2022-09-23 15:20:22.122207+0800 0x54d6 Default 0x0 3400 0 kmutil: finding bundles at additional paths: 2022-09-23 15:20:22.122269+0800 0x5323 Default 0xad13 631 0 tccd: [com.apple.TCC:access] AUTHREQ_RESULT: msgID=138.88, authValue=1, authReason=0, authVersion=1, error=(null), 2022-09-23 15:20:22.122560+0800 0x5323 Default 0xad13 631 0 tccd: [com.apple.TCC:access] REPLY: (501) function=TCCAccessRequest, msgID=138.88 2022-09-23 15:20:22.122658+0800 0x330c Activity 0xad14 138 0 mds: (TCC) TCCAccessRequest() IPC 2022-09-23 15:20:22.122892+0800 0x5323 Default 0xad14 631 0 tccd: [com.apple.TCC:access] REQUEST: tccd_uid=501, sender_pid=138, sender_uid=0, sender_auid=-1, function=TCCAccessRequest, msgID=138.89 2022-09-23 15:20:22.124545+0800 0x5323 Default 0xad14 631 0 tccd: [com.apple.TCC:access] AUTHREQ_CTX: msgID=138.89, function=, service=kTCCServiceCalendar, preflight=yes, query=1, 2022-09-23 15:20:22.124580+0800 0x5323 Default 0xad14 631 0 tccd: [com.apple.TCC:access] AUTHREQ_ATTRIBUTION: msgID=138.89, attribution={accessing={}, requesting={}, }, 2022-09-23 15:20:22.144185+0800 0x5323 Default 0xad14 631 0 tccd: [com.apple.TCC:access] AUTHREQ_SUBJECT: msgID=138.89, subject=com.citrix.NetScalerGateway.macos.app, 2022-09-23 15:20:22.148101+0800 0x5323 Default 0xad14 631 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity staticCode]: static code for: identifier com.citrix.NetScalerGateway.macos.app, type: 0: 0x7f899983b580 at /Applications/Citrix Secure Access.app 2022-09-23 15:20:22.150976+0800 0x5323 Activity 0xad51 631 0 tccd: (Security) SecTrustEvaluateIfNecessary 2022-09-23 15:20:22.155999+0800 0x5323 Default 0xad14 631 0 tccd: [com.apple.TCC:access] AUTHREQ_RESULT: msgID=138.89, authValue=1, authReason=0, authVersion=1, error=(null), 2022-09-23 15:20:22.156316+0800 0x5323 Default 0xad14 631 0 tccd: [com.apple.TCC:access] REPLY: (501) function=TCCAccessRequest, msgID=138.89 2022-09-23 15:20:22.156535+0800 0x330c Activity 0xad15 138 0 mds: (TCC) TCCAccessRequest() IPC 2022-09-23 15:20:22.156882+0800 0x5323 Default 0xad15 631 0 tccd: [com.apple.TCC:access] REQUEST: tccd_uid=501, sender_pid=138, sender_uid=0, sender_auid=-1, function=TCCAccessRequest, msgID=138.90 2022-09-23 15:20:22.158200+0800 0x5323 Default 0xad15 631 0 tccd: [com.apple.TCC:access] AUTHREQ_CTX: msgID=138.90, function=, service=kTCCServiceReminders, preflight=yes, query=1, 2022-09-23 15:20:22.158236+0800 0x5323 Default 0xad15 631 0 tccd: [com.apple.TCC:access] AUTHREQ_ATTRIBUTION: msgID=138.90, attribution={accessing={}, requesting={}, }, 2022-09-23 15:20:22.194291+0800 0x5323 Default 0xad15 631 0 tccd: [com.apple.TCC:access] AUTHREQ_SUBJECT: msgID=138.90, subject=com.citrix.NetScalerGateway.macos.app, 2022-09-23 15:20:22.196322+0800 0x5323 Default 0xad15 631 0 tccd: [com.apple.TCC:access] -[TCCDAccessIdentity staticCode]: static code for: identifier com.citrix.NetScalerGateway.macos.app, type: 0: 0x7f89998174c0 at /Applications/Citrix Secure Access.app 2022-09-23 15:20:22.198334+0800 0x5323 Activity 0xad52 631 0 tccd: (Security) SecTrustEvaluateIfNecessary 2022-09-23 15:20:22.203338+0800 0x5323 Default 0xad15 631 0 tccd: [com.apple.TCC:access] AUTHREQ_RESULT: msgID=138.90, authValue=1, authReason=0, authVersion=1, error=(null), 2022-09-23 15:20:22.203692+0800 0x5323 Default 0xad15 631 0 tccd: [com.apple.TCC:access] REPLY: (501) function=TCCAccessRequest, msgID=138.90 2022-09-23 15:20:22.283087+0800 0x54d6 Default 0x0 3400 0 kmutil: (CoreAnalytics) [com.apple.CoreAnalytics:client] Entering exit handler. 2022-09-23 15:20:22.283094+0800 0x54d6 Default 0x0 3400 0 kmutil: (CoreAnalytics) [com.apple.CoreAnalytics:client] Exiting exit handler. 2022-09-23 15:20:22.300932+0800 0x732 Activity 0xca4c 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.303442+0800 0x732 Activity 0xca4d 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.341260+0800 0xf53 Default 0xcf05 600 0 distnoted: [com.apple.distnoted:diagnostic] register name: AppleColorPreferencesChangedNotification object: kCFNotificationAnyObject token: 100000000 pid: 3401 2022-09-23 15:20:22.343020+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.0A000000-0600-0000-0000-000000000000:] internal event: WILL_SPAWN, code = 0 2022-09-23 15:20:22.343101+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.0A000000-0600-0000-0000-000000000000:] service state: spawn scheduled 2022-09-23 15:20:22.343105+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.0A000000-0600-0000-0000-000000000000:] service state: spawning 2022-09-23 15:20:22.343245+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.0A000000-0600-0000-0000-000000000000:] launching: ipc (mach) 2022-09-23 15:20:22.343859+0800 0x54fa Activity 0xcf0a 3401 0 VPNExtensionX: (TCC) TCCAccessRequest() IPC 2022-09-23 15:20:22.344889+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.0A000000-0600-0000-0000-000000000000 [3404]:] xpcproxy spawned with pid 3404 2022-09-23 15:20:22.344919+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.0A000000-0600-0000-0000-000000000000 [3404]:] internal event: SPAWNED, code = 0 2022-09-23 15:20:22.344927+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.0A000000-0600-0000-0000-000000000000 [3404]:] service state: xpcproxy 2022-09-23 15:20:22.344997+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.0A000000-0600-0000-0000-000000000000 [3404]:] internal event: SOURCE_ATTACH, code = 0 2022-09-23 15:20:22.345672+0800 0x532f Default 0xcf0a 192 0 tccd: [com.apple.TCC:access] REQUEST: tccd_uid=0, sender_pid=3401, sender_uid=501, sender_auid=501, function=TCCAccessRequest, msgID=3401.1 2022-09-23 15:20:22.346219+0800 0x5075 Default 0x0 3152 0 mdworker_shared: (Security) [com.apple.securityd:security_exception] MacOS error: -67028 2022-09-23 15:20:22.346373+0800 0x550c Default 0x0 3403 0 kmutil: kmutil (KernelManagement_executables-262.41.2) invoked (by pid 3402/kextstat): 2022-09-23 15:20:22.346654+0800 0x532f Default 0xcf0a 192 0 tccd: [com.apple.TCC:access] AUTHREQ_CTX: msgID=3401.1, function=, service=kTCCServiceListenEvent, preflight=yes, query=1, 2022-09-23 15:20:22.346684+0800 0x532f Default 0xcf0a 192 0 tccd: [com.apple.TCC:access] AUTHREQ_ATTRIBUTION: msgID=3401.1, attribution={requesting={}, }, 2022-09-23 15:20:22.351120+0800 0x5075 Default 0x0 3152 0 mdworker_shared: (Security) [com.apple.securityd:security_exception] MacOS error: -67028 2022-09-23 15:20:22.352112+0800 0x550f Activity 0xcf30 3404 0 xpcproxy: (libsystem_info.dylib) Retrieve User by ID 2022-09-23 15:20:22.352895+0800 0x550f Activity 0xcf31 3404 0 xpcproxy: (libsystem_info.dylib) Resolve user group list 2022-09-23 15:20:22.353614+0800 0x550f Activity 0xcf32 3404 0 xpcproxy: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.357726+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.0A000000-0600-0000-0000-000000000000 [3404]:] service state: running 2022-09-23 15:20:22.357751+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.0A000000-0600-0000-0000-000000000000 [3404]:] internal event: INIT, code = 0 2022-09-23 15:20:22.357772+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.0A000000-0600-0000-0000-000000000000 [3404]:] Successfully spawned mdworker_shared[3404] because ipc (mach) 2022-09-23 15:20:22.358197+0800 0x532f Default 0xcf0a 192 0 tccd: [com.apple.TCC:access] AUTHREQ_SUBJECT: msgID=3401.1, subject=com.citrix.NetScalerGateway.macos.app.vpnplugin, 2022-09-23 15:20:22.360797+0800 0x5511 Error 0xcf0a 192 0 tccd: [com.apple.TCC:access] Failed to create LSApplicationRecord for file:///Applications/Citrix%20Secure%20Access.app/Contents/PlugIns/VPNExtensionX.appex/: 'The operation couldn’t be completed. (OSStatus error -10811.)' 2022-09-23 15:20:22.361009+0800 0x532f Default 0xcf0a 192 0 tccd: [com.apple.TCC:access] AUTHREQ_RESULT: msgID=3401.1, authValue=1, authReason=5, authVersion=1, error=(null), 2022-09-23 15:20:22.361275+0800 0x532f Default 0xcf0a 192 0 tccd: [com.apple.TCC:access] REPLY: (0) function=TCCAccessRequest, msgID=3401.1 2022-09-23 15:20:22.366230+0800 0x732 Activity 0xca4e 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.368211+0800 0x732 Activity 0xca4f 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.369469+0800 0x732 Activity 0xcf40 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.370190+0800 0x732 Activity 0xcf41 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.370793+0800 0x2ec Activity 0xacd7 191 0 WindowServer: (TCC) TCCAccessRequest() IPC 2022-09-23 15:20:22.370964+0800 0x532f Default 0xacd7 192 0 tccd: [com.apple.TCC:access] REQUEST: tccd_uid=0, sender_pid=191, sender_uid=88, sender_auid=-1, function=TCCAccessRequest, msgID=191.101 2022-09-23 15:20:22.374332+0800 0x532f Default 0xacd7 192 0 tccd: [com.apple.TCC:access] AUTHREQ_CTX: msgID=191.101, function=, service=kTCCServiceListenEvent, preflight=yes, query=1, 2022-09-23 15:20:22.374362+0800 0x532f Default 0xacd7 192 0 tccd: [com.apple.TCC:access] AUTHREQ_ATTRIBUTION: msgID=191.101, attribution={accessing={}, requesting={}, }, 2022-09-23 15:20:22.374390+0800 0x532f Default 0xacd7 192 0 tccd: [com.apple.TCC:access] requestor: is checking access for accessor 2022-09-23 15:20:22.381412+0800 0x5510 Activity 0xcf50 3404 0 mdworker_shared: (libsystem_info.dylib) Retrieve User by ID 2022-09-23 15:20:22.382753+0800 0x532f Default 0xacd7 192 0 tccd: [com.apple.TCC:access] AUTHREQ_SUBJECT: msgID=191.101, subject=com.citrix.NetScalerGateway.macos.app.vpnplugin, 2022-09-23 15:20:22.384493+0800 0x5511 Error 0xacd7 192 0 tccd: [com.apple.TCC:access] Failed to create LSApplicationRecord for file:///Applications/Citrix%20Secure%20Access.app/Contents/PlugIns/VPNExtensionX.appex/: 'The operation couldn’t be completed. (OSStatus error -10811.)' 2022-09-23 15:20:22.384828+0800 0x532f Default 0xacd7 192 0 tccd: [com.apple.TCC:access] AUTHREQ_RESULT: msgID=191.101, authValue=1, authReason=5, authVersion=1, error=(null), 2022-09-23 15:20:22.384979+0800 0x532f Default 0xacd7 192 0 tccd: [com.apple.TCC:access] REPLY: (0) function=TCCAccessRequest, msgID=191.101 2022-09-23 15:20:22.389226+0800 0x550c Default 0x0 3403 0 kmutil: Initializing with settings: 2022-09-23 15:20:22.389295+0800 0x550c Default 0x0 3403 0 kmutil: Looking for the boot kernel collection 2022-09-23 15:20:22.389444+0800 0x550c Default 0x0 3403 0 kmutil: Skipping boot kernel collection, manager settings does not contain a path to it 2022-09-23 15:20:22.389450+0800 0x550c Default 0x0 3403 0 kmutil: Looking for the system kext collection 2022-09-23 15:20:22.389461+0800 0x550c Default 0x0 3403 0 kmutil: Skipping system kext collection, manager settings does not contain a path to it 2022-09-23 15:20:22.389465+0800 0x550c Default 0x0 3403 0 kmutil: Looking for the auxiliary kext collection 2022-09-23 15:20:22.389474+0800 0x550c Default 0x0 3403 0 kmutil: Skipping auxiliary kext collection, manager settings does not contain a path to it 2022-09-23 15:20:22.403529+0800 0x5513 Activity 0xcf51 3404 0 mdworker_shared: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.404638+0800 0x2ec Default 0x0 191 7 WindowServer: (SkyLight) [com.apple.SkyLight:default] [ ConnectionDebug ] New conn 0x31b6b, PID 3401 in session 257 on console 2022-09-23 15:20:22.405389+0800 0xf53 Default 0xcf05 600 0 distnoted: [com.apple.distnoted:diagnostic] register name: NSSecondaryDisplayVisChanged object: kCFNotificationAnyObject token: 200000001 pid: 3401 2022-09-23 15:20:22.406698+0800 0x54fa Default 0xcf05 3401 0 VPNExtensionX: (LaunchServices) [com.apple.processmanager:front-35286506] CHECKIN: pid=3401 2022-09-23 15:20:22.409925+0800 0x54da Activity 0xaee6 155 0 launchservicesd: (Security) SecTrustEvaluateIfNecessary 2022-09-23 15:20:22.420477+0800 0x5415 Activity 0xcf20 206 0 runningboardd: (RunningBoard) acquireAssertionWithDescriptor 2022-09-23 15:20:22.420652+0800 0x5415 Default 0xcf20 206 0 runningboardd: (RunningBoard) [com.apple.runningboard:assertion] Acquiring assertion targeting [xpcservice:722:722])(501)>:3401] from originator [daemon:155] with description ]> 2022-09-23 15:20:22.420754+0800 0x5415 Default 0xcf20 206 0 runningboardd: (RunningBoard) [com.apple.runningboard:assertion] Assertion 206-155-701 (target:[xpcservice:722:722])(501)>:3401]) will be created as active 2022-09-23 15:20:22.420935+0800 0x54ef Activity 0xcf21 206 0 runningboardd: (RunningBoard) state update 2022-09-23 15:20:22.421319+0800 0x54ef Default 0xcf20 206 0 runningboardd: (RunningBoard) [com.apple.runningboard:monitor] Calculated state for xpcservice:722:722])(501)>: running-active (role: UserInteractiveNonFocal) 2022-09-23 15:20:22.421917+0800 0x31b9 Activity 0xacd8 191 0 WindowServer: (RunningBoardServices) observedProcessStatesDidChange 2022-09-23 15:20:22.422000+0800 0x31b9 Default 0xacd8 191 0 WindowServer: (RunningBoardServices) [com.apple.runningboard:monitor] Received state update for 3401 2022-09-23 15:20:22.422153+0800 0x54da Default 0xcf05 155 2 launchservicesd: [com.apple.launchservices:cas] CHECKIN:0x0-0x52052 3401 com.citrix.NetScalerGateway.macos.app.vpnplugin 2022-09-23 15:20:22.422835+0800 0x54fa Default 0xcf05 3401 0 VPNExtensionX: (LaunchServices) [com.apple.processmanager:front-35286506] CHECKEDIN: pid=3401 asn=0x0-0x52052 foreground=0 2022-09-23 15:20:22.424576+0800 0x5415 Activity 0xcf22 206 0 runningboardd: (RunningBoard) acquireAssertionWithDescriptor 2022-09-23 15:20:22.424933+0800 0x5415 Default 0xcf22 206 0 runningboardd: (RunningBoard) [com.apple.runningboard:assertion] Acquiring assertion targeting [xpcservice:722:722])(501)>:3401] from originator [daemon:155] with description ]> 2022-09-23 15:20:22.425048+0800 0x5415 Default 0xcf22 206 0 runningboardd: (RunningBoard) [com.apple.runningboard:assertion] Assertion 206-155-702 (target:[xpcservice:722:722])(501)>:3401]) will be created as active 2022-09-23 15:20:22.425270+0800 0x5415 Activity 0xcf23 206 0 runningboardd: (RunningBoard) state update 2022-09-23 15:20:22.427401+0800 0x329 Activity 0x95bb 196 0 loginwindow: (CoreServicesInternal) CFURLResolveBookmarkData 2022-09-23 15:20:22.427513+0800 0x54ea Default 0xcf05 626 2 ***: (LaunchServices) [com.apple.launchservices:default] Failed to register : -10811 2022-09-23 15:20:22.427703+0800 0x329 Activity 0x95bc 196 0 loginwindow: (CoreServicesInternal) CFURLResolveBookmarkData 2022-09-23 15:20:22.427712+0800 0xf53 Default 0xcf05 600 0 distnoted: [com.apple.distnoted:diagnostic] register name: AppleAppSleepPreferencesChangedNotification object: kCFNotificationAnyObject token: 300000002 pid: 3401 2022-09-23 15:20:22.428241+0800 0x54f2 Activity 0xcf24 206 0 runningboardd: (RunningBoard) invalidateAssertionWithIdentifier 2022-09-23 15:20:22.428279+0800 0x54f2 Default 0xcf24 206 0 runningboardd: (RunningBoard) [com.apple.runningboard:assertion] Invalidating assertion 206-155-701 (target:[xpcservice:722:722])(501)>:3401]) from originator [daemon:155] 2022-09-23 15:20:22.428321+0800 0x329 Activity 0x95bd 196 0 loginwindow: (CoreServicesInternal) CFURLResolveBookmarkData 2022-09-23 15:20:22.443144+0800 0x54fa Default 0xcf05 3401 0 VPNExtensionX: (HIServices) [com.apple.processmanager:front-35286506] FRONTLOGGING: version 1 2022-09-23 15:20:22.443146+0800 0x54fa Default 0xcf05 3401 0 VPNExtensionX: (HIServices) [com.apple.processmanager:front-35286506] Registered, pid=3401 ASN=0x0,0x52052 2022-09-23 15:20:22.446183+0800 0xf53 Default 0xcf05 600 0 distnoted: [com.apple.distnoted:diagnostic] register name: AppleInterfaceMenuBarHidingChangedNotification object: kCFNotificationAnyObject token: 400000003 pid: 3401 2022-09-23 15:20:22.460238+0800 0x329 Default 0x0 196 5 loginwindow: [com.apple.loginwindow.logging:Standard] -[ApplicationManager