sorry, I've selected WiFi channels now - was worry to do so as other factors in place like AP's, DNS started leaking after changing some settings too but seems ok on channel 5 & 100 now
Compression is set to No, Additional Config only has verb 5, Watchdogs are disabled apart from the OpenVPN one as suggested so will keep an eye and grab logs when it happens again
Considering to upgrade and re-configure, is there a thorough guide for the other settings non OpenVPN related please? Already have the guide for the OpenVPN client & server settings
Hi, here we go - got the logs, so the router was fine at about 11pm (23:00), connected to it this morning about 7:30ish... No internet, after about 5/10 minutes or so, it then sorted itself out (quicker than normal)
Quote:
Jun 24 19:31:06 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
Jun 24 19:31:06 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: CMD 'state'
Jun 24 19:31:06 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: Client disconnected
Jun 24 19:31:06 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
Jun 24 19:31:06 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: CMD 'state'
Jun 24 19:31:06 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: Client disconnected
Jun 24 19:31:06 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
Jun 24 19:31:06 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: CMD 'state'
Jun 24 19:31:06 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: Client disconnected
Jun 24 19:31:07 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
Jun 24 19:31:07 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: CMD 'status 2'
Jun 24 19:31:07 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: Client disconnected
Jun 24 19:31:07 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: Client connected from [AF_INET]127.0.0.1:16
Jun 24 19:31:07 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: CMD 'log 500'
Jun 24 19:31:07 DD-WRT daemon.notice openvpn[15961]: MANAGEMENT: Client disconnected
Jun 24 19:31:53 DD-WRT daemon.err openvpn[15961]: tun packet too large on write (tried=1434,max=1400)
Jun 24 19:31:53 DD-WRT daemon.err openvpn[15961]: tun packet too large on write (tried=1434,max=1400)
Jun 24 19:31:53 DD-WRT daemon.err openvpn[15961]: tun packet too large on write (tried=1434,max=1400)
Jun 24 19:31:53 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 24 20:11:37 DD-WRT daemon.notice openvpn[15961]: 9761 variation(s) on previous 3 message(s) suppressed by --mute
Jun 24 20:11:37 DD-WRT daemon.notice openvpn[15961]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Jun 24 20:11:37 DD-WRT daemon.notice openvpn[15961]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
Jun 24 20:11:37 DD-WRT daemon.notice openvpn[15961]: VERIFY KU OK
Jun 24 20:11:37 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 24 20:11:37 DD-WRT daemon.notice openvpn[15961]: 4 variation(s) on previous 3 message(s) suppressed by --mute
Jun 24 20:11:37 DD-WRT daemon.warn openvpn[15961]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 24 20:11:37 DD-WRT daemon.warn openvpn[15961]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 24 20:11:37 DD-WRT daemon.notice openvpn[15961]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 24 20:11:37 DD-WRT daemon.notice openvpn[15961]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 24 20:11:37 DD-WRT daemon.notice openvpn[15961]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 24 20:11:42 DD-WRT daemon.debug ntpclient[18008]: Connecting to 2.pool.ntp.org [92.241.223.83] ...
Jun 24 20:11:42 DD-WRT daemon.info ntpclient[18008]: Time set from 2.pool.ntp.org [92.241.223.83].
Jun 24 20:11:42 DD-WRT daemon.info process_monitor[16308]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 24 20:11:43 DD-WRT daemon.err openvpn[15961]: tun packet too large on write (tried=1434,max=1400)
Jun 24 20:11:43 DD-WRT daemon.err openvpn[15961]: tun packet too large on write (tried=1434,max=1400)
Jun 24 20:11:43 DD-WRT daemon.err openvpn[15961]: tun packet too large on write (tried=1434,max=1400)
Jun 24 20:11:43 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 24 21:11:36 DD-WRT daemon.notice openvpn[15961]: 170 variation(s) on previous 3 message(s) suppressed by --mute
Jun 24 21:11:36 DD-WRT daemon.notice openvpn[15961]: TLS: tls_process: killed expiring key
Jun 24 21:11:37 DD-WRT daemon.notice openvpn[15961]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Jun 24 21:11:37 DD-WRT daemon.notice openvpn[15961]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
Jun 24 21:11:37 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 24 21:11:37 DD-WRT daemon.notice openvpn[15961]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Jun 24 21:11:37 DD-WRT daemon.warn openvpn[15961]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 24 21:11:37 DD-WRT daemon.warn openvpn[15961]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 24 21:11:37 DD-WRT daemon.notice openvpn[15961]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 24 21:11:37 DD-WRT daemon.notice openvpn[15961]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 24 21:11:37 DD-WRT daemon.notice openvpn[15961]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 24 21:11:42 DD-WRT daemon.debug ntpclient[18871]: Connecting to 2.pool.ntp.org [92.241.223.83] ...
