*Tunnelblick: macOS 15.3.1 (24D70); Tunnelblick 6.0 (build 6160); prior version 4.0.1 (build 5971); Admin user
git commit 7a9fcf29ae3c5e2bc43627a065ea6f190a97d51c
The Tunnelblick.app process is not being translated (arm64)
System Integrity Protection is enabled
Model: Mac14,3
================================================================================
Configuration 400
"Sanitized" condensed configuration file for /Library/Application Support/Tunnelblick/Shared/400.tblk:
client
dev tap
proto udp
remote
resolv-retry infinite
nobind
persist-key
persist-tun
ca ca.crt
cert client.crt
key client.key
cipher AES-128-CBC
comp-lzo
verb 5
================================================================================
Files in 400.tblk:
Contents/Resources/cli….crt
Contents/Resources/ca.crt
Contents/Resources/config.ovpn
Contents/Resources/cli….key
================================================================================
Configuration preferences:
-notOKToCheckThatIPAddressDidNotChangeAfterConnection = 0
-lastConnectionSucceeded = 0
================================================================================
Wildcard preferences:
-notOKToCheckThatIPAddressDidNotChangeAfterConnection = 0
================================================================================
Program preferences:
launchAtNextLogin = 1
tunnelblickVersionHistory = (
"6.0 (build 6160)",
"4.0.1 (build 5971)",
"3.8.8b (build 5777)",
"4.0.1 (build 5971)",
"3.8.8b (build 5777)",
"4.0.0 (build 5970)",
"3.8.8g (build 5779.3)"
)
statusDisplayNumber = 0
lastLaunchTime = 762190730.495136
lastLanguageAtLaunchWasRTL = 0
connectionWindowDisplayCriteria = showWhenConnecting
maxLogDisplaySize = 102400
lastConnectedDisplayName = 250
keyboardShortcutIndex = 1
updateCheckAutomatically = 1
NSWindow Frame ConnectingWindow = 765 649 389 217 0 0 1920 1055
NSWindow Frame SUStatusFrame = 760 711 400 135 0 0 1920 1055
NSWindow Frame SUUpdateAlert = 650 492 620 398 0 0 1920 1055
detailsWindowFrameVersion = 6160
detailsWindowFrame = {{500, 420}, {920, 522}}
detailsWindowLeftFrame = {{0, 0}, {167, 402}}
detailsWindowViewIndex = 0
detailsWindowConfigurationsTabIdentifier = log
leftNavSelectedDisplayName = 400
haveDealtWithOldTunTapPreferences = 1
haveDealtWithAlwaysShowLoginWindow = 1
haveDealtWithOldLoginItem = 1
haveDealtWithAfterDisconnect = 1
SUEnableAutomaticChecks = 1
SUScheduledCheckInterval = 86400
SULastCheckTime = 2025-02-25 15:38:50 +0000
SUHasLaunchedBefore = 1
================================================================================
Forced preferences:
(None)
================================================================================
Deployed forced preferences:
(None)
================================================================================
Tunnelblick Kext Policy Data:
net.tunnelblick.tap|Z2SG5H3HC8|Jonathan Bullard|1|5
net.tunnelblick.tun|Z2SG5H3HC8|Jonathan Bullard|1|5
================================================================================
Tunnelblick Log:
2025-02-25 09:39:01.322910 *Tunnelblick: macOS 15.3.1 (24D70); Tunnelblick 6.0 (build 6160); prior version 4.0.1 (build 5971)
2025-02-25 09:39:01.496690 *Tunnelblick: Attempting connection with 400; Set nameserver = 0x00000301; monitoring connection
2025-02-25 09:39:01.497402 *Tunnelblick: openvpnstart start 400.tblk 60435 0x00000301 0 3 0 0x0210c172 -ptADGNWradsgnw 2.6.13-openssl-3.0.16 <password>
2025-02-25 09:39:01.521132 *Tunnelblick: openvpnstart starting OpenVPN
2025-02-25 09:39:02.938601 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
2025-02-25 09:39:02.940840 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305). OpenVPN ignores --cipher for cipher negotiations.
2025-02-25 09:39:02.941116 OpenVPN 2.6.13 x86_64-apple-darwin [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD]
2025-02-25 09:39:02.941134 library versions: OpenSSL 3.0.16 11 Feb 2025, LZO 2.10
2025-02-25 09:39:02.942154 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:60435
2025-02-25 09:39:02.942179 Need hold release from management interface, waiting...
2025-02-25 09:39:04.045461 *Tunnelblick: openvpnstart log:
OpenVPN started successfully.