checkInAppContext:eventData:] | ApplicationManager: Checked in app : VPNExtensionX 2022-09-23 15:20:22.531565+0800 0x5415 Activity 0xcf25 206 0 runningboardd: (RunningBoard) state update 2022-09-23 15:20:22.531710+0800 0x5415 Activity 0xcf26 206 0 runningboardd: (RunningBoard) state notification 2022-09-23 15:20:22.532293+0800 0x5521 Default 0xcf05 3401 0 VPNExtensionX: Interface lo0: 2022-09-23 15:20:22.533084+0800 0x5521 Default 0xcf05 3401 0 VPNExtensionX: Keys for lo0: ( "State:/Network/Interface/lo0/LinkQuality", "State:/Network/Interface/lo0/IPv4", "State:/Network/Interface/lo0/IPv6" ) 2022-09-23 15:20:22.533348+0800 0x5521 Default 0xcf05 3401 0 VPNExtensionX: Type of State:/Network/Interface/lo0/LinkQuality is __NSSingleEntryDictionaryI 2022-09-23 15:20:22.533704+0800 0x5521 Default 0xcf05 3401 0 VPNExtensionX: Type of State:/Network/Interface/lo0/IPv4 is __NSDictionaryI 2022-09-23 15:20:22.534050+0800 0x5521 Default 0xcf05 3401 0 VPNExtensionX: Type of State:/Network/Interface/lo0/IPv6 is __NSDictionaryI 2022-09-23 15:20:22.534195+0800 0x5521 Default 0xcf05 3401 0 VPNExtensionX: Interface gif0: 2022-09-23 15:20:22.534866+0800 0x5521 Default 0xcf05 3401 0 VPNExtensionX: Keys for gif0: ( ) 2022-09-23 15:20:22.535022+0800 0x5521 Default 0xcf05 3401 0 VPNExtensionX: Interface stf0: 2022-09-23 15:20:22.535398+0800 0x5521 Default 0xcf05 3401 0 VPNExtensionX: Keys for stf0: ( ) 2022-09-23 15:20:22.535527+0800 0x5521 Default 0xcf05 3401 0 VPNExtensionX: Interface en0: 2022-09-23 15:20:22.536043+0800 0x5521 Default 0xcf05 3401 0 VPNExtensionX: Keys for en0: ( "State:/Network/Interface/en0/Link", "State:/Network/Interface/en0/CaptiveNetwork", "State:/Network/Interface/en0/IPv4", "State:/Network/Interface/en0/IPv6", "State:/Network/Interface/en0/LinkQuality", "State:/Network/Interface/en0/AirPort" ) 2022-09-23 15:20:22.536278+0800 0x5521 Default 0xcf05 3401 0 VPNExtensionX: Type of State:/Network/Interface/en0/Link is __NSSingleEntryDictionaryI 2022-09-23 15:20:22.536761+0800 0x5521 Default 0xcf05 3401 0 VPNExtensionX: Type of State:/Network/Interface/en0/CaptiveNetwork is __NSDictionaryI 2022-09-23 15:20:22.537266+0800 0x5521 Default 0xcf05 3401 0 VPNExtensionX: Type of State:/Network/Interface/en0/IPv4 is __NSDictionaryI 2022-09-23 15:20:22.537505+0800 0x5521 Default 0xcf05 3401 0 VPNExtensionX: Type of State:/Network/Interface/en0/IPv6 is __NSDictionaryI 2022-09-23 15:20:22.538005+0800 0x5521 Default 0xcf05 3401 0 VPNExtensionX: Type of State:/Network/Interface/en0/LinkQuality is __NSSingleEntryDictionaryI 2022-09-23 15:20:22.538437+0800 0x5521 Default 0xcf05 3401 0 VPNExtensionX: Type of State:/Network/Interface/en0/AirPort is __NSDictionaryI 2022-09-23 15:20:22.538615+0800 0x5521 Default 0xcf05 3401 0 VPNExtensionX: Interface en1: 2022-09-23 15:20:22.539123+0800 0x5521 Default 0xcf05 3401 0 VPNExtensionX: Keys for en1: ( "State:/Network/Interface/en1/Link", "State:/Network/Interface/en1/LinkQuality" ) 2022-09-23 15:20:22.539520+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Type of State:/Network/Interface/en1/Link is __NSSingleEntryDictionaryI 2022-09-23 15:20:22.539949+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Type of State:/Network/Interface/en1/LinkQuality is __NSSingleEntryDictionaryI 2022-09-23 15:20:22.540252+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Interface bridge0: 2022-09-23 15:20:22.541241+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Keys for bridge0: ( "State:/Network/Interface/bridge0/Link" ) 2022-09-23 15:20:22.541449+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Type of State:/Network/Interface/bridge0/Link is __NSSingleEntryDictionaryI 2022-09-23 15:20:22.541602+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Interface p2p0: 2022-09-23 15:20:22.542040+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Keys for p2p0: ( "State:/Network/Interface/p2p0/Link" ) 2022-09-23 15:20:22.542701+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Type of State:/Network/Interface/p2p0/Link is __NSSingleEntryDictionaryI 2022-09-23 15:20:22.542982+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Interface awdl0: 2022-09-23 15:20:22.543577+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Keys for awdl0: ( "State:/Network/Interface/awdl0/IPv6", "State:/Network/Interface/awdl0/Link" ) 2022-09-23 15:20:22.543918+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Type of State:/Network/Interface/awdl0/IPv6 is __NSDictionaryI 2022-09-23 15:20:22.544299+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Type of State:/Network/Interface/awdl0/Link is __NSSingleEntryDictionaryI 2022-09-23 15:20:22.544415+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Interface llw0: 2022-09-23 15:20:22.544913+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Keys for llw0: ( "State:/Network/Interface/llw0/Link", "State:/Network/Interface/llw0/IPv6" ) 2022-09-23 15:20:22.545098+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Type of State:/Network/Interface/llw0/Link is __NSSingleEntryDictionaryI 2022-09-23 15:20:22.545269+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Type of State:/Network/Interface/llw0/IPv6 is __NSDictionaryI 2022-09-23 15:20:22.545361+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Interface utun0: 2022-09-23 15:20:22.545909+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Keys for utun0: ( "State:/Network/Interface/utun0/IPv6" ) 2022-09-23 15:20:22.546183+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Type of State:/Network/Interface/utun0/IPv6 is __NSDictionaryI 2022-09-23 15:20:22.546285+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Interface utun1: 2022-09-23 15:20:22.546710+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Keys for utun1: ( "State:/Network/Interface/utun1/IPv6" ) 2022-09-23 15:20:22.546876+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Type of State:/Network/Interface/utun1/IPv6 is __NSDictionaryI 2022-09-23 15:20:22.546969+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Interface utun2: 2022-09-23 15:20:22.547591+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Keys for utun2: ( "State:/Network/Interface/utun2/IPv6" ) 2022-09-23 15:20:22.547785+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Type of State:/Network/Interface/utun2/IPv6 is __NSDictionaryI 2022-09-23 15:20:22.547877+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Interface utun3: 2022-09-23 15:20:22.548345+0800 0x5503 Default 0xcf05 3401 0 VPNExtensionX: Keys for utun3: ( ) 2022-09-23 15:20:22.554065+0800 0x4adb Default 0xcf05 198 0 analyticsd: [com.apple.analyticsd:xpc] Setting new client connection handler. 144 active connections 2022-09-23 15:20:22.554311+0800 0x5500 Default 0xcf05 3401 0 VPNExtensionX: (CoreAnalytics) [com.apple.CoreAnalytics:client] Received configuration update from daemon (initial) 2022-09-23 15:20:22.556324+0800 0x551f Activity 0xcf52 3404 0 mdworker_shared: (CoreFoundation) Loading Preferences From System CFPrefsD 2022-09-23 15:20:22.559230+0800 0x54fa Error 0xcf05 3401 0 VPNExtensionX: (libsqlite3.dylib) [com.apple.libsqlite3:logging-persist] cannot open file at line 45340 of [d24547a13b] 2022-09-23 15:20:22.559233+0800 0x54fa Error 0xcf05 3401 0 VPNExtensionX: (libsqlite3.dylib) [com.apple.libsqlite3:logging-persist] os_unix.c:45340: (2) open(/var/db/DetachedSignatures) - No such file or directory 2022-09-23 15:20:22.569392+0800 0x54fa Activity 0xcf0b 3401 0 VPNExtensionX: (Security) SecTrustEvaluateIfNecessary 2022-09-23 15:20:22.587107+0800 0x54fa Default 0xcf05 3401 0 VPNExtensionX: (NetworkExtension) [com.apple.networkextension:] Signature check failed: code failed to satisfy specified code requirement(s) 2022-09-23 15:20:22.587995+0800 0x54fa Default 0xcf05 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:path] nw_path_evaluator_start [6205AB04-FA39-4DE5-BA02-D708DAD85AB9 generic, attribution: developer] path: satisfied (Path is satisfied), interface: en0, ipv4, ipv6, dns 2022-09-23 15:20:22.588621+0800 0x5500 Default 0x0 0 0 kernel: memorystatus: assertion priority 10 overrides priority 0 for VPNExtensionX:3401 2022-09-23 15:20:22.588883+0800 0x10e6 Default 0xacbc 722 0 neagent: (NetworkExtension) [com.apple.networkextension:] Extension request with extension com.citrix.NetScalerGateway.macos.app.vpnplugin started with identifier CC822709-96DF-467B-BDAB-5724921D1828 2022-09-23 15:20:22.589542+0800 0x54fa Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:path] nw_path_evaluator_start [6205AB04-FA39-4DE5-BA02-D708DAD85AB9 generic, attribution: developer] path: satisfied (Path is satisfied), interface: en0, ipv4, ipv6, dns 2022-09-23 15:20:22.591836+0800 0x54fa Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:path] nw_path_evaluator_start [6205AB04-FA39-4DE5-BA02-D708DAD85AB9 generic, attribution: developer] path: satisfied (Path is satisfied), interface: en0, ipv4, ipv6, dns 2022-09-23 15:20:22.598819+0800 0x54e6 Activity 0xacbd 722 0 neagent: (Security) SecTrustEvaluateIfNecessary 2022-09-23 15:20:22.599686+0800 0x50e3 Activity 0xabb6 667 0 siriactionsd: (CloudKit) client/account-status 2022-09-23 15:20:22.599689+0800 0x50e3 Activity 0xabb7 667 0 siriactionsd: (CloudKit) client/account-info 2022-09-23 15:20:22.605721+0800 0x54e6 Default 0xacbc 722 0 neagent: (NetworkExtension) [com.apple.networkextension:] Signature check failed: code failed to satisfy specified code requirement(s) 2022-09-23 15:20:22.606864+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.09000000-0600-0000-0000-000000000000:] internal event: WILL_SPAWN, code = 0 2022-09-23 15:20:22.606888+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.09000000-0600-0000-0000-000000000000:] service state: spawn scheduled 2022-09-23 15:20:22.606892+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.09000000-0600-0000-0000-000000000000:] service state: spawning 2022-09-23 15:20:22.607069+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.09000000-0600-0000-0000-000000000000:] launching: ipc (mach) 2022-09-23 15:20:22.610714+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.09000000-0600-0000-0000-000000000000 [3405]:] xpcproxy spawned with pid 3405 2022-09-23 15:20:22.610744+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.09000000-0600-0000-0000-000000000000 [3405]:] internal event: SPAWNED, code = 0 2022-09-23 15:20:22.610750+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.09000000-0600-0000-0000-000000000000 [3405]:] service state: xpcproxy 2022-09-23 15:20:22.610776+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.0D000000-0700-0000-0000-000000000000:] internal event: WILL_SPAWN, code = 0 2022-09-23 15:20:22.610782+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.0D000000-0700-0000-0000-000000000000:] service state: spawn scheduled 2022-09-23 15:20:22.610786+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.0D000000-0700-0000-0000-000000000000:] service state: spawning 2022-09-23 15:20:22.610893+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.0D000000-0700-0000-0000-000000000000:] launching: ipc (mach) 2022-09-23 15:20:22.612974+0800 0x54e6 Activity 0xacbe 722 0 neagent: (Security) SecTrustEvaluateIfNecessary 2022-09-23 15:20:22.613773+0800 0x730 Activity 0xcf42 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.613797+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.0D000000-0700-0000-0000-000000000000 [3406]:] xpcproxy spawned with pid 3406 2022-09-23 15:20:22.613828+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.0D000000-0700-0000-0000-000000000000 [3406]:] internal event: SPAWNED, code = 0 2022-09-23 15:20:22.613834+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.0D000000-0700-0000-0000-000000000000 [3406]:] service state: xpcproxy 2022-09-23 15:20:22.613849+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.09000000-0600-0000-0000-000000000000 [3405]:] internal event: SOURCE_ATTACH, code = 0 2022-09-23 15:20:22.613868+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.0D000000-0700-0000-0000-000000000000 [3406]:] internal event: SOURCE_ATTACH, code = 0 2022-09-23 15:20:22.613931+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.07000000-0700-0000-0000-000000000000 [3152]:] service exited: dirty = 0, supported pressured-exit = 1 2022-09-23 15:20:22.613937+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.07000000-0700-0000-0000-000000000000 [3152]:] Service exited due to SIGKILL | sent by mds[138] 2022-09-23 15:20:22.613941+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.07000000-0700-0000-0000-000000000000 [3152]:] exited due to SIGKILL | sent by mds[138] 2022-09-23 15:20:22.613946+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.07000000-0700-0000-0000-000000000000 [3152]:] service state: exited 2022-09-23 15:20:22.613951+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.07000000-0700-0000-0000-000000000000 [3152]:] internal event: EXITED, code = 0 2022-09-23 15:20:22.613955+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.07000000-0700-0000-0000-000000000000 [3152]:] service state: not running 2022-09-23 15:20:22.613968+0800 0x54df Default 0x0 1 0 launchd: [user/501:] service inactive: com.apple.mdworker.shared.07000000-0700-0000-0000-000000000000 2022-09-23 15:20:22.613970+0800 0x54df Default 0x0 1 0 launchd: [user/501:] removing service: com.apple.mdworker.shared.07000000-0700-0000-0000-000000000000 2022-09-23 15:20:22.614081+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.07000000-0700-0000-0000-000000000000:] internal event: PETRIFIED, code = 0 2022-09-23 15:20:22.616997+0800 0x730 Activity 0xcf43 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.621452+0800 0x5527 Activity 0xcf60 3405 0 mdworker_shared: (libsystem_info.dylib) Retrieve User by ID 2022-09-23 15:20:22.621819+0800 0x54e6 Default 0xacbc 722 0 neagent: (NetworkExtension) [com.apple.networkextension:] Signature check failed: code failed to satisfy specified code requirement(s) 2022-09-23 15:20:22.621941+0800 0x5528 Activity 0xcf70 3406 0 mdworker_shared: (libsystem_info.dylib) Retrieve User by ID 2022-09-23 15:20:22.622069+0800 0x54e6 Default 0xacbc 722 0 neagent: (NetworkExtension) [com.apple.networkextension:] Provider is not signed with a Developer ID certificate 2022-09-23 15:20:22.622464+0800 0x5527 Activity 0xcf61 3405 0 mdworker_shared: (libsystem_info.dylib) Resolve user group list 2022-09-23 15:20:22.622778+0800 0x5528 Activity 0xcf71 3406 0 mdworker_shared: (libsystem_info.dylib) Resolve user group list 2022-09-23 15:20:22.623168+0800 0x5527 Activity 0xcf62 3405 0 mdworker_shared: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.623476+0800 0x5528 Activity 0xcf72 3406 0 mdworker_shared: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.624843+0800 0x4bb5 Default 0x0 0 0 kernel: if_updown: utun4 is not attached 2022-09-23 15:20:22.624947+0800 0x4bb5 Default 0x0 0 0 kernel: utun4: attached with 0 suspended link-layer multicast membership(s) 2022-09-23 15:20:22.624957+0800 0x4bb5 Default 0x0 0 0 kernel: ifnet_attach: All kernel threads created for interface utun4 have been scheduled at least once. Proceeding. 