3.8.8 will connnect, but 4.0.1 & 6.0 will not connect

89 views
Skip to first unread message

Luther Wakefield

unread,
Feb 25, 2025, 12:04:10 PM2/25/25
to tunnelblick-discuss
I have tried both 4.01 and 6.0, and it will not connect to one of my two servers. I am attaching the Diagnostics. Any help would be appreciated.

*Tunnelblick: macOS 15.3.1 (24D70); Tunnelblick 6.0 (build 6160); prior version 4.0.1 (build 5971); Admin user

git commit 7a9fcf29ae3c5e2bc43627a065ea6f190a97d51c

The Tunnelblick.app process is not being translated (arm64)

System Integrity Protection is enabled

Model: Mac14,3


================================================================================


Configuration 400


"Sanitized" condensed configuration file for /Library/Application Support/Tunnelblick/Shared/400.tblk:


client

dev tap

proto udp

remote 

resolv-retry infinite

nobind

persist-key

persist-tun

ca ca.crt

cert client.crt

key client.key

cipher AES-128-CBC

comp-lzo

verb 5


================================================================================


Files in 400.tblk:

      Contents/Resources/cli….crt

      Contents/Resources/ca.crt

      Contents/Resources/config.ovpn

      Contents/Resources/cli….key


================================================================================


Configuration preferences:


-notOKToCheckThatIPAddressDidNotChangeAfterConnection = 0

-lastConnectionSucceeded = 0


================================================================================


Wildcard preferences:


-notOKToCheckThatIPAddressDidNotChangeAfterConnection = 0


================================================================================


Program preferences:


launchAtNextLogin = 1

tunnelblickVersionHistory = (

    "6.0 (build 6160)",

    "4.0.1 (build 5971)",

    "3.8.8b (build 5777)",

    "4.0.1 (build 5971)",

    "3.8.8b (build 5777)",

    "4.0.0 (build 5970)",

    "3.8.8g (build 5779.3)"

)

statusDisplayNumber = 0

lastLaunchTime = 762190730.495136

lastLanguageAtLaunchWasRTL = 0

connectionWindowDisplayCriteria = showWhenConnecting

maxLogDisplaySize = 102400

lastConnectedDisplayName = 250

keyboardShortcutIndex = 1

updateCheckAutomatically = 1

NSWindow Frame ConnectingWindow = 765 649 389 217 0 0 1920 1055 

NSWindow Frame SUStatusFrame = 760 711 400 135 0 0 1920 1055 

NSWindow Frame SUUpdateAlert = 650 492 620 398 0 0 1920 1055 

detailsWindowFrameVersion = 6160

detailsWindowFrame = {{500, 420}, {920, 522}}

detailsWindowLeftFrame = {{0, 0}, {167, 402}}

detailsWindowViewIndex = 0

detailsWindowConfigurationsTabIdentifier = log

leftNavSelectedDisplayName = 400

haveDealtWithOldTunTapPreferences = 1

haveDealtWithAlwaysShowLoginWindow = 1

haveDealtWithOldLoginItem = 1

haveDealtWithAfterDisconnect = 1

SUEnableAutomaticChecks = 1

SUScheduledCheckInterval = 86400

SULastCheckTime = 2025-02-25 15:38:50 +0000

SUHasLaunchedBefore = 1


================================================================================


Forced preferences:


(None)


================================================================================


Deployed forced preferences:


(None)


================================================================================


Tunnelblick Kext Policy Data:


net.tunnelblick.tap|Z2SG5H3HC8|Jonathan Bullard|1|5

net.tunnelblick.tun|Z2SG5H3HC8|Jonathan Bullard|1|5


================================================================================


Tunnelblick Log:


2025-02-25 09:39:01.322910 *Tunnelblick: macOS 15.3.1 (24D70); Tunnelblick 6.0 (build 6160); prior version 4.0.1 (build 5971)

2025-02-25 09:39:01.496690 *Tunnelblick: Attempting connection with 400; Set nameserver = 0x00000301; monitoring connection

2025-02-25 09:39:01.497402 *Tunnelblick: openvpnstart start 400.tblk 60435 0x00000301 0 3 0 0x0210c172 -ptADGNWradsgnw 2.6.13-openssl-3.0.16 <password>

2025-02-25 09:39:01.521132 *Tunnelblick: openvpnstart starting OpenVPN

2025-02-25 09:39:02.938601 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.

2025-02-25 09:39:02.940840 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305). OpenVPN ignores --cipher for cipher negotiations. 

2025-02-25 09:39:02.941116 OpenVPN 2.6.13 x86_64-apple-darwin [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD]

2025-02-25 09:39:02.941134 library versions: OpenSSL 3.0.16 11 Feb 2025, LZO 2.10

2025-02-25 09:39:02.942154 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:60435

2025-02-25 09:39:02.942179 Need hold release from management interface, waiting...

2025-02-25 09:39:04.045461 *Tunnelblick: openvpnstart log:

     OpenVPN started successfully.