Command used to start OpenVPN (one argument per displayed line):
/Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.6.13-openssl-3.0.16/openvpn
--daemon
--log-append /Library/Application Support/Tunnelblick/Logs/-SLibrary-SApplication Support-STunnelblick-SShared-S400.tblk-SContents-SResources-Sconfig.ovpn.769_0_3_0_34652530.60435.openvpn.log
--cd /Library/Application Support/Tunnelblick/Shared/400.tblk/Contents/Resources
--machine-readable-output
--setenv IV_GUI_VER "net.tunnelblick.tunnelblick 6160 6.0 (build 6160)"
--verb 3
--config /Library/Application Support/Tunnelblick/Shared/400.tblk/Contents/Resources/config.ovpn
--setenv TUNNELBLICK_CONFIG_FOLDER /Library/Application Support/Tunnelblick/Shared/400.tblk/Contents/Resources
--verb 3
--cd /Library/Application Support/Tunnelblick/Shared/400.tblk/Contents/Resources
--management 127.0.0.1 60435 /Library/Application Support/Tunnelblick/Mips/400.tblk.mip
--setenv IV_SSO webauth,crtext
--management-query-passwords
--management-hold
--script-security 2
--route-up /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -9 -a -d -f -m -w -ptADGNWradsgnw
--down /Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh -9 -a -d -f -m -w -ptADGNWradsgnw
--route-pre-down /Applications/Tunnelblick.app/Contents/Resources/client.route-pre-down.tunnelblick.sh -9 -a -d -f -m -w -ptADGNWradsgnw
2025-02-25 09:39:04.057615 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:51370
2025-02-25 09:39:04.091813 MANAGEMENT: CMD 'pid'
2025-02-25 09:39:04.091854 MANAGEMENT: CMD 'auth-retry interact'
2025-02-25 09:39:04.091876 MANAGEMENT: CMD 'state on'
2025-02-25 09:39:04.091893 MANAGEMENT: CMD 'state'
2025-02-25 09:39:04.091922 MANAGEMENT: CMD 'bytecount 1'
2025-02-25 09:39:04.092218 *Tunnelblick: Established communication with OpenVPN
2025-02-25 09:39:04.099169 *Tunnelblick: >INFO:OpenVPN Management Interface Version 5 -- type 'help' for more info
2025-02-25 09:39:04.099689 MANAGEMENT: CMD 'hold release'
2025-02-25 09:39:04.099827 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
2025-02-25 09:39:04.099846 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2025-02-25 09:39:04.108411 TCP/UDP: Preserving recently used remote address: [AF_INET]23.119.69.9:12974
2025-02-25 09:39:04.108523 Socket Buffers: R=[786896->786896] S=[9216->9216]
2025-02-25 09:39:04.108557 UDPv4 link local: (not bound)
2025-02-25 09:39:04.108584 UDPv4 link remote: [AF_INET]
2025-02-25 09:39:04.108670 MANAGEMENT: >STATE:1740497944,WAIT,,,,,,
2025-02-25 09:39:04.164748 MANAGEMENT: >STATE:1740497944,AUTH,,,,,,
2025-02-25 09:39:04.164858 TLS: Initial packet from [AF_INET], sid=964d7338 a0d1164e
2025-02-25 09:39:04.303905 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=ma...@netgear.com
2025-02-25 09:39:04.304476 VERIFY OK: depth=0, CN=netgear
2025-02-25 09:39:04.512653 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 1024 bits RSA, signature: RSA-SHA256, peer temporary key: 1024 bits DH
2025-02-25 09:39:04.512782 [netgear] Peer Connection Initiated with [AF_INET]
2025-02-25 09:39:04.512827 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2025-02-25 09:39:04.512977 TLS: tls_multi_process: initial untrusted session promoted to trusted
2025-02-25 09:39:05.227716 MANAGEMENT: >STATE:1740497945,GET_CONFIG,,,,,,
2025-02-25 09:39:05.227899 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)
2025-02-25 09:39:05.281368 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route-delay 5,route-gateway dhcp,ping 10,ping-restart 120'
2025-02-25 09:39:05.281546 OPTIONS IMPORT: route options modified
2025-02-25 09:39:05.281584 OPTIONS IMPORT: route-related options modified
2025-02-25 09:39:05.281609 OPTIONS ERROR: failed to negotiate cipher with server. Add the server's cipher ('AES-128-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.
2025-02-25 09:39:05.281629 ERROR: Failed to apply push options
2025-02-25 09:39:05.281648 Failed to open tun/tap interface
2025-02-25 09:39:05.282003 SIGUSR1[soft,process-push-msg-failed] received, process restarting
2025-02-25 09:39:05.282036 MANAGEMENT: >STATE:1740497945,RECONNECTING,process-push-msg-failed,,,,,
2025-02-25 09:39:05.283063 *Tunnelblick: Delaying HOLD release for 1.000 seconds
2025-02-25 09:39:06.286031 MANAGEMENT: CMD 'hold release'
2025-02-25 09:39:06.286164 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
2025-02-25 09:39:06.286199 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2025-02-25 09:39:06.286510 TCP/UDP: Preserving recently used remote address: [AF_INET]23.119.69.9:12974
2025-02-25 09:39:06.286599 Socket Buffers: R=[786896->786896] S=[9216->9216]
2025-02-25 09:39:06.286665 UDPv4 link local: (not bound)
2025-02-25 09:39:06.286699 UDPv4 link remote: [AF_INET]
2025-02-25 09:39:06.286771 MANAGEMENT: >STATE:1740497946,WAIT,,,,,,
2025-02-25 09:39:06.351159 MANAGEMENT: >STATE:1740497946,AUTH,,,,,,
2025-02-25 09:39:06.351255 TLS: Initial packet from [AF_INET], sid=fe8131a0 80c80c03
2025-02-25 09:39:06.496550 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=ma...@netgear.com
2025-02-25 09:39:06.496929 VERIFY OK: depth=0, CN=netgear
2025-02-25 09:39:06.696260 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 1024 bits RSA, signature: RSA-SHA256, peer temporary key: 1024 bits DH
2025-02-25 09:39:06.696379 [netgear] Peer Connection Initiated with [AF_INET]
2025-02-25 09:39:06.696450 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2025-02-25 09:39:06.696587 TLS: tls_multi_process: initial untrusted session promoted to trusted
2025-02-25 09:39:07.035868 MANAGEMENT: >STATE:1740497947,GET_CONFIG,,,,,,
2025-02-25 09:39:07.035978 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)
2025-02-25 09:39:07.106085 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route-delay 5,route-gateway dhcp,ping 10,ping-restart 120'
2025-02-25 09:39:07.106213 OPTIONS IMPORT: route options modified
2025-02-25 09:39:07.106237 OPTIONS IMPORT: route-related options modified
2025-02-25 09:39:07.106257 OPTIONS ERROR: failed to negotiate cipher with server. Add the server's cipher ('AES-128-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.
