OpenVPN Client Disconnecting/Dropping

Post new topic   Reply to topic    DD-WRT Forum Index -> Advanced Networking
Goto page Previous  1, 2, 3, 4  Next
Author Message
Jord9857
DD-WRT User


Joined: 17 Mar 2021
Posts: 74

PostPosted: Fri Jun 24, 2022 18:24    Post subject: Reply with quote
sorry, I've selected WiFi channels now - was worry to do so as other factors in place like AP's, DNS started leaking after changing some settings too but seems ok on channel 5 & 100 now

Compression is set to No, Additional Config only has verb 5, Watchdogs are disabled apart from the OpenVPN one as suggested so will keep an eye and grab logs when it happens again

Considering to upgrade and re-configure, is there a thorough guide for the other settings non OpenVPN related please? Already have the guide for the OpenVPN client & server settings
Sponsor
Jord9857
DD-WRT User


Joined: 17 Mar 2021
Posts: 74

PostPosted: Sat Jun 25, 2022 6:46    Post subject: Reply with quote
Hi, here we go - got the logs, so the router was fine at about 11pm (23:00), connected to it this morning about 7:30ish... No internet, after about 5/10 minutes or so, it then sorted itself out (quicker than normal)

Quote:
Jun 24 19:31:06 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
Jun 24 19:31:06 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: CMD 'state'
Jun 24 19:31:06 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: Client disconnected
Jun 24 19:31:06 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
Jun 24 19:31:06 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: CMD 'state'
Jun 24 19:31:06 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: Client disconnected
Jun 24 19:31:06 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
Jun 24 19:31:06 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: CMD 'state'
Jun 24 19:31:06 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: Client disconnected
Jun 24 19:31:07 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
Jun 24 19:31:07 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: CMD 'status 2'
Jun 24 19:31:07 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: Client disconnected
Jun 24 19:31:07 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
Jun 24 19:31:07 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: CMD 'log 500'
Jun 24 19:31:07 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: Client disconnected
Jun 24 19:31:53 DD-WRT daemon.err openvpn[15961]: tun packet too large on write (tried=1434,max=1400)
Jun 24 19:31:53 DD-WRT daemon.err openvpn[15961]: tun packet too large on write (tried=1434,max=1400)
Jun 24 19:31:53 DD-WRT daemon.err openvpn[15961]: tun packet too large on write (tried=1434,max=1400)
Jun 24 19:31:53 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 24 20:11:37 DD-WRT daemon.notice openvpn[15961]: 9761 variation(s) on previous 3 message(s) suppressed by --mute
Jun 24 20:11:37 DD-WRT daemon.notice openvpn[15961]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Jun 24 20:11:37 DD-WRT daemon.notice openvpn[15961]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
Jun 24 20:11:37 DD-WRT daemon.notice openvpn[15961]: VERIFY KU OK
Jun 24 20:11:37 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 24 20:11:37 DD-WRT daemon.notice openvpn[15961]: 4 variation(s) on previous 3 message(s) suppressed by --mute
Jun 24 20:11:37 DD-WRT daemon.warn openvpn[15961]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 24 20:11:37 DD-WRT daemon.warn openvpn[15961]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 24 20:11:37 DD-WRT daemon.notice openvpn[15961]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 24 20:11:37 DD-WRT daemon.notice openvpn[15961]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 24 20:11:37 DD-WRT daemon.notice openvpn[15961]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 24 20:11:42 DD-WRT daemon.debug ntpclient[18008]: Connecting to 2.pool.ntp.org [92.241.223.83] ...
Jun 24 20:11:42 DD-WRT daemon.info ntpclient[18008]: Time set from 2.pool.ntp.org [92.241.223.83].
Jun 24 20:11:42 DD-WRT daemon.info process_monitor[16308]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 24 20:11:43 DD-WRT daemon.err openvpn[15961]: tun packet too large on write (tried=1434,max=1400)
Jun 24 20:11:43 DD-WRT daemon.err openvpn[15961]: tun packet too large on write (tried=1434,max=1400)
Jun 24 20:11:43 DD-WRT daemon.err openvpn[15961]: tun packet too large on write (tried=1434,max=1400)
Jun 24 20:11:43 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 24 21:11:36 DD-WRT daemon.notice openvpn[15961]: 170 variation(s) on previous 3 message(s) suppressed by --mute
Jun 24 21:11:36 DD-WRT daemon.notice openvpn[15961]: TLS: tls_process: killed expiring key
Jun 24 21:11:37 DD-WRT daemon.notice openvpn[15961]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Jun 24 21:11:37 DD-WRT daemon.notice openvpn[15961]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
Jun 24 21:11:37 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 24 21:11:37 DD-WRT daemon.notice openvpn[15961]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Jun 24 21:11:37 DD-WRT daemon.warn openvpn[15961]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 24 21:11:37 DD-WRT daemon.warn openvpn[15961]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 24 21:11:37 DD-WRT daemon.notice openvpn[15961]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 24 21:11:37 DD-WRT daemon.notice openvpn[15961]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 24 21:11:37 DD-WRT daemon.notice openvpn[15961]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 24 21:11:42 DD-WRT daemon.debug ntpclient[18871]: Connecting to 2.pool.ntp.org [92.241.223.83] ...
Jun 24 21:11:42 DD-WRT daemon.info ntpclient[18871]: Time set from 2.pool.ntp.org [92.241.223.83].
Jun 24 21:11:42 DD-WRT daemon.info process_monitor[16308]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 24 21:58:29 DD-WRT daemon.err openvpn[15961]: tun packet too large on write (tried=1434,max=1400)
Jun 24 21:58:29 DD-WRT daemon.err openvpn[15961]: tun packet too large on write (tried=1434,max=1400)
Jun 24 21:58:29 DD-WRT daemon.err openvpn[15961]: tun packet too large on write (tried=1434,max=1400)
Jun 24 21:58:29 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 24 22:11:36 DD-WRT daemon.notice openvpn[15961]: 1 variation(s) on previous 3 message(s) suppressed by --mute
Jun 24 22:11:36 DD-WRT daemon.notice openvpn[15961]: TLS: tls_process: killed expiring key
Jun 24 22:11:37 DD-WRT daemon.notice openvpn[15961]: TLS: soft reset sec=3600/3600 bytes=450208364/-1 pkts=441705/0
Jun 24 22:11:37 DD-WRT daemon.notice openvpn[15961]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Jun 24 22:11:37 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 24 22:11:38 DD-WRT daemon.notice openvpn[15961]: 6 variation(s) on previous 3 message(s) suppressed by --mute
Jun 24 22:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 24 22:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 24 22:11:38 DD-WRT daemon.notice openvpn[15961]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 24 22:11:38 DD-WRT daemon.notice openvpn[15961]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 24 22:11:38 DD-WRT daemon.notice openvpn[15961]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 24 22:11:43 DD-WRT daemon.debug ntpclient[19443]: Connecting to 2.pool.ntp.org [217.75.106.216] ...
Jun 24 22:11:43 DD-WRT daemon.info ntpclient[19443]: Time set from 2.pool.ntp.org [217.75.106.216].
Jun 24 22:11:43 DD-WRT daemon.info process_monitor[16308]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 24 23:11:37 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 24 23:11:38 DD-WRT daemon.notice openvpn[15961]: 8 variation(s) on previous 3 message(s) suppressed by --mute
Jun 24 23:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 24 23:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 24 23:11:38 DD-WRT daemon.notice openvpn[15961]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 24 23:11:38 DD-WRT daemon.notice openvpn[15961]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 24 23:11:38 DD-WRT daemon.notice openvpn[15961]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 24 23:11:44 DD-WRT daemon.debug ntpclient[20036]: Connecting to 2.pool.ntp.org [194.58.203.148] ...
Jun 24 23:11:44 DD-WRT daemon.info ntpclient[20036]: Time set from 2.pool.ntp.org [194.58.203.148].
Jun 24 23:11:44 DD-WRT daemon.info process_monitor[16308]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 24 23:59:41 DD-WRT user.debug : ttraff: data for 24-6-2022 commited to nvram
Jun 25 00:11:37 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 25 00:11:38 DD-WRT daemon.notice openvpn[15961]: 9 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 00:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 25 00:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 25 00:11:38 DD-WRT daemon.notice openvpn[15961]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 00:11:38 DD-WRT daemon.notice openvpn[15961]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 00:11:38 DD-WRT daemon.notice openvpn[15961]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 25 00:11:45 DD-WRT daemon.debug ntpclient[20612]: Connecting to 2.pool.ntp.org [193.182.111.13] ...
Jun 25 00:11:46 DD-WRT daemon.info ntpclient[20612]: Time set from 2.pool.ntp.org [193.182.111.13].
Jun 25 00:11:46 DD-WRT daemon.info process_monitor[16308]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 25 01:11:38 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 25 01:11:38 DD-WRT daemon.notice openvpn[15961]: 7 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 01:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 25 01:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 25 01:11:38 DD-WRT daemon.notice openvpn[15961]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 01:11:38 DD-WRT daemon.notice openvpn[15961]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 01:11:38 DD-WRT daemon.notice openvpn[15961]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 25 01:11:46 DD-WRT daemon.debug ntpclient[21187]: Connecting to 2.pool.ntp.org [91.209.0.20] ...