2022-09-23 15:20:22.625265+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.625758+0800 0x3f9 Default 0x0 235 0 airportd: _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.625798+0800 0x3f9 Default 0x0 235 0 airportd: _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.625825+0800 0x3f9 Default 0x0 235 0 airportd: _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.625884+0800 0x3f9 Default 0x0 235 0 airportd: _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.626010+0800 0x3f9 Default 0x0 235 0 airportd: _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.626054+0800 0x3f9 Default 0x0 235 0 airportd: _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.626068+0800 0x3f9 Default 0x0 235 0 airportd: _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.626117+0800 0x3f9 Default 0x0 235 0 airportd: _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.626304+0800 0x3f9 Default 0x0 235 0 airportd: _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.626333+0800 0x3f9 Default 0x0 235 0 airportd: _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.626348+0800 0x3f9 Default 0x0 235 0 airportd: _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.626450+0800 0x3f9 Default 0x0 235 0 airportd: _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.626602+0800 0x3f9 Default 0x0 235 0 airportd: _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.626629+0800 0x3f9 Default 0x0 235 0 airportd: _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.626642+0800 0x3f9 Default 0x0 235 0 airportd: _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.626686+0800 0x3f9 Default 0x0 235 0 airportd: _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.627345+0800 0x3f9 Default 0x0 235 0 airportd: _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.627377+0800 0x3f9 Default 0x0 235 0 airportd: _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.627407+0800 0x3f9 Default 0x0 235 0 airportd: _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.627528+0800 0x3f9 Default 0x0 235 0 airportd: _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.628302+0800 0x4603 Default 0x0 119 0 configd: (libnetwork.dylib) [com.apple.network:] network_config_check_mobile_asset Checking mobile asset 2022-09-23 15:20:22.628528+0800 0x54e1 Default 0x0 0 0 kernel: utun4: is now delegating en0 (type 0x6, family 2, sub-family 3) 2022-09-23 15:20:22.628936+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.629563+0800 0x4bb5 Error 0x0 231 0 nehelper: (Network) [com.apple.network:] -[NWPrivilegedHelper startXPCListener]_block_invoke client pid 119 does not have any known entitlement 2022-09-23 15:20:22.629587+0800 0x4bb5 Error 0x0 231 0 nehelper: (libxpc.dylib) Peer connection was rejected by the listener (xpc_connection_cancel()) 2022-09-23 15:20:22.630055+0800 0x5530 Error 0x0 119 0 configd: (libnetwork.dylib) [com.apple.network:] networkd_privileged_check_mobile_asset_block_invoke received XPC_ERROR_CONNECTION_INVALID 2022-09-23 15:20:22.631026+0800 0x28f Default 0x0 119 0 configd: [com.apple.SystemConfiguration:IPMonitor] network changed 2022-09-23 15:20:22.634400+0800 0x39c Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.634444+0800 0x39c Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.634464+0800 0x39c Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.634531+0800 0x39c Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.638733+0800 0x4f9b Default 0x0 235 0 airportd: _processIPv4Changes: ARP/NDP offloads disabled, not programming the offload 2022-09-23 15:20:22.639319+0800 0x5530 Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.639361+0800 0x5530 Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.639382+0800 0x5530 Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.639444+0800 0x5530 Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.639736+0800 0x5530 Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.639781+0800 0x5530 Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.639810+0800 0x5530 Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.639843+0800 0x3e1 Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] *** Network Configuration Change *** SC key: State:/Network/Global/IPv4 2022-09-23 15:20:22.639846+0800 0x3e1 Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] *** Network Configuration Change *** 1 change delay 25 2022-09-23 15:20:22.639846+0800 0x3e1 Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] SetNetworkChanged: Scheduling in 25 ticks 2022-09-23 15:20:22.639923+0800 0x5530 Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.640134+0800 0x5530 Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.640194+0800 0x5530 Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.640226+0800 0x5530 Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.640297+0800 0x5530 Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.640606+0800 0x5530 Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.640732+0800 0x5530 Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.640762+0800 0x5530 Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.640831+0800 0x5530 Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.641111+0800 0x5530 Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.641171+0800 0x5530 Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.641232+0800 0x5530 Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.641305+0800 0x5530 Default 0x0 119 0 configd: (CoreWLAN) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.648817+0800 0x28f Default 0x0 119 0 configd: [com.apple.SystemConfiguration:IPMonitor] network changed 2022-09-23 15:20:22.652138+0800 0x4f9b Default 0x0 235 0 airportd: _processIPv4Changes: ARP/NDP offloads disabled, not programming the offload 2022-09-23 15:20:22.653288+0800 0x3e1 Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] *** Network Configuration Change *** SC key: State:/Network/Global/IPv4 2022-09-23 15:20:22.653292+0800 0x3e1 Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] *** Network Configuration Change *** 1 change delay 25 2022-09-23 15:20:22.653292+0800 0x3e1 Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] SetNetworkChanged: *NOT* increasing delay from 9 to 25 2022-09-23 15:20:22.659800+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] *** Network Configuration Change *** 0 ticks late 2022-09-23 15:20:22.660002+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] *** Network Configuration Change *** No IPv6 address TENTATIVE, will continue 2022-09-23 15:20:22.660295+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.09000000-0600-0000-0000-000000000000 [3405]:] service state: running 2022-09-23 15:20:22.660303+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.09000000-0600-0000-0000-000000000000 [3405]:] internal event: INIT, code = 0 2022-09-23 15:20:22.660322+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.09000000-0600-0000-0000-000000000000 [3405]:] Successfully spawned mdworker_shared[3405] because ipc (mach) 2022-09-23 15:20:22.660562+0800 0x4d13 Default 0x0 121 0 powerd: TCPKeepAliveState: unsupported 2022-09-23 15:20:22.660640+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.660642+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.663265+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.664090+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.664463+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.664464+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.666054+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:NAT] ClearInactiveInterfaces: Deleting utun4(14) InterfaceID 0xe(0x7fc499812c00) /32 Age 250 (Primary) 2022-09-23 15:20:22.666068+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.666328+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.666333+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.666518+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.666522+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.666523+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.666525+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.666525+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.666526+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.666527+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.666528+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.666530+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.666539+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.668119+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.0D000000-0700-0000-0000-000000000000 [3406]:] service state: running 2022-09-23 15:20:22.668127+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.0D000000-0700-0000-0000-000000000000 [3406]:] internal event: INIT, code = 0 2022-09-23 15:20:22.668145+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.0D000000-0700-0000-0000-000000000000 [3406]:] Successfully spawned mdworker_shared[3406] because ipc (mach) 2022-09-23 15:20:22.669612+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.669616+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.670196+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.670197+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.670511+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.670516+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.670517+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.670528+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] 2022-09-23 15:20:22.672135+0800 0x732 Activity 0xcf44 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.673027+0800 0x732 Activity 0xcf45 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.674288+0800 0x732 Activity 0xcf46 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.674961+0800 0x732 Activity 0xcf47 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.678960+0800 0x553c Default 0x0 288 2 mobileassetd: [com.apple.mobileassetd:Notice] handleMessage: MobileAsset V1 command: 13 2022-09-23 15:20:22.679109+0800 0x663 Default 0x0 344 0 nsurlsessiond: [com.apple.nsurlsessiond:background] received network changed event 2022-09-23 15:20:22.679265+0800 0x5321 Default 0x0 288 2 mobileassetd: [com.apple.mobileassetd:Notice] handleCopyMatchingAssets: HANDLER - assetQuery [com.apple.MobileAsset.WiFi]: (local=1) [(null)] 2022-09-23 15:20:22.679529+0800 0x5321 Default 0x0 288 2 mobileassetd: [com.apple.mobileassetd:Notice] -[ASAssetRepository _assetsOfAssetType:matchingPredicate:error:]: [MobileAssetError:29] No asset metadata available to search 2022-09-23 15:20:22.680485+0800 0x54e0 Activity 0xb27 282 0 nesessionmanager: (Security) SecTrustEvaluateIfNecessary 2022-09-23 15:20:22.681181+0800 0x5321 Default 0x0 288 2 mobileassetd: [com.apple.mobileassetd:Notice] handleMessage: MobileAsset V1 command: 24 2022-09-23 15:20:22.681747+0800 0x553b Default 0x0 719 2 WiFiAgent: (MobileAsset) [com.apple.mobileassetd:Notice] _MobileAssetSendCopyMatchingAssetsCommand: [MobileAssetError:29] Unable to copy asset information from https://mesu.apple.com/assets/macos/ for asset type com.apple.MobileAsset.WiFi 2022-09-23 15:20:22.682213+0800 0x553e Default 0x0 288 2 mobileassetd: [com.apple.mobileassetd:Notice] handleMessage: MobileAsset V1 command: 13 2022-09-23 15:20:22.682481+0800 0x553e Default 0x0 288 2 mobileassetd: [com.apple.mobileassetd:Notice] handleCopyMatchingAssets: HANDLER - assetQuery [com.apple.MobileAsset.WiFi]: (local=1) [(null)] 2022-09-23 15:20:22.682740+0800 0x553e Default 0x0 288 2 mobileassetd: [com.apple.mobileassetd:Notice] -[ASAssetRepository _assetsOfAssetType:matchingPredicate:error:]: [MobileAssetError:29] No asset metadata available to search 2022-09-23 15:20:22.683249+0800 0x553c Default 0x0 288 2 mobileassetd: [com.apple.mobileassetd:Notice] handleMessage: MobileAsset V1 command: 24 2022-09-23 15:20:22.683508+0800 0x5537 Default 0x0 719 2 WiFiAgent: (MobileAsset) [com.apple.mobileassetd:Notice] _MobileAssetSendCopyMatchingAssetsCommand: [MobileAssetError:29] Unable to copy asset information from https://mesu.apple.com/assets/macos/ for asset type com.apple.MobileAsset.WiFi 2022-09-23 15:20:22.690246+0800 0x1240 Default 0x0 770 0 WiFiVelocityAgent: [com.apple.wifivelocity:] [wifivelocity] [C3DA9] Debug logging enabled (counter=1, timeout=0.000000) 2022-09-23 15:20:22.690353+0800 0x1240 Default 0x0 770 0 WiFiVelocityAgent: [com.apple.wifivelocity:] [wifivelocity] (W5Engine.m:1171) RECEIVED DIAGNOSTICS REQUEST (uuid=5D9FC) from WiFiAgent (719) with configuration (null) and items: 2022-09-23 15:20:22.690370+0800 0x1240 Default 0x0 770 0 WiFiVelocityAgent: [com.apple.wifivelocity:] [wifivelocity] (W5Engine.m:1174) TEST: No Wi-Fi Security (Open) (38) 2022-09-23 15:20:22.690381+0800 0x1240 Default 0x0 770 0 WiFiVelocityAgent: [com.apple.wifivelocity:] [wifivelocity] (W5Engine.m:1174) TEST: Legacy Wi-Fi Security (WEP) (39) 2022-09-23 15:20:22.690393+0800 0x1240 Default 0x0 770 0 WiFiVelocityAgent: [com.apple.wifivelocity:] [wifivelocity] (W5Engine.m:1174) TEST: Legacy Wi-Fi Security (WPA) (40) 2022-09-23 15:20:22.690406+0800 0x1240 Default 0x0 770 0 WiFiVelocityAgent: [com.apple.wifivelocity:] [wifivelocity] (W5Engine.m:1174) TEST: Legacy Wi-Fi Rates (802.11b) (41) 2022-09-23 15:20:22.690415+0800 0x1240 Default 0x0 770 0 WiFiVelocityAgent: [com.apple.wifivelocity:] [wifivelocity] (W5Engine.m:1174) TEST: Ambiguous Network Name (42) 2022-09-23 15:20:22.690425+0800 0x1240 Default 0x0 770 0 WiFiVelocityAgent: [com.apple.wifivelocity:] [wifivelocity] (W5Engine.m:1174) TEST: Hidden Network (43) 2022-09-23 15:20:22.690983+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] [7BC39] Debug logging enabled (counter=1, timeout=0.000000) 2022-09-23 15:20:22.691415+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.691 [FCE7E] BEGIN No Wi-Fi Security (Open) 2022-09-23 15:20:22.691828+0800 0x5462 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.692274+0800 0x5462 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.692321+0800 0x5462 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.692344+0800 0x5462 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.692410+0800 0x5462 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.692852+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.693173+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET SECURITY] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.693479+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.693516+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.693534+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.693589+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.694036+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET SECURITY] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.694466+0800 0x5462 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET WEP SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.694507+0800 0x5529 Activity 0xcf80 3405 0 mdworker_shared: (libsystem_info.dylib) Retrieve User by ID 2022-09-23 15:20:22.694701+0800 0x54e0 Default 0x0 282 0 nesessionmanager: (NetworkExtension) [com.apple.networkextension:] Signature is valid and has the correct designated requirement 2022-09-23 15:20:22.694809+0800 0x5462 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.694859+0800 0x5462 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.694877+0800 0x5462 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.694941+0800 0x5462 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.695070+0800 0x54e0 Default 0x0 282 0 nesessionmanager: [com.apple.networkextension:] NESMVPNSession[Primary Tunnel:neo.globe.com.ph:922A211C-1ADD-4115-8ADE-7A2B473356EF:(null)]: Plugin NEVPNTunnelPlugin(com.citrix.NetScalerGateway.macos.app[inactive]) initialized with Mach-O UUIDs ( "7FC46B04-3F5D-38B5-9773-9D7A90663AEB" ) 2022-09-23 15:20:22.695675+0800 0x54e0 Default 0x0 282 0 nesessionmanager: [com.apple.networkextension:] NESMVPNSession[Primary Tunnel:neo.globe.com.ph:922A211C-1ADD-4115-8ADE-7A2B473356EF:(null)] in state NESMVPNSessionStateStarting: plugin NEVPNTunnelPlugin(com.citrix.NetScalerGateway.macos.app[inactive]) started with PID 3401 error (null) 2022-09-23 15:20:22.695796+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET WEP SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.696226+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET WAPI SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.696720+0800 0x5500 Default 0x0 3401 0 VPNExtensionX: (NetworkExtension) [com.apple.networkextension:] [Extension com.citrix.NetScalerGateway.macos.app.vpnplugin]: Calling startTunnelWithOptions with options 0x7fdbcd3170f0 2022-09-23 15:20:22.696857+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.696945+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.696964+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.697022+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.697090+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: Extension started with options : { AuthMethod = Password; AuthProtocolVersion = 2; GatewayCookie = "XXXXXXXXXX..."; GatewayIPAddress = "112.198.38.172"; GatewayType = 1; LoginType = 0; LogoffUrl = "/p/u/doLogoff.do"; ServerAddress = "neo.globe.com.ph"; SetClientUrl = "/p/u/setClient.do"; StateContext = "bG9naW5zY2hlbWE9ZGVmYXVsdA=="; VendorData = { CanEdit = 1; ClientCertEnabled = 0; }; } 2022-09-23 15:20:22.697675+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET WAPI SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.701296+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: Calling LaunchDarkly's startCompleteWhenFlagsReceivedWithConfig 2022-09-23 15:20:22.703842+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.704 [FCE7E] END No Wi-Fi Security (Open), took 0.006716s, result=0, didPass=1 2022-09-23 15:20:22.703885+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.704 [95613] BEGIN Legacy Wi-Fi Security (WEP) 2022-09-23 15:20:22.704139+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.704500+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.704543+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.704564+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.704629+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.705047+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.705552+0800 0x5462 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET SECURITY] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.707351+0800 0x5462 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.707431+0800 0x5462 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.707476+0800 0x5462 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.707575+0800 0x5462 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.709484+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET SECURITY] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.709664+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET WEP SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.710107+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.710151+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.710170+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.710228+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.711122+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET WEP SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.711619+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET WAPI SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.711966+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.712012+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.712032+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.712097+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.712650+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET WAPI SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.713398+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET CURR SCAN RESULT] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.713791+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.713829+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.713847+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.713904+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.714869+0800 0x1240 Default 0x0 770 0 WiFiVelocityAgent: [com.apple.wifivelocity:] [wifivelocity] [003E3] Debug logging enabled (counter=2, timeout=0.000000) 2022-09-23 15:20:22.715035+0800 0x1240 Default 0x0 770 0 WiFiVelocityAgent: [com.apple.wifivelocity:] [wifivelocity] (W5Engine.m:1171) RECEIVED DIAGNOSTICS REQUEST (uuid=B503B) from WiFiAgent (719) with configuration (null) and items: 2022-09-23 15:20:22.715052+0800 0x1240 Default 0x0 770 0 WiFiVelocityAgent: [com.apple.wifivelocity:] [wifivelocity] (W5Engine.m:1174) TEST: No Wi-Fi Security (Open) (38) 2022-09-23 15:20:22.715062+0800 0x1240 Default 0x0 770 0 WiFiVelocityAgent: [com.apple.wifivelocity:] [wifivelocity] (W5Engine.m:1174) TEST: Legacy Wi-Fi Security (WEP) (39) 2022-09-23 15:20:22.715072+0800 0x1240 Default 0x0 770 0 WiFiVelocityAgent: [com.apple.wifivelocity:] [wifivelocity] (W5Engine.m:1174) TEST: Legacy Wi-Fi Security (WPA) (40) 2022-09-23 15:20:22.715081+0800 0x1240 Default 0x0 770 0 WiFiVelocityAgent: [com.apple.wifivelocity:] [wifivelocity] (W5Engine.m:1174) TEST: Legacy Wi-Fi Rates (802.11b) (41) 2022-09-23 15:20:22.715090+0800 0x1240 Default 0x0 770 0 WiFiVelocityAgent: [com.apple.wifivelocity:] [wifivelocity] (W5Engine.m:1174) TEST: Ambiguous Network Name (42) 2022-09-23 15:20:22.715099+0800 0x1240 Default 0x0 770 0 WiFiVelocityAgent: [com.apple.wifivelocity:] [wifivelocity] (W5Engine.m:1174) TEST: Hidden Network (43) 2022-09-23 15:20:22.715476+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] [B6E07] Debug logging enabled (counter=2, timeout=0.000000) 2022-09-23 15:20:22.716409+0800 0x5415 Activity 0xcf27 206 0 runningboardd: (RunningBoard) acquireAssertionWithDescriptor 2022-09-23 15:20:22.716622+0800 0x5415 Default 0xcf27 206 0 runningboardd: (RunningBoard) [com.apple.runningboard:assertion] Acquiring assertion targeting [xpcservice:722:722])(501)>:3401] from originator [xpcservice:722:722])(501)>:3401] with description , ]> 2022-09-23 15:20:22.716664+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET CURR SCAN RESULT] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.716754+0800 0x5415 Default 0xcf27 206 0 runningboardd: (RunningBoard) [com.apple.runningboard:assertion] Assertion 206-3401-703 (target:[xpcservice:722:722])(501)>:3401]) will be created as inactive as start-time-defining assertions exist 2022-09-23 15:20:22.716907+0800 0x54ef Activity 0xcf28 206 0 runningboardd: (RunningBoard) state update 2022-09-23 15:20:22.717351+0800 0x552a Activity 0xcf90 3406 0 mdworker_shared: (libsystem_info.dylib) Retrieve User by ID 2022-09-23 15:20:22.717433+0800 0x54ef Activity 0xcf29 206 0 runningboardd: (RunningBoard) limitationsForInstance 2022-09-23 15:20:22.718100+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.718 [95613] END Legacy Wi-Fi Security (WEP), took 0.017274s, result=0, didPass=1 2022-09-23 15:20:22.718448+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.718 [08545] BEGIN Legacy Wi-Fi Security (WPA) 2022-09-23 15:20:22.719091+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.719454+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.719508+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.719533+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.719599+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.720774+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.720880+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET SECURITY] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.721237+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.721286+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.721311+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.721425+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.722106+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET SECURITY] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.722207+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET WEP SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.722553+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.722605+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.722632+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.722700+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.724181+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET WEP SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.724983+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET WAPI SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.725325+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.725361+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.725379+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.725436+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.725934+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET WAPI SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.726349+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET CURR SCAN RESULT] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.727198+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.727251+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.727290+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.727368+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.729864+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET CURR SCAN RESULT] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.731066+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.731 [08545] END Legacy Wi-Fi Security (WPA), took 0.012252s, result=1, didPass=0 2022-09-23 15:20:22.731313+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.731793+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.731864+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.731893+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.731967+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.732447+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.733052+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.733 [85774] BEGIN Legacy Wi-Fi Rates (802.11b) 2022-09-23 15:20:22.733457+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.733527+0800 0x5500 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) Task <97686506-8CE2-4EA5-B56E-B34D7EA0EC62>.<1> resuming, timeouts(300.0, 604800.0) QOS(0x19) Voucher 2022-09-23 15:20:22.733599+0800 0x5500 Activity 0xcf0c 3401 0 VPNExtensionX: (CoreFoundation) Loading Preferences From User CFPrefsD 2022-09-23 15:20:22.734194+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.734250+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.734277+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.734356+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.734720+0800 0x5500 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) [Telemetry]: Activity on Task <97686506-8CE2-4EA5-B56E-B34D7EA0EC62>.<1> was not selected for reporting 2022-09-23 15:20:22.734993+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.735379+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET PHY MODE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.735506+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (AppSSOCore) [com.apple.AppSSO:SOConfigurationClient] -[SOConfigurationClient init] on 2022-09-23 15:20:22.735713+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.735759+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.735782+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.735979+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.736027+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (AppSSOCore) [com.apple.AppSSO:SOServiceConnection] : new XPC connection 2022-09-23 15:20:22.736539+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET PHY MODE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.736618+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.737 [85774] END Legacy Wi-Fi Rates (802.11b), took 0.003370s, result=0, didPass=1 2022-09-23 15:20:22.736970+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.737 [3D52C] BEGIN Ambiguous Network Name 2022-09-23 15:20:22.737708+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.738087+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.738137+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.738162+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.738228+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.738539+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.738925+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.739 [3D52C] END Ambiguous Network Name, took 0.001689s, result=0, didPass=1 2022-09-23 15:20:22.739224+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.739 [AC6FB] BEGIN Hidden Network 2022-09-23 15:20:22.739399+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) [com.apple.CFNetwork:ATS] Task <97686506-8CE2-4EA5-B56E-B34D7EA0EC62>.<1> {strength 1, tls 8, ct 0, sub 0, sig 0, ciphers 1, bundle 0, builtin 0} 2022-09-23 15:20:22.739595+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET CURR KNOWN NETWORK] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.740096+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.740139+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.740155+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.740214+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.741436+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) Connection 1: enabling TLS 2022-09-23 15:20:22.741441+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) Connection 1: starting, TC(0x0) 2022-09-23 15:20:22.741464+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] [C1 99EB3D80-B535-4434-8C8E-D4FCA231A3E0 Hostname#5ad56d8d:443 tcp, url hash: 26f3f6f0, tls, definite, attribution: developer, context: com.apple.CFNetwork.NSURLSession.{3CDF63CD-D6D4-4331-9855-95D16DFA210A}{(null)}{Y}{2} (private), proc: 7FC46B04-3F5D-38B5-9773-9D7A90663AEB] start 2022-09-23 15:20:22.741483+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] [C1 Hostname#5ad56d8d:443 initial path ((null))] event: path:start @0.000s 2022-09-23 15:20:22.741738+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] [C1 Hostname#5ad56d8d:443 waiting path (satisfied (Path is satisfied), interface: en0, scoped, ipv4, ipv6, dns)] event: path:satisfied @0.000s, uuid: 9C1A8A03-8158-457A-ADA2-7E14A1D9CF47 2022-09-23 15:20:22.741791+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] [C1 Hostname#5ad56d8d:443 in_progress resolver (satisfied (Path is satisfied), interface: en0, scoped, ipv4, ipv6, dns)] event: resolver:start_dns @0.000s 2022-09-23 15:20:22.741801+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] nw_connection_report_state_with_handler_on_nw_queue [C1] reporting state preparing 2022-09-23 15:20:22.741905+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET CURR KNOWN NETWORK] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.741982+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) Task <97686506-8CE2-4EA5-B56E-B34D7EA0EC62>.