2025-02-25 09:39:07.106270 ERROR: Failed to apply push options
2025-02-25 09:39:07.106282 Failed to open tun/tap interface
2025-02-25 09:39:07.106620 SIGUSR1[soft,process-push-msg-failed] received, process restarting
2025-02-25 09:39:07.106647 MANAGEMENT: >STATE:1740497947,RECONNECTING,process-push-msg-failed,,,,,
2025-02-25 09:39:07.107675 *Tunnelblick: Delaying HOLD release for 1.000 seconds
2025-02-25 09:39:08.110746 MANAGEMENT: CMD 'hold release'
2025-02-25 09:39:08.110875 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
2025-02-25 09:39:08.110907 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2025-02-25 09:39:08.111210 TCP/UDP: Preserving recently used remote address: [AF_INET]23.119.69.9:12974
2025-02-25 09:39:08.111302 Socket Buffers: R=[786896->786896] S=[9216->9216]
2025-02-25 09:39:08.111330 UDPv4 link local: (not bound)
2025-02-25 09:39:08.111351 UDPv4 link remote: [AF_INET]
2025-02-25 09:39:08.111422 MANAGEMENT: >STATE:1740497948,WAIT,,,,,,
2025-02-25 09:39:08.170690 MANAGEMENT: >STATE:1740497948,AUTH,,,,,,
2025-02-25 09:39:08.170768 TLS: Initial packet from [AF_INET], sid=56ba4e86 7f2b32fa
2025-02-25 09:39:08.309192 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=ma...@netgear.com
2025-02-25 09:39:08.309594 VERIFY OK: depth=0, CN=netgear
2025-02-25 09:39:08.526812 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 1024 bits RSA, signature: RSA-SHA256, peer temporary key: 1024 bits DH
2025-02-25 09:39:08.526926 [netgear] Peer Connection Initiated with [AF_INET]
2025-02-25 09:39:08.526970 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2025-02-25 09:39:08.527108 TLS: tls_multi_process: initial untrusted session promoted to trusted
2025-02-25 09:39:09.187382 MANAGEMENT: >STATE:1740497949,GET_CONFIG,,,,,,
2025-02-25 09:39:09.187519 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)
2025-02-25 09:39:09.249262 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route-delay 5,route-gateway dhcp,ping 10,ping-restart 120'
2025-02-25 09:39:09.249356 OPTIONS IMPORT: route options modified
2025-02-25 09:39:09.249372 OPTIONS IMPORT: route-related options modified
2025-02-25 09:39:09.249387 OPTIONS ERROR: failed to negotiate cipher with server. Add the server's cipher ('AES-128-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.
2025-02-25 09:39:09.249421 ERROR: Failed to apply push options
2025-02-25 09:39:09.249429 Failed to open tun/tap interface
2025-02-25 09:39:09.249652 SIGUSR1[soft,process-push-msg-failed] received, process restarting
2025-02-25 09:39:09.249671 MANAGEMENT: >STATE:1740497949,RECONNECTING,process-push-msg-failed,,,,,
2025-02-25 09:39:09.252430 *Tunnelblick: Delaying HOLD release for 1.000 seconds
2025-02-25 09:39:10.254160 MANAGEMENT: CMD 'hold release'
2025-02-25 09:39:10.254284 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
2025-02-25 09:39:10.254312 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2025-02-25 09:39:10.254674 TCP/UDP: Preserving recently used remote address: [AF_INET]23.119.69.9:12974
2025-02-25 09:39:10.254759 Socket Buffers: R=[786896->786896] S=[9216->9216]
2025-02-25 09:39:10.254781 UDPv4 link local: (not bound)
2025-02-25 09:39:10.254802 UDPv4 link remote: [AF_INET]23.119.69.9:12974
2025-02-25 09:39:10.254884 MANAGEMENT: >STATE:1740497950,WAIT,,,,,,
2025-02-25 09:39:10.310904 MANAGEMENT: >STATE:1740497950,AUTH,,,,,,
2025-02-25 09:39:10.310982 TLS: Initial packet from [AF_INET], sid=8774b354 13f44554
2025-02-25 09:39:10.448556 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=ma...@netgear.com
2025-02-25 09:39:10.448974 VERIFY OK: depth=0, CN=netgear
2025-02-25 09:39:10.667265 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 1024 bits RSA, signature: RSA-SHA256, peer temporary key: 1024 bits DH
2025-02-25 09:39:10.667367 [netgear] Peer Connection Initiated with [AF_INET]
2025-02-25 09:39:10.667408 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2025-02-25 09:39:10.667541 TLS: tls_multi_process: initial untrusted session promoted to trusted
2025-02-25 09:39:11.050870 MANAGEMENT: >STATE:1740497951,GET_CONFIG,,,,,,
2025-02-25 09:39:11.050995 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)
2025-02-25 09:39:11.114430 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route-delay 5,route-gateway dhcp,ping 10,ping-restart 120'
2025-02-25 09:39:11.114577 OPTIONS IMPORT: route options modified
2025-02-25 09:39:11.114606 OPTIONS IMPORT: route-related options modified
2025-02-25 09:39:11.114630 OPTIONS ERROR: failed to negotiate cipher with server. Add the server's cipher ('AES-128-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.