Jun 25 01:11:46 DD-WRT daemon.info ntpclient[21187]: Time set from 2.pool.ntp.org [91.209.0.20].
Jun 25 01:11:46 DD-WRT daemon.info process_monitor[16308]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 25 02:11:38 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 25 02:11:38 DD-WRT daemon.notice openvpn[15961]: 7 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 02:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 25 02:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 25 02:11:38 DD-WRT daemon.notice openvpn[15961]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 02:11:38 DD-WRT daemon.notice openvpn[15961]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 02:11:38 DD-WRT daemon.notice openvpn[15961]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 25 02:11:47 DD-WRT daemon.debug ntpclient[21754]: Connecting to 2.pool.ntp.org [83.168.200.199] ...
Jun 25 02:11:47 DD-WRT daemon.info ntpclient[21754]: Time set from 2.pool.ntp.org [83.168.200.199].
Jun 25 02:11:47 DD-WRT daemon.info process_monitor[16308]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 25 03:11:38 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 25 03:11:38 DD-WRT daemon.notice openvpn[15961]: 7 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 03:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 25 03:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 25 03:11:38 DD-WRT daemon.notice openvpn[15961]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 03:11:38 DD-WRT daemon.notice openvpn[15961]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 03:11:38 DD-WRT daemon.notice openvpn[15961]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 25 03:11:48 DD-WRT daemon.debug ntpclient[22330]: Connecting to 2.pool.ntp.org [45.154.255.240] ...
Jun 25 03:11:48 DD-WRT daemon.info ntpclient[22330]: Time set from 2.pool.ntp.org [45.154.255.240].
Jun 25 03:11:48 DD-WRT daemon.info process_monitor[16308]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 25 04:11:39 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 25 04:11:39 DD-WRT daemon.notice openvpn[15961]: 7 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 04:11:39 DD-WRT daemon.warn openvpn[15961]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 25 04:11:39 DD-WRT daemon.warn openvpn[15961]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 25 04:11:39 DD-WRT daemon.notice openvpn[15961]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 04:11:39 DD-WRT daemon.notice openvpn[15961]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 04:11:39 DD-WRT daemon.notice openvpn[15961]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 25 04:11:48 DD-WRT daemon.debug ntpclient[22895]: Connecting to 2.pool.ntp.org [192.36.143.130] ...
Jun 25 04:11:49 DD-WRT daemon.info ntpclient[22895]: Time set from 2.pool.ntp.org [192.36.143.130].
Jun 25 04:11:49 DD-WRT daemon.info process_monitor[16308]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 25 04:25:18 DD-WRT daemon.err openvpn[15961]: read UDPv4 [EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH]: Host is unreachable (code=148)
Jun 25 04:25:24 DD-WRT daemon.err openvpn[15961]: read UDPv4 [EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH]: Host is unreachable (code=148)
Jun 25 04:25:28 DD-WRT daemon.err openvpn[15961]: read UDPv4 [EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH]: Host is unreachable (code=148)
Jun 25 04:25:39 DD-WRT user.warn root: openvpn watchdog: openvpn tunnel tun1 failed, now restarting openvpn client, to reboot set vpn_onfail_reboot=1
Jun 25 04:25:39 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) successfully stopped
Jun 25 04:25:39 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 25 04:25:39 DD-WRT daemon.notice openvpn[15961]: 1 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 04:25:39 DD-WRT daemon.notice openvpn[15961]: SIGTERM received, sending exit notification to peer
Jun 25 04:25:40 DD-WRT daemon.notice openvpn[15961]: TCP/UDP: Closing socket
Jun 25 04:25:40 DD-WRT daemon.notice openvpn[15961]: /tmp/openvpncl/route-down.sh tun1 1400 1453 10.8.3.3 255.255.255.0 init
Jun 25 04:25:40 DD-WRT daemon.notice openvpn[15961]: net_route_v4_del: 45.83.91.27/32 via 192.168.1.254 dev [NULL] table 0 metric -1
Jun 25 04:25:40 DD-WRT daemon.notice openvpn[15961]: net_route_v4_del: 0.0.0.0/1 via 10.8.3.1 dev [NULL] table 0 metric -1
Jun 25 04:25:40 DD-WRT daemon.notice openvpn[15961]: net_route_v4_del: 128.0.0.0/1 via 10.8.3.1 dev [NULL] table 0 metric -1
Jun 25 04:25:40 DD-WRT daemon.notice openvpn[15961]: Closing TUN/TAP interface
Jun 25 04:25:40 DD-WRT daemon.notice openvpn[15961]: net_addr_v4_del: 10.8.3.3 dev tun1
Jun 25 04:25:40 DD-WRT daemon.notice openvpn[15961]: SIGTERM[soft,exit-with-notification] received, process exiting
Jun 25 04:25:40 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jun 25 04:25:41 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) starting/restarting...
Jun 25 04:25:41 DD-WRT user.info : [openvpn] : General Killswitch for OpenVPN enabled from OpenVPN
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23095]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23095]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23095]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23095]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23095]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23095]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23095]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23095]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23095]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23095]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23095]: WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23095]: Current Parameter Settings:
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23095]: config = '/tmp/openvpncl/openvpn.conf'
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23095]: mode = 0
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23095]: NOTE: --mute triggered...
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23095]: 361 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23095]: OpenVPN 2.5.6 mips-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 23 2022
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23095]: library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.09
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23098]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jun 25 04:25:41 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23098]: WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1400)
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: Control Channel MTU parms [ L:1522 D:1140 EF:110 EB:0 ET:0 EL:3 ]
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: Data Channel MTU parms [ L:1522 D:1450 EF:122 EB:389 ET:0 EL:3 ]
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: TCP/UDP: Preserving recently used remote address: [AF_INET]45.83.91.27:1194
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: Socket Buffers: R=[172032->172032] S=[172032->172032]
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: UDPv4 link local: (not bound)
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: UDPv4 link remote: [AF_INET]45.83.91.27:1194
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: TLS: Initial packet from [AF_INET]45.83.91.27:1194, sid=8427431c a6d779f5
Jun 25 04:25:41 DD-WRT user.info root: openvpn watchdog /usr/bin/openvpn-watchdog.sh on tunnel tun1 running
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: NOTE: --mute triggered...
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23098]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23098]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: [se520.nordvpn.com] Peer Connection Initiated with [AF_INET]45.83.91.27:1194
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: SENT CONTROL [se520.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.3.1,topology
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: OPTIONS IMPORT: timers and/or timeouts modified
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: NOTE: --mute triggered...
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: 3 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: Socket Buffers: R=[172032->344064] S=[172032->344064]
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: OPTIONS IMPORT: --ifconfig/up options modified
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: OPTIONS IMPORT: route options modified
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: OPTIONS IMPORT: route-related options modified
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: NOTE: --mute triggered...
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: 4 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: Data Channel MTU parms [ L:1453 D:1450 EF:53 EB:389 ET:0 EL:3 ]
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: net_route_v4_best_gw query: dst 0.0.0.0
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: net_route_v4_best_gw result: via 192.168.1.254 dev vlan2
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: TUN/TAP device tun1 opened
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: do_ifconfig, ipv4=1, ipv6=0
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: net_iface_mtu_set: mtu 1400 for tun1
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: net_iface_up: set tun1 up
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: net_addr_v4_add: 10.8.3.3/24 dev tun1
