Tunnelblick 3.2 3 Dmg 1
- 2013-10-02 08:03:17 *Tunnelblick: OS X 10.8.5; Tunnelblick 3.2.8 (build 2891.3099)
- 2013-10-02 08:03:20 *Tunnelblick: Attempting connection with IPredator-MacOSX-Password; Set nameserver = 1; monitoring connection
- 2013-10-02 08:03:20 *Tunnelblick: /Applications/Tunnelblick.app/Contents/Resources/openvpnstart start IPredator-MacOSX-Password.ovpn 1337 1 0 0 0 49 -atDASNGWrdasngw
- 2013-10-02 08:03:20 *Tunnelblick: openvpnstart message: Loading tun.kext
- 2013-10-02 08:03:20 OpenVPN 2.2.1 i386-apple-darwin10.8.0 [SSL] [LZO2] [PKCS11] [eurephia] built on Aug 10 2012
- 2013-10-02 08:03:20 MANAGEMENT: TCP Socket listening on 127.0.0.1:1337
- 2013-10-02 08:03:20 Need hold release from management interface, waiting...
- 2013-10-02 08:03:20 MANAGEMENT: Client connected from 127.0.0.1:1337
- 2013-10-02 08:03:20 MANAGEMENT: CMD 'state on'
- 2013-10-02 08:03:20 MANAGEMENT: CMD 'hold release'
- 2013-10-02 08:03:20 *Tunnelblick: openvpnstart: /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.2.1/openvpn --cd /Users/Jarzi/Library/Application Support/Tunnelblick/Configurations --daemon --management 127.0.0.1 1337 --config /Users/Jarzi/Library/Application Support/Tunnelblick/Configurations/IPredator-MacOSX-Password.ovpn --log /Library/Application Support/Tunnelblick/Logs/-SUsers-SJarzi-SLibrary-SApplication Support-STunnelblick-SConfigurations-SIPredator--MacOSX--Password.ovpn.1_0_0_0_49.1337.openvpn.log --management-query-passwords --management-hold --script-security 2 --up /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -m -w -d -atDASNGWrdasngw --down /Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh -m -w -d -atDASNGWrdasngw --up-restart
- 2013-10-02 08:03:20 *Tunnelblick: Established communication with OpenVPN
- 2013-10-02 08:03:27 MANAGEMENT: CMD 'username 'Auth' 'thermo'
- 2013-10-02 08:03:27 MANAGEMENT: CMD 'password [...]'
- 2013-10-02 08:03:27 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2013-10-02 08:03:27 Control Channel Authentication: tls-auth using INLINE static key file
- 2013-10-02 08:03:27 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2013-10-02 08:03:27 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2013-10-02 08:03:27 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
- 2013-10-02 08:03:27 Socket Buffers: R=[196724->65536] S=[9216->65536]
- 2013-10-02 08:03:27 MANAGEMENT: >STATE:1380690207,RESOLVE,
- 2013-10-02 08:03:27 RESOLVE: NOTE: pw.openvpn.ipredator.se resolves to 20 addresses
- 2013-10-02 08:03:27 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
- 2013-10-02 08:03:27 Local Options hash (VER=V4): '5b243d85'
- 2013-10-02 08:03:27 Expected Remote Options hash (VER=V4): '0b024030'
- 2013-10-02 08:03:27 UDPv4 link remote: 46.246.43.2:1194
- 2013-10-02 08:03:27 MANAGEMENT: >STATE:1380690207,WAIT,
- 2013-10-02 08:03:27 MANAGEMENT: >STATE:1380690207,AUTH,
- 2013-10-02 08:03:27 TLS: Initial packet from 46.246.43.2:1194, sid=2f6888cd fecac9ac
- 2013-10-02 08:03:27 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- 2013-10-02 08:03:28 VERIFY OK: depth=1, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=Royal_Swedish_Beer_Squadron_CA/emailAddress=hostmaster@ipredator.se
- 2013-10-02 08:03:28 VERIFY OK: depth=0, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=pw.openvpn.ipredator.se/emailAddress=hostmaster@ipredator.se
- 2013-10-02 08:03:28 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2013-10-02 08:03:28 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2013-10-02 08:03:28 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2013-10-02 08:03:28 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2013-10-02 08:03:28 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- 2013-10-02 08:03:28 [pw.openvpn.ipredator.se] Peer Connection Initiated with 46.246.43.2:1194
