Tunnelblick 3.2 3 Dmg

  1. Tunnelblick 3.2 3 Dmg 1
  2. Tunnelblick 3.2 3 Dmg Torrent
Tunnelblick

Tunnelblick 3.2 3 Dmg 1

  1. 2013-10-02 08:03:17 *Tunnelblick: OS X 10.8.5; Tunnelblick 3.2.8 (build 2891.3099)
  2. 2013-10-02 08:03:20 *Tunnelblick: Attempting connection with IPredator-MacOSX-Password; Set nameserver = 1; monitoring connection
  3. 2013-10-02 08:03:20 *Tunnelblick: /Applications/Tunnelblick.app/Contents/Resources/openvpnstart start IPredator-MacOSX-Password.ovpn 1337 1 0 0 0 49 -atDASNGWrdasngw
  4. 2013-10-02 08:03:20 *Tunnelblick: openvpnstart message: Loading tun.kext
  5. 2013-10-02 08:03:20 OpenVPN 2.2.1 i386-apple-darwin10.8.0 [SSL] [LZO2] [PKCS11] [eurephia] built on Aug 10 2012
  6. 2013-10-02 08:03:20 MANAGEMENT: TCP Socket listening on 127.0.0.1:1337
  7. 2013-10-02 08:03:20 Need hold release from management interface, waiting...
  8. 2013-10-02 08:03:20 MANAGEMENT: Client connected from 127.0.0.1:1337
  9. 2013-10-02 08:03:20 MANAGEMENT: CMD 'state on'
  10. 2013-10-02 08:03:20 MANAGEMENT: CMD 'hold release'
  11. 2013-10-02 08:03:20 *Tunnelblick: openvpnstart: /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.2.1/openvpn --cd /Users/Jarzi/Library/Application Support/Tunnelblick/Configurations --daemon --management 127.0.0.1 1337 --config /Users/Jarzi/Library/Application Support/Tunnelblick/Configurations/IPredator-MacOSX-Password.ovpn --log /Library/Application Support/Tunnelblick/Logs/-SUsers-SJarzi-SLibrary-SApplication Support-STunnelblick-SConfigurations-SIPredator--MacOSX--Password.ovpn.1_0_0_0_49.1337.openvpn.log --management-query-passwords --management-hold --script-security 2 --up /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -m -w -d -atDASNGWrdasngw --down /Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh -m -w -d -atDASNGWrdasngw --up-restart
  12. 2013-10-02 08:03:20 *Tunnelblick: Established communication with OpenVPN
  13. 2013-10-02 08:03:27 MANAGEMENT: CMD 'username 'Auth' 'thermo'
  14. 2013-10-02 08:03:27 MANAGEMENT: CMD 'password [...]'