2025-02-25 09:39:11.114644 ERROR: Failed to apply push options
2025-02-25 09:39:11.114657 Failed to open tun/tap interface
2025-02-25 09:39:11.115002 SIGUSR1[soft,process-push-msg-failed] received, process restarting
2025-02-25 09:39:11.115034 MANAGEMENT: >STATE:1740497951,RECONNECTING,process-push-msg-failed,,,,,
2025-02-25 09:39:11.116066 *Tunnelblick: Delaying HOLD release for 1.000 seconds
2025-02-25 09:39:12.118169 MANAGEMENT: CMD 'hold release'
2025-02-25 09:39:12.118298 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
2025-02-25 09:39:12.118327 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2025-02-25 09:39:12.118607 TCP/UDP: Preserving recently used remote address: [AF_INET]23.119.69.9:12974
2025-02-25 09:39:12.118695 Socket Buffers: R=[786896->786896] S=[9216->9216]
2025-02-25 09:39:12.118719 UDPv4 link local: (not bound)
2025-02-25 09:39:12.118740 UDPv4 link remote: [AF_INET]
2025-02-25 09:39:12.118803 MANAGEMENT: >STATE:1740497952,WAIT,,,,,,
2025-02-25 09:39:12.180622 MANAGEMENT: >STATE:1740497952,AUTH,,,,,,
2025-02-25 09:39:12.180716 TLS: Initial packet from [AF_INET], sid=0b88a122 23c8874c
2025-02-25 09:39:12.318385 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=ma...@netgear.com
2025-02-25 09:39:12.318601 VERIFY OK: depth=0, CN=netgear
2025-02-25 09:39:12.524913 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 1024 bits RSA, signature: RSA-SHA256, peer temporary key: 1024 bits DH
2025-02-25 09:39:12.525075 [netgear] Peer Connection Initiated with [AF_INET]23.119.69.9:12974
2025-02-25 09:39:12.525121 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2025-02-25 09:39:12.525251 TLS: tls_multi_process: initial untrusted session promoted to trusted
2025-02-25 09:39:13.625645 MANAGEMENT: >STATE:1740497953,GET_CONFIG,,,,,,
2025-02-25 09:39:13.625774 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)
2025-02-25 09:39:13.687417 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route-delay 5,route-gateway dhcp,ping 10,ping-restart 120'
2025-02-25 09:39:13.687568 OPTIONS IMPORT: route options modified
2025-02-25 09:39:13.687595 OPTIONS IMPORT: route-related options modified
2025-02-25 09:39:13.687620 OPTIONS ERROR: failed to negotiate cipher with server. Add the server's cipher ('AES-128-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.
2025-02-25 09:39:13.687636 ERROR: Failed to apply push options
2025-02-25 09:39:13.687648 Failed to open tun/tap interface
2025-02-25 09:39:13.687978 SIGUSR1[soft,process-push-msg-failed] received, process restarting
2025-02-25 09:39:13.688010 MANAGEMENT: >STATE:1740497953,RECONNECTING,process-push-msg-failed,,,,,
2025-02-25 09:39:13.688976 *Tunnelblick: Delaying HOLD release for 2.000 seconds
2025-02-25 09:39:15.691402 MANAGEMENT: CMD 'hold release'
2025-02-25 09:39:15.691558 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
2025-02-25 09:39:15.691597 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2025-02-25 09:39:15.691974 TCP/UDP: Preserving recently used remote address: [AF_INET]23.119.69.9:12974
2025-02-25 09:39:15.692093 Socket Buffers: R=[786896->786896] S=[9216->9216]
2025-02-25 09:39:15.692127 UDPv4 link local: (not bound)
2025-02-25 09:39:15.692155 UDPv4 link remote: [AF_INET]23.119.69.9:12974
2025-02-25 09:39:15.692221 MANAGEMENT: >STATE:1740497955,WAIT,,,,,,
2025-02-25 09:39:15.750645 MANAGEMENT: >STATE:1740497955,AUTH,,,,,,
2025-02-25 09:39:15.750739 TLS: Initial packet from [AF_INET], sid=15915bd5 bc8d4d5a
2025-02-25 09:39:15.897627 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=ma...@netgear.com
2025-02-25 09:39:15.898042 VERIFY OK: depth=0, CN=netgear
2025-02-25 09:39:16.094330 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 1024 bits RSA, signature: RSA-SHA256, peer temporary key: 1024 bits DH
2025-02-25 09:39:16.094473 [netgear] Peer Connection Initiated with [AF_INET]23.119.69.9:12974
2025-02-25 09:39:16.094524 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2025-02-25 09:39:16.094669 TLS: tls_multi_process: initial untrusted session promoted to trusted
2025-02-25 09:39:17.362725 MANAGEMENT: >STATE:1740497957,GET_CONFIG,,,,,,
2025-02-25 09:39:17.362862 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)
2025-02-25 09:39:17.429299 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route-delay 5,route-gateway dhcp,ping 10,ping-restart 120'
2025-02-25 09:39:17.429438 OPTIONS IMPORT: route options modified
2025-02-25 09:39:17.429469 OPTIONS IMPORT: route-related options modified
2025-02-25 09:39:17.429493 OPTIONS ERROR: failed to negotiate cipher with server. Add the server's cipher ('AES-128-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.