- 2013-10-02 08:03:29 MANAGEMENT: >STATE:1380690209,GET_CONFIG,
- 2013-10-02 08:03:30 SENT CONTROL [pw.openvpn.ipredator.se]: 'PUSH_REQUEST' (status=1)
- 2013-10-02 08:03:30 AUTH: Received AUTH_FAILED control message
- 2013-10-02 08:03:30 SIGUSR1[soft,auth-failure] received, process restarting
- 2013-10-02 08:03:30 MANAGEMENT: >STATE:1380690210,RECONNECTING,auth-failure,
- 2013-10-02 08:03:32 MANAGEMENT: CMD 'hold release'
- 2013-10-02 08:03:32 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2013-10-02 08:03:32 LZO compression initialized
- 2013-10-02 08:03:32 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
- 2013-10-02 08:03:32 Socket Buffers: R=[196724->65536] S=[9216->65536]
- 2013-10-02 08:03:32 MANAGEMENT: >STATE:1380690212,RESOLVE,
- 2013-10-02 08:03:32 RESOLVE: NOTE: pw.openvpn.ipredator.se resolves to 20 addresses
- 2013-10-02 08:03:32 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
- 2013-10-02 08:03:32 Local Options hash (VER=V4): '5b243d85'
- 2013-10-02 08:03:32 Expected Remote Options hash (VER=V4): '0b024030'
- 2013-10-02 08:03:32 UDPv4 link remote: 46.246.43.2:1194
- 2013-10-02 08:03:32 MANAGEMENT: >STATE:1380690212,WAIT,
- 2013-10-02 08:03:32 MANAGEMENT: >STATE:1380690212,AUTH,
- 2013-10-02 08:03:32 TLS: Initial packet from 46.246.43.2:1194, sid=3f6e03de faad7a42
- 2013-10-02 08:03:32 VERIFY OK: depth=1, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=Royal_Swedish_Beer_Squadron_CA/emailAddress=hostmaster@ipredator.se
- 2013-10-02 08:03:32 VERIFY OK: depth=0, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=pw.openvpn.ipredator.se/emailAddress=hostmaster@ipredator.se
- 2013-10-02 08:03:32 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2013-10-02 08:03:32 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2013-10-02 08:03:32 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2013-10-02 08:03:32 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2013-10-02 08:03:32 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- 2013-10-02 08:03:32 [pw.openvpn.ipredator.se] Peer Connection Initiated with 46.246.43.2:1194
- 2013-10-02 08:03:33 MANAGEMENT: >STATE:1380690213,GET_CONFIG,
- 2013-10-02 08:03:35 SENT CONTROL [pw.openvpn.ipredator.se]: 'PUSH_REQUEST' (status=1)
- 2013-10-02 08:03:35 AUTH: Received AUTH_FAILED control message
- 2013-10-02 08:03:35 SIGUSR1[soft,auth-failure] received, process restarting
- 2013-10-02 08:03:35 MANAGEMENT: >STATE:1380690215,RECONNECTING,auth-failure,
- 2013-10-02 08:03:39 MANAGEMENT: CMD 'hold release'
- 2013-10-02 08:03:39 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2013-10-02 08:03:39 LZO compression initialized
- 2013-10-02 08:03:39 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
- 2013-10-02 08:03:39 Socket Buffers: R=[196724->65536] S=[9216->65536]
- 2013-10-02 08:03:39 MANAGEMENT: >STATE:1380690219,RESOLVE,
- 2013-10-02 08:03:39 RESOLVE: NOTE: pw.openvpn.ipredator.se resolves to 20 addresses
- 2013-10-02 08:03:39 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
- 2013-10-02 08:03:39 Local Options hash (VER=V4): '5b243d85'
- 2013-10-02 08:03:39 Expected Remote Options hash (VER=V4): '0b024030'
- 2013-10-02 08:03:39 UDPv4 link remote: 46.246.43.2:1194
- 2013-10-02 08:03:39 MANAGEMENT: >STATE:1380690219,WAIT,
- 2013-10-02 08:03:39 MANAGEMENT: >STATE:1380690219,AUTH,
- 2013-10-02 08:03:39 TLS: Initial packet from 46.246.43.2:1194, sid=51118858 d07092e4