     Command used to start OpenVPN (one argument per displayed line):

          /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.6.13-openssl-3.0.16/openvpn

          --daemon

          --log-append /Library/Application Support/Tunnelblick/Logs/-SLibrary-SApplication Support-STunnelblick-SShared-S400.tblk-SContents-SResources-Sconfig.ovpn.769_0_3_0_34652530.60435.openvpn.log

          --cd /Library/Application Support/Tunnelblick/Shared/400.tblk/Contents/Resources

          --machine-readable-output

          --setenv IV_GUI_VER "net.tunnelblick.tunnelblick 6160 6.0 (build 6160)"

          --verb 3

          --config /Library/Application Support/Tunnelblick/Shared/400.tblk/Contents/Resources/config.ovpn

          --setenv TUNNELBLICK_CONFIG_FOLDER /Library/Application Support/Tunnelblick/Shared/400.tblk/Contents/Resources

          --verb 3

          --cd /Library/Application Support/Tunnelblick/Shared/400.tblk/Contents/Resources

          --management 127.0.0.1 60435 /Library/Application Support/Tunnelblick/Mips/400.tblk.mip

          --setenv IV_SSO webauth,crtext

          --management-query-passwords

          --management-hold

          --script-security 2

          --route-up /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -9 -a -d -f -m -w -ptADGNWradsgnw

          --down /Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh -9 -a -d -f -m -w -ptADGNWradsgnw

          --route-pre-down /Applications/Tunnelblick.app/Contents/Resources/client.route-pre-down.tunnelblick.sh -9 -a -d -f -m -w -ptADGNWradsgnw

2025-02-25 09:39:04.057615 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:51370

2025-02-25 09:39:04.091813 MANAGEMENT: CMD 'pid'

2025-02-25 09:39:04.091854 MANAGEMENT: CMD 'auth-retry interact'

2025-02-25 09:39:04.091876 MANAGEMENT: CMD 'state on'

2025-02-25 09:39:04.091893 MANAGEMENT: CMD 'state'

2025-02-25 09:39:04.091922 MANAGEMENT: CMD 'bytecount 1'

2025-02-25 09:39:04.092218 *Tunnelblick: Established communication with OpenVPN

2025-02-25 09:39:04.099169 *Tunnelblick: >INFO:OpenVPN Management Interface Version 5 -- type 'help' for more info

2025-02-25 09:39:04.099689 MANAGEMENT: CMD 'hold release'

2025-02-25 09:39:04.099827 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.

2025-02-25 09:39:04.099846 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts

2025-02-25 09:39:04.108411 TCP/UDP: Preserving recently used remote address: [AF_INET]23.119.69.9:12974

2025-02-25 09:39:04.108523 Socket Buffers: R=[786896->786896] S=[9216->9216]

2025-02-25 09:39:04.108557 UDPv4 link local: (not bound)

2025-02-25 09:39:04.108584 UDPv4 link remote: [AF_INET]

2025-02-25 09:39:04.108670 MANAGEMENT: >STATE:1740497944,WAIT,,,,,,

2025-02-25 09:39:04.164748 MANAGEMENT: >STATE:1740497944,AUTH,,,,,,

2025-02-25 09:39:04.164858 TLS: Initial packet from [AF_INET], sid=964d7338 a0d1164e

2025-02-25 09:39:04.303905 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=ma...@netgear.com

2025-02-25 09:39:04.304476 VERIFY OK: depth=0, CN=netgear

2025-02-25 09:39:04.512653 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 1024 bits RSA, signature: RSA-SHA256, peer temporary key: 1024 bits DH

2025-02-25 09:39:04.512782 [netgear] Peer Connection Initiated with [AF_INET]

2025-02-25 09:39:04.512827 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1

2025-02-25 09:39:04.512977 TLS: tls_multi_process: initial untrusted session promoted to trusted

2025-02-25 09:39:05.227716 MANAGEMENT: >STATE:1740497945,GET_CONFIG,,,,,,

2025-02-25 09:39:05.227899 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)

2025-02-25 09:39:05.281368 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route-delay 5,route-gateway dhcp,ping 10,ping-restart 120'

2025-02-25 09:39:05.281546 OPTIONS IMPORT: route options modified

2025-02-25 09:39:05.281584 OPTIONS IMPORT: route-related options modified

2025-02-25 09:39:05.281609 OPTIONS ERROR: failed to negotiate cipher with server.  Add the server's cipher ('AES-128-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.

2025-02-25 09:39:05.281629 ERROR: Failed to apply push options

2025-02-25 09:39:05.281648 Failed to open tun/tap interface

2025-02-25 09:39:05.282003 SIGUSR1[soft,process-push-msg-failed] received, process restarting

2025-02-25 09:39:05.282036 MANAGEMENT: >STATE:1740497945,RECONNECTING,process-push-msg-failed,,,,,

2025-02-25 09:39:05.283063 *Tunnelblick: Delaying HOLD release for 1.000 seconds

2025-02-25 09:39:06.286031 MANAGEMENT: CMD 'hold release'

2025-02-25 09:39:06.286164 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.

2025-02-25 09:39:06.286199 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts

2025-02-25 09:39:06.286510 TCP/UDP: Preserving recently used remote address: [AF_INET]23.119.69.9:12974

2025-02-25 09:39:06.286599 Socket Buffers: R=[786896->786896] S=[9216->9216]

2025-02-25 09:39:06.286665 UDPv4 link local: (not bound)

2025-02-25 09:39:06.286699 UDPv4 link remote: [AF_INET]

2025-02-25 09:39:06.286771 MANAGEMENT: >STATE:1740497946,WAIT,,,,,,

2025-02-25 09:39:06.351159 MANAGEMENT: >STATE:1740497946,AUTH,,,,,,

2025-02-25 09:39:06.351255 TLS: Initial packet from [AF_INET], sid=fe8131a0 80c80c03

2025-02-25 09:39:06.496550 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=ma...@netgear.com

2025-02-25 09:39:06.496929 VERIFY OK: depth=0, CN=netgear

2025-02-25 09:39:06.696260 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 1024 bits RSA, signature: RSA-SHA256, peer temporary key: 1024 bits DH

2025-02-25 09:39:06.696379 [netgear] Peer Connection Initiated with [AF_INET]

2025-02-25 09:39:06.696450 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1

2025-02-25 09:39:06.696587 TLS: tls_multi_process: initial untrusted session promoted to trusted

2025-02-25 09:39:07.035868 MANAGEMENT: >STATE:1740497947,GET_CONFIG,,,,,,

2025-02-25 09:39:07.035978 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)

2025-02-25 09:39:07.106085 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route-delay 5,route-gateway dhcp,ping 10,ping-restart 120'

2025-02-25 09:39:07.106213 OPTIONS IMPORT: route options modified

2025-02-25 09:39:07.106237 OPTIONS IMPORT: route-related options modified

2025-02-25 09:39:07.106257 OPTIONS ERROR: failed to negotiate cipher with server.  Add the server's cipher ('AES-128-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.