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: net_route_v4_add: 45.83.91.27/32 via 192.168.1.254 dev [NULL] table 0 metric -1
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: net_route_v4_add: 0.0.0.0/1 via 10.8.3.1 dev [NULL] table 0 metric -1
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: net_route_v4_add: 128.0.0.0/1 via 10.8.3.1 dev [NULL] table 0 metric -1
Jun 25 04:25:43 DD-WRT daemon.warn openvpn[23098]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Jun 25 04:25:43 DD-WRT daemon.notice openvpn[23098]: Initialization Sequence Completed
Jun 25 05:11:49 DD-WRT daemon.debug ntpclient[23524]: Connecting to 2.pool.ntp.org [16.16.55.166] ...
Jun 25 05:11:49 DD-WRT daemon.info ntpclient[23524]: Time set from 2.pool.ntp.org [16.16.55.166].
Jun 25 05:11:49 DD-WRT daemon.info process_monitor[16308]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 25 05:25:41 DD-WRT daemon.notice openvpn[23098]: TLS: soft reset sec=3600/3600 bytes=1127247/-1 pkts=6378/0
Jun 25 05:25:41 DD-WRT daemon.notice openvpn[23098]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Jun 25 05:25:41 DD-WRT daemon.notice openvpn[23098]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
Jun 25 05:25:41 DD-WRT daemon.notice openvpn[23098]: NOTE: --mute triggered...
Jun 25 05:25:41 DD-WRT daemon.notice openvpn[23098]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 05:25:41 DD-WRT daemon.warn openvpn[23098]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 25 05:25:41 DD-WRT daemon.warn openvpn[23098]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 25 05:25:41 DD-WRT daemon.notice openvpn[23098]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 05:25:41 DD-WRT daemon.notice openvpn[23098]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 05:25:41 DD-WRT daemon.notice openvpn[23098]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 25 05:39:11 DD-WRT daemon.err openvpn[23098]: read UDPv4 [EHOSTUNREACH]: Host is unreachable (code=148)
Jun 25 05:39:15 DD-WRT daemon.err openvpn[23098]: read UDPv4 [EHOSTUNREACH|EHOSTUNREACH]: Host is unreachable (code=148)
Jun 25 05:39:19 DD-WRT daemon.err openvpn[23098]: read UDPv4 [EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH]: Host is unreachable (code=148)
Jun 25 05:39:22 DD-WRT daemon.notice openvpn[23098]: NOTE: --mute triggered...
Jun 25 05:39:25 DD-WRT user.warn root: openvpn watchdog: openvpn tunnel tun1 failed, now restarting openvpn client, to reboot set vpn_onfail_reboot=1
Jun 25 05:39:25 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) successfully stopped
Jun 25 05:39:25 DD-WRT daemon.notice openvpn[23098]: 2 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 05:39:25 DD-WRT daemon.notice openvpn[23098]: SIGTERM received, sending exit notification to peer
Jun 25 05:39:25 DD-WRT daemon.err openvpn[23098]: read UDPv4 [EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH]: Host is unreachable (code=148)
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23098]: TCP/UDP: Closing socket
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23098]: /tmp/openvpncl/route-down.sh tun1 1400 1453 10.8.3.3 255.255.255.0 init
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23098]: net_route_v4_del: 45.83.91.27/32 via 192.168.1.254 dev [NULL] table 0 metric -1
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23098]: net_route_v4_del: 0.0.0.0/1 via 10.8.3.1 dev [NULL] table 0 metric -1
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23098]: net_route_v4_del: 128.0.0.0/1 via 10.8.3.1 dev [NULL] table 0 metric -1
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23098]: Closing TUN/TAP interface
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23098]: net_addr_v4_del: 10.8.3.3 dev tun1
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23098]: SIGTERM[soft,exit-with-notification] received, process exiting
Jun 25 05:39:27 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jun 25 05:39:27 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) starting/restarting...
Jun 25 05:39:27 DD-WRT user.info : [openvpn] : General Killswitch for OpenVPN enabled from OpenVPN
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23843]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23843]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23843]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23843]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23843]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23843]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23843]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23843]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23843]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23843]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23843]: WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23843]: Current Parameter Settings:
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23843]: config = '/tmp/openvpncl/openvpn.conf'
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23843]: mode = 0
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23843]: NOTE: --mute triggered...
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23843]: 361 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23843]: OpenVPN 2.5.6 mips-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 23 2022
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23843]: library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.09
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23846]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jun 25 05:39:27 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23846]: WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1400)
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: Control Channel MTU parms [ L:1522 D:1140 EF:110 EB:0 ET:0 EL:3 ]
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: Data Channel MTU parms [ L:1522 D:1450 EF:122 EB:389 ET:0 EL:3 ]
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: TCP/UDP: Preserving recently used remote address: [AF_INET]45.83.91.27:1194
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: Socket Buffers: R=[172032->172032] S=[172032->172032]
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: UDPv4 link local: (not bound)
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: UDPv4 link remote: [AF_INET]45.83.91.27:1194
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: TLS: Initial packet from [AF_INET]45.83.91.27:1194, sid=b9585450 3a7b2e72
Jun 25 05:39:27 DD-WRT user.info root: openvpn watchdog /usr/bin/openvpn-watchdog.sh on tunnel tun1 running
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: NOTE: --mute triggered...
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23846]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23846]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: [se520.nordvpn.com] Peer Connection Initiated with [AF_INET]45.83.91.27:1194
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: SENT CONTROL [se520.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: OPTIONS IMPORT: timers and/or timeouts modified
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: NOTE: --mute triggered...
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: 3 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: Socket Buffers: R=[172032->344064] S=[172032->344064]
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: OPTIONS IMPORT: --ifconfig/up options modified
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: OPTIONS IMPORT: route options modified
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: OPTIONS IMPORT: route-related options modified
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: NOTE: --mute triggered...
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: 4 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: Data Channel MTU parms [ L:1453 D:1450 EF:53 EB:389 ET:0 EL:3 ]
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: net_route_v4_best_gw query: dst 0.0.0.0
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: net_route_v4_best_gw result: via 192.168.1.254 dev vlan2
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: TUN/TAP device tun1 opened
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: do_ifconfig, ipv4=1, ipv6=0
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: net_iface_mtu_set: mtu 1400 for tun1
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: net_iface_up: set tun1 up
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: net_addr_v4_add: 10.8.0.3/24 dev tun1
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: net_route_v4_add: 45.83.91.27/32 via 192.168.1.254 dev [NULL] table 0 metric -1
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: net_route_v4_add: 0.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: net_route_v4_add: 128.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Jun 25 05:39:29 DD-WRT daemon.warn openvpn[23846]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: Initialization Sequence Completed
Jun 25 06:11:50 DD-WRT daemon.debug ntpclient[24175]: Connecting to 2.pool.ntp.org [92.241.223.83] ...
Jun 25 06:11:53 DD-WRT daemon.debug ntpclient[24175]: Timed out waiting for 2.pool.ntp.org [92.241.223.83].
Jun 25 06:11:53 DD-WRT daemon.debug ntpclient[24175]: Connecting to 212.18.3.19 [212.18.3.19] ...
Jun 25 06:11:56 DD-WRT daemon.debug ntpclient[24175]: Timed out waiting for 212.18.3.19 [212.18.3.19].
Jun 25 06:11:56 DD-WRT daemon.debug ntpclient[24175]: Connecting to 88.99.174.22 [88.99.174.22] ...
Jun 25 06:11:59 DD-WRT daemon.debug ntpclient[24175]: Timed out waiting for 88.99.174.22 [88.99.174.22].
Jun 25 06:11:59 DD-WRT daemon.err process_monitor[16308]: cyclic NTP Update failed (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 25 06:39:27 DD-WRT daemon.notice openvpn[23846]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Jun 25 06:39:27 DD-WRT daemon.notice openvpn[23846]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