  15. 2013-10-02 08:03:27 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  16. 2013-10-02 08:03:27 Control Channel Authentication: tls-auth using INLINE static key file
  17. 2013-10-02 08:03:27 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  18. 2013-10-02 08:03:27 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  19. 2013-10-02 08:03:27 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
  20. 2013-10-02 08:03:27 Socket Buffers: R=[196724->65536] S=[9216->65536]
  21. 2013-10-02 08:03:27 MANAGEMENT: >STATE:1380690207,RESOLVE,
  22. 2013-10-02 08:03:27 RESOLVE: NOTE: pw.openvpn.ipredator.se resolves to 20 addresses
  23. 2013-10-02 08:03:27 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
  24. 2013-10-02 08:03:27 Local Options hash (VER=V4): '5b243d85'
  25. 2013-10-02 08:03:27 Expected Remote Options hash (VER=V4): '0b024030'
  26. 2013-10-02 08:03:27 UDPv4 link remote: 46.246.43.2:1194
  27. 2013-10-02 08:03:27 MANAGEMENT: >STATE:1380690207,WAIT,
  28. 2013-10-02 08:03:27 MANAGEMENT: >STATE:1380690207,AUTH,
  29. 2013-10-02 08:03:27 TLS: Initial packet from 46.246.43.2:1194, sid=2f6888cd fecac9ac
  30. 2013-10-02 08:03:27 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  31. 2013-10-02 08:03:28 VERIFY OK: depth=1, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=Royal_Swedish_Beer_Squadron_CA/emailAddress=hostmaster@ipredator.se
  32. 2013-10-02 08:03:28 VERIFY OK: depth=0, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=pw.openvpn.ipredator.se/emailAddress=hostmaster@ipredator.se
  33. 2013-10-02 08:03:28 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  34. 2013-10-02 08:03:28 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  35. 2013-10-02 08:03:28 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  36. 2013-10-02 08:03:28 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  37. 2013-10-02 08:03:28 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  38. 2013-10-02 08:03:28 [pw.openvpn.ipredator.se] Peer Connection Initiated with 46.246.43.2:1194
  39. 2013-10-02 08:03:29 MANAGEMENT: >STATE:1380690209,GET_CONFIG,
  40. 2013-10-02 08:03:30 SENT CONTROL [pw.openvpn.ipredator.se]: 'PUSH_REQUEST' (status=1)
  41. 2013-10-02 08:03:30 AUTH: Received AUTH_FAILED control message
  42. 2013-10-02 08:03:30 SIGUSR1[soft,auth-failure] received, process restarting
  43. 2013-10-02 08:03:30 MANAGEMENT: >STATE:1380690210,RECONNECTING,auth-failure,
  44. 2013-10-02 08:03:32 MANAGEMENT: CMD 'hold release'
  45. 2013-10-02 08:03:32 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  46. 2013-10-02 08:03:32 LZO compression initialized
  47. 2013-10-02 08:03:32 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
  48. 2013-10-02 08:03:32 Socket Buffers: R=[196724->65536] S=[9216->65536]
  49. 2013-10-02 08:03:32 MANAGEMENT: >STATE:1380690212,RESOLVE,
  50. 2013-10-02 08:03:32 RESOLVE: NOTE: pw.openvpn.ipredator.se resolves to 20 addresses
  51. 2013-10-02 08:03:32 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
  52. 2013-10-02 08:03:32 Local Options hash (VER=V4): '5b243d85'
  53. 2013-10-02 08:03:32 Expected Remote Options hash (VER=V4): '0b024030'
  54. 2013-10-02 08:03:32 UDPv4 link remote: 46.246.43.2:1194
  55. 2013-10-02 08:03:32 MANAGEMENT: >STATE:1380690212,WAIT,
  56. 2013-10-02 08:03:32 MANAGEMENT: >STATE:1380690212,AUTH,
  57. 2013-10-02 08:03:32 TLS: Initial packet from 46.246.43.2:1194, sid=3f6e03de faad7a42
