tunnelblick icon Tunnelblick free software for OpenVPN on OS X and macOS This website collects GDPR "Personal Information"…
We need translators for several languages…
Home Downloads Support Documents Issues Source Contribute Contact

On This Page
    Release Downloads
    Verifying Downloads
    User Contributions
    Download Integrity

Release Downloads

To be notified of new releases, use Tunnelblick's built-in update mechanism or subscribe to the Tunnelblick Announce Mailing List.

Beta versions are suitable for most users. See Stable vs. Beta for details.

Beta Tunnelblick 3.7.6beta03 (build 5031, OS X 10.7.5+, Intel-64 only) released 2018-03-28 Release Notes
SHA1: 1ab67f673542749b4c29bfa564bd6ddb8af5d805 MD5: 0a982b43418d5aa6770cf05312688612
SHA256: ecfbe42cdc349b0cd619601abcfd7e09f3e3ca991d5e0249a01c1f3e4c6f60fc
GnuPG v2 signature
 
Stable Tunnelblick 3.7.5a (build 5011, OS X 10.7.5+, Intel-64 only) released 2018-03-28 Release Notes
SHA1: e3925bfa2e8209e70fe2502435bf2292827a9eec MD5: 1277befca6c4c5019031bd37d7c6d997
SHA256: 1da1c1c7c7380f74b8674bb1a094296dd384d49871856b7477a0948852657167
GnuPG v2 signature
 
Older See the Deprecated Downloads page. Includes versions for OS X 10.4 - 10.7.4.
 
Uninstaller Please read Uninstalling Tunnelblick before using Tunnelblick Uninstaller
  Tunnelblick Uninstaller 1.9 (build 4990, OS X 10.7.5+, Intel-64 only) released 2018-01-31 Release Notes
SHA1: 3bd401dd4bc429bd71a9f15e032f754669f217c9 MD5: d328e5d2242c40bd80af607d38c7d498
SHA256: 77b2e8022220cda87ed981fd9321b2f52d83814edf6a7c93a6cf2bd1a32195ab
GnuPG v2 signature

Verifying Downloads

You should verify all downloads. Even though https:, the .dmg format, and the application's OS X digital signature provide some protection, they can be circumvented.

Verifying Hashes

Comparing the SHA256, SHA1, and MD5 hashes of your downloaded file with the official published ones will provide additional assurance that the download is legitimate and has not been modified. You can compare the hashes with programs included with macOS without the need to install additional software.

To compute the hashes of a file you've downloaded, type the following into /Applications/Utilities/Terminal:

          shasum -a 256 path-to-the-file
          openssl sha1 path-to-the-file
          openssl md5 path-to-the-file

Then compare the computed hashes with the values shown near the link for the downloaded file.

(Don't type 'path-to-the-file' — type the path to the file, that is, the sequence of folders that contain the file plus the file name (e.g. /Users/janedoe/Desktop/Tunnelblick_3.7.2a_build_4851.dmg). An easy way to get it into Terminal is to drag/drop the file anywhere in the Terminal window. The pointer will turn into a green and white plus sign ("+"_) to indicate the path will be dropped. So you would type 'shasum -a 256 ' — with a space at the end — and then drag/drop the disk image file anywhere in the Terminal window.)

For additional assurance that the hashes displayed on this site have not been compromised, the hashes are also available in the description of each "Release" on Tunnelblick's GitHub site, which is hosted and administered separately from this site.

Verifying GnuPG Signatures

Recent Tunnelblick disk images are also signed with GnuPG version 2.

To prepare for verifying signatures, you should download and install GnuPG 2.2.3 or higher, and then add the Tunnelblick Security GnuPG public key (key ID 6BB9367E, fingerprint 76DF 975A 1C56 4277 4FB0 9868 FF5F D80E 6BB9 367E) to your trusted GnuPG keyring by typing the following into /Applications/Utilities/Terminal:

          gpg --import TunnelblickSecurityPublicKey.asc.

To verify the signature of a file, download the corresponding signature file and then type the following into /Applications/Utilities/Terminal:

          gpg --verify path-to-the-signature-file path-to-the-disk-image-file

The result should be similar to the following:

          gpg: Signature made Sat Dec 16 19:17:03 2017 EST
          gpg: using RSA key B4D96F0D6A58E335A0F4923A2FF3A2B2DC6FD12C
          gpg: Good signature from "Tunnelblick Security <tunnelblicksecurity@protonmail.com>" [ultimate]


User Contributions

These downloads have been contributed by users and usually help deal with special circumstances. They are not endorsed or checked by the Tunnelblick project, and you use them at your own risk. To contribute a download, send it to the developers or post it on the Tunnelblick Discussion Group.

Before using these scripts, please read Tunnelblick and VPNs: Privacy and Security. (Actually, everyone using a VPN should read that!)

Note: these scripts are executed as root. Instructions for using scripts.

  Scripts to Unload Cisco Tun Kext: user-contributed-001-pre-post.zip
  SHA1: d3b09a2284de2862be7d55059581a85698930b28 MD5: f6f484864697607ee5c7206a5b056b12
  Contributed by "petiepooo".
These scripts unload the Cisco AnyConnect tun kext before a Tunnelblick connection is started, and reload the Cisco tun kext after a Tunnelblick connection is stopped. (The Cisco kext interferes with Tunnelblick's operation of tun connections.)
 
  Scripts to Mount/Unmount a Volume: user-contributed-002-mount-unmount-volume.zip
  SHA1: eb69727620fa8c46633d9ccf9f86c4b258fea7e6 MD5: 5b3b04bea43403b2a709aaa4c92d7473
  Contributed by John Griffis.
These scripts mount a volume after a configuration is connected and unmount it when the configuration is disconnected. Scripts must be edited before use (in any plain-text editor) to specify details of the volume to be connected. For a note about connecting to a CIFS account, see this discussion.
 
  Scripts to Monitor Connection Time and Bandwidth Use: user-contributed-003-monitor-uptime-and-bandwidth.zip
  SHA1: 384b370967e722eacb2f3a782e8c326d87174003 MD5: 2c23ed5c31a1238843fb5ea36fd5dd74
  Contributed by "vkapovit".
  These scripts provide a mechanism for the user to be alerted when the VPN has been up for more than 20 minutes or when bandwidth has exceeded 100MB. See this discussion for details. Requires Growl.
Includes compiled binaries; use at your own risk.
 
  Scripts to Launch and Kill a Program: user-contributed-004-launch-kill-program.zip
  SHA1: 977aa7cc55f3e191b50057fe766c426af01808eb MD5: beccc55286b398fe0a8bcb798e25a883
  Contributed by "anonymous".
  These scripts cause a program to be launched when a VPN is connected and then killed when the VPN is disconnected. It can be used with a torrent program, for example, so that the program is only active when the VPN is connected.
Note that there may be a short time after the VPN has been disconnected before the program is killed.
 

Download Integrity

In June 2015 there was much discussion (and outrage) about SourceForge providing downloads that contain unwanted or malicious software; SourceForge has changed their policies to help avoid this. Tunnelblick binaries were hosted on SourceForge from the fall of 2013, when Google Code stopped hosting new binaries, until 2015-07-17, when they were moved from SourceForge to GitHub.

Tunnelblick protects against unwanted software insertions by publishing the SHA1 and MD5 hashes for each of our downloads. You should verify the hashes of all Tunnelblick downloads by following the instructions above.

Additional safeguards automatically protect updates performed by Tunnelblick's built-in update mechanism:

  • Updates are controlled by tunnelblick.net and all update data is transported via https:
  • Update downloads contain digital signatures to verify they have not been modified. (This is in addition to the OS X digital signature of the Tunnelblick application itself.) See Digital Signatures.
  Deutsch     Français     中文(简体)     Русский     Español     日本語     …