Mac - This computer's apparent public IP address was not different after connecting to

807 views
Skip to first unread message

cas...@gmail.com

unread,
Feb 6, 2019, 3:02:00 PM2/6/19
to tunnelblick-discuss

OSX 10.14 here's the log:



*Tunnelblick: macOS 10.14.0; Tunnelblick 3.7.9beta02 (build 5200); prior version 3.7.8 (build 5180)

2019-02-06 11:25:56 *Tunnelblick: Attempting connection with Trust.Zone-United-States-UT using shadow copy; Set nameserver = 769; monitoring connection

2019-02-06 11:25:56 *Tunnelblick: openvpnstart start Trust.Zone-United-States-UT.tblk 64040 769 0 1 0 1065776 -ptADGNWradsgnw 2.4.6-openssl-1.0.2q

2019-02-06 11:25:56 *Tunnelblick: openvpnstart starting OpenVPN

2019-02-06 11:25:57 *Tunnelblick: openvpnstart log:

     OpenVPN started successfully. Command used to start OpenVPN (one argument per displayed line):

     

          /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.4.6-openssl-1.0.2q/openvpn

          --daemon

          --log /Library/Application Support/Tunnelblick/Logs/-SUsers-Slesigh-SLibrary-SApplication Support-STunnelblick-SConfigurations-STrust.Zone--United--States--UT.tblk-SContents-SResources-Sconfig.ovpn.769_0_1_0_1065776.64040.openvpn.log

          --cd /Library/Application Support/Tunnelblick/Users/lesigh/Trust.Zone-United-States-UT.tblk/Contents/Resources

          --setenv IV_GUI_VER "net.tunnelblick.tunnelblick 5200 3.7.9beta02 (build 5200)"

          --verb 3

          --config /Library/Application Support/Tunnelblick/Users/lesigh/Trust.Zone-United-States-UT.tblk/Contents/Resources/config.ovpn

          --setenv TUNNELBLICK_CONFIG_FOLDER /Library/Application Support/Tunnelblick/Users/lesigh/Trust.Zone-United-States-UT.tblk/Contents/Resources

          --verb 3

          --cd /Library/Application Support/Tunnelblick/Users/lesigh/Trust.Zone-United-States-UT.tblk/Contents/Resources

          --management 127.0.0.1 64040 /Library/Application Support/Tunnelblick/gaecfhmgibbanjgjkhikaeajpibmpjfphboipmml.mip

          --management-query-passwords

          --management-hold

          --redirect-gateway def1

          --script-security 2

          --up /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw

          --down /Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw


2019-02-06 11:25:57 *Tunnelblick: Established communication with OpenVPN

2019-02-06 11:25:57 *Tunnelblick: Obtained VPN username and password from the Keychain

2019-02-06 11:25:57 OpenVPN 2.4.6 x86_64-apple-darwin [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Jan 10 2019

2019-02-06 11:25:57 library versions: OpenSSL 1.0.2q  20 Nov 2018, LZO 2.10

2019-02-06 11:25:57 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:64040

2019-02-06 11:25:57 Need hold release from management interface, waiting...

2019-02-06 11:25:57 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:64040

2019-02-06 11:25:57 MANAGEMENT: CMD 'pid'

2019-02-06 11:25:57 MANAGEMENT: CMD 'auth-retry interact'

2019-02-06 11:25:57 MANAGEMENT: CMD 'state on'

2019-02-06 11:25:57 MANAGEMENT: CMD 'state'

2019-02-06 11:25:57 MANAGEMENT: CMD 'bytecount 1'

2019-02-06 11:25:57 MANAGEMENT: CMD 'hold release'

2019-02-06 11:25:57 MANAGEMENT: CMD 'username "Auth" "LRmWw"'

2019-02-06 11:25:57 MANAGEMENT: CMD 'password [...]'