2025-02-25 09:39:07.106270 ERROR: Failed to apply push options

2025-02-25 09:39:07.106282 Failed to open tun/tap interface

2025-02-25 09:39:07.106620 SIGUSR1[soft,process-push-msg-failed] received, process restarting

2025-02-25 09:39:07.106647 MANAGEMENT: >STATE:1740497947,RECONNECTING,process-push-msg-failed,,,,,

2025-02-25 09:39:07.107675 *Tunnelblick: Delaying HOLD release for 1.000 seconds

2025-02-25 09:39:08.110746 MANAGEMENT: CMD 'hold release'

2025-02-25 09:39:08.110875 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.

2025-02-25 09:39:08.110907 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts

2025-02-25 09:39:08.111210 TCP/UDP: Preserving recently used remote address: [AF_INET]23.119.69.9:12974

2025-02-25 09:39:08.111302 Socket Buffers: R=[786896->786896] S=[9216->9216]

2025-02-25 09:39:08.111330 UDPv4 link local: (not bound)

2025-02-25 09:39:08.111351 UDPv4 link remote: [AF_INET]

2025-02-25 09:39:08.111422 MANAGEMENT: >STATE:1740497948,WAIT,,,,,,

2025-02-25 09:39:08.170690 MANAGEMENT: >STATE:1740497948,AUTH,,,,,,

2025-02-25 09:39:08.170768 TLS: Initial packet from [AF_INET], sid=56ba4e86 7f2b32fa

2025-02-25 09:39:08.309192 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=ma...@netgear.com

2025-02-25 09:39:08.309594 VERIFY OK: depth=0, CN=netgear

2025-02-25 09:39:08.526812 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 1024 bits RSA, signature: RSA-SHA256, peer temporary key: 1024 bits DH

2025-02-25 09:39:08.526926 [netgear] Peer Connection Initiated with [AF_INET]

2025-02-25 09:39:08.526970 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1

2025-02-25 09:39:08.527108 TLS: tls_multi_process: initial untrusted session promoted to trusted

2025-02-25 09:39:09.187382 MANAGEMENT: >STATE:1740497949,GET_CONFIG,,,,,,

2025-02-25 09:39:09.187519 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)

2025-02-25 09:39:09.249262 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route-delay 5,route-gateway dhcp,ping 10,ping-restart 120'

2025-02-25 09:39:09.249356 OPTIONS IMPORT: route options modified

2025-02-25 09:39:09.249372 OPTIONS IMPORT: route-related options modified

2025-02-25 09:39:09.249387 OPTIONS ERROR: failed to negotiate cipher with server.  Add the server's cipher ('AES-128-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.

2025-02-25 09:39:09.249421 ERROR: Failed to apply push options

2025-02-25 09:39:09.249429 Failed to open tun/tap interface

2025-02-25 09:39:09.249652 SIGUSR1[soft,process-push-msg-failed] received, process restarting

2025-02-25 09:39:09.249671 MANAGEMENT: >STATE:1740497949,RECONNECTING,process-push-msg-failed,,,,,

2025-02-25 09:39:09.252430 *Tunnelblick: Delaying HOLD release for 1.000 seconds

2025-02-25 09:39:10.254160 MANAGEMENT: CMD 'hold release'

2025-02-25 09:39:10.254284 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.

2025-02-25 09:39:10.254312 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts

2025-02-25 09:39:10.254674 TCP/UDP: Preserving recently used remote address: [AF_INET]23.119.69.9:12974

2025-02-25 09:39:10.254759 Socket Buffers: R=[786896->786896] S=[9216->9216]

2025-02-25 09:39:10.254781 UDPv4 link local: (not bound)

2025-02-25 09:39:10.254802 UDPv4 link remote: [AF_INET]23.119.69.9:12974

2025-02-25 09:39:10.254884 MANAGEMENT: >STATE:1740497950,WAIT,,,,,,

2025-02-25 09:39:10.310904 MANAGEMENT: >STATE:1740497950,AUTH,,,,,,

2025-02-25 09:39:10.310982 TLS: Initial packet from [AF_INET], sid=8774b354 13f44554

2025-02-25 09:39:10.448556 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=ma...@netgear.com

2025-02-25 09:39:10.448974 VERIFY OK: depth=0, CN=netgear

2025-02-25 09:39:10.667265 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 1024 bits RSA, signature: RSA-SHA256, peer temporary key: 1024 bits DH

2025-02-25 09:39:10.667367 [netgear] Peer Connection Initiated with [AF_INET]

2025-02-25 09:39:10.667408 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1

2025-02-25 09:39:10.667541 TLS: tls_multi_process: initial untrusted session promoted to trusted

2025-02-25 09:39:11.050870 MANAGEMENT: >STATE:1740497951,GET_CONFIG,,,,,,

2025-02-25 09:39:11.050995 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)

2025-02-25 09:39:11.114430 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route-delay 5,route-gateway dhcp,ping 10,ping-restart 120'

2025-02-25 09:39:11.114577 OPTIONS IMPORT: route options modified

2025-02-25 09:39:11.114606 OPTIONS IMPORT: route-related options modified

2025-02-25 09:39:11.114630 OPTIONS ERROR: failed to negotiate cipher with server.  Add the server's cipher ('AES-128-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.