  58. 2013-10-02 08:03:32 VERIFY OK: depth=1, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=Royal_Swedish_Beer_Squadron_CA/emailAddress=hostmaster@ipredator.se
  59. 2013-10-02 08:03:32 VERIFY OK: depth=0, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=pw.openvpn.ipredator.se/emailAddress=hostmaster@ipredator.se
  60. 2013-10-02 08:03:32 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  61. 2013-10-02 08:03:32 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  62. 2013-10-02 08:03:32 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  63. 2013-10-02 08:03:32 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  64. 2013-10-02 08:03:32 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  65. 2013-10-02 08:03:32 [pw.openvpn.ipredator.se] Peer Connection Initiated with 46.246.43.2:1194
  66. 2013-10-02 08:03:33 MANAGEMENT: >STATE:1380690213,GET_CONFIG,
  67. 2013-10-02 08:03:35 SENT CONTROL [pw.openvpn.ipredator.se]: 'PUSH_REQUEST' (status=1)
  68. 2013-10-02 08:03:35 AUTH: Received AUTH_FAILED control message
  69. 2013-10-02 08:03:35 SIGUSR1[soft,auth-failure] received, process restarting
  70. 2013-10-02 08:03:35 MANAGEMENT: >STATE:1380690215,RECONNECTING,auth-failure,
  71. 2013-10-02 08:03:39 MANAGEMENT: CMD 'hold release'
  72. 2013-10-02 08:03:39 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  73. 2013-10-02 08:03:39 LZO compression initialized
  74. 2013-10-02 08:03:39 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
  75. 2013-10-02 08:03:39 Socket Buffers: R=[196724->65536] S=[9216->65536]
  76. 2013-10-02 08:03:39 MANAGEMENT: >STATE:1380690219,RESOLVE,
  77. 2013-10-02 08:03:39 RESOLVE: NOTE: pw.openvpn.ipredator.se resolves to 20 addresses
  78. 2013-10-02 08:03:39 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
  79. 2013-10-02 08:03:39 Local Options hash (VER=V4): '5b243d85'
  80. 2013-10-02 08:03:39 Expected Remote Options hash (VER=V4): '0b024030'
  81. 2013-10-02 08:03:39 UDPv4 link remote: 46.246.43.2:1194
  82. 2013-10-02 08:03:39 MANAGEMENT: >STATE:1380690219,WAIT,
  83. 2013-10-02 08:03:39 MANAGEMENT: >STATE:1380690219,AUTH,
  84. 2013-10-02 08:03:39 TLS: Initial packet from 46.246.43.2:1194, sid=51118858 d07092e4
  85. 2013-10-02 08:03:39 VERIFY OK: depth=1, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=Royal_Swedish_Beer_Squadron_CA/emailAddress=hostmaster@ipredator.se
  86. 2013-10-02 08:03:39 VERIFY OK: depth=0, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=pw.openvpn.ipredator.se/emailAddress=hostmaster@ipredator.se
  87. 2013-10-02 08:03:39 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  88. 2013-10-02 08:03:39 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  89. 2013-10-02 08:03:39 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  90. 2013-10-02 08:03:39 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  91. 2013-10-02 08:03:39 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  92. 2013-10-02 08:03:39 [pw.openvpn.ipredator.se] Peer Connection Initiated with 46.246.43.2:1194
  93. 2013-10-02 08:03:40 MANAGEMENT: >STATE:1380690220,GET_CONFIG,
  94. 2013-10-02 08:03:41 SENT CONTROL [pw.openvpn.ipredator.se]: 'PUSH_REQUEST' (status=1)
  95. 2013-10-02 08:03:41 AUTH: Received AUTH_FAILED control message
  96. 2013-10-02 08:03:41 SIGUSR1[soft,auth-failure] received, process restarting
  97. 2013-10-02 08:03:41 MANAGEMENT: >STATE:1380690221,RECONNECTING,auth-failure,
  98. 2013-10-02 08:03:43 MANAGEMENT: CMD 'hold release'
  99. 2013-10-02 08:03:43 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  100. 2013-10-02 08:03:43 LZO compression initialized