<1> setting up Connection 1 2022-09-23 15:20:22.743154+0800 0x505d Default 0x0 227 0 mDNSResponder: [com.apple.mdns:dnssd_server] [R2268] getaddrinfo start -- flags: 0xC000D000, ifindex: 4, protocols: 0, hostname: , options: 0x8 {use-failover}, client pid: 3401 (VPNExtensionX) 2022-09-23 15:20:22.743178+0800 0x505d Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] [R2268->Q39908] Question for (HTTPS) assigned DNS service 1 2022-09-23 15:20:22.743196+0800 0x505d Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] [R2268->Q53156] Question for (AAAA) assigned DNS service 1 2022-09-23 15:20:22.743198+0800 0x505d Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] [Q53156] ShouldSuppressUnicastQuery: Query suppressed for AAAA (AAAA records are unusable) 2022-09-23 15:20:22.743207+0800 0x505d Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] [R2268->Q33952] Question for (Addr) assigned DNS service 1 2022-09-23 15:20:22.743395+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.743 [AC6FB] END Hidden Network, took 0.003520s, result=0, didPass=1 2022-09-23 15:20:22.743410+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] [R2268->Q39908] AnswerQuestionByFollowingCNAME: 0x7fc49a009260 (HTTPS) following CNAME referral 0 for 2022-09-23 15:20:22.743424+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] [R2268->Q33040] Question for (HTTPS) assigned DNS service 1 2022-09-23 15:20:22.743429+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] [R2268->Q53156] GenerateNegativeResponse: Generating negative response for question (AAAA) 2022-09-23 15:20:22.743452+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] [7BC39] Debug logging disabled (counter=1) 2022-09-23 15:20:22.743457+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] [R2268->Q33952] AnswerQuestionByFollowingCNAME: 0x7fc49a02d800 (Addr) following CNAME referral 0 for 2022-09-23 15:20:22.743469+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] [R2268->Q24045] Question for (Addr) assigned DNS service 1 2022-09-23 15:20:22.743475+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] [R2268->Q33040] AnswerNewQuestion: Restarting original question 0x7fc49a009260 firstExpiredQname for allowExpiredAnswers question 2022-09-23 15:20:22.743482+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] [R2268->Q55488] Question for (HTTPS) assigned DNS service 1 2022-09-23 15:20:22.743501+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] [R2268->Q24045] AnswerNewQuestion: Restarting original question 0x7fc49a02d800 firstExpiredQname for allowExpiredAnswers question 2022-09-23 15:20:22.743510+0800 0x4af Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] [R2268->Q58091] Question for (Addr) assigned DNS service 1 2022-09-23 15:20:22.743682+0800 0x5544 Default 0x0 227 0 mDNSResponder: [com.apple.mdns:dnssd_server] [R2268->Q24045] getaddrinfo result -- event: add, ifindex: 0, name: BBWciEvP, type: A, rdata: BBYTKgzR, expired: yes 2022-09-23 15:20:22.743704+0800 0x5544 Default 0x0 227 0 mDNSResponder: [com.apple.mdns:dnssd_server] [R2268->Q24045] getaddrinfo result -- event: add, ifindex: 0, name: BBWciEvP, type: A, rdata: BBPpDtXS, expired: yes 2022-09-23 15:20:22.743870+0800 0x505d Default 0x0 227 0 mDNSResponder: [com.apple.mdns:resolver] [Q55488] Sent 47-byte query #1 to over UDP via en0/4 -- id: 0xC95C (51548), flags: 0x0100 (Q/Query, RD, NoError), counts: 1/0/0/0, BBsqNhxd IN HTTPS? 2022-09-23 15:20:22.743954+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.744 [8308B] BEGIN No Wi-Fi Security (Open) 2022-09-23 15:20:22.744074+0800 0x505d Default 0x0 227 0 mDNSResponder: [com.apple.mdns:resolver] [Q58091] Sent 47-byte query #1 to over UDP via en0/4 -- id: 0x92E2 (37602), flags: 0x0100 (Q/Query, RD, NoError), counts: 1/0/0/0, BBsqNhxd IN A? 2022-09-23 15:20:22.744179+0800 0x1240 Default 0x0 770 0 WiFiVelocityAgent: [com.apple.wifivelocity:] [wifivelocity] (W5Engine.m:1179) COMPLETED DIAGNOSTICS REQUEST (uuid=5D9FC) from WiFiAgent (719), took 0.053906s 2022-09-23 15:20:22.744229+0800 0x1240 Default 0x0 770 0 WiFiVelocityAgent: [com.apple.wifivelocity:] [wifivelocity] [C3DA9] Debug logging disabled (counter=1) 2022-09-23 15:20:22.744383+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.744715+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.744764+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.744787+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.745031+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.745422+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.745630+0800 0x54dd Default 0x0 0 0 kernel: cfil_data_service_ctl_q:4137 cfil_service_pending_queue() error -2 2022-09-23 15:20:22.745638+0800 0x54dd Default 0x0 0 0 kernel: cfil_update_data_offsets:4565 cfil_data_service_ctl_q() error -2 2022-09-23 15:20:22.746653+0800 0x54dd Default 0x0 0 0 kernel: cfil_data_service_ctl_q:4137 cfil_service_pending_queue() error -2 2022-09-23 15:20:22.746660+0800 0x54dd Default 0x0 0 0 kernel: cfil_update_data_offsets:4565 cfil_data_service_ctl_q() error -2 2022-09-23 15:20:22.747622+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET SECURITY] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.747945+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.747983+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.748002+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.748058+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.748671+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET SECURITY] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.749027+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET WEP SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.749438+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.749476+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.749495+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.749555+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.750468+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET WEP SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.750646+0800 0x54dd Default 0x0 0 0 kernel: cfil_data_service_ctl_q:4137 cfil_service_pending_queue() error -2 2022-09-23 15:20:22.750653+0800 0x54dd Default 0x0 0 0 kernel: cfil_update_data_offsets:4565 cfil_data_service_ctl_q() error -2 2022-09-23 15:20:22.750741+0800 0x505d Default 0x0 227 0 mDNSResponder: [com.apple.mdns:resolver] [Q58091] Received acceptable 79-byte response from over UDP via en0/4 -- id: 0x92E2 (37602), flags: 0x8180 (R/Query, RD, RA, NoError), counts: 1/2/0/0, BBsqNhxd IN A?, 29 IN A BBPpDtXS, 29 IN A BBYTKgzR 2022-09-23 15:20:22.750807+0800 0x5544 Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] [Q58091] Handling concluded querier: BBsqNhxd A IN 2022-09-23 15:20:22.750833+0800 0x5544 Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] mDNSCoreReceiveCacheCheck: Discarding (ghost) rrtype change from (CNAME) to (Addr) 2022-09-23 15:20:22.750845+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET WAPI SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.750874+0800 0x5544 Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] mDNSCoreReceiveNoUnicastAnswers: Removing expired record 2022-09-23 15:20:22.750987+0800 0x5544 Default 0x0 227 0 mDNSResponder: [com.apple.mdns:dnssd_server] [R2268->Q53156] getaddrinfo result -- event: add, ifindex: 0, name: BBsqNhxd, type: AAAA, rdata: , reason: query-suppressed 2022-09-23 15:20:22.751008+0800 0x5544 Default 0x0 227 0 mDNSResponder: [com.apple.mdns:dnssd_server] [R2268->Q58091] getaddrinfo result -- event: add, ifindex: 0, name: BBsqNhxd, type: A, rdata: BBPpDtXS, expired: no 2022-09-23 15:20:22.751021+0800 0x5544 Default 0x0 227 0 mDNSResponder: [com.apple.mdns:dnssd_server] [R2268->Q58091] getaddrinfo result -- event: add, ifindex: 0, name: BBsqNhxd, type: A, rdata: BBYTKgzR, expired: no 2022-09-23 15:20:22.751203+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.751239+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.751257+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.751316+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.751710+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET WAPI SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.752080+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.752 [8308B] END No Wi-Fi Security (Open), took 0.007966s, result=0, didPass=1 2022-09-23 15:20:22.752319+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.752 [B915B] BEGIN Legacy Wi-Fi Security (WEP) 2022-09-23 15:20:22.752803+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.753120+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.753159+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.753177+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.753235+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.753519+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.753833+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET SECURITY] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.754186+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.754223+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.754241+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.754301+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.754331+0800 0x54dd Default 0x0 0 0 kernel: cfil_data_service_ctl_q:4137 cfil_service_pending_queue() error -2 2022-09-23 15:20:22.754338+0800 0x54dd Default 0x0 0 0 kernel: cfil_update_data_offsets:4565 cfil_data_service_ctl_q() error -2 2022-09-23 15:20:22.754562+0800 0x5544 Default 0x0 227 0 mDNSResponder: [com.apple.mdns:resolver] [Q55488] Received acceptable 158-byte response from over UDP via en0/4 -- id: 0xC95C (51548), flags: 0x8180 (R/Query, RD, RA, NoError), counts: 1/1/1/0, BBsqNhxd IN HTTPS?, 45 IN CNAME BBWciEvP, BBHKjWJr 727 IN SOA BBeENJSg BBXCkKJW 1 7200 900 1209600 86400 2022-09-23 15:20:22.754760+0800 0x5544 Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] [Q55488] Handling concluded querier: BBsqNhxd HTTPS IN 2022-09-23 15:20:22.754784+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET SECURITY] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.754785+0800 0x5544 Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] mDNSCoreReceiveCacheCheck: Discarding (immortal) rrtype change from (Addr) to (CNAME) 2022-09-23 15:20:22.754790+0800 0x5544 Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] mDNSCoreReceiveCacheCheck: Discarding (immortal) rrtype change from (Addr) to (CNAME) 2022-09-23 15:20:22.754801+0800 0x5544 Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] [Q51548] mDNSCoreReceiveResponse ignoring 2022-09-23 15:20:22.754812+0800 0x5544 Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] [R2268->Q55488] AnswerQuestionByFollowingCNAME: 0x7fc49a009260 (HTTPS) following CNAME referral 0 for 2022-09-23 15:20:22.754827+0800 0x5544 Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] [R2268->Q30524] Question for (HTTPS) assigned DNS service 1 2022-09-23 15:20:22.754838+0800 0x5544 Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] [R2268->Q58091] AnswerQuestionByFollowingCNAME: 0x7fc49a02d800 (Addr) following CNAME referral 0 for 2022-09-23 15:20:22.754850+0800 0x5544 Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] [R2268->Q39267] Question for (Addr) assigned DNS service 1 2022-09-23 15:20:22.755078+0800 0x505d Default 0x0 227 0 mDNSResponder: [com.apple.mdns:dnssd_server] [R2268->Q30524] getaddrinfo result -- event: add, ifindex: 0, name: BBWciEvP, type: HTTPS, rdata: , reason: no-data 2022-09-23 15:20:22.755282+0800 0x5544 Default 0x0 227 0 mDNSResponder: [com.apple.mdns:resolver] [Q39267] Sent 50-byte query #1 to over UDP via en0/4 -- id: 0x596F (22895), flags: 0x0100 (Q/Query, RD, NoError), counts: 1/0/0/0, BBWciEvP IN A? 2022-09-23 15:20:22.755376+0800 0x5544 Default 0x0 227 0 mDNSResponder: [com.apple.mdns:dnssd_server] [R2268] getaddrinfo stop -- hostname: , client pid: 3401 (VPNExtensionX) 2022-09-23 15:20:22.755389+0800 0x5544 Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] [Q39267] Keeping orphaned querier for up to 5 seconds 2022-09-23 15:20:22.755418+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET WEP SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.755654+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] nw_endpoint_resolver_update [C1 Hostname#5ad56d8d:443 in_progress resolver (satisfied (Path is satisfied), interface: en0, scoped, ipv4, ipv6, dns)] Adding endpoint handler for IPv4#369bf2e0:443 2022-09-23 15:20:22.755759+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] nw_endpoint_resolver_update [C1 Hostname#5ad56d8d:443 in_progress resolver (satisfied (Path is satisfied), interface: en0, scoped, ipv4, ipv6, dns)] Adding endpoint handler for IPv4#461e4aef:443 2022-09-23 15:20:22.755776+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] [C1 Hostname#5ad56d8d:443 in_progress resolver (satisfied (Path is satisfied), interface: en0, scoped, ipv4, ipv6, dns)] event: resolver:receive_dns @0.014s 2022-09-23 15:20:22.755800+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.755824+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] [C1.1 IPv4#369bf2e0:443 initial path ((null))] event: path:start @0.014s 2022-09-23 15:20:22.755843+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.755867+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.755933+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.756051+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] [C1.1 IPv4#369bf2e0:443 waiting path (satisfied (Path is satisfied), interface: en0, scoped, ipv4, ipv6, dns)] event: path:satisfied @0.014s, uuid: B536A0C4-9032-4CE9-9316-85F94E02F894 2022-09-23 15:20:22.756459+0800 0x54dd Default 0x0 0 0 kernel: cfil_data_service_ctl_q:4137 cfil_service_pending_queue() error -2 2022-09-23 15:20:22.756468+0800 0x54dd Default 0x0 0 0 kernel: cfil_update_data_offsets:4565 cfil_data_service_ctl_q() error -2 2022-09-23 15:20:22.756753+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET WEP SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.757421+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] [C1.1 IPv4#369bf2e0:443 in_progress socket-flow (satisfied (Path is satisfied), interface: en0, scoped, ipv4, ipv6, dns)] event: flow:start_connect @0.015s 2022-09-23 15:20:22.757571+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET WAPI SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.757977+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.758035+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.758062+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.758132+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.758267+0800 0x54e0 Default 0x0 282 0 nesessionmanager: [com.apple.networkextension:] Got a new agent client connection from VPNExtensionX(3401) 2022-09-23 15:20:22.758324+0800 0x54e0 Default 0x0 282 0 nesessionmanager: [com.apple.networkextension:] Got a new agent client connection from VPNExtensionX(3401) 2022-09-23 15:20:22.758601+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET WAPI SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.759218+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET CURR SCAN RESULT] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.759628+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.759667+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.759686+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.759747+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.761843+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET CURR SCAN RESULT] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.762665+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.763 [B915B] END Legacy Wi-Fi Security (WEP), took 0.010110s, result=0, didPass=1 2022-09-23 15:20:22.763029+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.763 [45EA1] BEGIN Legacy Wi-Fi Security (WPA) 2022-09-23 15:20:22.763263+0800 0x54dd Default 0x0 0 0 kernel: cfil_data_service_ctl_q:4137 cfil_service_pending_queue() error -2 2022-09-23 15:20:22.763269+0800 0x54dd Default 0x0 0 0 kernel: cfil_update_data_offsets:4565 cfil_data_service_ctl_q() error -2 2022-09-23 15:20:22.763370+0800 0x5544 Default 0x0 227 0 mDNSResponder: [com.apple.mdns:resolver] [Q39267] Received acceptable 82-byte response from over UDP via en0/4 -- id: 0x596F (22895), flags: 0x8180 (R/Query, RD, RA, NoError), counts: 1/2/0/0, BBWciEvP IN A?, 231 IN A BBYTKgzR, 231 IN A BBPpDtXS 2022-09-23 15:20:22.763452+0800 0x5531 Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] [Q39267] Handling concluded querier: BBWciEvP A IN 2022-09-23 15:20:22.763475+0800 0x5531 Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] mDNSCoreReceiveCacheCheck: rescuing RR 2022-09-23 15:20:22.763482+0800 0x5531 Default 0x0 227 0 mDNSResponder: [com.apple.mDNSResponder:Default] mDNSCoreReceiveCacheCheck: rescuing RR 2022-09-23 15:20:22.763528+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.763860+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.763898+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.763915+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.763975+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.764322+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.764643+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET SECURITY] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.765049+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.765090+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.765109+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.765168+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.765763+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET SECURITY] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.766339+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET WEP SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.766734+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.766772+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.766791+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.766846+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.767632+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET WEP SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.767954+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET WAPI SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.768386+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.768437+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.768462+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.768533+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.768993+0800 0x5460 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET WAPI SUBTYPE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.769482+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET CURR SCAN RESULT] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.769857+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.769913+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.769942+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.770015+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.772471+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET CURR SCAN RESULT] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.774486+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.774 [45EA1] END Legacy Wi-Fi Security (WPA), took 0.010715s, result=1, didPass=0 2022-09-23 15:20:22.775056+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.775799+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.775904+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.775948+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.776084+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.777007+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.777650+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.777 [F797A] BEGIN Legacy Wi-Fi Rates (802.11b) 2022-09-23 15:20:22.778875+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.779268+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.779320+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.779344+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.779404+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.779775+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.780304+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET PHY MODE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.780617+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.780653+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.780670+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.780726+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.781064+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET PHY MODE] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.781246+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.781 [F797A] END Legacy Wi-Fi Rates (802.11b), took 0.002747s, result=0, didPass=1 2022-09-23 15:20:22.781616+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.782 [0327E] BEGIN Ambiguous Network Name 2022-09-23 15:20:22.782029+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.782384+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.782433+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.782459+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.782523+0800 0x5461 Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.784046+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.784 [0327E] END Ambiguous Network Name, took 0.001388s, result=0, didPass=1 2022-09-23 15:20:22.784096+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.784 [A8B6A] BEGIN Hidden Network 2022-09-23 15:20:22.784426+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET SSID] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.784608+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] RECV REQ [GET CURR KNOWN NETWORK] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A info=(null)) 2022-09-23 15:20:22.785578+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.785623+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.785641+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:22.785706+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:22.787203+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] 15:20:22.787 [A8B6A] END Hidden Network, took 0.003312s, result=0, didPass=1 2022-09-23 15:20:22.787433+0800 0x1249 Default 0x0 771 0 wifivelocityd: [com.apple.wifivelocity:] [wifivelocity] [B6E07] Debug logging disabled (counter=0) 2022-09-23 15:20:22.787600+0800 0x4f9b Default 0x0 235 0 airportd: (CoreWiFi) [com.apple.WiFiManager:] [corewifi] SENT RESP [GET CURR KNOWN NETWORK] (pid=771 proc=wifivelocityd service=com.apple.private.corewifi.internal-xpc intf=(null) uuid=4580A err=0) 2022-09-23 15:20:22.787829+0800 0x1240 Default 0x0 770 0 WiFiVelocityAgent: [com.apple.wifivelocity:] [wifivelocity] (W5Engine.m:1179) COMPLETED DIAGNOSTICS REQUEST (uuid=B503B) from WiFiAgent (719), took 0.072860s 2022-09-23 15:20:22.788046+0800 0x1240 Default 0x0 770 0 WiFiVelocityAgent: [com.apple.wifivelocity:] [wifivelocity] [003E3] Debug logging disabled (counter=0) 2022-09-23 15:20:22.800038+0800 0x5504 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] nw_socket_handle_socket_event [C1.1:3] Socket received CONNECTED event 2022-09-23 15:20:22.800156+0800 0x5504 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] nw_flow_connected [C1.1 IPv4#369bf2e0:443 in_progress socket-flow (satisfied (Path is satisfied), viable, interface: en0, scoped, ipv4, ipv6, dns)] Transport protocol connected (socket) 2022-09-23 15:20:22.800184+0800 0x5504 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] [C1.1 IPv4#369bf2e0:443 in_progress socket-flow (satisfied (Path is satisfied), viable, interface: en0, scoped, ipv4, ipv6, dns)] event: flow:finish_transport @0.058s 2022-09-23 15:20:22.800202+0800 0x5504 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] [C1 Hostname#5ad56d8d:443 in_progress resolver (satisfied (Path is satisfied), interface: en0, scoped, ipv4, ipv6, dns)] event: flow:finish_transport @0.058s 2022-09-23 15:20:22.800425+0800 0x5504 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_session_apply_protocol_options_for_transport_block_invoke(1719) [C1.1:2][0x7fdbcd316c40] TLS configured [min_version(0x0303) max_version(0x0304) name() tickets(false) false_start(false) enforce_ev(false) enforce_ats(false)] 2022-09-23 15:20:22.800484+0800 0x5504 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2012) [C1.1:2][0x7fdbcd316c40] Client handshake started 2022-09-23 15:20:22.800613+0800 0x5504 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2029) [C1.1:2][0x7fdbcd316c40] Client handshake state: TLS client enter_early_data 2022-09-23 15:20:22.800721+0800 0x5504 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2029) [C1.1:2][0x7fdbcd316c40] Client handshake state: TLS client read_server_hello 2022-09-23 15:20:22.820915+0800 0x554e Activity 0xcf91 3406 0 mdworker_shared: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.821598+0800 0x554d Activity 0xcf81 3405 0 mdworker_shared: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.834978+0800 0x550c Activity 0xcfa0 3403 0 kmutil: (Security) SecTrustEvaluateIfNecessary 2022-09-23 15:20:22.883916+0800 0x5504 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2029) [C1.1:2][0x7fdbcd316c40] Client handshake state: TLS client read_server_certificate 2022-09-23 15:20:22.883980+0800 0x5504 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2029) [C1.1:2][0x7fdbcd316c40] Client handshake state: TLS client read_certificate_status 2022-09-23 15:20:22.883983+0800 0x5504 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2029) [C1.1:2][0x7fdbcd316c40] Client handshake state: TLS client verify_server_certificate 2022-09-23 15:20:22.884277+0800 0x5504 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_evaluate_trust_async(1615) [C1.1:2][0x7fdbcd316c40] Performing external trust evaluation 2022-09-23 15:20:22.884456+0800 0x5504 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_evaluate_trust_async_external(1600) [C1.1:2][0x7fdbcd316c40] Asyncing for external verify block 2022-09-23 15:20:22.884473+0800 0x5504 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) Connection 1: asked to evaluate TLS Trust 2022-09-23 15:20:22.884809+0800 0x5500 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) Task <97686506-8CE2-4EA5-B56E-B34D7EA0EC62>.<1> auth completion disp=1 cred=0x0 2022-09-23 15:20:22.885130+0800 0x5504 Activity 0xcf0d 3401 0 VPNExtensionX: (Security) SecTrustEvaluateIfNecessaryFastAsync 2022-09-23 15:20:22.893566+0800 0x5504 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) System Trust Evaluation yielded status(0) 2022-09-23 15:20:22.893573+0800 0x5504 Activity 0xcf0e 3401 0 VPNExtensionX: (Security) SecTrustEvaluateIfNecessaryFastAsync 2022-09-23 15:20:22.901902+0800 0x5500 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) Connection 1: TLS Trust result 0 2022-09-23 15:20:22.901924+0800 0x5500 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_evaluate_trust_async_external_block_invoke_3(1556) [C1.1:2][0x7fdbcd316c40] Returning from external verify block with result: true 2022-09-23 15:20:22.901931+0800 0x5500 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_certificate_verify_callback(1777) [C1.1:2][0x7fdbcd316c40] Certificate verification result: OK 2022-09-23 15:20:22.901952+0800 0x5500 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2029) [C1.1:2][0x7fdbcd316c40] Client handshake state: TLS client read_server_key_exchange 2022-09-23 15:20:22.902223+0800 0x5500 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2029) [C1.1:2][0x7fdbcd316c40] Client handshake state: TLS client read_certificate_request 2022-09-23 15:20:22.902239+0800 0x5500 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2029) [C1.1:2][0x7fdbcd316c40] Client handshake state: TLS client read_server_hello_done 2022-09-23 15:20:22.902242+0800 0x5500 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2029) [C1.1:2][0x7fdbcd316c40] Client handshake state: TLS client send_client_certificate 2022-09-23 15:20:22.902244+0800 0x5500 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2029) [C1.1:2][0x7fdbcd316c40] Client handshake state: TLS client send_client_key_exchange 2022-09-23 15:20:22.903023+0800 0x5500 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2029) [C1.1:2][0x7fdbcd316c40] Client handshake state: TLS client send_client_certificate_verify 2022-09-23 15:20:22.903027+0800 0x5500 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2029) [C1.1:2][0x7fdbcd316c40] Client handshake state: TLS client send_client_finished 2022-09-23 15:20:22.903088+0800 0x5500 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2029) [C1.1:2][0x7fdbcd316c40] Client handshake state: TLS client finish_flight 2022-09-23 15:20:22.903175+0800 0x5500 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2029) [C1.1:2][0x7fdbcd316c40] Client handshake state: TLS client read_session_ticket 2022-09-23 15:20:22.903177+0800 0x5500 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2029) [C1.1:2][0x7fdbcd316c40] Client handshake state: TLS client process_change_cipher_spec 2022-09-23 15:20:22.904416+0800 0x10e4 Default 0x0 721 0 nsurlsessiond: [com.apple.nsurlsessiond:background] received network changed event 2022-09-23 15:20:22.909353+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.06000000-0700-0000-0000-000000000000:] internal event: WILL_SPAWN, code = 0 2022-09-23 15:20:22.909377+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.06000000-0700-0000-0000-000000000000:] service state: spawn scheduled 2022-09-23 15:20:22.909381+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.06000000-0700-0000-0000-000000000000:] service state: spawning 2022-09-23 15:20:22.909504+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.06000000-0700-0000-0000-000000000000:] launching: ipc (mach) 2022-09-23 15:20:22.914082+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.06000000-0700-0000-0000-000000000000 [3407]:] xpcproxy spawned with pid 3407 2022-09-23 15:20:22.914122+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.06000000-0700-0000-0000-000000000000 [3407]:] internal event: SPAWNED, code = 0 2022-09-23 15:20:22.914129+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.06000000-0700-0000-0000-000000000000 [3407]:] service state: xpcproxy 2022-09-23 15:20:22.914150+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.06000000-0700-0000-0000-000000000000 [3407]:] internal event: SOURCE_ATTACH, code = 0 2022-09-23 15:20:22.917339+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.04000000-0500-0000-0000-000000000000:] internal event: WILL_SPAWN, code = 0 2022-09-23 15:20:22.917363+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.04000000-0500-0000-0000-000000000000:] service state: spawn scheduled 2022-09-23 15:20:22.917368+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.04000000-0500-0000-0000-000000000000:] service state: spawning 2022-09-23 15:20:22.917565+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.04000000-0500-0000-0000-000000000000:] launching: ipc (mach) 2022-09-23 15:20:22.917721+0800 0x72f Activity 0xcf48 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.918621+0800 0x72f Activity 0xcf49 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.920312+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.04000000-0500-0000-0000-000000000000 [3408]:] xpcproxy spawned with pid 3408 2022-09-23 15:20:22.920337+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.04000000-0500-0000-0000-000000000000 [3408]:] internal event: SPAWNED, code = 0 2022-09-23 15:20:22.920343+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.04000000-0500-0000-0000-000000000000 [3408]:] service state: xpcproxy 2022-09-23 15:20:22.920366+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.04000000-0500-0000-0000-000000000000 [3408]:] internal event: SOURCE_ATTACH, code = 0 2022-09-23 15:20:22.925859+0800 