2025-02-25 09:39:17.429513 ERROR: Failed to apply push options
2025-02-25 09:39:17.429531 Failed to open tun/tap interface
2025-02-25 09:39:17.429878 SIGUSR1[soft,process-push-msg-failed] received, process restarting
2025-02-25 09:39:17.429915 MANAGEMENT: >STATE:1740497957,RECONNECTING,process-push-msg-failed,,,,,
2025-02-25 09:39:17.430937 *Tunnelblick: Delaying HOLD release for 4.000 seconds
2025-02-25 09:39:21.433009 MANAGEMENT: CMD 'hold release'
2025-02-25 09:39:21.433145 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
2025-02-25 09:39:21.433182 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2025-02-25 09:39:21.433544 TCP/UDP: Preserving recently used remote address: [AF_INET]23.119.69.9:12974
2025-02-25 09:39:21.433664 Socket Buffers: R=[786896->786896] S=[9216->9216]
2025-02-25 09:39:21.433689 UDPv4 link local: (not bound)
2025-02-25 09:39:21.433713 UDPv4 link remote: [AF_INET]
2025-02-25 09:39:21.433769 MANAGEMENT: >STATE:1740497961,WAIT,,,,,,
2025-02-25 09:39:21.535697 MANAGEMENT: >STATE:1740497961,AUTH,,,,,,
2025-02-25 09:39:21.535805 TLS: Initial packet from [AF_INET], sid=fbe7de4c cff39fa9
2025-02-25 09:39:21.678463 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=ma...@netgear.com
2025-02-25 09:39:21.678873 VERIFY OK: depth=0, CN=netgear
2025-02-25 09:39:21.874338 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 1024 bits RSA, signature: RSA-SHA256, peer temporary key: 1024 bits DH
2025-02-25 09:39:21.874420 [netgear] Peer Connection Initiated with [AF_INET]
2025-02-25 09:39:21.874456 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2025-02-25 09:39:21.874596 TLS: tls_multi_process: initial untrusted session promoted to trusted
2025-02-25 09:39:22.249408 MANAGEMENT: >STATE:1740497962,GET_CONFIG,,,,,,
2025-02-25 09:39:22.249525 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)
2025-02-25 09:39:22.315724 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route-delay 5,route-gateway dhcp,ping 10,ping-restart 120'
2025-02-25 09:39:22.315872 OPTIONS IMPORT: route options modified
2025-02-25 09:39:22.315899 OPTIONS IMPORT: route-related options modified
2025-02-25 09:39:22.315921 OPTIONS ERROR: failed to negotiate cipher with server. Add the server's cipher ('AES-128-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.
2025-02-25 09:39:22.315936 ERROR: Failed to apply push options
2025-02-25 09:39:22.315948 Failed to open tun/tap interface
2025-02-25 09:39:22.316304 SIGUSR1[soft,process-push-msg-failed] received, process restarting
2025-02-25 09:39:22.316334 MANAGEMENT: >STATE:1740497962,RECONNECTING,process-push-msg-failed,,,,,
2025-02-25 09:39:22.317010 *Tunnelblick: Delaying HOLD release for 8.000 seconds
2025-02-25 09:39:30.318650 MANAGEMENT: CMD 'hold release'
2025-02-25 09:39:30.318778 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
2025-02-25 09:39:30.318806 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2025-02-25 09:39:30.319103 TCP/UDP: Preserving recently used remote address: [AF_INET]
2025-02-25 09:39:30.319186 Socket Buffers: R=[786896->786896] S=[9216->9216]
2025-02-25 09:39:30.319214 UDPv4 link local: (not bound)
2025-02-25 09:39:30.319235 UDPv4 link remote: [AF_INET]
2025-02-25 09:39:30.319305 MANAGEMENT: >STATE:1740497970,WAIT,,,,,,
2025-02-25 09:39:30.384225 MANAGEMENT: >STATE:1740497970,AUTH,,,,,,
2025-02-25 09:39:30.384319 TLS: Initial packet from [AF_INET], sid=68ad0faf 9d0dd8ab
2025-02-25 09:39:30.528871 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=ma...@netgear.com
2025-02-25 09:39:30.529274 VERIFY OK: depth=0, CN=netgear
2025-02-25 09:39:30.744752 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 1024 bits RSA, signature: RSA-SHA256, peer temporary key: 1024 bits DH
2025-02-25 09:39:30.744867 [netgear] Peer Connection Initiated with [AF_INET]
2025-02-25 09:39:30.744904 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2025-02-25 09:39:30.745035 TLS: tls_multi_process: initial untrusted session promoted to trusted
2025-02-25 09:39:31.794026 MANAGEMENT: >STATE:1740497971,GET_CONFIG,,,,,,
2025-02-25 09:39:31.794143 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)
2025-02-25 09:39:31.845701 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route-delay 5,route-gateway dhcp,ping 10,ping-restart 120'
2025-02-25 09:39:31.845835 OPTIONS IMPORT: route options modified
2025-02-25 09:39:31.845904 OPTIONS IMPORT: route-related options modified
2025-02-25 09:39:31.845927 OPTIONS ERROR: failed to negotiate cipher with server. Add the server's cipher ('AES-128-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.