  101. 2013-10-02 08:03:43 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
  102. 2013-10-02 08:03:43 Socket Buffers: R=[196724->65536] S=[9216->65536]
  103. 2013-10-02 08:03:43 MANAGEMENT: >STATE:1380690223,RESOLVE,
  104. 2013-10-02 08:03:43 RESOLVE: NOTE: pw.openvpn.ipredator.se resolves to 20 addresses
  105. 2013-10-02 08:03:43 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
  106. 2013-10-02 08:03:43 Local Options hash (VER=V4): '5b243d85'
  107. 2013-10-02 08:03:43 Expected Remote Options hash (VER=V4): '0b024030'
  108. 2013-10-02 08:03:43 UDPv4 link remote: 46.246.43.2:1194
  109. 2013-10-02 08:03:43 MANAGEMENT: >STATE:1380690223,WAIT,
  110. 2013-10-02 08:03:43 MANAGEMENT: >STATE:1380690223,AUTH,
  111. 2013-10-02 08:03:43 TLS: Initial packet from 46.246.43.2:1194, sid=e45b3a7c 0590aaf8
  112. 2013-10-02 08:03:44 VERIFY OK: depth=1, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=Royal_Swedish_Beer_Squadron_CA/emailAddress=hostmaster@ipredator.se
  113. 2013-10-02 08:03:44 VERIFY OK: depth=0, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=pw.openvpn.ipredator.se/emailAddress=hostmaster@ipredator.se
  114. 2013-10-02 08:03:44 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  115. 2013-10-02 08:03:44 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  116. 2013-10-02 08:03:44 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  117. 2013-10-02 08:03:44 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  118. 2013-10-02 08:03:44 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  119. 2013-10-02 08:03:44 [pw.openvpn.ipredator.se] Peer Connection Initiated with 46.246.43.2:1194
  120. 2013-10-02 08:03:45 MANAGEMENT: >STATE:1380690225,GET_CONFIG,
  121. 2013-10-02 08:03:46 SENT CONTROL [pw.openvpn.ipredator.se]: 'PUSH_REQUEST' (status=1)
  122. 2013-10-02 08:03:46 AUTH: Received AUTH_FAILED control message
  123. 2013-10-02 08:03:46 SIGUSR1[soft,auth-failure] received, process restarting
  124. 2013-10-02 08:03:46 MANAGEMENT: >STATE:1380690226,RECONNECTING,auth-failure,
  125. 2013-10-02 08:04:08 MANAGEMENT: CMD 'hold release'
  126. 2013-10-02 08:04:08 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  127. 2013-10-02 08:04:08 LZO compression initialized
  128. 2013-10-02 08:04:08 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
  129. 2013-10-02 08:04:08 Socket Buffers: R=[196724->65536] S=[9216->65536]
  130. 2013-10-02 08:04:08 MANAGEMENT: >STATE:1380690248,RESOLVE,
  131. 2013-10-02 08:04:08 RESOLVE: NOTE: pw.openvpn.ipredator.se resolves to 20 addresses
  132. 2013-10-02 08:04:08 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
  133. 2013-10-02 08:04:08 Local Options hash (VER=V4): '5b243d85'
  134. 2013-10-02 08:04:08 Expected Remote Options hash (VER=V4): '0b024030'
  135. 2013-10-02 08:04:08 UDPv4 link remote: 46.246.43.2:1194
  136. 2013-10-02 08:04:08 MANAGEMENT: >STATE:1380690248,WAIT,
  137. 2013-10-02 08:04:08 MANAGEMENT: >STATE:1380690248,AUTH,
  138. 2013-10-02 08:04:08 TLS: Initial packet from 46.246.43.2:1194, sid=6af60335 41e1d889
  139. 2013-10-02 08:04:08 VERIFY OK: depth=1, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=Royal_Swedish_Beer_Squadron_CA/emailAddress=hostmaster@ipredator.se
  140. 2013-10-02 08:04:08 VERIFY OK: depth=0, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=pw.openvpn.ipredator.se/emailAddress=hostmaster@ipredator.se