0x5554 Activity 0xcfb0 3407 0 xpcproxy: (libsystem_info.dylib) Retrieve User by ID 2022-09-23 15:20:22.926863+0800 0x5554 Activity 0xcfb1 3407 0 xpcproxy: (libsystem_info.dylib) Resolve user group list 2022-09-23 15:20:22.927990+0800 0x5554 Activity 0xcfb2 3407 0 xpcproxy: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.929740+0800 0x5555 Activity 0xcfc0 3408 0 xpcproxy: (libsystem_info.dylib) Retrieve User by ID 2022-09-23 15:20:22.930498+0800 0x5555 Activity 0xcfc1 3408 0 xpcproxy: (libsystem_info.dylib) Resolve user group list 2022-09-23 15:20:22.931058+0800 0x5555 Activity 0xcfc2 3408 0 xpcproxy: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.931635+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.06000000-0700-0000-0000-000000000000 [3407]:] service state: running 2022-09-23 15:20:22.931653+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.06000000-0700-0000-0000-000000000000 [3407]:] internal event: INIT, code = 0 2022-09-23 15:20:22.931669+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.06000000-0700-0000-0000-000000000000 [3407]:] Successfully spawned mdworker_shared[3407] because ipc (mach) 2022-09-23 15:20:22.935398+0800 0x732 Activity 0xcf4a 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.936195+0800 0x732 Activity 0xcf4b 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.936843+0800 0x732 Activity 0xcf4c 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.937372+0800 0x732 Activity 0xcf4d 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.937888+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.04000000-0500-0000-0000-000000000000 [3408]:] service state: running 2022-09-23 15:20:22.937904+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.04000000-0500-0000-0000-000000000000 [3408]:] internal event: INIT, code = 0 2022-09-23 15:20:22.937921+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.04000000-0500-0000-0000-000000000000 [3408]:] Successfully spawned mdworker_shared[3408] because ipc (mach) 2022-09-23 15:20:22.942737+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.05000000-0500-0000-0000-000000000000:] internal event: WILL_SPAWN, code = 0 2022-09-23 15:20:22.942759+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.05000000-0500-0000-0000-000000000000:] service state: spawn scheduled 2022-09-23 15:20:22.942764+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.05000000-0500-0000-0000-000000000000:] service state: spawning 2022-09-23 15:20:22.943014+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.05000000-0500-0000-0000-000000000000:] launching: ipc (mach) 2022-09-23 15:20:22.945443+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.05000000-0500-0000-0000-000000000000 [3409]:] xpcproxy spawned with pid 3409 2022-09-23 15:20:22.945475+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.05000000-0500-0000-0000-000000000000 [3409]:] internal event: SPAWNED, code = 0 2022-09-23 15:20:22.945480+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.05000000-0500-0000-0000-000000000000 [3409]:] service state: xpcproxy 2022-09-23 15:20:22.945502+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.05000000-0500-0000-0000-000000000000 [3409]:] internal event: SOURCE_ATTACH, code = 0 2022-09-23 15:20:22.945511+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.08000000-0600-0000-0000-000000000000:] internal event: WILL_SPAWN, code = 0 2022-09-23 15:20:22.945517+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.08000000-0600-0000-0000-000000000000:] service state: spawn scheduled 2022-09-23 15:20:22.945520+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.08000000-0600-0000-0000-000000000000:] service state: spawning 2022-09-23 15:20:22.945627+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.08000000-0600-0000-0000-000000000000:] launching: ipc (mach) 2022-09-23 15:20:22.947819+0800 0x731 Activity 0xcf4e 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.949058+0800 0x731 Activity 0xcf4f 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.949686+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.08000000-0600-0000-0000-000000000000 [3410]:] xpcproxy spawned with pid 3410 2022-09-23 15:20:22.949716+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.08000000-0600-0000-0000-000000000000 [3410]:] internal event: SPAWNED, code = 0 2022-09-23 15:20:22.949722+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.08000000-0600-0000-0000-000000000000 [3410]:] service state: xpcproxy 2022-09-23 15:20:22.949820+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.03000000-0700-0000-0000-000000000000:] internal event: WILL_SPAWN, code = 0 2022-09-23 15:20:22.949826+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.03000000-0700-0000-0000-000000000000:] service state: spawn scheduled 2022-09-23 15:20:22.949831+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.03000000-0700-0000-0000-000000000000:] service state: spawning 2022-09-23 15:20:22.949934+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.03000000-0700-0000-0000-000000000000:] launching: ipc (mach) 2022-09-23 15:20:22.953964+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.03000000-0700-0000-0000-000000000000 [3411]:] xpcproxy spawned with pid 3411 2022-09-23 15:20:22.953997+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.03000000-0700-0000-0000-000000000000 [3411]:] internal event: SPAWNED, code = 0 2022-09-23 15:20:22.954003+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.03000000-0700-0000-0000-000000000000 [3411]:] service state: xpcproxy 2022-09-23 15:20:22.954045+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.01000000-0600-0000-0000-000000000000:] internal event: WILL_SPAWN, code = 0 2022-09-23 15:20:22.954053+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.01000000-0600-0000-0000-000000000000:] service state: spawn scheduled 2022-09-23 15:20:22.954057+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.01000000-0600-0000-0000-000000000000:] service state: spawning 2022-09-23 15:20:22.954181+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.01000000-0600-0000-0000-000000000000:] launching: ipc (mach) 2022-09-23 15:20:22.956576+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.01000000-0600-0000-0000-000000000000 [3412]:] xpcproxy spawned with pid 3412 2022-09-23 15:20:22.956611+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.01000000-0600-0000-0000-000000000000 [3412]:] internal event: SPAWNED, code = 0 2022-09-23 15:20:22.956617+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.01000000-0600-0000-0000-000000000000 [3412]:] service state: xpcproxy 2022-09-23 15:20:22.956636+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.08000000-0600-0000-0000-000000000000 [3410]:] internal event: SOURCE_ATTACH, code = 0 2022-09-23 15:20:22.956818+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.03000000-0700-0000-0000-000000000000 [3411]:] internal event: SOURCE_ATTACH, code = 0 2022-09-23 15:20:22.956906+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.01000000-0600-0000-0000-000000000000 [3412]:] internal event: SOURCE_ATTACH, code = 0 2022-09-23 15:20:22.961308+0800 0x5556 Activity 0xcfe0 3407 0 mdworker_shared: (libsystem_info.dylib) Retrieve User by ID 2022-09-23 15:20:22.961792+0800 0x5557 Activity 0xcff0 3408 0 mdworker_shared: (libsystem_info.dylib) Retrieve User by ID 2022-09-23 15:20:22.963004+0800 0x5558 Activity 0xd000 3409 0 xpcproxy: (libsystem_info.dylib) Retrieve User by ID 2022-09-23 15:20:22.964028+0800 0x5559 Activity 0xd010 3410 0 xpcproxy: (libsystem_info.dylib) Retrieve User by ID 2022-09-23 15:20:22.964339+0800 0x5558 Activity 0xd001 3409 0 xpcproxy: (libsystem_info.dylib) Resolve user group list 2022-09-23 15:20:22.964584+0800 0x555a Activity 0xd020 3411 0 xpcproxy: (libsystem_info.dylib) Retrieve User by ID 2022-09-23 15:20:22.965015+0800 0x5559 Activity 0xd011 3410 0 xpcproxy: (libsystem_info.dylib) Resolve user group list 2022-09-23 15:20:22.965162+0800 0x5558 Activity 0xd002 3409 0 xpcproxy: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.965744+0800 0x555a Activity 0xd021 3411 0 xpcproxy: (libsystem_info.dylib) Resolve user group list 2022-09-23 15:20:22.966033+0800 0x5559 Activity 0xd012 3410 0 xpcproxy: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.966502+0800 0x555a Activity 0xd022 3411 0 xpcproxy: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.968238+0800 0x555b Activity 0xd030 3412 0 xpcproxy: (libsystem_info.dylib) Retrieve User by ID 2022-09-23 15:20:22.969266+0800 0x555b Activity 0xd031 3412 0 xpcproxy: (libsystem_info.dylib) Resolve user group list 2022-09-23 15:20:22.970120+0800 0x555b Activity 0xd032 3412 0 xpcproxy: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.972085+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.05000000-0500-0000-0000-000000000000 [3409]:] service state: running 2022-09-23 15:20:22.972094+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.05000000-0500-0000-0000-000000000000 [3409]:] internal event: INIT, code = 0 2022-09-23 15:20:22.972114+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.05000000-0500-0000-0000-000000000000 [3409]:] Successfully spawned mdworker_shared[3409] because ipc (mach) 2022-09-23 15:20:22.979681+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.03000000-0700-0000-0000-000000000000 [3411]:] service state: running 2022-09-23 15:20:22.979687+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.03000000-0700-0000-0000-000000000000 [3411]:] internal event: INIT, code = 0 2022-09-23 15:20:22.979702+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.03000000-0700-0000-0000-000000000000 [3411]:] Successfully spawned mdworker_shared[3411] because ipc (mach) 2022-09-23 15:20:22.984003+0800 0x732 Activity 0xcfd0 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.984777+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.08000000-0600-0000-0000-000000000000 [3410]:] service state: running 2022-09-23 15:20:22.984783+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.08000000-0600-0000-0000-000000000000 [3410]:] internal event: INIT, code = 0 2022-09-23 15:20:22.984801+0800 0x54df Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.08000000-0600-0000-0000-000000000000 [3410]:] Successfully spawned mdworker_shared[3410] because ipc (mach) 2022-09-23 15:20:22.985124+0800 0x732 Activity 0xcfd1 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.985672+0800 0x732 Activity 0xcfd2 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.986056+0800 0x732 Activity 0xcfd3 361 0 com.crowdstrike.falcon.Agent: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:22.988741+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.01000000-0600-0000-0000-000000000000 [3412]:] service state: running 2022-09-23 15:20:22.988749+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.01000000-0600-0000-0000-000000000000 [3412]:] internal event: INIT, code = 0 2022-09-23 15:20:22.988766+0800 0x54c4 Default 0x0 1 0 launchd: [user/501/com.apple.mdworker.shared.01000000-0600-0000-0000-000000000000 [3412]:] Successfully spawned mdworker_shared[3412] because ipc (mach) 2022-09-23 15:20:22.990757+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2029) [C1.1:2][0x7fdbcd316c40] Client handshake state: TLS client read_server_finished 2022-09-23 15:20:22.990821+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2029) [C1.1:2][0x7fdbcd316c40] Client handshake state: TLS client finish_client_handshake 2022-09-23 15:20:22.990911+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2029) [C1.1:2][0x7fdbcd316c40] Client handshake state: TLS client done 2022-09-23 15:20:22.990913+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2018) [C1.1:2][0x7fdbcd316c40] Client handshake done 2022-09-23 15:20:22.991537+0800 0x5500 Activity 0xcf0f 3401 0 VPNExtensionX: (Security) SecTrustReportNetworkingAnalytics 2022-09-23 15:20:22.991565+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] nw_protocol_boringssl_signal_connected(715) [C1.1:2][0x7fdbcd316c40] TLS connected [version(0x0303) ciphersuite(TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) group(0x0017) signature_alg(0x0601) alpn(h2) resumed(0) offered_ticket(0) false_started(0) ocsp_received(0) sct_received(0) connect_time(191ms) flight_time(170ms) rtt(83ms) write_stalls(0) read_stalls(5)] 2022-09-23 15:20:22.991618+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] nw_flow_connected [C1.1 IPv4#369bf2e0:443 in_progress socket-flow (satisfied (Path is satisfied), viable, interface: en0, scoped, ipv4, ipv6, dns)] Output protocol connected (CFNetworkConnection-3529306501) 2022-09-23 15:20:22.991669+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] [C1.1 IPv4#369bf2e0:443 ready socket-flow (satisfied (Path is satisfied), viable, interface: en0, scoped, ipv4, ipv6, dns)] event: flow:finish_connect @0.250s 2022-09-23 15:20:22.991708+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] nw_connection_report_state_with_handler_on_nw_queue [C1] reporting state ready 2022-09-23 15:20:22.991728+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] [C1 Hostname#5ad56d8d:443 ready resolver (satisfied (Path is satisfied), interface: en0, scoped, ipv4, ipv6, dns)] event: flow:finish_connect @0.250s 2022-09-23 15:20:22.991742+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] [C1.1 IPv4#369bf2e0:443 ready socket-flow (satisfied (Path is satisfied), viable, interface: en0, scoped, ipv4, ipv6, dns)] event: flow:changed_viability @0.250s 2022-09-23 15:20:22.991762+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] [C1 Hostname#5ad56d8d:443 ready resolver (satisfied (Path is satisfied), interface: en0, scoped, ipv4, ipv6, dns)] event: flow:changed_viability @0.250s 2022-09-23 15:20:22.992058+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) Connection 1: connected successfully 2022-09-23 15:20:22.992082+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) Connection 1: TLS handshake complete 2022-09-23 15:20:22.992373+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) Connection 1: ready C(N) E(N) 2022-09-23 15:20:22.993156+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) Task <97686506-8CE2-4EA5-B56E-B34D7EA0EC62>.<1> now using Connection 1 2022-09-23 15:20:22.993189+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) Connection 1: received viability advisory(Y) 2022-09-23 15:20:22.993571+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) Task <97686506-8CE2-4EA5-B56E-B34D7EA0EC62>.<1> sent request, body N 0 2022-09-23 15:20:23.001686+0800 0x555c Activity 0xd050 3409 0 mdworker_shared: (libsystem_info.dylib) Retrieve User by ID 2022-09-23 15:20:23.012975+0800 0x555d Activity 0xd060 3411 0 mdworker_shared: (libsystem_info.dylib) Retrieve User by ID 2022-09-23 15:20:23.018225+0800 0x555e Activity 0xd070 3410 0 mdworker_shared: (libsystem_info.dylib) Retrieve User by ID 2022-09-23 15:20:23.025222+0800 0x555f Activity 0xd080 3412 0 mdworker_shared: (libsystem_info.dylib) Retrieve User by ID 2022-09-23 15:20:23.039762+0800 0x5552 Activity 0xcf82 3405 0 mdworker_shared: (CoreFoundation) Loading Preferences From System CFPrefsD 2022-09-23 15:20:23.046955+0800 0x5551 Activity 0xcf92 3406 0 mdworker_shared: (CoreFoundation) Loading Preferences From System CFPrefsD 2022-09-23 15:20:23.054847+0800 0x5562 Activity 0xcfe1 3407 0 mdworker_shared: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:23.061175+0800 0x5560 Activity 0xcff1 3408 0 mdworker_shared: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:23.063016+0800 0x5566 Activity 0xd051 3409 0 mdworker_shared: (libsystem_info.dylib) Membership API: translate identifier 2022-09-23 15:20:23.087893+0800 0x5500 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) Task <97686506-8CE2-4EA5-B56E-B34D7EA0EC62>.