2025-02-25 09:39:11.114644 ERROR: Failed to apply push options

2025-02-25 09:39:11.114657 Failed to open tun/tap interface

2025-02-25 09:39:11.115002 SIGUSR1[soft,process-push-msg-failed] received, process restarting

2025-02-25 09:39:11.115034 MANAGEMENT: >STATE:1740497951,RECONNECTING,process-push-msg-failed,,,,,

2025-02-25 09:39:11.116066 *Tunnelblick: Delaying HOLD release for 1.000 seconds

2025-02-25 09:39:12.118169 MANAGEMENT: CMD 'hold release'

2025-02-25 09:39:12.118298 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.

2025-02-25 09:39:12.118327 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts

2025-02-25 09:39:12.118607 TCP/UDP: Preserving recently used remote address: [AF_INET]23.119.69.9:12974

2025-02-25 09:39:12.118695 Socket Buffers: R=[786896->786896] S=[9216->9216]

2025-02-25 09:39:12.118719 UDPv4 link local: (not bound)

2025-02-25 09:39:12.118740 UDPv4 link remote: [AF_INET]

2025-02-25 09:39:12.118803 MANAGEMENT: >STATE:1740497952,WAIT,,,,,,

2025-02-25 09:39:12.180622 MANAGEMENT: >STATE:1740497952,AUTH,,,,,,

2025-02-25 09:39:12.180716 TLS: Initial packet from [AF_INET], sid=0b88a122 23c8874c

2025-02-25 09:39:12.318385 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=ma...@netgear.com

2025-02-25 09:39:12.318601 VERIFY OK: depth=0, CN=netgear

2025-02-25 09:39:12.524913 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 1024 bits RSA, signature: RSA-SHA256, peer temporary key: 1024 bits DH

2025-02-25 09:39:12.525075 [netgear] Peer Connection Initiated with [AF_INET]23.119.69.9:12974

2025-02-25 09:39:12.525121 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1

2025-02-25 09:39:12.525251 TLS: tls_multi_process: initial untrusted session promoted to trusted

2025-02-25 09:39:13.625645 MANAGEMENT: >STATE:1740497953,GET_CONFIG,,,,,,

2025-02-25 09:39:13.625774 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)

2025-02-25 09:39:13.687417 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route-delay 5,route-gateway dhcp,ping 10,ping-restart 120'

2025-02-25 09:39:13.687568 OPTIONS IMPORT: route options modified

2025-02-25 09:39:13.687595 OPTIONS IMPORT: route-related options modified

2025-02-25 09:39:13.687620 OPTIONS ERROR: failed to negotiate cipher with server.  Add the server's cipher ('AES-128-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.

2025-02-25 09:39:13.687636 ERROR: Failed to apply push options

2025-02-25 09:39:13.687648 Failed to open tun/tap interface

2025-02-25 09:39:13.687978 SIGUSR1[soft,process-push-msg-failed] received, process restarting

2025-02-25 09:39:13.688010 MANAGEMENT: >STATE:1740497953,RECONNECTING,process-push-msg-failed,,,,,

2025-02-25 09:39:13.688976 *Tunnelblick: Delaying HOLD release for 2.000 seconds

2025-02-25 09:39:15.691402 MANAGEMENT: CMD 'hold release'

2025-02-25 09:39:15.691558 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.

2025-02-25 09:39:15.691597 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts

2025-02-25 09:39:15.691974 TCP/UDP: Preserving recently used remote address: [AF_INET]23.119.69.9:12974

2025-02-25 09:39:15.692093 Socket Buffers: R=[786896->786896] S=[9216->9216]

2025-02-25 09:39:15.692127 UDPv4 link local: (not bound)

2025-02-25 09:39:15.692155 UDPv4 link remote: [AF_INET]23.119.69.9:12974

2025-02-25 09:39:15.692221 MANAGEMENT: >STATE:1740497955,WAIT,,,,,,

2025-02-25 09:39:15.750645 MANAGEMENT: >STATE:1740497955,AUTH,,,,,,

2025-02-25 09:39:15.750739 TLS: Initial packet from [AF_INET], sid=15915bd5 bc8d4d5a

2025-02-25 09:39:15.897627 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=ma...@netgear.com

2025-02-25 09:39:15.898042 VERIFY OK: depth=0, CN=netgear

2025-02-25 09:39:16.094330 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 1024 bits RSA, signature: RSA-SHA256, peer temporary key: 1024 bits DH

2025-02-25 09:39:16.094473 [netgear] Peer Connection Initiated with [AF_INET]23.119.69.9:12974

2025-02-25 09:39:16.094524 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1

2025-02-25 09:39:16.094669 TLS: tls_multi_process: initial untrusted session promoted to trusted

2025-02-25 09:39:17.362725 MANAGEMENT: >STATE:1740497957,GET_CONFIG,,,,,,

2025-02-25 09:39:17.362862 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)

2025-02-25 09:39:17.429299 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route-delay 5,route-gateway dhcp,ping 10,ping-restart 120'

2025-02-25 09:39:17.429438 OPTIONS IMPORT: route options modified

2025-02-25 09:39:17.429469 OPTIONS IMPORT: route-related options modified

2025-02-25 09:39:17.429493 OPTIONS ERROR: failed to negotiate cipher with server.  Add the server's cipher ('AES-128-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.