- 2013-10-02 08:03:39 VERIFY OK: depth=1, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=Royal_Swedish_Beer_Squadron_CA/emailAddress=hostmaster@ipredator.se
- 2013-10-02 08:03:39 VERIFY OK: depth=0, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=pw.openvpn.ipredator.se/emailAddress=hostmaster@ipredator.se
- 2013-10-02 08:03:39 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2013-10-02 08:03:39 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2013-10-02 08:03:39 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2013-10-02 08:03:39 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2013-10-02 08:03:39 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- 2013-10-02 08:03:39 [pw.openvpn.ipredator.se] Peer Connection Initiated with 46.246.43.2:1194
- 2013-10-02 08:03:40 MANAGEMENT: >STATE:1380690220,GET_CONFIG,
- 2013-10-02 08:03:41 SENT CONTROL [pw.openvpn.ipredator.se]: 'PUSH_REQUEST' (status=1)
- 2013-10-02 08:03:41 AUTH: Received AUTH_FAILED control message
- 2013-10-02 08:03:41 SIGUSR1[soft,auth-failure] received, process restarting
- 2013-10-02 08:03:41 MANAGEMENT: >STATE:1380690221,RECONNECTING,auth-failure,
- 2013-10-02 08:03:43 MANAGEMENT: CMD 'hold release'
- 2013-10-02 08:03:43 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2013-10-02 08:03:43 LZO compression initialized
- 2013-10-02 08:03:43 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
- 2013-10-02 08:03:43 Socket Buffers: R=[196724->65536] S=[9216->65536]
- 2013-10-02 08:03:43 MANAGEMENT: >STATE:1380690223,RESOLVE,
- 2013-10-02 08:03:43 RESOLVE: NOTE: pw.openvpn.ipredator.se resolves to 20 addresses
- 2013-10-02 08:03:43 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
- 2013-10-02 08:03:43 Local Options hash (VER=V4): '5b243d85'
- 2013-10-02 08:03:43 Expected Remote Options hash (VER=V4): '0b024030'
- 2013-10-02 08:03:43 UDPv4 link remote: 46.246.43.2:1194
- 2013-10-02 08:03:43 MANAGEMENT: >STATE:1380690223,WAIT,
- 2013-10-02 08:03:43 MANAGEMENT: >STATE:1380690223,AUTH,
- 2013-10-02 08:03:43 TLS: Initial packet from 46.246.43.2:1194, sid=e45b3a7c 0590aaf8
- 2013-10-02 08:03:44 VERIFY OK: depth=1, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=Royal_Swedish_Beer_Squadron_CA/emailAddress=hostmaster@ipredator.se
- 2013-10-02 08:03:44 VERIFY OK: depth=0, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=pw.openvpn.ipredator.se/emailAddress=hostmaster@ipredator.se
- 2013-10-02 08:03:44 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2013-10-02 08:03:44 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2013-10-02 08:03:44 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2013-10-02 08:03:44 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2013-10-02 08:03:44 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- 2013-10-02 08:03:44 [pw.openvpn.ipredator.se] Peer Connection Initiated with 46.246.43.2:1194
- 2013-10-02 08:03:45 MANAGEMENT: >STATE:1380690225,GET_CONFIG,
- 2013-10-02 08:03:46 SENT CONTROL [pw.openvpn.ipredator.se]: 'PUSH_REQUEST' (status=1)
- 2013-10-02 08:03:46 AUTH: Received AUTH_FAILED control message
- 2013-10-02 08:03:46 SIGUSR1[soft,auth-failure] received, process restarting
- 2013-10-02 08:03:46 MANAGEMENT: >STATE:1380690226,RECONNECTING,auth-failure,
- 2013-10-02 08:04:08 MANAGEMENT: CMD 'hold release'
- 2013-10-02 08:04:08 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2013-10-02 08:04:08 LZO compression initialized
- 2013-10-02 08:04:08 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
- 2013-10-02 08:04:08 Socket Buffers: R=[196724->65536] S=[9216->65536]
- 2013-10-02 08:04:08 MANAGEMENT: >STATE:1380690248,RESOLVE,