Jun 25 06:39:27 DD-WRT daemon.notice openvpn[23846]: VERIFY KU OK
Jun 25 06:39:27 DD-WRT daemon.notice openvpn[23846]: NOTE: --mute triggered...
Jun 25 06:39:27 DD-WRT daemon.notice openvpn[23846]: 4 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 06:39:27 DD-WRT daemon.warn openvpn[23846]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 25 06:39:27 DD-WRT daemon.warn openvpn[23846]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 25 06:39:27 DD-WRT daemon.notice openvpn[23846]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 06:39:27 DD-WRT daemon.notice openvpn[23846]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 06:39:27 DD-WRT daemon.notice openvpn[23846]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 25 07:12:00 DD-WRT daemon.debug ntpclient[24730]: Connecting to 2.pool.ntp.org [194.58.205.20] ...
Jun 25 07:12:03 DD-WRT daemon.debug ntpclient[24730]: Timed out waiting for 2.pool.ntp.org [194.58.205.20].
Jun 25 07:12:03 DD-WRT daemon.debug ntpclient[24730]: Connecting to 212.18.3.19 [212.18.3.19] ...
Jun 25 07:12:06 DD-WRT daemon.debug ntpclient[24730]: Timed out waiting for 212.18.3.19 [212.18.3.19].
Jun 25 07:12:06 DD-WRT daemon.debug ntpclient[24730]: Connecting to 88.99.174.22 [88.99.174.22] ...
Jun 25 07:12:09 DD-WRT daemon.debug ntpclient[24730]: Timed out waiting for 88.99.174.22 [88.99.174.22].
Jun 25 07:12:09 DD-WRT daemon.err process_monitor[16308]: cyclic NTP Update failed (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 25 07:32:27 DD-WRT daemon.info httpd[15692]: [httpd] : Authentication fail
Jun 25 07:32:27 DD-WRT daemon.err httpd[15692]: [httpd] : Request Error Code 401: Authorization required. Wrong username and/or password!
Jun 25 07:35:31 DD-WRT user.warn root: openvpn watchdog: openvpn tunnel tun1 failed, now restarting openvpn client, to reboot set vpn_onfail_reboot=1
Jun 25 07:35:31 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) successfully stopped
Jun 25 07:35:31 DD-WRT daemon.err openvpn[23846]: event_wait : Interrupted system call (code=4)
Jun 25 07:35:31 DD-WRT daemon.notice openvpn[23846]: SIGTERM received, sending exit notification to peer
Jun 25 07:35:32 DD-WRT daemon.notice openvpn[23846]: TCP/UDP: Closing socket
Jun 25 07:35:32 DD-WRT daemon.notice openvpn[23846]: /tmp/openvpncl/route-down.sh tun1 1400 1453 10.8.0.3 255.255.255.0 init
Jun 25 07:35:32 DD-WRT daemon.notice openvpn[23846]: net_route_v4_del: 45.83.91.27/32 via 192.168.1.254 dev [NULL] table 0 metric -1
Jun 25 07:35:32 DD-WRT daemon.notice openvpn[23846]: net_route_v4_del: 0.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Jun 25 07:35:32 DD-WRT daemon.notice openvpn[23846]: net_route_v4_del: 128.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Jun 25 07:35:32 DD-WRT daemon.notice openvpn[23846]: Closing TUN/TAP interface
Jun 25 07:35:32 DD-WRT daemon.notice openvpn[23846]: net_addr_v4_del: 10.8.0.3 dev tun1
Jun 25 07:35:32 DD-WRT daemon.notice openvpn[23846]: SIGTERM[soft,exit-with-notification] received, process exiting
Jun 25 07:35:33 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jun 25 07:35:33 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) starting/restarting...
Jun 25 07:35:33 DD-WRT user.info : [openvpn] : General Killswitch for OpenVPN enabled from OpenVPN
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25124]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25124]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25124]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25124]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25124]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25124]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25124]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25124]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25124]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25124]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25124]: WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
Jun 25 07:35:33 DD-WRT daemon.notice openvpn[25124]: Current Parameter Settings:
Jun 25 07:35:33 DD-WRT daemon.notice openvpn[25124]: config = '/tmp/openvpncl/openvpn.conf'
Jun 25 07:35:33 DD-WRT daemon.notice openvpn[25124]: mode = 0
Jun 25 07:35:33 DD-WRT daemon.notice openvpn[25124]: NOTE: --mute triggered...
Jun 25 07:35:33 DD-WRT daemon.notice openvpn[25124]: 361 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 07:35:33 DD-WRT daemon.notice openvpn[25124]: OpenVPN 2.5.6 mips-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 23 2022
Jun 25 07:35:33 DD-WRT daemon.notice openvpn[25124]: library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.09
Jun 25 07:35:33 DD-WRT daemon.notice openvpn[25128]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25128]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jun 25 07:35:33 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jun 25 07:35:33 DD-WRT daemon.notice openvpn[25128]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 25 07:35:33 DD-WRT daemon.notice openvpn[25128]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25128]: WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1400)
Jun 25 07:35:33 DD-WRT daemon.notice openvpn[25128]: Control Channel MTU parms [ L:1522 D:1140 EF:110 EB:0 ET:0 EL:3 ]
Jun 25 07:35:33 DD-WRT user.info root: openvpn watchdog /usr/bin/openvpn-watchdog.sh on tunnel tun1 running
Jun 25 07:35:38 DD-WRT daemon.err openvpn[25128]: RESOLVE: Cannot resolve host address: se520.nordvpn.com:1194 (Try again)
Jun 25 07:35:38 DD-WRT daemon.notice openvpn[25128]: Data Channel MTU parms [ L:1522 D:1450 EF:122 EB:389 ET:0 EL:3 ]
Jun 25 07:35:38 DD-WRT daemon.notice openvpn[25128]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
Jun 25 07:35:38 DD-WRT daemon.notice openvpn[25128]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
Jun 25 07:35:43 DD-WRT daemon.err openvpn[25128]: RESOLVE: Cannot resolve host address: se520.nordvpn.com:1194 (Try again)
Jun 25 07:35:43 DD-WRT daemon.warn openvpn[25128]: Could not determine IPv4/IPv6 protocol
Jun 25 07:35:43 DD-WRT daemon.notice openvpn[25128]: SIGUSR1[soft,init_instance] received, process restarting
Jun 25 07:35:43 DD-WRT daemon.notice openvpn[25128]: Restart pause, 5 second(s)
Jun 25 07:35:48 DD-WRT daemon.warn openvpn[25128]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 25 07:35:48 DD-WRT daemon.warn openvpn[25128]: WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1400)
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: Control Channel MTU parms [ L:1522 D:1140 EF:110 EB:0 ET:0 EL:3 ]
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: Data Channel MTU parms [ L:1522 D:1450 EF:122 EB:389 ET:0 EL:3 ]
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: TCP/UDP: Preserving recently used remote address: [AF_INET]45.12.220.227:1194
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: Socket Buffers: R=[172032->172032] S=[172032->172032]
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: UDPv4 link local: (not bound)
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: UDPv4 link remote: [AF_INET]45.12.220.227:1194
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: TLS: Initial packet from [AF_INET]45.12.220.227:1194, sid=74a65a24 ec36e304
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: NOTE: --mute triggered...
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 07:35:48 DD-WRT daemon.warn openvpn[25128]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 25 07:35:48 DD-WRT daemon.warn openvpn[25128]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: [se515.nordvpn.com] Peer Connection Initiated with [AF_INET]45.12.220.227:1194
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: SENT CONTROL [se515.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.1.1,topology
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: OPTIONS IMPORT: timers and/or timeouts modified
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: NOTE: --mute triggered...
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: 3 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: Socket Buffers: R=[172032->344064] S=[172032->344064]
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: OPTIONS IMPORT: --ifconfig/up options modified
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: OPTIONS IMPORT: route options modified
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: OPTIONS IMPORT: route-related options modified
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: NOTE: --mute triggered...
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: 4 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: Data Channel MTU parms [ L:1453 D:1450 EF:53 EB:389 ET:0 EL:3 ]
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: net_route_v4_best_gw query: dst 0.0.0.0
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: net_route_v4_best_gw result: via 192.168.1.254 dev vlan2
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: TUN/TAP device tun1 opened
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: do_ifconfig, ipv4=1, ipv6=0
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: net_iface_mtu_set: mtu 1400 for tun1
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: net_iface_up: set tun1 up
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: net_addr_v4_add: 10.8.1.5/24 dev tun1
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: net_route_v4_add: 45.12.220.227/32 via 192.168.1.254 dev [NULL] table 0 metric -1
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: net_route_v4_add: 0.0.0.0/1 via 10.8.1.1 dev [NULL] table 0 metric -1
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: net_route_v4_add: 128.0.0.0/1 via 10.8.1.1 dev [NULL] table 0 metric -1
Jun 25 07:35:50 DD-WRT daemon.warn openvpn[25128]: WARNING: this configuration may cache password
Alozaros
DD-WRT Guru