<1> received response, status 200 content U 2022-09-23 15:20:23.092357+0800 0x5504 Default 0x0 3401 0 VPNExtensionX: Time taken for LauncDarkly to initialise : 0.390940. Timedout = 0 2022-09-23 15:20:23.092811+0800 0x5504 Default 0x0 3401 0 VPNExtensionX: NSGAuthContext - initWithTunnelProvider: 2022-09-23 15:20:23.093119+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: NSGAuthContext: Creating auth context from protocol config type = plugin identifier = 2063E56D-8F7E-419E-B04B-6BCA488E7702 serverAddress = neo.globe.com.ph identityDataImported = NO proxySettings = { autoProxyDiscovery = NO autoProxyConfigurationEnabled = NO HTTPEnabled = NO HTTPSEnabled = NO FTPEnabled = NO SOCKSEnabled = NO RTSPEnabled = NO gopherEnabled = NO excludeSimpleHostnames = NO usePassiveFTP = YES } disconnectOnSleep = NO disconnectOnIdle = NO disconnectOnIdleTimeout = 0 disconnectOnWake = NO disconnectOnWakeTimeout = 0 disconnectOnUserSwitch = NO disconnectOnLogout = NO includeAllNetworks = NO excludeLocalNetworks = NO enforceRoutes = NO pluginType = com.citrix.NetScalerGateway.macos.app authenticationMethod = 0 reassertTimeout = 0 providerConfiguration = { CanEdit = 1 ClientCertEnabled = 0 } providerBundle<…> 2022-09-23 15:20:23.093235+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: Parsing vpn server info. 2022-09-23 15:20:23.093297+0800 0x54fa Activity 0xd040 3401 0 VPNExtensionX: (libsystem_containermanager.dylib) container_create_or_lookup_app_group_path_by_app_group_identifier 2022-09-23 15:20:23.093311+0800 0x54fa Default 0x0 3401 0 VPNExtensionX: (libsystem_containermanager.dylib) [com.apple.containermanager:unspecified] container_create_or_lookup_app_group_path_by_app_group_identifier: success 2022-09-23 15:20:23.093320+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: Parsing vpn server info. 2022-09-23 15:20:23.093397+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: VPN V-server address is https://neo.globe.com.ph. 2022-09-23 15:20:23.093473+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: VPN V-server port is 443. 2022-09-23 15:20:23.093744+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: Block untrusted servers : 1. 2022-09-23 15:20:23.093821+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: User name not available in the VPN profile. 2022-09-23 15:20:23.093890+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: Password not available in the VPN profile. 2022-09-23 15:20:23.093961+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: NSGCert - Setting client cert mode 0. [0 = Disabled, 1 = Automatic(iOS only), 2 = Client cert present] 2022-09-23 15:20:23.094030+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: NSGAuthContext - parsing vendor config data { CanEdit = 1; ClientCertEnabled = 0; }. 2022-09-23 15:20:23.094101+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: No Custom User agent in vendor config dictionary. 2022-09-23 15:20:23.094206+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: PacketTunnelProvider - Validating tunnel startup options 2022-09-23 15:20:23.094278+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: Gateway cookie available. Extension started by App. 2022-09-23 15:20:23.094349+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: PacketTunnelProvider - Starting tunnel establishment. 2022-09-23 15:20:23.094422+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: PacketTunnelProvider - startTunnelEstablishmentWithOptions: 2022-09-23 15:20:23.094497+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: PacketTunnelProvider - Setting up tunnel context 2022-09-23 15:20:23.094572+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: NSGTunnelParameters - init 2022-09-23 15:20:23.094648+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: NSGTunnelParameters - parseExtensionStartupOptions: 2022-09-23 15:20:23.094722+0800 0x5521 Default 0x0 3401 0 VPNExtensionX: Set Client is in Progress..... 2022-09-23 15:20:23.095336+0800 0x54fa Default 0x0 3401 0 VPNExtensionX: (CFNetwork) Task <1759F89E-5C55-4D07-BBA0-CF36211551E6>.<1> resuming, timeouts(60.0, 604800.0) QOS(0x15) Voucher 2022-09-23 15:20:23.095411+0800 0x54fa Default 0x0 3401 0 VPNExtensionX: (CFNetwork) [Telemetry]: Activity on Task <1759F89E-5C55-4D07-BBA0-CF36211551E6>.<1> was not selected for reporting 2022-09-23 15:20:23.096715+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) [com.apple.CFNetwork:ATS] Task <1759F89E-5C55-4D07-BBA0-CF36211551E6>.<1> {strength 0, tls 4, ct 0, sub 0, sig 1, ciphers 0, bundle 0, builtin 0} 2022-09-23 15:20:23.096848+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) Faulting in AlternativeServices Storage singleton 2022-09-23 15:20:23.097150+0800 0x5503 Error 0x0 3401 0 VPNExtensionX: (libsqlite3.dylib) [com.apple.libsqlite3:logging] volume does not support data protection, stripping SQLITE_OPEN_FILEPROTECTION_* flags 2022-09-23 15:20:23.138053+0800 0x5503 Error 0x0 3401 0 VPNExtensionX: (libsqlite3.dylib) [com.apple.libsqlite3:logging] volume does not support data protection, stripping SQLITE_OPEN_FILEPROTECTION_* flags 2022-09-23 15:20:23.147237+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) Connection 2: enabling TLS 2022-09-23 15:20:23.147240+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) Connection 2: starting, TC(0x0) 2022-09-23 15:20:23.147257+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] [C2 2DE33284-0357-45F0-8BED-DAFE3BB20AF0 IPv4#fe0935e5:443 tcp, url hash: b98fa34c, tls, definite, attribution: developer, context: com.apple.CFNetwork.NSURLSession.{301B92B0-D345-4BC1-B169-B88E18DE6C55}{(null)}{Y}{2} (private), proc: 7FC46B04-3F5D-38B5-9773-9D7A90663AEB] start 2022-09-23 15:20:23.147290+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] [C2 IPv4#fe0935e5:443 initial path ((null))] event: path:start @0.000s 2022-09-23 15:20:23.147463+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] [C2 IPv4#fe0935e5:443 waiting path (satisfied (Path is satisfied), interface: en0, scoped, ipv4, ipv6, dns, flow divert agg: 1)] event: path:satisfied @0.000s, uuid: C300C5D6-7F0D-4EAE-AE7C-0DB389741C63 2022-09-23 15:20:23.147726+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] [C2 IPv4#fe0935e5:443 in_progress socket-flow (satisfied (Path is satisfied), interface: en0, scoped, ipv4, ipv6, dns, flow divert agg: 1)] event: flow:start_connect @0.000s 2022-09-23 15:20:23.147730+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] nw_connection_report_state_with_handler_on_nw_queue [C2] reporting state preparing 2022-09-23 15:20:23.147905+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) Task <1759F89E-5C55-4D07-BBA0-CF36211551E6>.<1> setting up Connection 2 2022-09-23 15:20:23.148654+0800 0x52d1 Default 0x0 357 0 com.mcafee.CMF.networkextension: (NetworkExtension) [com.apple.networkextension:] (0): Flow 1838588093 is connecting 2022-09-23 15:20:23.148813+0800 0x52d1 Default 0x0 357 0 com.mcafee.CMF.networkextension: (NetworkExtension) [com.apple.networkextension:] (1838588093): New flow: NEFlow type = stream, app = com.citrix.NetScalerGateway.macos.app.vpnplugin, name = , 192.168.1.8:0 <-> 112.198.38.172:443, filter_id = FD3F3BC5-28DC-4169-ADCB-543EB129B998, interface = en0(bound) 2022-09-23 15:20:23.149103+0800 0x54dd Default 0x0 357 0 com.mcafee.CMF.networkextension: (NetworkExtension) [com.apple.networkextension:] [Extension com.mcafee.containerapp]: Calling handleNewFlow with TCP com.citrix.NetScalerGateway.macos.app.vpnplugin[{length = 20, bytes = 0xf61bcf6970ac9163540fec8f7df90a271b6c5ffe}] remote: 112.198.38.172:443 interface en0(bound) 2022-09-23 15:20:23.149449+0800 0x54dd Error 0x0 357 0 com.mcafee.CMF.networkextension: EvaluateNwPolicies: Returned Reaction = AAC_REACTION_REDIRECT_BYPASS 2022-09-23 15:20:23.149477+0800 0x54dd Default 0x0 357 0 com.mcafee.CMF.networkextension: [com.mcafee.dev.PassThroughProxy:providerCore] checkPolicyForRedirection: Bypassing. Not redirecting traffic to Proxy. Original dest: 112.198.38.172:443 cookie: 2876, processPath: /Applications/Citrix Secure Access.app/Contents/PlugIns/VPNExtensionX.appex/Contents/MacOS/VPNExtensionX 2022-09-23 15:20:23.149533+0800 0x54dd Default 0x0 357 0 com.mcafee.CMF.networkextension: (NetworkExtension) [com.apple.networkextension:] [Extension com.mcafee.containerapp]: provider rejected new flow TCP com.citrix.NetScalerGateway.macos.app.vpnplugin[{length = 20, bytes = 0xf61bcf6970ac9163540fec8f7df90a271b6c5ffe}] remote: 112.198.38.172:443 interface en0(bound) 2022-09-23 15:20:23.149597+0800 0x54dd Default 0x0 0 0 kernel: (1838588093): No more valid control units, disabling flow divert 2022-09-23 15:20:23.149600+0800 0x54dd Default 0x0 0 0 kernel: (1838588093): Skipped all flow divert services, disabling flow divert 2022-09-23 15:20:23.149802+0800 0x54dd Default 0x0 357 0 com.mcafee.CMF.networkextension: (NetworkExtension) [com.apple.networkextension:] (1838588093): Destroying, client tx 0, client rx 0, kernel rx 0, kernel tx 0 2022-09-23 15:20:23.150132+0800 0x5500 Default 0x0 3401 0 VPNExtensionX: (CFNetwork) Garbage collection for alternative services 2022-09-23 15:20:23.154175+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.154217+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.154239+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.154302+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:23.154506+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.154539+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.154559+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.154611+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:23.156044+0800 0x52d1 Default 0x0 0 0 kernel: cfil_data_service_ctl_q:4137 cfil_service_pending_queue() error -2 2022-09-23 15:20:23.156051+0800 0x52d1 Default 0x0 0 0 kernel: cfil_update_data_offsets:4565 cfil_data_service_ctl_q() error -2 2022-09-23 15:20:23.158754+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] nw_socket_handle_socket_event [C2:3] Socket received CONNECTED event 2022-09-23 15:20:23.158764+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.158960+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] nw_flow_connected [C2 IPv4#fe0935e5:443 in_progress socket-flow (satisfied (Path is satisfied), viable, interface: en0, scoped, ipv4, ipv6, dns, flow divert agg: 1)] Transport protocol connected (socket) 2022-09-23 15:20:23.158965+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.159049+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.159080+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] [C2 IPv4#fe0935e5:443 in_progress socket-flow (satisfied (Path is satisfied), viable, interface: en0, scoped, ipv4, ipv6, dns, flow divert agg: 1)] event: flow:finish_transport @0.011s 2022-09-23 15:20:23.159252+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:23.159352+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_session_apply_protocol_options_for_transport_block_invoke(1719) [C2:2][0x7fdbcc755440] TLS configured [min_version(0x0301) max_version(0x0304) name() tickets(false) false_start(false) enforce_ev(false) enforce_ats(false)] 2022-09-23 15:20:23.159391+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2012) [C2:2][0x7fdbcc755440] Client handshake started 2022-09-23 15:20:23.159488+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.159510+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2029) [C2:2][0x7fdbcc755440] Client handshake state: TLS client enter_early_data 2022-09-23 15:20:23.159536+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.159563+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.159623+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:23.159630+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] boringssl_context_info_handler(2029) [C2:2][0x7fdbcc755440] Client handshake state: TLS client read_server_hello 2022-09-23 15:20:23.159676+0800 0x5503 Error 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] nw_socket_get_input_frames recvmsg(fd 17, 1024 bytes) [57: Socket is not connected] 2022-09-23 15:20:23.159684+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] nw_protocol_boringssl_error(1792) [C2:2][0x7fdbcc755440] Lower protocol stack error during TLS handshake. [57: ] 2022-09-23 15:20:23.159780+0800 0x5503 Error 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] nw_socket_get_input_frames recvmsg(fd 17, 1024 bytes) [57: Socket is not connected] 2022-09-23 15:20:23.159785+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] nw_protocol_boringssl_error(1792) [C2:2][0x7fdbcc755440] Lower protocol stack error during TLS handshake. [57: ] 2022-09-23 15:20:23.159833+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.159872+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.159895+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.159905+0800 0x5503 Error 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] nw_socket_get_input_frames recvmsg(fd 17, 1024 bytes) [57: Socket is not connected] 2022-09-23 15:20:23.159910+0800 0x5503 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] nw_protocol_boringssl_error(1792) [C2:2][0x7fdbcc755440] Lower protocol stack error during TLS handshake. [57: ] 2022-09-23 15:20:23.159996+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:23.160183+0800 0x5503 Activity 0xd041 3401 0 VPNExtensionX: (Security) SecTrustReportNetworkingAnalytics 2022-09-23 15:20:23.160224+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.160256+0800 0x5504 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] nw_flow_disconnected [C2 IPv4#fe0935e5:443 in_progress socket-flow (satisfied (Path is satisfied), viable, interface: en0, scoped, ipv4, ipv6, dns, flow divert agg: 1)] Output protocol disconnected 2022-09-23 15:20:23.160296+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.160318+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.160345+0800 0x5504 Default 0x0 3401 0 VPNExtensionX: (libboringssl.dylib) [com.apple.network:boringssl] nw_protocol_boringssl_error(1792) [C2:2][0x7fdbcc755440] Lower protocol stack error during TLS handshake. [32: ] 2022-09-23 15:20:23.160376+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:23.160505+0800 0x5504 Default 0x0 3401 0 VPNExtensionX: (libnetwork.dylib) [com.apple.network:connection] [C2 IPv4#fe0935e5:443 failed socket-flow (satisfied (Path is satisfied), viable, interface: en0, scoped, ipv4, ipv6, dns, flow divert agg: 1)] event: flow:failed_connect @0.013s, error server closed session with no notification 2022-09-23 15:20:23.160576+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.160611+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.160631+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.160686+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:23.160870+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.160902+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.160985+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.161056+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:23.161256+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.161336+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.161358+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.161415+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 421: getifaddrs nInterfaces[ 24], count[ 3] 2022-09-23 15:20:23.161596+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface '' 2022-09-23 15:20:23.161627+0800 0x39bd Default 0x0 1660 0 Google Chrome: (CoreWLAN) _getIfListCopy/ 410: Added 'IFM_IEEE80211' supported interface ''