- 2013-10-02 08:04:08 RESOLVE: NOTE: pw.openvpn.ipredator.se resolves to 20 addresses
- 2013-10-02 08:04:08 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
- 2013-10-02 08:04:08 Local Options hash (VER=V4): '5b243d85'
- 2013-10-02 08:04:08 Expected Remote Options hash (VER=V4): '0b024030'
- 2013-10-02 08:04:08 UDPv4 link remote: 46.246.43.2:1194
- 2013-10-02 08:04:08 MANAGEMENT: >STATE:1380690248,WAIT,
- 2013-10-02 08:04:08 MANAGEMENT: >STATE:1380690248,AUTH,
- 2013-10-02 08:04:08 TLS: Initial packet from 46.246.43.2:1194, sid=6af60335 41e1d889
- 2013-10-02 08:04:08 VERIFY OK: depth=1, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=Royal_Swedish_Beer_Squadron_CA/emailAddress=hostmaster@ipredator.se
- 2013-10-02 08:04:08 VERIFY OK: depth=0, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=pw.openvpn.ipredator.se/emailAddress=hostmaster@ipredator.se
- 2013-10-02 08:04:08 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2013-10-02 08:04:08 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2013-10-02 08:04:08 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2013-10-02 08:04:08 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2013-10-02 08:04:08 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- 2013-10-02 08:04:08 [pw.openvpn.ipredator.se] Peer Connection Initiated with 46.246.43.2:1194
- 2013-10-02 08:04:09 MANAGEMENT: >STATE:1380690249,GET_CONFIG,
- 2013-10-02 08:04:10 SENT CONTROL [pw.openvpn.ipredator.se]: 'PUSH_REQUEST' (status=1)
- 2013-10-02 08:04:10 AUTH: Received AUTH_FAILED control message
- 2013-10-02 08:04:10 SIGUSR1[soft,auth-failure] received, process restarting
- 2013-10-02 08:04:10 MANAGEMENT: >STATE:1380690250,RECONNECTING,auth-failure,
- 2013-10-02 08:04:15 MANAGEMENT: CMD 'hold release'
- 2013-10-02 08:04:15 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2013-10-02 08:04:15 LZO compression initialized
- 2013-10-02 08:04:15 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
- 2013-10-02 08:04:15 Socket Buffers: R=[196724->65536] S=[9216->65536]
- 2013-10-02 08:04:15 MANAGEMENT: >STATE:1380690255,RESOLVE,
- 2013-10-02 08:04:15 RESOLVE: NOTE: pw.openvpn.ipredator.se resolves to 20 addresses
- 2013-10-02 08:04:15 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
- 2013-10-02 08:04:15 Local Options hash (VER=V4): '5b243d85'
- 2013-10-02 08:04:15 Expected Remote Options hash (VER=V4): '0b024030'
- 2013-10-02 08:04:15 UDPv4 link remote: 46.246.43.2:1194
- 2013-10-02 08:04:15 MANAGEMENT: >STATE:1380690255,WAIT,
- 2013-10-02 08:04:15 MANAGEMENT: >STATE:1380690255,AUTH,
- 2013-10-02 08:04:15 TLS: Initial packet from 46.246.43.2:1194, sid=c1107166 996a608e
- 2013-10-02 08:04:15 VERIFY OK: depth=1, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=Royal_Swedish_Beer_Squadron_CA/emailAddress=hostmaster@ipredator.se
- 2013-10-02 08:04:15 VERIFY OK: depth=0, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=pw.openvpn.ipredator.se/emailAddress=hostmaster@ipredator.se
- 2013-10-02 08:04:15 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2013-10-02 08:04:15 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2013-10-02 08:04:15 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2013-10-02 08:04:15 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2013-10-02 08:04:15 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- 2013-10-02 08:04:15 [pw.openvpn.ipredator.se] Peer Connection Initiated with 46.246.43.2:1194
- 2013-10-02 08:04:16 MANAGEMENT: >STATE:1380690256,GET_CONFIG,
- 2013-10-02 08:04:17 SENT CONTROL [pw.openvpn.ipredator.se]: 'PUSH_REQUEST' (status=1)