Joined: 16 Nov 2015
Posts: 6437
Location: UK, London, just across the river..

PostPosted: Sat Jun 25, 2022 9:00    Post subject: Reply with quote
looking at the log, it looks like watchdog is working and its doing its job..i only don't understand why, its trying the same se520.nordvpn.com server again, as its it down for some odd reason..and yes VPN providers tend to do that, in order to relieve their servers overloads...its just a bad VPN practice..
and then after few try's it seems its is successful, whit the next server that is operational se515.nordvpn.com ... Cool
To be honest, my VPN provider is not that bad, but with a risk to insult the VPN gurus and developers...i don't use the GUI option for multiple server choice..nor i use the GUI keep alive Embarassed

i know, i shouldn't use advanced VPN commands with no reason, but im an old school guy, if its working its working.. Rolling Eyes i still use the old way, as well i do have some lines to prevent ISP DNS use, or DNS6 or any ipv6 routes, so resolving hosts is more independent...

I have those in advanced VPN box
ill put a little explanation for what each line does

verb 5 - this specifies the log
pull-filter ignore "dhcp-option DNS" - this will ignore VPN DNS and will use DNSmasq DNS resolving inside the VPN
pull-filter ignore "dhcp-option DNS6" - same as above but disables IPv6 DNS
pull-filter ignore "ifconfig-ipv6" - ignores any ipv6
pull-filter ignore "route-ipv6" - ignores any ipv6 router
pull-filter ignore "redirect-gateway ipv6" - ignores any ipv6 gateways
keepalive 10 120 - keeps servers pinged
reneg-sec 12000 - this specifies time for cypher negotiation
server-poll-timeout 10 - this gives 10 sec time out if server goes down, before to try the next server inline
remote server IP or name port - those are the next servers you want to use
remote server IP or name port

the last will look like
remote se520.nordvpn.com 1994 -- or any port you use

but, let see what the other gurus will say, im also interested to learn..and find out...
the log seems to be showing you have been connected at last...

_________________
Atheros
TP-Link WR740Nv1 ---DD-WRT 55630 WAP
TP-Link WR1043NDv2 -DD-WRT 55723 Gateway/DoT,Forced DNS,Ad-Block,Firewall,x4VLAN,VPN
TP-Link WR1043NDv2 -Gargoyle OS 1.15.x AP,DNS,QoS,Quotas
Qualcomm-Atheros
Netgear XR500 --DD-WRT 55779 Gateway/DoH,Forced DNS,AP Isolation,4VLAN,Ad-Block,Firewall,Vanilla
Netgear R7800 --DD-WRT 55819 Gateway/DoT,AD-Block,Forced DNS,AP&Net Isolation,x3VLAN,Firewall,Vanilla
Netgear R9000 --DD-WRT 55779 Gateway/DoT,AD-Block,AP Isolation,Firewall,Forced DNS,x2VLAN,Vanilla
Broadcom
Netgear R7000 --DD-WRT 55460 Gateway/SmartDNS/DoH,AD-Block,Firewall,Forced DNS,x3VLAN,VPN
NOT USING 5Ghz ANYWHERE
------------------------------------------------------
Stubby DNS over TLS I DNSCrypt v2 by mac913
Jord9857
DD-WRT User


Joined: 17 Mar 2021
Posts: 74

PostPosted: Sat Jun 25, 2022 9:08    Post subject: Reply with quote
Yeah the openvpn watchdog done its job when there was no internet because it retarted the openvpn and had internet again after 5/10 minutes (shown at the end of the log)

I've previously tried replacing the Nordvpn servers with other recommended ones but always seems to do this

Unless it has some sort of key expiry and at this moment in time it needed renewing with the Nord server?...


Last edited by Jord9857 on Sat Jun 25, 2022 9:17; edited 1 time in total
Alozaros
DD-WRT Guru


Joined: 16 Nov 2015
Posts: 6437
Location: UK, London, just across the river..

PostPosted: Sat Jun 25, 2022 9:17    Post subject: Reply with quote
Jord9857 wrote:
Yeah the openvpn watchdog done its job when there was no internet because it retarted the openvpn and had internet again after 5/10 minutes (shown at the end of the log)

I've previously tried replacing the Nordvpn servers with other recommended ones but always seems to do this


yep its not a bug in the firmware i guess, but more likely Nord VPN bad practice...

Im on PIA and its been rock solid...but, it could be also the servers and their status, i use...

yep try to give a key renew time don't leave it to 0
try 14400

_________________
Atheros
TP-Link WR740Nv1 ---DD-WRT 55630 WAP
TP-Link WR1043NDv2 -DD-WRT 55723 Gateway/DoT,Forced DNS,Ad-Block,Firewall,x4VLAN,VPN
TP-Link WR1043NDv2 -Gargoyle OS 1.15.x AP,DNS,QoS,Quotas
Qualcomm-Atheros
Netgear XR500 --DD-WRT 55779 Gateway/DoH,Forced DNS,AP Isolation,4VLAN,Ad-Block,Firewall,Vanilla
Netgear R7800 --DD-WRT 55819 Gateway/DoT,AD-Block,Forced DNS,AP&Net Isolation,x3VLAN,Firewall,Vanilla
Netgear R9000 --DD-WRT 55779 Gateway/DoT,AD-Block,AP Isolation,Firewall,Forced DNS,x2VLAN,Vanilla
Broadcom
Netgear R7000 --DD-WRT 55460 Gateway/SmartDNS/DoH,AD-Block,Firewall,Forced DNS,x3VLAN,VPN
NOT USING 5Ghz ANYWHERE
------------------------------------------------------
Stubby DNS over TLS I DNSCrypt v2 by mac913


Last edited by Alozaros on Sat Jun 25, 2022 9:20; edited 1 time in total
egc
DD-WRT Guru


Joined: 18 Mar 2014
Posts: 12884
Location: Netherlands

PostPosted: Sat Jun 25, 2022 9:19    Post subject: Reply with quote
Well unless you really know what you are doing stick to the GUI Smile

In the GUI you can enter multiple NORD VPN servers which the router will try one after each other unless you enable random

Add the following to the Additional Configuration:
Quote:
verb 5
keepalive 10 120 #check if provider does not pushes ping-exit, that takes precedence and you have to use a watchdog
resolv-retry infinite
reneg-sec 0 #slightly unsafe to use so not recommended

But indeed it looks like the VPN cannot reach the server any more, as Alozoros said sometimes they kick you off if a server is too busy it is also possible you have an internet glitch or other router problem.