2025-02-25 09:39:17.429513 ERROR: Failed to apply push options

2025-02-25 09:39:17.429531 Failed to open tun/tap interface

2025-02-25 09:39:17.429878 SIGUSR1[soft,process-push-msg-failed] received, process restarting

2025-02-25 09:39:17.429915 MANAGEMENT: >STATE:1740497957,RECONNECTING,process-push-msg-failed,,,,,

2025-02-25 09:39:17.430937 *Tunnelblick: Delaying HOLD release for 4.000 seconds

2025-02-25 09:39:21.433009 MANAGEMENT: CMD 'hold release'

2025-02-25 09:39:21.433145 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.

2025-02-25 09:39:21.433182 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts

2025-02-25 09:39:21.433544 TCP/UDP: Preserving recently used remote address: [AF_INET]23.119.69.9:12974

2025-02-25 09:39:21.433664 Socket Buffers: R=[786896->786896] S=[9216->9216]

2025-02-25 09:39:21.433689 UDPv4 link local: (not bound)

2025-02-25 09:39:21.433713 UDPv4 link remote: [AF_INET]

2025-02-25 09:39:21.433769 MANAGEMENT: >STATE:1740497961,WAIT,,,,,,

2025-02-25 09:39:21.535697 MANAGEMENT: >STATE:1740497961,AUTH,,,,,,

2025-02-25 09:39:21.535805 TLS: Initial packet from [AF_INET], sid=fbe7de4c cff39fa9

2025-02-25 09:39:21.678463 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=ma...@netgear.com

2025-02-25 09:39:21.678873 VERIFY OK: depth=0, CN=netgear

2025-02-25 09:39:21.874338 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 1024 bits RSA, signature: RSA-SHA256, peer temporary key: 1024 bits DH

2025-02-25 09:39:21.874420 [netgear] Peer Connection Initiated with [AF_INET]

2025-02-25 09:39:21.874456 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1

2025-02-25 09:39:21.874596 TLS: tls_multi_process: initial untrusted session promoted to trusted

2025-02-25 09:39:22.249408 MANAGEMENT: >STATE:1740497962,GET_CONFIG,,,,,,

2025-02-25 09:39:22.249525 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)

2025-02-25 09:39:22.315724 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route-delay 5,route-gateway dhcp,ping 10,ping-restart 120'

2025-02-25 09:39:22.315872 OPTIONS IMPORT: route options modified

2025-02-25 09:39:22.315899 OPTIONS IMPORT: route-related options modified

2025-02-25 09:39:22.315921 OPTIONS ERROR: failed to negotiate cipher with server.  Add the server's cipher ('AES-128-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.

2025-02-25 09:39:22.315936 ERROR: Failed to apply push options

2025-02-25 09:39:22.315948 Failed to open tun/tap interface

2025-02-25 09:39:22.316304 SIGUSR1[soft,process-push-msg-failed] received, process restarting

2025-02-25 09:39:22.316334 MANAGEMENT: >STATE:1740497962,RECONNECTING,process-push-msg-failed,,,,,

2025-02-25 09:39:22.317010 *Tunnelblick: Delaying HOLD release for 8.000 seconds

2025-02-25 09:39:30.318650 MANAGEMENT: CMD 'hold release'

2025-02-25 09:39:30.318778 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.

2025-02-25 09:39:30.318806 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts

2025-02-25 09:39:30.319103 TCP/UDP: Preserving recently used remote address: [AF_INET]

2025-02-25 09:39:30.319186 Socket Buffers: R=[786896->786896] S=[9216->9216]

2025-02-25 09:39:30.319214 UDPv4 link local: (not bound)

2025-02-25 09:39:30.319235 UDPv4 link remote: [AF_INET]

2025-02-25 09:39:30.319305 MANAGEMENT: >STATE:1740497970,WAIT,,,,,,

2025-02-25 09:39:30.384225 MANAGEMENT: >STATE:1740497970,AUTH,,,,,,

2025-02-25 09:39:30.384319 TLS: Initial packet from [AF_INET], sid=68ad0faf 9d0dd8ab

2025-02-25 09:39:30.528871 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=ma...@netgear.com

2025-02-25 09:39:30.529274 VERIFY OK: depth=0, CN=netgear

2025-02-25 09:39:30.744752 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 1024 bits RSA, signature: RSA-SHA256, peer temporary key: 1024 bits DH

2025-02-25 09:39:30.744867 [netgear] Peer Connection Initiated with [AF_INET]

2025-02-25 09:39:30.744904 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1

2025-02-25 09:39:30.745035 TLS: tls_multi_process: initial untrusted session promoted to trusted

2025-02-25 09:39:31.794026 MANAGEMENT: >STATE:1740497971,GET_CONFIG,,,,,,

2025-02-25 09:39:31.794143 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)

2025-02-25 09:39:31.845701 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route-delay 5,route-gateway dhcp,ping 10,ping-restart 120'

2025-02-25 09:39:31.845835 OPTIONS IMPORT: route options modified

2025-02-25 09:39:31.845904 OPTIONS IMPORT: route-related options modified

2025-02-25 09:39:31.845927 OPTIONS ERROR: failed to negotiate cipher with server.  Add the server's cipher ('AES-128-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.

2025-02-25 09:39:31.845942 ERROR: Failed to apply push options

2025-02-25 09:39:31.845954 Failed to open tun/tap interface

2025-02-25 09:39:31.846303 SIGUSR1[soft,process-push-msg-failed] received, process restarting

2025-02-25 09:39:31.846329 MANAGEMENT: >STATE:1740497971,RECONNECTING,process-push-msg-failed,,,,,

2025-02-25 09:39:31.847364 *Tunnelblick: Delaying HOLD release for 16.000 seconds

2025-02-25 09:39:47.849640 MANAGEMENT: CMD 'hold release'

2025-02-25 09:39:47.849807 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.