Jun 24 21:11:42 DD-WRT daemon.info ntpclient[18871]: Time set from 2.pool.ntp.org [92.241.223.83].
Jun 24 21:11:42 DD-WRT daemon.info process_monitor[16308]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 24 21:58:29 DD-WRT daemon.err openvpn[15961]: tun packet too large on write (tried=1434,max=1400)
Jun 24 21:58:29 DD-WRT daemon.err openvpn[15961]: tun packet too large on write (tried=1434,max=1400)
Jun 24 21:58:29 DD-WRT daemon.err openvpn[15961]: tun packet too large on write (tried=1434,max=1400)
Jun 24 21:58:29 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 24 22:11:36 DD-WRT daemon.notice openvpn[15961]: 1 variation(s) on previous 3 message(s) suppressed by --mute
Jun 24 22:11:36 DD-WRT daemon.notice openvpn[15961]: TLS: tls_process: killed expiring key
Jun 24 22:11:37 DD-WRT daemon.notice openvpn[15961]: TLS: soft reset sec=3600/3600 bytes=450208364/-1 pkts=441705/0
Jun 24 22:11:37 DD-WRT daemon.notice openvpn[15961]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Jun 24 22:11:37 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 24 22:11:38 DD-WRT daemon.notice openvpn[15961]: 6 variation(s) on previous 3 message(s) suppressed by --mute
Jun 24 22:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 24 22:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 24 22:11:38 DD-WRT daemon.notice openvpn[15961]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 24 22:11:38 DD-WRT daemon.notice openvpn[15961]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 24 22:11:38 DD-WRT daemon.notice openvpn[15961]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 24 22:11:43 DD-WRT daemon.debug ntpclient[19443]: Connecting to 2.pool.ntp.org [217.75.106.216] ...
Jun 24 22:11:43 DD-WRT daemon.info ntpclient[19443]: Time set from 2.pool.ntp.org [217.75.106.216].
Jun 24 22:11:43 DD-WRT daemon.info process_monitor[16308]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 24 23:11:37 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 24 23:11:38 DD-WRT daemon.notice openvpn[15961]: 8 variation(s) on previous 3 message(s) suppressed by --mute
Jun 24 23:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 24 23:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 24 23:11:38 DD-WRT daemon.notice openvpn[15961]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 24 23:11:38 DD-WRT daemon.notice openvpn[15961]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 24 23:11:38 DD-WRT daemon.notice openvpn[15961]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 24 23:11:44 DD-WRT daemon.debug ntpclient[20036]: Connecting to 2.pool.ntp.org [194.58.203.148] ...
Jun 24 23:11:44 DD-WRT daemon.info ntpclient[20036]: Time set from 2.pool.ntp.org [194.58.203.148].
Jun 24 23:11:44 DD-WRT daemon.info process_monitor[16308]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 24 23:59:41 DD-WRT user.debug : ttraff: data for 24-6-2022 commited to nvram
Jun 25 00:11:37 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 25 00:11:38 DD-WRT daemon.notice openvpn[15961]: 9 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 00:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 25 00:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 25 00:11:38 DD-WRT daemon.notice openvpn[15961]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 00:11:38 DD-WRT daemon.notice openvpn[15961]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 00:11:38 DD-WRT daemon.notice openvpn[15961]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 25 00:11:45 DD-WRT daemon.debug ntpclient[20612]: Connecting to 2.pool.ntp.org [193.182.111.13] ...
Jun 25 00:11:46 DD-WRT daemon.info ntpclient[20612]: Time set from 2.pool.ntp.org [193.182.111.13].
Jun 25 00:11:46 DD-WRT daemon.info process_monitor[16308]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 25 01:11:38 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 25 01:11:38 DD-WRT daemon.notice openvpn[15961]: 7 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 01:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 25 01:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 25 01:11:38 DD-WRT daemon.notice openvpn[15961]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 01:11:38 DD-WRT daemon.notice openvpn[15961]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 01:11:38 DD-WRT daemon.notice openvpn[15961]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 25 01:11:46 DD-WRT daemon.debug ntpclient[21187]: Connecting to 2.pool.ntp.org [91.209.0.20] ...
Jun 25 01:11:46 DD-WRT daemon.info ntpclient[21187]: Time set from 2.pool.ntp.org [91.209.0.20].