Maybe @eibgrad has some more ideas?

_________________
Routers:Netgear R7000, R6400v1, R6400v2, EA6900 (XvortexCFE), E2000, E1200v1, WRT54GS v1.
Install guide R6400v2, R6700v3,XR300:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=316399
Install guide R7800/XR500: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320614
Forum Guide Lines (important read):https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087
dale_gribble39
DD-WRT Guru


Joined: 11 Jun 2022
Posts: 1935

PostPosted: Sat Jun 25, 2022 13:36    Post subject: Reply with quote
Visuals would be great. So we can see what the MTU settings are and other things. Don't need to see keys, but screenshots sure help diagnose what could be wrong.
_________________
"The woods are lovely, dark and deep,
But I have promises to keep,
And miles to go before I sleep,
And miles to go before I sleep." - Robert Frost

"I am one of the noticeable ones - notice me" - Dale Frances McKenzie Bozzio

<fact>code knows no gender</fact>

This is me, knowing I've ruffled your feathers, and not giving a ****
Some people are still hard-headed.

--------------------------------------
Mac Pro (Mid 2012) - Two 2.4GHz 6-Core Intel Xeon E5645 processors 64GB 1333MHz DDR3 ECC SDRAM OpenSUSE Leap 15.5
Jord9857
DD-WRT User


Joined: 17 Mar 2021
Posts: 74

PostPosted: Sun Jun 26, 2022 10:15    Post subject: Reply with quote
egc wrote:
Well unless you really know what you are doing stick to the GUI Smile

In the GUI you can enter multiple NORD VPN servers which the router will try one after each other unless you enable random

Add the following to the Additional Configuration:
Quote:
verb 5
keepalive 10 120 #check if provider does not pushes ping-exit, that takes precedence and you have to use a watchdog
resolv-retry infinite
reneg-sec 0 #slightly unsafe to use so not recommended

But indeed it looks like the VPN cannot reach the server any more, as Alozoros said sometimes they kick you off if a server is too busy it is also possible you have an internet glitch or other router problem.

Maybe @eibgrad has some more ideas?


I have multiple Nord servers listed in the GUI

I will add this to the additional config now, it happened again this morning and even after the openvpn watchdog restarting didn't fix it - couldn't resolve for any of the Nord servers I have listed (were working as I haven't changed for a few days)
egc
DD-WRT Guru


Joined: 18 Mar 2014
Posts: 12884
Location: Netherlands

PostPosted: Sun Jun 26, 2022 10:25    Post subject: Reply with quote
Maybe it is a general router/network problem and not related to VPN at all.

If all else fails consider resetting to defaults and rebuild manually, it gives you the time to carefully review all your settings.

That is the best advice I can give at this moment

_________________
Routers:Netgear R7000, R6400v1, R6400v2, EA6900 (XvortexCFE), E2000, E1200v1, WRT54GS v1.
Install guide R6400v2, R6700v3,XR300:https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=316399
Install guide R7800/XR500: https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=320614
Forum Guide Lines (important read):https://forum.dd-wrt.com/phpBB2/viewtopic.php?t=324087
Jord9857
DD-WRT User


Joined: 17 Mar 2021
Posts: 74

PostPosted: Sun Jun 26, 2022 10:33    Post subject: Reply with quote
egc wrote:
Maybe it is a general router/network problem and not related to VPN at all.

If all else fails consider resetting to defaults and rebuild manually, it gives you the time to carefully review all your settings.

That is the best advice I can give at this moment


I've just added this addition config and internet access was restored within a minute or so of applying
Jord9857
DD-WRT User


Joined: 17 Mar 2021
Posts: 74

PostPosted: Sun Jun 26, 2022 11:34    Post subject: Reply with quote
Internet access lost again

Quote:
Jun 26 11:10:32 DD-WRT daemon.err httpd[15692]: [httpd] : Request Error Code 401: Authorization required. Wrong username and/or password!
Jun 26 11:13:30 DD-WRT daemon.debug ntpclient[9271]: Connecting to 2.pool.ntp.org [81.236.171.34] ...
Jun 26 11:13:33 DD-WRT daemon.debug ntpclient[9271]: Timed out waiting for 2.pool.ntp.org [81.236.171.34].
Jun 26 11:13:33 DD-WRT daemon.debug ntpclient[9271]: Connecting to 212.18.3.19 [212.18.3.19] ...
Jun 26 11:13:36 DD-WRT daemon.debug ntpclient[9271]: Timed out waiting for 212.18.3.19 [212.18.3.19].
Jun 26 11:13:36 DD-WRT daemon.debug ntpclient[9271]: Connecting to 88.99.174.22 [88.99.174.22] ...
Jun 26 11:13:39 DD-WRT daemon.debug ntpclient[9271]: Timed out waiting for 88.99.174.22 [88.99.174.22].
Jun 26 11:13:39 DD-WRT daemon.err process_monitor[16308]: cyclic NTP Update failed (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 26 11:18:09 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) successfully stopped
Jun 26 11:18:09 DD-WRT user.info : [openvpnserver] : OpenVPN daemon (Server) successfully stopped
Jun 26 11:18:09 DD-WRT user.info : [pptpd] : daemon successfully stopped
Jun 26 11:18:09 DD-WRT daemon.err openvpn[8566]: event_wait : Interrupted system call (code=4)
Jun 26 11:18:09 DD-WRT daemon.notice openvpn[8566]: SIGTERM received, sending exit notification to peer
Jun 26 11:18:10 DD-WRT user.info : [openvpn] : OpenVPN daemon (Server) starting/restarting...
Jun 26 11:18:10 DD-WRT daemon.warn openvpn[9522]: Consider setting groups/curves preference with tls-groups instead of forcing a specific curve with ecdh-curve.
Jun 26 11:18:10 DD-WRT daemon.notice openvpn[8566]: TCP/UDP: Closing socket
Jun 26 11:18:10 DD-WRT daemon.notice openvpn[8566]: /tmp/openvpncl/route-down.sh tun1 1400 1453 10.8.0.4 255.255.255.0 init
Jun 26 11:18:10 DD-WRT daemon.notice openvpn[8566]: net_route_v4_del: 45.83.91.27/32 via 192.168.1.254 dev [NULL] table 0 metric -1
Jun 26 11:18:10 DD-WRT daemon.notice openvpn[8566]: net_route_v4_del: 0.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Jun 26 11:18:10 DD-WRT daemon.warn openvpn[8566]: sitnl_send: rtnl: generic error (-3): No such process
Jun 26 11:18:10 DD-WRT daemon.warn openvpn[8566]: ERROR: Linux route delete command failed
Jun 26 11:18:10 DD-WRT daemon.notice openvpn[8566]: net_route_v4_del: 128.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Jun 26 11:18:10 DD-WRT daemon.warn openvpn[8566]: sitnl_send: rtnl: generic error (-3): No such process
Jun 26 11:18:10 DD-WRT daemon.warn openvpn[8566]: ERROR: Linux route delete command failed
Jun 26 11:18:10 DD-WRT daemon.notice openvpn[8566]: Closing TUN/TAP interface
Jun 26 11:18:10 DD-WRT daemon.notice openvpn[8566]: net_addr_v4_del: 10.8.0.4 dev tun1
Jun 26 11:18:10 DD-WRT daemon.notice openvpn[8566]: SIGTERM[soft,exit-with-notification] received, process exiting
Jun 26 11:18:10 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jun 26 11:18:11 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) starting/restarting...
Jun 26 11:18:11 DD-WRT user.info : [openvpn] : General Killswitch for OpenVPN enabled from OpenVPN
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9604]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9604]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9604]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9604]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9604]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9604]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9604]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9604]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9604]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9604]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9604]: WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9604]: Current Parameter Settings:
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9604]: config = '/tmp/openvpncl/openvpn.conf'
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9604]: mode = 0
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9604]: NOTE: --mute triggered...
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9604]: 361 variation(s) on previous 3 message(s) suppressed by --mute
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9604]: OpenVPN 2.5.6 mips-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 23 2022
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9604]: library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.09
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9617]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts

Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9617]: WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1400)
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: Control Channel MTU parms [ L:1522 D:1140 EF:110 EB:0 ET:0 EL:3 ]
Jun 26 11:18:11 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: Data Channel MTU parms [ L:1522 D:1450 EF:122 EB:389 ET:0 EL:3 ]
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: TCP/UDP: Preserving recently used remote address: [AF_INET]45.83.91.27:1194
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: Socket Buffers: R=[172032->172032] S=[172032->172032]
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: UDPv4 link local: (not bound)
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: UDPv4 link remote: [AF_INET]45.83.91.27:1194
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: TLS: Initial packet from [AF_INET]45.83.91.27:1194, sid=66968e29 794e0cca
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Jun 26 11:18:11 DD-WRT user.info root: openvpn watchdog /usr/bin/openvpn-watchdog.sh on tunnel tun1 running
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: NOTE: --mute triggered...
Jun 26 11:18:12 DD-WRT daemon.notice openvpn[9617]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Jun 26 11:18:12 DD-WRT daemon.warn openvpn[9617]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 26 11:18:12 DD-WRT daemon.warn openvpn[9617]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 26 11:18:12 DD-WRT daemon.notice openvpn[9617]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 26 11:18:12 DD-WRT daemon.notice openvpn[9617]: [se520.nordvpn.com] Peer Connection Initiated with [AF_INET]45.83.91.27:1194
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: SENT CONTROL [se520.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.3.1,topology s
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: OPTIONS IMPORT: timers and/or timeouts modified
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: NOTE: --mute triggered...
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: 3 variation(s) on previous 3 message(s) suppressed by --mute
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: Socket Buffers: R=[172032->344064] S=[172032->344064]
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: OPTIONS IMPORT: --ifconfig/up options modified
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: OPTIONS IMPORT: route options modified
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: OPTIONS IMPORT: route-related options modified
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: NOTE: --mute triggered...
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: 4 variation(s) on previous 3 message(s) suppressed by --mute
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: Data Channel MTU parms [ L:1453 D:1450 EF:53 EB:389 ET:0 EL:3 ]
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: net_route_v4_best_gw query: dst 0.0.0.0
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: net_route_v4_best_gw result: via 192.168.1.254 dev vlan2
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: TUN/TAP device tun1 opened
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: do_ifconfig, ipv4=1, ipv6=0
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: net_iface_mtu_set: mtu 1400 for tun1
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: net_iface_up: set tun1 up
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: net_addr_v4_add: 10.8.3.3/24 dev tun1
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: net_route_v4_add: 45.83.91.27/32 via 192.168.1.254 dev [NULL] table 0 metric -1
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: net_route_v4_add: 0.0.0.0/1 via 10.8.3.1 dev [NULL] table 0 metric -1
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: net_route_v4_add: 128.0.0.0/1 via 10.8.3.1 dev [NULL] table 0 metric -1
Jun 26 11:18:13 DD-WRT daemon.warn openvpn[9617]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: Initialization Sequence Completed
Jun 26 11:18:13 DD-WRT user.info : [openvpn] : General Killswitch for OpenVPN enabled via Firewall
Jun 26 11:18:13 DD-WRT user.info : [vpn modules] : vpn modules successfully unloaded
Jun 26 11:18:13 DD-WRT user.info : [vpn modules] : nf_conntrack_proto_gre successfully loaded
Jun 26 11:18:13 DD-WRT user.info : [vpn modules] : nf_nat_proto_gre successfully loaded
Jun 26 11:18:14 DD-WRT user.info : [vpn modules] : nf_conntrack_pptp successfully loaded
Jun 26 11:18:14 DD-WRT user.info : [vpn modules] : nf_nat_pptp successfully loaded
Jun 26 11:18:16 DD-WRT user.info : [servicemanager] : waiting for services to finish (4)...
Jun 26 11:18:16 DD-WRT user.info : [cron] : daemon successfully stopped
Jun 26 11:18:16 DD-WRT user.info : [ipv6] : successfully stopped
Jun 26 11:18:16 DD-WRT user.info : [pptpd] : daemon successfully stopped
Jun 26 11:18:16 DD-WRT user.info : [cron] : daemon successfully started
Jun 26 11:18:16 DD-WRT cron.info cron[10163]: (CRON) STARTUP (fork ok)
Jun 26 11:18:19 DD-WRT user.info : [openvpn] : General Killswitch for OpenVPN enabled via Firewall
Jun 26 11:18:19 DD-WRT user.info : [vpn modules] : vpn modules successfully unloaded
Jun 26 11:18:19 DD-WRT user.info : [vpn modules] : nf_conntrack_proto_gre successfully loaded
Jun 26 11:18:19 DD-WRT user.info : [vpn modules] : nf_nat_proto_gre successfully loaded
Jun 26 11:18:19 DD-WRT user.info : [vpn modules] : nf_conntrack_pptp successfully loaded
Jun 26 11:18:19 DD-WRT user.info : [vpn modules] : nf_nat_pptp successfully loaded
Jun 26 11:18:21 DD-WRT user.info : [wland] : daemon successfully stopped
Jun 26 11:18:22 DD-WRT user.info : [wland] : daemon successfully started
Jun 26 11:18:24 DD-WRT user.info : [httpd] : daemon successfully stopped
Jun 26 11:18:24 DD-WRT daemon.info httpd[15692]: [httpd] : httpd server shutdown
Jun 26 11:18:24 DD-WRT daemon.info httpd[10706]: [httpd] : httpd server started at port 80
Jun 26 11:18:24 DD-WRT user.info : [httpd] : http daemon successfully started
Jun 26 11:58:37 DD-WRT user.warn root: openvpn watchdog: openvpn tunnel tun1 failed, now restarting openvpn client, to reboot set vpn_onfail_reboot=1
Jun 26 11:58:37 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) successfully stopped
Jun 26 11:58:37 DD-WRT daemon.err openvpn[9617]: event_wait : Interrupted system call (code=4)
Jun 26 11:58:37 DD-WRT daemon.notice openvpn[9617]: SIGTERM received, sending exit notification to peer
Jun 26 11:58:38 DD-WRT daemon.notice openvpn[9617]: TCP/UDP: Closing socket
Jun 26 11:58:38 DD-WRT daemon.notice openvpn[9617]: /tmp/openvpncl/route-down.sh tun1 1400 1453 10.8.3.3 255.255.255.0 init
Jun 26 11:58:38 DD-WRT daemon.notice openvpn[9617]: net_route_v4_del: 45.83.91.27/32 via 192.168.1.254 dev [NULL] table 0 metric -1
Jun 26 11:58:38 DD-WRT daemon.notice openvpn[9617]: net_route_v4_del: 0.0.0.0/1 via 10.8.3.1 dev [NULL] table 0 metric -1
Jun 26 11:58:38 DD-WRT daemon.notice openvpn[9617]: net_route_v4_del: 128.0.0.0/1 via 10.8.3.1 dev [NULL] table 0 metric -1
Jun 26 11:58:38 DD-WRT daemon.notice openvpn[9617]: Closing TUN/TAP interface
Jun 26 11:58:38 DD-WRT daemon.notice openvpn[9617]: net_addr_v4_del: 10.8.3.3 dev tun1
Jun 26 11:58:38 DD-WRT daemon.notice openvpn[9617]: SIGTERM[soft,exit-with-notification] received, process exiting
Jun 26 11:58:38 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jun 26 11:58:39 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) starting/restarting...
Jun 26 11:58:39 DD-WRT user.info : [openvpn] : General Killswitch for OpenVPN enabled from OpenVPN
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11110]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11110]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11110]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11110]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11110]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11110]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11110]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11110]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11110]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11110]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11110]: WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11110]: Current Parameter Settings:
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11110]: config = '/tmp/openvpncl/openvpn.conf'
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11110]: mode = 0
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11110]: NOTE: --mute triggered...
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11110]: 361 variation(s) on previous 3 message(s) suppressed by --mute
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11110]: OpenVPN 2.5.6 mips-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 23 2022
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11110]: library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.09
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11114]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jun 26 11:58:39 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11114]: WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1400)
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: Control Channel MTU parms [ L:1522 D:1140 EF:110 EB:0 ET:0 EL:3 ]
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: Data Channel MTU parms [ L:1522 D:1450 EF:122 EB:389 ET:0 EL:3 ]
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: TCP/UDP: Preserving recently used remote address: [AF_INET]45.83.91.27:1194
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: Socket Buffers: R=[172032->172032] S=[172032->172032]
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: UDPv4 link local: (not bound)
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: UDPv4 link remote: [AF_INET]45.83.91.27:1194
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: TLS: Initial packet from [AF_INET]45.83.91.27:1194, sid=6f1a7321 812fa7ad
Jun 26 11:58:39 DD-WRT user.info root: openvpn watchdog /usr/bin/openvpn-watchdog.sh on tunnel tun1 running
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: NOTE: --mute triggered...
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11114]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11114]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: [se520.nordvpn.com] Peer Connection Initiated with [AF_INET]45.83.91.27:1194
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: SENT CONTROL [se520.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: OPTIONS IMPORT: timers and/or timeouts modified
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: NOTE: --mute triggered...
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: 3 variation(s) on previous 3 message(s) suppressed by --mute
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: Socket Buffers: R=[172032->344064] S=[172032->344064]
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: OPTIONS IMPORT: --ifconfig/up options modified
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: OPTIONS IMPORT: route options modified
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: OPTIONS IMPORT: route-related options modified
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: NOTE: --mute triggered...
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: 4 variation(s) on previous 3 message(s) suppressed by --mute
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: Data Channel MTU parms [ L:1453 D:1450 EF:53 EB:389 ET:0 EL:3 ]
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: net_route_v4_best_gw query: dst 0.0.0.0
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: net_route_v4_best_gw result: via 192.168.1.254 dev vlan2
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: TUN/TAP device tun1 opened
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: do_ifconfig, ipv4=1, ipv6=0
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: net_iface_mtu_set: mtu 1400 for tun1
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: net_iface_up: set tun1 up
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: net_addr_v4_add: 10.8.0.4/24 dev tun1
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: net_route_v4_add: 45.83.91.27/32 via 192.168.1.254 dev [NULL] table 0 metric -1
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: net_route_v4_add: 0.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: net_route_v4_add: 128.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Jun 26 11:58:41 DD-WRT daemon.warn openvpn[11114]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Jun 26 11:58:41 DD-WRT daemon.notice openvpn[11114]: Initialization Sequence Completed
Jun 26 12:13:40 DD-WRT daemon.debug ntpclient[11291]: Connecting to 2.pool.ntp.org [91.209.0.17] ...
Jun 26 12:13:43 DD-WRT daemon.debug ntpclient[11291]: Timed out waiting for 2.pool.ntp.org [91.209.0.17].
Jun 26 12:13:43 DD-WRT daemon.debug ntpclient[11291]: Connecting to 212.18.3.19 [212.18.3.19] ...
Jun 26 12:13:46 DD-WRT daemon.debug ntpclient[11291]: Timed out waiting for 212.18.3.19 [212.18.3.19].
Jun 26 12:13:46 DD-WRT daemon.debug ntpclient[11291]: Connecting to 88.99.174.22 [88.99.174.22] ...
Jun 26 12:13:49 DD-WRT daemon.debug ntpclient[11291]: Timed out waiting for 88.99.174.22 [88.99.174.22].
Jun 26 12:13:49 DD-WRT daemon.err process_monitor[16308]: cyclic NTP Update failed (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
the-joker
DD-WRT Developer/Maintainer