2025-02-25 09:39:47.849844 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts

2025-02-25 09:39:47.850139 TCP/UDP: Preserving recently used remote address: [AF_INET]23.119.69.9:12974

2025-02-25 09:39:47.850235 Socket Buffers: R=[786896->786896] S=[9216->9216]

2025-02-25 09:39:47.850264 UDPv4 link local: (not bound)

2025-02-25 09:39:47.850290 UDPv4 link remote: [AF_INET]

2025-02-25 09:39:47.850354 MANAGEMENT: >STATE:1740497987,WAIT,,,,,,

2025-02-25 09:39:47.909241 MANAGEMENT: >STATE:1740497987,AUTH,,,,,,

2025-02-25 09:39:47.909351 TLS: Initial packet from [AF_INET], sid=6298cf3a c20b01ab

2025-02-25 09:39:48.046627 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=ma...@netgear.com

2025-02-25 09:39:48.047086 VERIFY OK: depth=0, CN=netgear

2025-02-25 09:39:48.252213 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 1024 bits RSA, signature: RSA-SHA256, peer temporary key: 1024 bits DH

2025-02-25 09:39:48.252353 [netgear] Peer Connection Initiated with [AF_INET]

2025-02-25 09:39:48.252406 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1

2025-02-25 09:39:48.252547 TLS: tls_multi_process: initial untrusted session promoted to trusted

2025-02-25 09:39:50.092708 MANAGEMENT: >STATE:1740497990,GET_CONFIG,,,,,,

2025-02-25 09:39:50.092852 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)

2025-02-25 09:39:50.155653 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route-delay 5,route-gateway dhcp,ping 10,ping-restart 120'

2025-02-25 09:39:50.155815 OPTIONS IMPORT: route options modified

2025-02-25 09:39:50.155846 OPTIONS IMPORT: route-related options modified

2025-02-25 09:39:50.155874 OPTIONS ERROR: failed to negotiate cipher with server.  Add the server's cipher ('AES-128-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.

2025-02-25 09:39:50.155895 ERROR: Failed to apply push options

2025-02-25 09:39:50.155914 Failed to open tun/tap interface

2025-02-25 09:39:50.156291 SIGUSR1[soft,process-push-msg-failed] received, process restarting

2025-02-25 09:39:50.156328 MANAGEMENT: >STATE:1740497990,RECONNECTING,process-push-msg-failed,,,,,

2025-02-25 09:39:50.157349 *Tunnelblick: Delaying HOLD release for 32.000 seconds

2025-02-25 09:40:22.159990 MANAGEMENT: CMD 'hold release'

2025-02-25 09:40:22.160117 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.

2025-02-25 09:40:22.160139 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts

2025-02-25 09:40:22.160404 TCP/UDP: Preserving recently used remote address: [AF_INET]23.119.69.9:12974

2025-02-25 09:40:22.160477 Socket Buffers: R=[786896->786896] S=[9216->9216]

2025-02-25 09:40:22.160496 UDPv4 link local: (not bound)

2025-02-25 09:40:22.160510 UDPv4 link remote: [AF_INET]

2025-02-25 09:40:22.160559 MANAGEMENT: >STATE:1740498022,WAIT,,,,,,

2025-02-25 09:40:22.221444 MANAGEMENT: >STATE:1740498022,AUTH,,,,,,

2025-02-25 09:40:22.221566 TLS: Initial packet from [AF_INET], sid=6bd0bea3 fb04903a

2025-02-25 09:40:22.359084 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=netgear, OU=netgear, CN=netgear, emailAddress=ma...@netgear.com

2025-02-25 09:40:22.359552 VERIFY OK: depth=0, CN=netgear

2025-02-25 09:40:22.570133 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, peer certificate: 1024 bits RSA, signature: RSA-SHA256, peer temporary key: 1024 bits DH

2025-02-25 09:40:22.570265 [netgear] Peer Connection Initiated with [AF_INET]

2025-02-25 09:40:22.570312 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1

2025-02-25 09:40:22.570452 TLS: tls_multi_process: initial untrusted session promoted to trusted

2025-02-25 09:40:23.042244 *Tunnelblick: Disconnecting; notification window disconnect button pressed

2025-02-25 09:40:23.264578 MANAGEMENT: >STATE:1740498023,GET_CONFIG,,,,,,

2025-02-25 09:40:23.264694 SENT CONTROL [netgear]: 'PUSH_REQUEST' (status=1)

2025-02-25 09:40:23.329044 PUSH: Received control message: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0,route-delay 5,route-gateway dhcp,ping 10,ping-restart 120'

2025-02-25 09:40:23.329162 OPTIONS IMPORT: route options modified

2025-02-25 09:40:23.329186 OPTIONS IMPORT: route-related options modified

2025-02-25 09:40:23.329207 OPTIONS ERROR: failed to negotiate cipher with server.  Add the server's cipher ('AES-128-CBC') to --data-ciphers (currently 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305') if you want to connect to this server.

2025-02-25 09:40:23.329225 ERROR: Failed to apply push options

2025-02-25 09:40:23.329237 Failed to open tun/tap interface

2025-02-25 09:40:23.329589 SIGUSR1[soft,process-push-msg-failed] received, process restarting

2025-02-25 09:40:23.329618 MANAGEMENT: >STATE:1740498023,RECONNECTING,process-push-msg-failed,,,,,

2025-02-25 09:40:23.353091 *Tunnelblick: Disconnecting using 'kill'

2025-02-25 09:40:23.521909 SIGTERM[hard,init_instance] received, process exiting

2025-02-25 09:40:23.521948 MANAGEMENT: >STATE:1740498023,EXITING,init_instance,,,,,

2025-02-25 09:40:23.647264 *Tunnelblick: Delaying HOLD release for 64.000 seconds

2025-02-25 09:40:25.588382 *Tunnelblick: Expected disconnection occurred.