2025-02-25 09:39:31.845942 ERROR: Failed to apply push options
2025-02-25 09:39:31.845954 Failed to open tun/tap interface
2025-02-25 09:39:31.846303 SIGUSR1[soft,process-push-msg-failed] received, process restarting
2025-02-25 09:39:31.846329 MANAGEMENT: >STATE:1740497971,RECONNECTING,process-push-msg-failed,,,,,
2025-02-25 09:39:31.847364 *Tunnelblick: Delaying HOLD release for 16.000 seconds
2025-02-25 09:39:47.849640 MANAGEMENT: CMD 'hold release'
2025-02-25 09:39:47.849807 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
2025-02-25 09:39:47.849844 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2025-02-25 09:39:47.850139 TCP/UDP: Preserving recently used remote address: [AF_INET]23.119.69.9:12974
2025-02-25 09:39:47.850235 Socket Buffers: R=[786896->786896] S=[9216->9216]
2025-02-25 09:39:47.850264 UDPv4 link local: (not bound)
2025-02-25 09:39:47.850290 UDPv4 link remote: [AF_INET]
2025-02-25 09:39:47.850354 MANAGEMENT: >STATE:1740497987,WAIT,,,,,,
2025-02-25 09:39:47.909241 MANAGEMENT: >STATE:1740497987,AUTH,,,,,,
2025-02-25 09:39:47.909351 TLS: Initial packet from [AF_INET], sid=6298cf3a c20b01ab
2025-02-25 09:39:48.046627 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=ma...@netgear.com
2025-02-25 09:39:48.047086 VERIFY OK: depth=0, CN=netgear
2025-02-25 09:39:48.252213 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 1024 bits RSA, signature: RSA-SHA256, peer temporary key: 1024 bits DH
2025-02-25 09:39:48.252353 [netgear] Peer Connection Initiated with [AF_INET]
2025-02-25 09:39:48.252406 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2025-02-25 09:39:48.252547 TLS: tls_multi_process: initial untrusted session promoted to trusted
2025-02-25 09:39:50.092708 MANAGEMENT: >STATE:1740497990,GET_CONFIG,,,,,,
2025-02-25 09:39:50.092852 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)
2025-02-25 09:39:50.155653 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route-delay 5,route-gateway dhcp,ping 10,ping-restart 120'
2025-02-25 09:39:50.155815 OPTIONS IMPORT: route options modified
2025-02-25 09:39:50.155846 OPTIONS IMPORT: route-related options modified
2025-02-25 09:39:50.155874 OPTIONS ERROR: failed to negotiate cipher with server. Add the server's cipher ('AES-128-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.
2025-02-25 09:39:50.155895 ERROR: Failed to apply push options
2025-02-25 09:39:50.155914 Failed to open tun/tap interface
2025-02-25 09:39:50.156291 SIGUSR1[soft,process-push-msg-failed] received, process restarting
2025-02-25 09:39:50.156328 MANAGEMENT: >STATE:1740497990,RECONNECTING,process-push-msg-failed,,,,,
2025-02-25 09:39:50.157349 *Tunnelblick: Delaying HOLD release for 32.000 seconds
2025-02-25 09:40:22.159990 MANAGEMENT: CMD 'hold release'
2025-02-25 09:40:22.160117 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
2025-02-25 09:40:22.160139 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2025-02-25 09:40:22.160404 TCP/UDP: Preserving recently used remote address: [AF_INET]23.119.69.9:12974
2025-02-25 09:40:22.160477 Socket Buffers: R=[786896->786896] S=[9216->9216]
2025-02-25 09:40:22.160496 UDPv4 link local: (not bound)
2025-02-25 09:40:22.160510 UDPv4 link remote: [AF_INET]
2025-02-25 09:40:22.160559 MANAGEMENT: >STATE:1740498022,WAIT,,,,,,
2025-02-25 09:40:22.221444 MANAGEMENT: >STATE:1740498022,AUTH,,,,,,
2025-02-25 09:40:22.221566 TLS: Initial packet from [AF_INET], sid=6bd0bea3 fb04903a
2025-02-25 09:40:22.359084 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=ma...@netgear.com
2025-02-25 09:40:22.359552 VERIFY OK: depth=0, CN=netgear
2025-02-25 09:40:22.570133 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 1024 bits RSA, signature: RSA-SHA256, peer temporary key: 1024 bits DH
2025-02-25 09:40:22.570265 [netgear] Peer Connection Initiated with [AF_INET]
2025-02-25 09:40:22.570312 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2025-02-25 09:40:22.570452 TLS: tls_multi_process: initial untrusted session promoted to trusted
2025-02-25 09:40:23.042244 *Tunnelblick: Disconnecting; notification window disconnect button pressed
2025-02-25 09:40:23.264578 MANAGEMENT: >STATE:1740498023,GET_CONFIG,,,,,,
2025-02-25 09:40:23.264694 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)
2025-02-25 09:40:23.329044 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route-delay 5,route-gateway dhcp,ping 10,ping-restart 120'
2025-02-25 09:40:23.329162 OPTIONS IMPORT: route options modified
2025-02-25 09:40:23.329186 OPTIONS IMPORT: route-related options modified
2025-02-25 09:40:23.329207 OPTIONS ERROR: failed to negotiate cipher with server. Add the server's cipher ('AES-128-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.