Joined: 31 Jul 2021
Posts: 2146
Location: All over YOUR webs

PostPosted: Sun Jun 26, 2022 14:37    Post subject: Reply with quote
Ive taken the liberty to include the insanely huge inline logs into quotes, code blocks wont work since there's some PHP issue/limitation which breaks the initial closing bracket. At least in quotes/code blocks it makes it saner to look at.

On doing this triggered another forums bug that breaks the layout, Ive submitted a couple of fixes and waiting on them going live.

@Jord9857 Just a suggestion; would be nice that when logs are that long, instead attaching them as a text file to your replies, it makes following the threads much easier to read as opposed to the endless scrolling your large logs force everyone to go through.

Sorry for the noise.

PS: the layout fixes are now live.

_________________
Saving your retinas from the burn!🔥
DD-WRT Inspired themes for routers
DD-WRT Inspired themes for the phpBB Forum
DD-WRT Inspired themes for the SVN Trac & FTP site
Join in for a chat @ #style_it_themes_public:matrix.org or #style_it_themes:discord

DD-WRT UI Themes Bug Reporting and Discussion thread

Router: ANus RT-AC68U E1 (recognized as C1)
kernel-panic69
DD-WRT Guru


Joined: 08 May 2018
Posts: 14221
Location: Texas, USA

PostPosted: Sun Jun 26, 2022 17:49    Post subject: Reply with quote
Quick interject: either someone removed your forum fix for text box width,
or someone's post still made the format of the page askew, sir the-j0ker.

_________________
"Life is but a fleeting moment, a vapor that vanishes quickly; All is vanity"
Contribute To DD-WRT
Pogo - A minimal level of ability is expected and needed...
DD-WRT Releases 2023 (PolitePol)
DD-WRT Releases 2023 (RSS Everything)

----------------------
Linux User #377467 counter.li.org / linuxcounter.net
Jord9857
DD-WRT User


Joined: 17 Mar 2021
Posts: 74

PostPosted: Tue Jun 28, 2022 18:19    Post subject: Reply with quote
Just wondering if anyone had any ideas or suggestions since?
eibgrad
DD-WRT Guru


Joined: 18 Sep 2010
Posts: 9157

PostPosted: Tue Jun 28, 2022 20:55    Post subject: Reply with quote
Based on the most recent syslog, which has the watchodog enabled, seems to me the tunnel is just failing for some unexplained reason. Once connected, it will run for at least an hour, then renegotiate the session key successfully, but eventually fail w/ the following message (which I've NOT seen before).

Jun 25 05:39:11 DD-WRT daemon.err openvpn[23098]: Read Udpv4 [Ehostunreach]: Host Is Unreachable (Code=148)

At that point, the tunnel seems borked, and eventually the watchdog detects it and reboots.

There's no obvious reason from the rest of the syslog to explain it. Seems more of a problem w/ the VPN provider. Some are known to kick off users when the server is overloaded, or down for maintenance. But this is a little different. The tunnel just stops working.

As an experiment, you might try using TCP rather than UDP (assuming NordVPN supports it). Maybe that will ensure both sides the connection is still valid (UDP, being connection-less, depends solely on timeout to detect the loss of a peer).

But overall, I don't see anything configured improperly here. All appearances suggest it's the VPN provider to blame.

_________________
ddwrt-ovpn-split-basic.sh (UPDATED!) * ddwrt-ovpn-split-advanced.sh (UPDATED!) * ddwrt-ovpn-client-killswitch.sh * ddwrt-ovpn-client-watchdog.sh * ddwrt-ovpn-remote-access.sh * ddwrt-ovpn-client-backup.sh * ddwrt-mount-usb-drives.sh * ddwrt-blacklist-domains.sh * ddwrt-wol-port-forward.sh * ddwrt-dns-monitor.sh (NEW!)
Goto page Previous  1, 2, 3, 4  Next Display posts from previous:    Page 2 of 4
Post new topic   Reply to topic    DD-WRT Forum Index -> Advanced Networking All times are GMT

Navigation

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You cannot download files in this forum