eibgrad DD-WRT Guru
Joined: 18 Sep 2010 Posts: 9157
|
Posted: Sun Jan 09, 2022 5:25 Post subject: |
|
It's best to NOT use compression unless the server insists on it. There are known vulnerabilities.
OpenVPN provides a management UI (iirc, running as localhost (127.0.0.1), port 16) that you can call when it's running. The router is calling it to get updated statistics from OpenVPN, then updating the OpenVPN status page. Every time you visit that page or refresh it, you'll see these messages in the syslog as it connects, issues the state command, and disconnects. OpenVPN is complaining that access to the UI is NOT using a password. But the router is always running as root anyway, and only accessible as root. Password protecting it is pointless. Once someone has access to the router, it's game over. But OpenVPN doesn't know this. It assumes there are other NON root users on the platform, so it complains.
In a nutshell, you can ignore these messages. _________________ ddwrt-ovpn-split-basic.sh (UPDATED!) * ddwrt-ovpn-split-advanced.sh (UPDATED!) * ddwrt-ovpn-client-killswitch.sh * ddwrt-ovpn-client-watchdog.sh * ddwrt-ovpn-remote-access.sh * ddwrt-ovpn-client-backup.sh * ddwrt-mount-usb-drives.sh * ddwrt-blacklist-domains.sh * ddwrt-wol-port-forward.sh * ddwrt-dns-monitor.sh (NEW!) |
|