  141. 2013-10-02 08:04:08 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  142. 2013-10-02 08:04:08 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  143. 2013-10-02 08:04:08 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  144. 2013-10-02 08:04:08 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  145. 2013-10-02 08:04:08 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  146. 2013-10-02 08:04:08 [pw.openvpn.ipredator.se] Peer Connection Initiated with 46.246.43.2:1194
  147. 2013-10-02 08:04:09 MANAGEMENT: >STATE:1380690249,GET_CONFIG,
  148. 2013-10-02 08:04:10 SENT CONTROL [pw.openvpn.ipredator.se]: 'PUSH_REQUEST' (status=1)
  149. 2013-10-02 08:04:10 AUTH: Received AUTH_FAILED control message
  150. 2013-10-02 08:04:10 SIGUSR1[soft,auth-failure] received, process restarting
  151. 2013-10-02 08:04:10 MANAGEMENT: >STATE:1380690250,RECONNECTING,auth-failure,
  152. 2013-10-02 08:04:15 MANAGEMENT: CMD 'hold release'
  153. 2013-10-02 08:04:15 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  154. 2013-10-02 08:04:15 LZO compression initialized
  155. 2013-10-02 08:04:15 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
  156. 2013-10-02 08:04:15 Socket Buffers: R=[196724->65536] S=[9216->65536]
  157. 2013-10-02 08:04:15 MANAGEMENT: >STATE:1380690255,RESOLVE,
  158. 2013-10-02 08:04:15 RESOLVE: NOTE: pw.openvpn.ipredator.se resolves to 20 addresses
  159. 2013-10-02 08:04:15 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
  160. 2013-10-02 08:04:15 Local Options hash (VER=V4): '5b243d85'
  161. 2013-10-02 08:04:15 Expected Remote Options hash (VER=V4): '0b024030'
  162. 2013-10-02 08:04:15 UDPv4 link remote: 46.246.43.2:1194
  163. 2013-10-02 08:04:15 MANAGEMENT: >STATE:1380690255,WAIT,
  164. 2013-10-02 08:04:15 MANAGEMENT: >STATE:1380690255,AUTH,
  165. 2013-10-02 08:04:15 TLS: Initial packet from 46.246.43.2:1194, sid=c1107166 996a608e
  166. 2013-10-02 08:04:15 VERIFY OK: depth=1, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=Royal_Swedish_Beer_Squadron_CA/emailAddress=hostmaster@ipredator.se
  167. 2013-10-02 08:04:15 VERIFY OK: depth=0, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=pw.openvpn.ipredator.se/emailAddress=hostmaster@ipredator.se
  168. 2013-10-02 08:04:15 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  169. 2013-10-02 08:04:15 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  170. 2013-10-02 08:04:15 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  171. 2013-10-02 08:04:15 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  172. 2013-10-02 08:04:15 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  173. 2013-10-02 08:04:15 [pw.openvpn.ipredator.se] Peer Connection Initiated with 46.246.43.2:1194
  174. 2013-10-02 08:04:16 MANAGEMENT: >STATE:1380690256,GET_CONFIG,
  175. 2013-10-02 08:04:17 SENT CONTROL [pw.openvpn.ipredator.se]: 'PUSH_REQUEST' (status=1)
  176. 2013-10-02 08:04:17 AUTH: Received AUTH_FAILED control message
  177. 2013-10-02 08:04:17 SIGUSR1[soft,auth-failure] received, process restarting
  178. 2013-10-02 08:04:17 MANAGEMENT: >STATE:1380690257,RECONNECTING,auth-failure,
  179. 2013-10-02 08:04:20 MANAGEMENT: CMD 'hold release'
  180. 2013-10-02 08:04:20 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  181. 2013-10-02 08:04:20 LZO compression initialized
  182. 2013-10-02 08:04:20 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
  183. 2013-10-02 08:04:20 Socket Buffers: R=[196724->65536] S=[9216->65536]
  184. 2013-10-02 08:04:20 MANAGEMENT: >STATE:1380690260,RESOLVE,