2025-02-25 09:40:23.329225 ERROR: Failed to apply push options
2025-02-25 09:40:23.329237 Failed to open tun/tap interface
2025-02-25 09:40:23.329589 SIGUSR1[soft,process-push-msg-failed] received, process restarting
2025-02-25 09:40:23.329618 MANAGEMENT: >STATE:1740498023,RECONNECTING,process-push-msg-failed,,,,,
2025-02-25 09:40:23.353091 *Tunnelblick: Disconnecting using 'kill'
2025-02-25 09:40:23.521909 SIGTERM[hard,init_instance] received, process exiting
2025-02-25 09:40:23.521948 MANAGEMENT: >STATE:1740498023,EXITING,init_instance,,,,,
2025-02-25 09:40:23.647264 *Tunnelblick: Delaying HOLD release for 64.000 seconds
2025-02-25 09:40:25.588382 *Tunnelblick: Expected disconnection occurred.
================================================================================
Installer log:
2025-02-25 09:18:20.133378: Tunnelblick installer getuid() = 501; geteuid() = 0; getgid() = 20; getegid() = 20
currentDirectoryPath = '/'; 1 arguments:
0x0101
2025-02-25 09:18:20.134670: Determined username 'lutherwakefield' from getuid(): 501
2025-02-25 09:18:20.136840: renamex_np() tests succeeded for /Applications
2025-02-25 09:18:20.139569: renamex_np() tests succeeded for /Library/Application Support/Tunnelblick
2025-02-25 09:18:20.143484: renamex_np() tests succeeded for /Users/lutherwakefield/Library/Application Support/Tunnelblick/Configurations
2025-02-25 09:18:20.144408: Created directory /Users/lutherwakefield/Library/Application Support/Tunnelblick/TBLogs with owner 0:80 and permissions 750
2025-02-25 09:18:20.144585: Changed ownership of /Users/lutherwakefield/Library/Application Support/Tunnelblick/TBLogs from 0:80 to 501:80
2025-02-25 09:18:20.146834: Replaced /Library/LaunchDaemons/net.tunnelblick.tunnelblick.tunnelblickd.plist
2025-02-25 09:18:20.363121: Used launchctl to load tunnelblickd
2025-02-25 09:18:20.380269: Kext is up-to-date: tunnelblick-tun.kext
2025-02-25 09:18:20.383942: Kext is up-to-date: tunnelblick-tap.kext
2025-02-25 09:18:20.384150: Tunnelblick installer succeeded
================================================================================
Down log:
09:20:19 *Tunnelblick: **********************************************
09:20:19 *Tunnelblick: Start of output from client.down.tunnelblick.sh
09:20:19 *Tunnelblick: INHIBIT_NETWORK_MONITORING is true, so not removing leasewatcher
09:20:19 *Tunnelblick: MADE_DNS_CHANGES is false, so not restoring network_settings
09:20:19 *Tunnelblick: Flushed the DNS cache with dscacheutil -flushcache
09:20:19 *Tunnelblick: Notified mDNSResponder that the DNS cache was flushed
09:20:19 *Tunnelblick: Up to six 'No such key' messages may appear next and may be ignored.
09:20:19 *Tunnelblick: End of output from client.down.tunnelblick.sh
09:20:19 *Tunnelblick: **********************************************
================================================================================
Previous down log:
09:04:58 *Tunnelblick: **********************************************
09:04:58 *Tunnelblick: Start of output from client.down.tunnelblick.sh
09:04:58 *Tunnelblick: INHIBIT_NETWORK_MONITORING is true, so not removing leasewatcher
09:04:58 *Tunnelblick: MADE_DNS_CHANGES is false, so not restoring network_settings
09:04:58 *Tunnelblick: Flushed the DNS cache with dscacheutil -flushcache
09:04:58 *Tunnelblick: Notified mDNSResponder that the DNS cache was flushed
09:04:58 *Tunnelblick: Up to six 'No such key' messages may appear next and may be ignored.
09:04:58 *Tunnelblick: End of output from client.down.tunnelblick.sh
09:04:58 *Tunnelblick: **********************************************
================================================================================
Network services:
An asterisk (*) denotes that a network service is disabled.