- 2013-10-02 08:04:17 AUTH: Received AUTH_FAILED control message
- 2013-10-02 08:04:17 SIGUSR1[soft,auth-failure] received, process restarting
- 2013-10-02 08:04:17 MANAGEMENT: >STATE:1380690257,RECONNECTING,auth-failure,
- 2013-10-02 08:04:20 MANAGEMENT: CMD 'hold release'
- 2013-10-02 08:04:20 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2013-10-02 08:04:20 LZO compression initialized
- 2013-10-02 08:04:20 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
- 2013-10-02 08:04:20 Socket Buffers: R=[196724->65536] S=[9216->65536]
- 2013-10-02 08:04:20 MANAGEMENT: >STATE:1380690260,RESOLVE,
- 2013-10-02 08:04:20 RESOLVE: NOTE: pw.openvpn.ipredator.se resolves to 20 addresses
- 2013-10-02 08:04:20 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
- 2013-10-02 08:04:20 Local Options hash (VER=V4): '5b243d85'
- 2013-10-02 08:04:20 Expected Remote Options hash (VER=V4): '0b024030'
- 2013-10-02 08:04:20 UDPv4 link remote: 46.246.43.2:1194
- 2013-10-02 08:04:20 MANAGEMENT: >STATE:1380690260,WAIT,
- 2013-10-02 08:04:20 MANAGEMENT: >STATE:1380690260,AUTH,
- 2013-10-02 08:04:20 TLS: Initial packet from 46.246.43.2:1194, sid=a6d42eaf d3c7e889
- 2013-10-02 08:04:20 VERIFY OK: depth=1, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=Royal_Swedish_Beer_Squadron_CA/emailAddress=hostmaster@ipredator.se
- 2013-10-02 08:04:20 VERIFY OK: depth=0, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=pw.openvpn.ipredator.se/emailAddress=hostmaster@ipredator.se
- 2013-10-02 08:04:20 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2013-10-02 08:04:20 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2013-10-02 08:04:20 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2013-10-02 08:04:20 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2013-10-02 08:04:20 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- 2013-10-02 08:04:20 [pw.openvpn.ipredator.se] Peer Connection Initiated with 46.246.43.2:1194
- 2013-10-02 08:04:21 MANAGEMENT: >STATE:1380690261,GET_CONFIG,
- 2013-10-02 08:04:22 SENT CONTROL [pw.openvpn.ipredator.se]: 'PUSH_REQUEST' (status=1)
- 2013-10-02 08:04:22 AUTH: Received AUTH_FAILED control message
- 2013-10-02 08:04:22 SIGUSR1[soft,auth-failure] received, process restarting
- 2013-10-02 08:04:22 MANAGEMENT: >STATE:1380690262,RECONNECTING,auth-failure,
- 2013-10-02 08:04:25 MANAGEMENT: CMD 'hold release'
- 2013-10-02 08:04:25 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2013-10-02 08:04:25 LZO compression initialized
- 2013-10-02 08:04:25 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
- 2013-10-02 08:04:25 Socket Buffers: R=[196724->65536] S=[9216->65536]
- 2013-10-02 08:04:25 MANAGEMENT: >STATE:1380690265,RESOLVE,
- 2013-10-02 08:04:25 RESOLVE: NOTE: pw.openvpn.ipredator.se resolves to 20 addresses
- 2013-10-02 08:04:25 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
- 2013-10-02 08:04:25 Local Options hash (VER=V4): '5b243d85'
- 2013-10-02 08:04:25 Expected Remote Options hash (VER=V4): '0b024030'
- 2013-10-02 08:04:25 UDPv4 link remote: 46.246.43.2:1194
- 2013-10-02 08:04:25 MANAGEMENT: >STATE:1380690265,WAIT,
- 2013-10-02 08:04:25 MANAGEMENT: >STATE:1380690265,AUTH,
- 2013-10-02 08:04:25 TLS: Initial packet from 46.246.43.2:1194, sid=c7815a50 f7504741
- 2013-10-02 08:04:25 VERIFY OK: depth=1, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=Royal_Swedish_Beer_Squadron_CA/emailAddress=hostmaster@ipredator.se
- 2013-10-02 08:04:25 VERIFY OK: depth=0, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=pw.openvpn.ipredator.se/emailAddress=hostmaster@ipredator.se
