Mac OS X Clients and Installation There are three client options for Mac OS X.:. The OpenVPN command line client.
Download.com offers no downloadable file for this product and presents data on the last available version for informational purposes only. To download OpenVPN, please go to the main OpenVPN website.
Most users prefer a graphical client, so this option will not be covered. Tunnelblick, a free option available for download at the.
The commercial. At the time of this writing, it costs $9 USD for a single seat. If OpenVPN is used frequently, Viscosity is a much nicer client and well worth the cost.
Both Tunnelblick and Viscosity are easily installed, with no configuration options during installation. Configuring Viscosity When using the Viscosity client, it can be configured manually or the OpenVPN Client Export package may be used to import the configuration. Viscosity provides a GUI configuration tool that can be used to generate the underlying OpenVPN client configuration. The CA and certificates can be imported manually, and all of the parameters can be set by hand. This section cover importing a Viscosity bundle from the export package. Download a copy of the Viscosity bundle for the client from the OpenVPN Client Export package.
Locate the saved file, which will end in.visc.zip indicating that it is a compressed archive. Copy this exported bundle to a folder on the Mac. Double click this file and it will expand to Viscosity.visc.
Double click Viscosity.visc and Viscosity will open and import the connection as shown in Figure. Viscosity Details Clicking the up/down arrow button in the middle of the details screen displays additional network traffic statistics. This shows the traffic sent within the tunnel (TUN/TAP In and Out), as well as the total TCP or UDP traffic sent including the overhead of the tunnel and encryption. For connections using primarily small packets the overhead is considerable with all VPN solutions. The stats shown in Figure are from only a few pings traversing the connection. The traffic sent in bringing up the connection is also counted here, so the initial overhead is higher than what it will be after being connected for some time. Also, the typical VPN traffic will have larger packet sizes than 64 byte pings, making the total overhead and difference between these two numbers considerably less.
On This Page Release Downloads To be notified of new releases, use Tunnelblick's built-in update mechanism or subscribe to the. Beta versions are suitable for most users. See for details.
There have been false reports of malware in Tunnelblick. See for details. Beta (build 5210, macOS and OS X 10.7.5, Intel-64 only) released 2019-2-27 SHA1: df4010eea5b853e93dd288c236b5e397273901e8 MD5: c0241dd196a6f239dfca8db8e42c3666 SHA256: af798f603246d60f4e76ea49e56602ec855a473dc1d6ac1d8cb1fe Stable (build 5180, macOS and OS X 10.7.5, Intel-64 only) released 2018-11-29 SHA1: 1b247c1281f9ed487307a7afa41a0a8c76c3a9a2 MD5: 6dd5de7665a6b6cbb58db0981dd3b05f SHA256: 0918551e80b3f861eb075cae790f3834a81a163a27a1451bda3370 Older See the.
Includes versions for OS X 10.4 - 10.7.4. Uninstaller Please read before using Tunnelblick Uninstaller (build 5090, macOS and OS X 10.7.5, Intel-64 only) released 2018-06-26 SHA1: c4577e1ab0cc646ba983 MD5: 0b8c3f0898ca88f4bbe90fe61271d7ab SHA256: 62b528da3212fd78146c6bcf03d88f4fb61f4f62029a3af791ef42 Verifying Downloads You should verify all downloads. Even though https:, the.dmg format, and the application's macOS digital signature provide some protection, they can be circumvented. Verifying Hashes Comparing the SHA256, SHA1, and MD5 hashes of your downloaded file with the official published ones will provide additional assurance that the download is legitimate and has not been modified. You can compare the hashes with programs included with macOS without the need to install additional software.
To compute the hashes of a file you've downloaded, type the following into /Applications/Utilities/Terminal: shasum -a 256 path-to-the-file openssl sha1 path-to-the-file openssl md5 path-to-the-file Then compare the computed hashes with the values shown near the link for the downloaded file. (Don't type ' path-to-the-file' — type the path to the file, that is, the sequence of folders that contain the file plus the file name (e.g. An easy way to get it into Terminal is to drag/drop the file anywhere in the Terminal window.