2019-02-06 11:25:57 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts

2019-02-06 11:25:57 MANAGEMENT: >STATE:1549477557,RESOLVE,,,,,,

2019-02-06 11:25:57 TCP/UDP: Preserving recently used remote address: [AF_INET]185.109.20.10:443

2019-02-06 11:25:57 Socket Buffers: R=[131072->131072] S=[131072->131072]

2019-02-06 11:25:57 Attempting to establish TCP connection with [AF_INET]185.109.20.10:443 [nonblock]

2019-02-06 11:25:57 MANAGEMENT: >STATE:1549477557,TCP_CONNECT,,,,,,

2019-02-06 11:25:58 TCP connection established with [AF_INET]185.109.20.10:443

2019-02-06 11:25:58 TCP_CLIENT link local: (not bound)

2019-02-06 11:25:58 TCP_CLIENT link remote: [AF_INET]185.109.20.10:443

2019-02-06 11:25:58 MANAGEMENT: >STATE:1549477558,WAIT,,,,,,

2019-02-06 11:25:58 MANAGEMENT: >STATE:1549477558,AUTH,,,,,,

2019-02-06 11:25:58 TLS: Initial packet from [AF_INET]185.109.20.10:443, sid=7c8ee953 36a426df

2019-02-06 11:25:58 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this

2019-02-06 11:25:58 VERIFY X509NAME OK: CN=vpn.trust.zone

2019-02-06 11:25:58 VERIFY OK: depth=0, CN=vpn.trust.zone

2019-02-06 11:25:59 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA

2019-02-06 11:25:59 [vpn.trust.zone] Peer Connection Initiated with [AF_INET]185.109.20.10:443

2019-02-06 11:26:00 MANAGEMENT: >STATE:1549477560,GET_CONFIG,,,,,,

2019-02-06 11:26:00 SENT CONTROL [vpn.trust.zone]: 'PUSH_REQUEST' (status=1)

2019-02-06 11:26:01 PUSH: Received control message: 'PUSH_REPLY,ping 3,ping-restart 10,topology subnet,ifconfig 10.0.0.13 255.240.0.0,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route-gateway 10.0.0.1,redirect-gateway def1'

2019-02-06 11:26:01 OPTIONS IMPORT: timers and/or timeouts modified

2019-02-06 11:26:01 OPTIONS IMPORT: --ifconfig/up options modified

2019-02-06 11:26:01 OPTIONS IMPORT: route options modified

2019-02-06 11:26:01 OPTIONS IMPORT: route-related options modified

2019-02-06 11:26:01 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

2019-02-06 11:26:01 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

2019-02-06 11:26:01 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication

2019-02-06 11:26:01 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key

2019-02-06 11:26:01 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication

2019-02-06 11:26:01 Opening utun (connect(AF_SYS_CONTROL)): Resource busy (errno=16)

2019-02-06 11:26:01 Opened utun device utun1

2019-02-06 11:26:01 do_ifconfig, tt->did_ifconfig_ipv6_setup=0

2019-02-06 11:26:01 MANAGEMENT: >STATE:1549477561,ASSIGN_IP,,10.0.0.13,,,,

2019-02-06 11:26:01 /sbin/ifconfig utun1 delete

                                        ifconfig: ioctl (SIOCDIFADDR): Can't assign requested address

2019-02-06 11:26:01 NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure

2019-02-06 11:26:01 /sbin/ifconfig utun1 10.0.0.13 10.0.0.13 netmask 255.240.0.0 mtu 1500 up

2019-02-06 11:26:01 /sbin/route add -net 10.0.0.0 10.0.0.13 255.240.0.0

                                        add net 10.0.0.0: gateway 10.0.0.13

2019-02-06 11:26:01 /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw utun1 1500 1603 10.0.0.13 255.240.0.0 init

                                        **********************************************

                                        Start of output from client.up.tunnelblick.sh

                                        Retrieved from OpenVPN: name server(s) [ 109.236.87.2 144.217.75.55 8.8.8.8 8.8.4.4 ], search domain(s) [  ] and SMB server(s) [  ] and using default domain name [ openvpn ]

                                        Not aggregating ServerAddresses because running on macOS 10.6 or higher

                                        Setting search domains to 'openvpn' because the search domains were not set manually (or are allowed to be changed) and 'Prepend domain name to search domains' was not selected

                                        Saved the DNS and SMB configurations so they can be restored

                                        Changed DNS ServerAddresses setting from '10.0.0.1' to '109.236.87.2 144.217.75.55 8.8.8.8 8.8.4.4'

                                        Changed DNS SearchDomains setting from '' to 'openvpn'

                                        Changed DNS DomainName setting from 'hsd1.co.comcast.net.' to 'openvpn'

                                        Did not change SMB NetBIOSName setting of ''

                                        Did not change SMB Workgroup setting of ''

                                        Did not change SMB WINSAddresses setting of ''

                                        DNS servers '109.236.87.2 144.217.75.55 8.8.8.8 8.8.4.4' will be used for DNS queries when the VPN is active

                                        NOTE: The DNS servers include one or more free public DNS servers known to Tunnelblick and one or more DNS servers not known to Tunnelblick. If used, the DNS servers not known to Tunnelblick may cause DNS queries to fail or be intercepted or falsified even if they are directed through the VPN. Specify only known public DNS servers or DNS servers located on the VPN network to avoid such problems.

                                        Flushed the DNS cache via dscacheutil

                                        /usr/sbin/discoveryutil not present. Not flushing the DNS cache via discoveryutil

                                        Notified mDNSResponder that the DNS cache was flushed

                                        Not notifying mDNSResponderHelper that the DNS cache was flushed because it is not running

                                        Setting up to monitor system configuration with process-network-changes

                                        End of output from client.up.tunnelblick.sh

                                        **********************************************

2019-02-06 11:26:05 *Tunnelblick: No 'connected.sh' script to execute

2019-02-06 11:26:05 /sbin/route add -net 185.109.20.10 10.0.0.1 255.255.255.255

                                        add net 185.109.20.10: gateway 10.0.0.1

2019-02-06 11:26:05 /sbin/route add -net 0.0.0.0 10.0.0.1 128.0.0.0

                                        add net 0.0.0.0: gateway 10.0.0.1

2019-02-06 11:26:05 /sbin/route add -net 128.0.0.0 10.0.0.1 128.0.0.0

                                        add net 128.0.0.0: gateway 10.0.0.1

2019-02-06 11:26:05 Initialization Sequence Completed

2019-02-06 11:26:05 MANAGEMENT: >STATE:1549477565,CONNECTED,SUCCESS,10.0.0.13,185.109.20.10,443,10.0.0.3,49330

2019-02-06 11:26:10 *Tunnelblick process-network-changes: A system configuration change was ignored

2019-02-06 11:26:10 *Tunnelblick: This computer's apparent public IP address (72.76.251.135) was unchanged after the connection was made

Tunnelblick developer

unread,
Feb 6, 2019, 3:05:19 PM2/6/19
to tunnelblick-discuss
See https://groups.google.com/d/msg/tunnelblick-discuss/hOXvATkBK4U/6pUsQRG4GgAJ

(Apparently trust.zone is having problems. I've never heard of them before today, and already there are two reports of problems!)

cas...@gmail.com

unread,
Feb 6, 2019, 3:42:13 PM2/6/19
to tunnelblick-discuss
Ah okay thanks, oddly enough their service is working fine on openvpn's ios client just isnt working on my mac.

bear...@gmail.com

unread,
Feb 7, 2019, 3:27:06 PM2/7/19
to tunnelblick-discuss
I started having this same issue as well using Trust.Zone. It just started a couple of days ago. I contacted Trust.Zone and they said it's an issue with Tunnelblick. What is weird is I have been using Trust.Zone for years with zero issues and nothing about my computer changed. Out of the blue I stated getting this message about the IP address changing. This is really frustrating. I guess maybe if I switch to a different VPN service it might work.

bear...@gmail.com

unread,
Feb 7, 2019, 5:40:16 PM2/7/19
to tunnelblick-discuss
FYI. When I contacted Trust.Zone the first time they simply told me turn off the "checking for IP address change" lol. Yeah, like that is going to help leaving me totally vulnerable. I just signed with Express VPN and it worked like a charm. I was loyal to trust.zone for years but they just want to blame Tunnleblick (when absolutely nothing changed on the computer or Tunnelblick) and Tunnelblick developers are saying to contact the VPN. Here is the easy fix. Use a different VPN. I used Express VPN and it tool literally 5 minutes to connect and no bizarre configuration stuff to deal with. Boom. Nothing against Tunnelblick, it worked great for years.
Reply all
Reply to author
Forward
0 new messages