Ethernet
Thunderbolt Bridge
Wi-Fi
Wi-Fi Power (en1): On
================================================================================
ifconfig output:
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
options=1203<RXCSUM,TXCSUM,TXSTATUS,SW_TIMESTAMP>
inet 127.0.0.1 netmask 0xff000000
inet6 ::1 prefixlen 128
inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1
nd6 options=201<PERFORMNUD,DAD>
gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280
stf0: flags=0<> mtu 1280
anpi1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
options=400<CHANNEL_IO>
ether 16:a0:cd:f0:ed:c1
media: none
status: inactive
anpi0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
options=400<CHANNEL_IO>
ether 16:a0:cd:f0:ed:c0
media: none
status: inactive
en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
options=50b<RXCSUM,TXCSUM,VLAN_HWTAGGING,AV,CHANNEL_IO>
ether 5c:1b:f4:76:9c:ea
inet6 fe80::4c2:2fd:385e:a912%en0 prefixlen 64 secured scopeid 0x6
inet6 2607:fb90:af1b:14b5:d8:850e:5890:8560 prefixlen 64 autoconf secured
inet6 2607:fb90:af1b:14b5:5809:d48f:ab3a:ca3a prefixlen 64 autoconf temporary
inet6 2607:fb90:af1b:14b5::6d81 prefixlen 64 dynamic
inet 192.168.12.115 netmask 0xffffff00 broadcast 192.168.12.255
nd6 options=201<PERFORMNUD,DAD>
media: autoselect (1000baseT <full-duplex,flow-control>)
status: active
en4: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
options=400<CHANNEL_IO>
ether 16:a0:cd:f0:ed:a0
nd6 options=201<PERFORMNUD,DAD>
media: none
status: inactive
en5: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
options=400<CHANNEL_IO>
ether 16:a0:cd:f0:ed:a1
nd6 options=201<PERFORMNUD,DAD>
media: none
status: inactive
en2: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
options=460<TSO4,TSO6,CHANNEL_IO>
ether 36:18:ad:c1:06:00
media: autoselect <full-duplex>
status: inactive
en3: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
options=460<TSO4,TSO6,CHANNEL_IO>
ether 36:18:ad:c1:06:04
media: autoselect <full-duplex>
status: inactive
ap1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
options=6460<TSO4,TSO6,CHANNEL_IO,PARTIAL_CSUM,ZEROINVERT_CSUM>
ether 32:ac:d1:62:cb:9a
nd6 options=201<PERFORMNUD,DAD>
media: autoselect (none)
status: inactive
en1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
options=6460<TSO4,TSO6,CHANNEL_IO,PARTIAL_CSUM,ZEROINVERT_CSUM>
ether 3a:ea:cd:9d:c4:eb
inet6 fe80::81d:79f6:c604:18f8%en1 prefixlen 64 secured scopeid 0xc
inet 192.168.12.210 netmask 0xffffff00 broadcast 192.168.12.255
inet6 2607:fb90:af1b:14b5:ca:f47a:27b8:3639 prefixlen 64 autoconf secured
inet6 2607:fb90:af1b:14b5:e84a:d9a3:4efc:eca7 prefixlen 64 autoconf temporary
inet6 2607:fb90:af1b:14b5::e5de prefixlen 64 dynamic
nd6 options=201<PERFORMNUD,DAD>
media: autoselect
status: active
bridge0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
options=63<RXCSUM,TXCSUM,TSO4,TSO6>
ether 36:18:ad:c1:06:00
Configuration:
id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0
maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200
root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0
ipfilter disabled flags 0x0
member: en2 flags=3<LEARNING,DISCOVER>
ifmaxaddr 0 port 9 priority 0 path cost 0
member: en3 flags=3<LEARNING,DISCOVER>
ifmaxaddr 0 port 10 priority 0 path cost 0
nd6 options=201<PERFORMNUD,DAD>
media: <unknown type>
status: inactive
awdl0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
options=6460<TSO4,TSO6,CHANNEL_IO,PARTIAL_CSUM,ZEROINVERT_CSUM>
ether 7a:f2:20:47:22:4f
inet6 fe80::78f2:20ff:fe47:224f%awdl0 prefixlen 64 scopeid 0xe
nd6 options=201<PERFORMNUD,DAD>
media: autoselect
status: active
llw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
options=400<CHANNEL_IO>
ether 7a:f2:20:47:22:4f
inet6 fe80::78f2:20ff:fe47:224f%llw0 prefixlen 64 scopeid 0xf
nd6 options=201<PERFORMNUD,DAD>
media: autoselect (none)
utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500
inet6 fe80::2e93:6088:125c:5257%utun0 prefixlen 64 scopeid 0x10
nd6 options=201<PERFORMNUD,DAD>
utun1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380
inet6 fe80::bebe:1e25:f0fc:61da%utun1 prefixlen 64 scopeid 0x11
nd6 options=201<PERFORMNUD,DAD>
utun2: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 2000
inet6 fe80::e203:523d:6131:fb3b%utun2 prefixlen 64 scopeid 0x12
nd6 options=201<PERFORMNUD,DAD>
utun3: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1000
inet6 fe80::ce81:b1c:bd2c:69e%utun3 prefixlen 64 scopeid 0x13
nd6 options=201<PERFORMNUD,DAD>
utun4: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380
inet6 fe80::351e:61f3:717a:7ae0%utun4 prefixlen 64 scopeid 0x14
nd6 options=201<PERFORMNUD,DAD>
utun5: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380
inet6 fe80::a630:3a75:7d9e:8497%utun5 prefixlen 64 scopeid 0x15
nd6 options=201<PERFORMNUD,DAD>
utun6: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380
inet6 fe80::1c34:603:14bc:d4ef%utun6 prefixlen 64 scopeid 0x16
nd6 options=201<PERFORMNUD,DAD>
================================================================================
Non-Apple kexts that are loaded:
Index Refs Address Size Wired Name (Version) UUID <Linked Against>
================================================================================
Quit Log:
2025-02-25 09:38:40.665078 applicationShouldTerminate: termination because of Quit; delayed until 'shutdownTunnelblick' finishes)
2025-02-25 09:38:40.667787 shutDownTunnelblick: started.
2025-02-25 09:38:40.669106 shutDownTunnelblick: Starting cleanup.
2025-02-25 09:38:40.669462 cleanup: Entering cleanup
2025-02-25 09:38:40.669710 synchronized user defaults
2025-02-25 09:38:41.579229 shutDownTunnelblick: Cleanup finished.
2025-02-25 09:38:41.580188 Finished shutting down Tunnelblick; allowing termination
================================================================================
Traces Log:
================================================================================
Console Log:
2025-02-25 09:39:05.281629 ERROR: Failed to apply push options
2025-02-25 09:39:05.281648 Failed to open tun/tap interface