The pointer will turn into a green and white plus sign ('+') to indicate the path will be dropped. So you would type ' shasum -a 256 ' — with a space at the end — and then drag/drop the disk image file anywhere in the Terminal window.) For additional assurance that the hashes displayed on this site have not been compromised, the hashes are also available in the description of each 'Release' on, which is hosted and administered separately from this site. Verifying GnuPG Signatures Recent Tunnelblick disk images are also signed with. To prepare for verifying signatures, you should download and install GnuPG 2.2.3 or higher, and then add the (key ID 6BB9367E, fingerprint 76DF 975A 1C56 4277 4FB0 9868 FF5F D80E 6BB9 367E) to your trusted GnuPG keyring by typing the following into /Applications/Utilities/Terminal: gpg -import TunnelblickSecurityPublicKey.asc. To verify the signature of a file, download the corresponding signature file and then type the following into /Applications/Utilities/Terminal: gpg -verify path-to-the-signature-file path-to-the-disk-image-file The result should be similar to the following: gpg: Signature made Sat Dec 16 19: EST gpg: using RSA key B4D96F0D6A58E335A0F4923A2FF3A2B2DC6FD12C gpg: Good signature from 'Tunnelblick Security ' ultimate User Contributions These downloads have been contributed by users and usually help deal with special circumstances. They are not endorsed or checked by the Tunnelblick project, and you use them at your own risk.
To contribute a download, or post it on the. Before using these scripts, please read. (Actually, everyone using a VPN should read that!) Note: these scripts are executed as root. Scripts to Unload Cisco Tun Kext: SHA1: d3b09a2284de2862be7d5508930b28 MD5: f6f07ee5c7206a5b056b12 Contributed by 'petiepooo'. These scripts unload the Cisco AnyConnect tun kext before a Tunnelblick connection is started, and reload the Cisco tun kext after a Tunnelblick connection is stopped. (The Cisco kext interferes with Tunnelblick's operation of tun connections.) Scripts to Mount/Unmount a Volume: SHA1: eb69727620fa8c46633d9ccf9f86c4b258fea7e6 MD5: 5b3b04bea43403b2a709aaa4c92d7473 Contributed by John Griffis. These scripts mount a volume after a configuration is connected and unmount it when the configuration is disconnected.
Scripts must be edited before use (in any plain-text editor) to specify details of the volume to be connected. For a note about connecting to a CIFS account, see. Scripts to Monitor Connection Time and Bandwidth Use: SHA1: 384b370967e722eacb2f3a782e8c33 MD5: 2c23ed5cfb5ea36fd5dd74 Contributed by 'vkapovit'.
![]()
These scripts provide a mechanism for the user to be alerted when the VPN has been up for more than 20 minutes or when bandwidth has exceeded 100MB. See for details. Requires Growl. Includes compiled binaries; use at your own risk. Scripts to Launch and Kill a Program: SHA1: 977aa7cc55f3e191b50057fe766c426af01808eb MD5: beccc55286b398fe0a8bcb798e25a883 Contributed by 'anonymous'. These scripts cause a program to be launched when a VPN is connected and then killed when the VPN is disconnected.
It can be used with a torrent program, for example, so that the program is only active when the VPN is connected. Note that there may be a short time after the VPN has been disconnected before the program is killed. Download Integrity In June 2015 there was much discussion (and outrage) about SourceForge providing downloads that contain unwanted or malicious software; SourceForge has changed their policies to help avoid this. Tunnelblick binaries were hosted on SourceForge from the fall of 2013, when Google Code stopped hosting new binaries, until 2015-07-17, when they were moved from SourceForge to GitHub. Tunnelblick protects against unwanted software insertions by publishing the SHA1 and MD5 hashes for each of our downloads. You should verify the hashes of all Tunnelblick downloads by following the instructions above. Additional safeguards automatically protect updates performed by Tunnelblick's built-in update mechanism:.
Updates are controlled by tunnelblick.net and all update data is transported via https:. Update downloads contain digital signatures to verify they have not been modified. (This is in addition to the macOS digital signature of the Tunnelblick application itself.) See.
Comments are closed.
|
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |