelblick-discuss
I'm also having the same problems since upgrading to 4.0.1 this weekend.  No other changes made

Tunnelblick developer

unread,
Jul 2, 2024, 3:59:03 PMJul 2
to tunnelblick-discuss
Mark - "same problems" – same answer:

Please see Tunnelblick 4.

If you encounter other problems, please post the Diagnostic Info by following the instructions at Before You Post.

Reply all
Reply to author
Forward
0 new messages