================================================================================


Installer log:


2025-02-25 09:18:20.133378: Tunnelblick installer getuid() = 501; geteuid() = 0; getgid() = 20; getegid() = 20

currentDirectoryPath = '/'; 1 arguments:

     0x0101

2025-02-25 09:18:20.134670: Determined username 'lutherwakefield' from getuid(): 501

2025-02-25 09:18:20.136840: renamex_np() tests succeeded for /Applications

2025-02-25 09:18:20.139569: renamex_np() tests succeeded for /Library/Application Support/Tunnelblick

2025-02-25 09:18:20.143484: renamex_np() tests succeeded for /Users/lutherwakefield/Library/Application Support/Tunnelblick/Configurations

2025-02-25 09:18:20.144408: Created directory /Users/lutherwakefield/Library/Application Support/Tunnelblick/TBLogs with owner 0:80 and permissions 750

2025-02-25 09:18:20.144585: Changed ownership of /Users/lutherwakefield/Library/Application Support/Tunnelblick/TBLogs from 0:80 to 501:80

2025-02-25 09:18:20.146834: Replaced /Library/LaunchDaemons/net.tunnelblick.tunnelblick.tunnelblickd.plist

2025-02-25 09:18:20.363121: Used launchctl to load tunnelblickd

2025-02-25 09:18:20.380269: Kext is up-to-date: tunnelblick-tun.kext

2025-02-25 09:18:20.383942: Kext is up-to-date: tunnelblick-tap.kext

2025-02-25 09:18:20.384150: Tunnelblick installer succeeded


================================================================================


Down log:


09:20:19 *Tunnelblick:  **********************************************

09:20:19 *Tunnelblick:  Start of output from client.down.tunnelblick.sh

09:20:19 *Tunnelblick:  INHIBIT_NETWORK_MONITORING is true, so not removing leasewatcher

09:20:19 *Tunnelblick:  MADE_DNS_CHANGES is false, so not restoring network_settings

09:20:19 *Tunnelblick:  Flushed the DNS cache with dscacheutil -flushcache

09:20:19 *Tunnelblick:  Notified mDNSResponder that the DNS cache was flushed

09:20:19 *Tunnelblick:  Up to six 'No such key' messages may appear next and may be ignored.

09:20:19 *Tunnelblick:  End of output from client.down.tunnelblick.sh

09:20:19 *Tunnelblick:  **********************************************


================================================================================


Previous down log:


09:04:58 *Tunnelblick:  **********************************************

09:04:58 *Tunnelblick:  Start of output from client.down.tunnelblick.sh

09:04:58 *Tunnelblick:  INHIBIT_NETWORK_MONITORING is true, so not removing leasewatcher

09:04:58 *Tunnelblick:  MADE_DNS_CHANGES is false, so not restoring network_settings

09:04:58 *Tunnelblick:  Flushed the DNS cache with dscacheutil -flushcache

09:04:58 *Tunnelblick:  Notified mDNSResponder that the DNS cache was flushed

09:04:58 *Tunnelblick:  Up to six 'No such key' messages may appear next and may be ignored.

09:04:58 *Tunnelblick:  End of output from client.down.tunnelblick.sh

09:04:58 *Tunnelblick:  **********************************************


================================================================================


Network services:


An asterisk (*) denotes that a network service is disabled.

Ethernet

Thunderbolt Bridge

Wi-Fi


Wi-Fi Power (en1): On


================================================================================


ifconfig output:


lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384

options=1203<RXCSUM,TXCSUM,TXSTATUS,SW_TIMESTAMP>

inet 127.0.0.1 netmask 0xff000000

inet6 ::1 prefixlen 128 

inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1 

nd6 options=201<PERFORMNUD,DAD>

gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280

stf0: flags=0<> mtu 1280

anpi1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500

options=400<CHANNEL_IO>

ether 16:a0:cd:f0:ed:c1

media: none

status: inactive

anpi0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500

options=400<CHANNEL_IO>

ether 16:a0:cd:f0:ed:c0

media: none

status: inactive

en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500

options=50b<RXCSUM,TXCSUM,VLAN_HWTAGGING,AV,CHANNEL_IO>

ether 5c:1b:f4:76:9c:ea

inet6 fe80::4c2:2fd:385e:a912%en0 prefixlen 64 secured scopeid 0x6 

inet6 2607:fb90:af1b:14b5:d8:850e:5890:8560 prefixlen 64 autoconf secured 

inet6 2607:fb90:af1b:14b5:5809:d48f:ab3a:ca3a prefixlen 64 autoconf temporary 

inet6 2607:fb90:af1b:14b5::6d81 prefixlen 64 dynamic 

inet 192.168.12.115 netmask 0xffffff00 broadcast 192.168.12.255

nd6 options=201<PERFORMNUD,DAD>

media: autoselect (1000baseT <full-duplex,flow-control>)

status: active

en4: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500

options=400<CHANNEL_IO>

ether 16:a0:cd:f0:ed:a0

nd6 options=201<PERFORMNUD,DAD>

media: none

status: inactive

en5: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500

options=400<CHANNEL_IO>

ether 16:a0:cd:f0:ed:a1

nd6 options=201<PERFORMNUD,DAD>

media: none

status: inactive

en2: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500

options=460<TSO4,TSO6,CHANNEL_IO>

ether 36:18:ad:c1:06:00

media: autoselect <full-duplex>

status: inactive

en3: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500

options=460<TSO4,TSO6,CHANNEL_IO>

ether 36:18:ad:c1:06:04

media: autoselect <full-duplex>

status: inactive

ap1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500

options=6460<TSO4,TSO6,CHANNEL_IO,PARTIAL_CSUM,ZEROINVERT_CSUM>

ether 32:ac:d1:62:cb:9a

nd6 options=201<PERFORMNUD,DAD>

media: autoselect (none)