  185. 2013-10-02 08:04:20 RESOLVE: NOTE: pw.openvpn.ipredator.se resolves to 20 addresses
  186. 2013-10-02 08:04:20 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
  187. 2013-10-02 08:04:20 Local Options hash (VER=V4): '5b243d85'
  188. 2013-10-02 08:04:20 Expected Remote Options hash (VER=V4): '0b024030'
  189. 2013-10-02 08:04:20 UDPv4 link remote: 46.246.43.2:1194
  190. 2013-10-02 08:04:20 MANAGEMENT: >STATE:1380690260,WAIT,
  191. 2013-10-02 08:04:20 MANAGEMENT: >STATE:1380690260,AUTH,
  192. 2013-10-02 08:04:20 TLS: Initial packet from 46.246.43.2:1194, sid=a6d42eaf d3c7e889
  193. 2013-10-02 08:04:20 VERIFY OK: depth=1, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=Royal_Swedish_Beer_Squadron_CA/emailAddress=hostmaster@ipredator.se
  194. 2013-10-02 08:04:20 VERIFY OK: depth=0, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=pw.openvpn.ipredator.se/emailAddress=hostmaster@ipredator.se
  195. 2013-10-02 08:04:20 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  196. 2013-10-02 08:04:20 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  197. 2013-10-02 08:04:20 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  198. 2013-10-02 08:04:20 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  199. 2013-10-02 08:04:20 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  200. 2013-10-02 08:04:20 [pw.openvpn.ipredator.se] Peer Connection Initiated with 46.246.43.2:1194
  201. 2013-10-02 08:04:21 MANAGEMENT: >STATE:1380690261,GET_CONFIG,
  202. 2013-10-02 08:04:22 SENT CONTROL [pw.openvpn.ipredator.se]: 'PUSH_REQUEST' (status=1)
  203. 2013-10-02 08:04:22 AUTH: Received AUTH_FAILED control message
  204. 2013-10-02 08:04:22 SIGUSR1[soft,auth-failure] received, process restarting
  205. 2013-10-02 08:04:22 MANAGEMENT: >STATE:1380690262,RECONNECTING,auth-failure,
  206. 2013-10-02 08:04:25 MANAGEMENT: CMD 'hold release'
  207. 2013-10-02 08:04:25 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  208. 2013-10-02 08:04:25 LZO compression initialized
  209. 2013-10-02 08:04:25 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
  210. 2013-10-02 08:04:25 Socket Buffers: R=[196724->65536] S=[9216->65536]
  211. 2013-10-02 08:04:25 MANAGEMENT: >STATE:1380690265,RESOLVE,
  212. 2013-10-02 08:04:25 RESOLVE: NOTE: pw.openvpn.ipredator.se resolves to 20 addresses
  213. 2013-10-02 08:04:25 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
  214. 2013-10-02 08:04:25 Local Options hash (VER=V4): '5b243d85'
  215. 2013-10-02 08:04:25 Expected Remote Options hash (VER=V4): '0b024030'
  216. 2013-10-02 08:04:25 UDPv4 link remote: 46.246.43.2:1194
  217. 2013-10-02 08:04:25 MANAGEMENT: >STATE:1380690265,WAIT,
  218. 2013-10-02 08:04:25 MANAGEMENT: >STATE:1380690265,AUTH,
  219. 2013-10-02 08:04:25 TLS: Initial packet from 46.246.43.2:1194, sid=c7815a50 f7504741
  220. 2013-10-02 08:04:25 VERIFY OK: depth=1, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=Royal_Swedish_Beer_Squadron_CA/emailAddress=hostmaster@ipredator.se
  221. 2013-10-02 08:04:25 VERIFY OK: depth=0, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=pw.openvpn.ipredator.se/emailAddress=hostmaster@ipredator.se
  222. 2013-10-02 08:04:25 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  223. 2013-10-02 08:04:25 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  224. 2013-10-02 08:04:25 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  225. 2013-10-02 08:04:25 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  226. 2013-10-02 08:04:25 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  227. 2013-10-02 08:04:25 [pw.openvpn.ipredator.se] Peer Connection Initiated with 46.246.43.2:1194