- 2013-10-02 08:04:25 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2013-10-02 08:04:25 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2013-10-02 08:04:25 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2013-10-02 08:04:25 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2013-10-02 08:04:25 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- 2013-10-02 08:04:25 [pw.openvpn.ipredator.se] Peer Connection Initiated with 46.246.43.2:1194
- 2013-10-02 08:04:26 MANAGEMENT: >STATE:1380690266,GET_CONFIG,
- 2013-10-02 08:04:27 SENT CONTROL [pw.openvpn.ipredator.se]: 'PUSH_REQUEST' (status=1)
- 2013-10-02 08:04:27 AUTH: Received AUTH_FAILED control message
- 2013-10-02 08:04:27 SIGUSR1[soft,auth-failure] received, process restarting
- 2013-10-02 08:04:27 MANAGEMENT: >STATE:1380690267,RECONNECTING,auth-failure,
- 2013-10-02 08:04:29 MANAGEMENT: CMD 'hold release'
- 2013-10-02 08:04:29 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2013-10-02 08:04:29 LZO compression initialized
- 2013-10-02 08:04:29 Control Channel MTU parms [ L:1558 D:166 EF:66 EB:0 ET:0 EL:0 ]
- 2013-10-02 08:04:29 Socket Buffers: R=[196724->65536] S=[9216->65536]
- 2013-10-02 08:04:29 MANAGEMENT: >STATE:1380690269,RESOLVE,
- 2013-10-02 08:04:29 RESOLVE: NOTE: pw.openvpn.ipredator.se resolves to 20 addresses
- 2013-10-02 08:04:29 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:135 ET:0 EL:0 AF:3/1 ]
- 2013-10-02 08:04:29 Local Options hash (VER=V4): '5b243d85'
- 2013-10-02 08:04:29 Expected Remote Options hash (VER=V4): '0b024030'
- 2013-10-02 08:04:29 UDPv4 link remote: 46.246.43.2:1194
- 2013-10-02 08:04:29 MANAGEMENT: >STATE:1380690269,WAIT,
- 2013-10-02 08:04:29 MANAGEMENT: >STATE:1380690269,AUTH,
- 2013-10-02 08:04:29 TLS: Initial packet from 46.246.43.2:1194, sid=0d55aa6a e08bc765
- 2013-10-02 08:04:29 VERIFY OK: depth=1, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=Royal_Swedish_Beer_Squadron_CA/emailAddress=hostmaster@ipredator.se
- 2013-10-02 08:04:29 VERIFY OK: depth=0, /C=SE/ST=Bryggland/L=Oeldal/O=Royal_Swedish_Beer_Squadron/OU=Internetz/CN=pw.openvpn.ipredator.se/emailAddress=hostmaster@ipredator.se
- 2013-10-02 08:04:29 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2013-10-02 08:04:29 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2013-10-02 08:04:29 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2013-10-02 08:04:29 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2013-10-02 08:04:29 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- 2013-10-02 08:04:29 [pw.openvpn.ipredator.se] Peer Connection Initiated with 46.246.43.2:1194
- 2013-10-02 08:04:30 MANAGEMENT: >STATE:1380690270,GET_CONFIG,
- 2013-10-02 08:04:32 SENT CONTROL [pw.openvpn.ipredator.se]: 'PUSH_REQUEST' (status=1)
- 2013-10-02 08:04:32 AUTH: Received AUTH_FAILED control message
- 2013-10-02 08:04:32 SIGUSR1[soft,auth-failure] received, process restarting
- 2013-10-02 08:04:32 MANAGEMENT: >STATE:1380690272,RECONNECTING,auth-failure,
- 2013-10-02 08:04:37 *Tunnelblick: Disconnecting; user cancelled authorization or there was an error obtaining authorization
- 2013-10-02 08:04:37 SIGTERM[hard,init_instance] received, process exiting
- 2013-10-02 08:04:37 MANAGEMENT: >STATE:1380690277,EXITING,init_instance,
- 2013-10-02 08:04:37 *Tunnelblick: Flushed the DNS cache
Tunnelblick 3.2 3 Dmg Torrent
How To - Configure SSL VPN for Mac OS X using Tunnelblick VPN client Applicable Version: 10.00 onwards Overview Tunnelblick is an open source graphic user interface for SSL VPN on Mac OS X. Documents - Tunnelblick Free open source OpenVPN VPN client server software for macOS. Includes OpenVPN, OpenSSL, easy-rsa, and drivers.