status: inactive

en1: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500

options=6460<TSO4,TSO6,CHANNEL_IO,PARTIAL_CSUM,ZEROINVERT_CSUM>

ether 3a:ea:cd:9d:c4:eb

inet6 fe80::81d:79f6:c604:18f8%en1 prefixlen 64 secured scopeid 0xc 

inet 192.168.12.210 netmask 0xffffff00 broadcast 192.168.12.255

inet6 2607:fb90:af1b:14b5:ca:f47a:27b8:3639 prefixlen 64 autoconf secured 

inet6 2607:fb90:af1b:14b5:e84a:d9a3:4efc:eca7 prefixlen 64 autoconf temporary 

inet6 2607:fb90:af1b:14b5::e5de prefixlen 64 dynamic 

nd6 options=201<PERFORMNUD,DAD>

media: autoselect

status: active

bridge0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500

options=63<RXCSUM,TXCSUM,TSO4,TSO6>

ether 36:18:ad:c1:06:00

Configuration:

id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0

maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200

root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0

ipfilter disabled flags 0x0

member: en2 flags=3<LEARNING,DISCOVER>

        ifmaxaddr 0 port 9 priority 0 path cost 0

member: en3 flags=3<LEARNING,DISCOVER>

        ifmaxaddr 0 port 10 priority 0 path cost 0

nd6 options=201<PERFORMNUD,DAD>

media: <unknown type>

status: inactive

awdl0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500

options=6460<TSO4,TSO6,CHANNEL_IO,PARTIAL_CSUM,ZEROINVERT_CSUM>

ether 7a:f2:20:47:22:4f

inet6 fe80::78f2:20ff:fe47:224f%awdl0 prefixlen 64 scopeid 0xe 

nd6 options=201<PERFORMNUD,DAD>

media: autoselect

status: active

llw0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500

options=400<CHANNEL_IO>

ether 7a:f2:20:47:22:4f

inet6 fe80::78f2:20ff:fe47:224f%llw0 prefixlen 64 scopeid 0xf 

nd6 options=201<PERFORMNUD,DAD>

media: autoselect (none)

utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1500

inet6 fe80::2e93:6088:125c:5257%utun0 prefixlen 64 scopeid 0x10 

nd6 options=201<PERFORMNUD,DAD>

utun1: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380

inet6 fe80::bebe:1e25:f0fc:61da%utun1 prefixlen 64 scopeid 0x11 

nd6 options=201<PERFORMNUD,DAD>

utun2: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 2000

inet6 fe80::e203:523d:6131:fb3b%utun2 prefixlen 64 scopeid 0x12 

nd6 options=201<PERFORMNUD,DAD>

utun3: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1000

inet6 fe80::ce81:b1c:bd2c:69e%utun3 prefixlen 64 scopeid 0x13 

nd6 options=201<PERFORMNUD,DAD>

utun4: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380

inet6 fe80::351e:61f3:717a:7ae0%utun4 prefixlen 64 scopeid 0x14 

nd6 options=201<PERFORMNUD,DAD>

utun5: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380

inet6 fe80::a630:3a75:7d9e:8497%utun5 prefixlen 64 scopeid 0x15 

nd6 options=201<PERFORMNUD,DAD>

utun6: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 1380

inet6 fe80::1c34:603:14bc:d4ef%utun6 prefixlen 64 scopeid 0x16 

nd6 options=201<PERFORMNUD,DAD>


================================================================================


Non-Apple kexts that are loaded:


Index Refs Address            Size       Wired      Name (Version) UUID <Linked Against>


================================================================================


Quit Log:


2025-02-25 09:38:40.665078 applicationShouldTerminate: termination because of Quit; delayed until 'shutdownTunnelblick' finishes)

2025-02-25 09:38:40.667787 shutDownTunnelblick: started.

2025-02-25 09:38:40.669106 shutDownTunnelblick: Starting cleanup.

2025-02-25 09:38:40.669462 cleanup: Entering cleanup

2025-02-25 09:38:40.669710 synchronized user defaults

2025-02-25 09:38:41.579229 shutDownTunnelblick: Cleanup finished.

2025-02-25 09:38:41.580188 Finished shutting down Tunnelblick; allowing termination


================================================================================


Traces Log:



================================================================================


Console Log:




Tunnelblick Developer

unread,
Feb 25, 2025, 12:19:22 PM2/25/25
to tunnelblick-discuss
The problem is "Failed to open tun/tap interface", e.g.

2025-02-25 09:39:05.281629 ERROR: Failed to apply push options

2025-02-25 09:39:05.281648 Failed to open tun/tap interface


Apparently Tunnelblick has not loaded a tap driver. Please try selecting "Always load Tap drive" in the Advanced Settings window:
  1. Click the Tunnelblick icon, then click "VPN Details…"
  2. Click on the large "Configurations" button at the top of the window.
  3. Click on your configuration so it is selected.
  4. Click on the "Settings" tab.
  5. Click on the "Advanced…" button; the "Advanced Settings" window will appear, with the name of your selected configuration in the window title.
  6. Click on the "Connecting & Disconnecting" tab at the top of the "Advanced Settings" window.
  7. Click on the lower of the two buttons in the window and select "Always load Tap driver".
  8. Close the "Advanced Settings" window.

Luther Wakefield

unread,
Feb 26, 2025, 3:06:26 PM2/26/25
to tunnelblick-discuss
Followed the instructions with the same results. Still unable to connect.

Tunnelblick Developer

unread,
Feb 27, 2025, 8:46:07 AM2/27/25
to tunnelblick-discuss
Reply all
Reply to author
Forward
0 new messages