  228. 2013-10-02 08:04:26 MANAGEMENT: >STATE:1380690266,GET_CONFIG,
  229. 2013-10-02 08:04:27 SENT CONTROL [pw.openvpn.ipredator.se]: 'PUSH_REQUEST' (status=1)
  230. 2013-10-02 08:04:27 AUTH: Received AUTH_FAILED control message
  231. 2013-10-02 08:04:27 SIGUSR1[soft,auth-failure] received, process restarting
  232. 2013-10-02 08:04:27 MANAGEMENT: >STATE:1380690267,RECONNECTING,auth-failure,
  233. 2013-10-02 08:04:29 MANAGEMENT: CMD 'hold release'
  234. 2013-10-02 08:04:29 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  235. 2013-10-02 08:04:29 LZO compression initialized
  236. 2013-10-02 08:04:29 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
  237. 2013-10-02 08:04:29 Socket Buffers: R=[196724->65536] S=[9216->65536]
  238. 2013-10-02 08:04:29 MANAGEMENT: >STATE:1380690269,RESOLVE,
  239. 2013-10-02 08:04:29 RESOLVE: NOTE: pw.openvpn.ipredator.se resolves to 20 addresses
  240. 2013-10-02 08:04:29 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
  241. 2013-10-02 08:04:29 Local Options hash (VER=V4): '5b243d85'
  242. 2013-10-02 08:04:29 Expected Remote Options hash (VER=V4): '0b024030'
  243. 2013-10-02 08:04:29 UDPv4 link remote: 46.246.43.2:1194
  244. 2013-10-02 08:04:29 MANAGEMENT: >STATE:1380690269,WAIT,
  245. 2013-10-02 08:04:29 MANAGEMENT: >STATE:1380690269,AUTH,
  246. 2013-10-02 08:04:29 TLS: Initial packet from 46.246.43.2:1194, sid=0d55aa6a e08bc765
  247. 2013-10-02 08:04:29 VERIFY OK: depth=1, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=Royal_Swedish_Beer_Squadron_CA/emailAddress=hostmaster@ipredator.se
  248. 2013-10-02 08:04:29 VERIFY OK: depth=0, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=pw.openvpn.ipredator.se/emailAddress=hostmaster@ipredator.se
  249. 2013-10-02 08:04:29 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  250. 2013-10-02 08:04:29 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  251. 2013-10-02 08:04:29 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  252. 2013-10-02 08:04:29 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  253. 2013-10-02 08:04:29 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  254. 2013-10-02 08:04:29 [pw.openvpn.ipredator.se] Peer Connection Initiated with 46.246.43.2:1194
  255. 2013-10-02 08:04:30 MANAGEMENT: >STATE:1380690270,GET_CONFIG,
  256. 2013-10-02 08:04:32 SENT CONTROL [pw.openvpn.ipredator.se]: 'PUSH_REQUEST' (status=1)
  257. 2013-10-02 08:04:32 AUTH: Received AUTH_FAILED control message
  258. 2013-10-02 08:04:32 SIGUSR1[soft,auth-failure] received, process restarting
  259. 2013-10-02 08:04:32 MANAGEMENT: >STATE:1380690272,RECONNECTING,auth-failure,
  260. 2013-10-02 08:04:37 *Tunnelblick: Disconnecting; user cancelled authorization or there was an error obtaining authorization
  261. 2013-10-02 08:04:37 SIGTERM[hard,init_instance] received, process exiting
  262. 2013-10-02 08:04:37 MANAGEMENT: >STATE:1380690277,EXITING,init_instance,
  263. 2013-10-02 08:04:37 *Tunnelblick: Flushed the DNS cache

Tunnelblick 3.2 3 Dmg Torrent

How To - Configure SSL VPN for Mac OS X using Tunnelblick VPN client Applicable Version: 10.00 onwards Overview Tunnelblick is an open source graphic user interface for SSL VPN on Mac OS X. Documents - Tunnelblick Free open source OpenVPN VPN client server software for macOS. Includes OpenVPN, OpenSSL, easy-rsa, and drivers.

Comments are closed.