Jun 25 01:11:46 DD-WRT daemon.info process_monitor[16308]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 25 02:11:38 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 25 02:11:38 DD-WRT daemon.notice openvpn[15961]: 7 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 02:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 25 02:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 25 02:11:38 DD-WRT daemon.notice openvpn[15961]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 02:11:38 DD-WRT daemon.notice openvpn[15961]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 02:11:38 DD-WRT daemon.notice openvpn[15961]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 25 02:11:47 DD-WRT daemon.debug ntpclient[21754]: Connecting to 2.pool.ntp.org [83.168.200.199] ...
Jun 25 02:11:47 DD-WRT daemon.info ntpclient[21754]: Time set from 2.pool.ntp.org [83.168.200.199].
Jun 25 02:11:47 DD-WRT daemon.info process_monitor[16308]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 25 03:11:38 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 25 03:11:38 DD-WRT daemon.notice openvpn[15961]: 7 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 03:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 25 03:11:38 DD-WRT daemon.warn openvpn[15961]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 25 03:11:38 DD-WRT daemon.notice openvpn[15961]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 03:11:38 DD-WRT daemon.notice openvpn[15961]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 03:11:38 DD-WRT daemon.notice openvpn[15961]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 25 03:11:48 DD-WRT daemon.debug ntpclient[22330]: Connecting to 2.pool.ntp.org [45.154.255.240] ...
Jun 25 03:11:48 DD-WRT daemon.info ntpclient[22330]: Time set from 2.pool.ntp.org [45.154.255.240].
Jun 25 03:11:48 DD-WRT daemon.info process_monitor[16308]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 25 04:11:39 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 25 04:11:39 DD-WRT daemon.notice openvpn[15961]: 7 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 04:11:39 DD-WRT daemon.warn openvpn[15961]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 25 04:11:39 DD-WRT daemon.warn openvpn[15961]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 25 04:11:39 DD-WRT daemon.notice openvpn[15961]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 04:11:39 DD-WRT daemon.notice openvpn[15961]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 04:11:39 DD-WRT daemon.notice openvpn[15961]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 25 04:11:48 DD-WRT daemon.debug ntpclient[22895]: Connecting to 2.pool.ntp.org [192.36.143.130] ...
Jun 25 04:11:49 DD-WRT daemon.info ntpclient[22895]: Time set from 2.pool.ntp.org [192.36.143.130].
Jun 25 04:11:49 DD-WRT daemon.info process_monitor[16308]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 25 04:25:18 DD-WRT daemon.err openvpn[15961]: read UDPv4 [EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH]: Host is unreachable (code=148)
Jun 25 04:25:24 DD-WRT daemon.err openvpn[15961]: read UDPv4 [EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH]: Host is unreachable (code=148)
Jun 25 04:25:28 DD-WRT daemon.err openvpn[15961]: read UDPv4 [EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH]: Host is unreachable (code=148)
Jun 25 04:25:39 DD-WRT user.warn root: openvpn watchdog: openvpn tunnel tun1 failed, now restarting openvpn client, to reboot set vpn_onfail_reboot=1
Jun 25 04:25:39 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) successfully stopped
Jun 25 04:25:39 DD-WRT daemon.notice openvpn[15961]: NOTE: --mute triggered...
Jun 25 04:25:39 DD-WRT daemon.notice openvpn[15961]: 1 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 04:25:39 DD-WRT daemon.notice openvpn[15961]: SIGTERM received, sending exit notification to peer
Jun 25 04:25:40 DD-WRT daemon.notice openvpn[15961]: TCP/UDP: Closing socket
Jun 25 04:25:40 DD-WRT daemon.notice openvpn[15961]: /tmp/openvpncl/route-down.sh tun1 1400 1453 10.8.3.3 255.255.255.0 init
Jun 25 04:25:40 DD-WRT daemon.notice openvpn[15961]: net_route_v4_del: 45.83.91.27/32 via 192.168.1.254 dev [NULL] table 0 metric -1
Jun 25 04:25:40 DD-WRT daemon.notice openvpn[15961]: net_route_v4_del: 0.0.0.0/1 via 10.8.3.1 dev [NULL] table 0 metric -1
Jun 25 04:25:40 DD-WRT daemon.notice openvpn[15961]: net_route_v4_del: 128.0.0.0/1 via 10.8.3.1 dev [NULL] table 0 metric -1
Jun 25 04:25:40 DD-WRT daemon.notice openvpn[15961]: Closing TUN/TAP interface
Jun 25 04:25:40 DD-WRT daemon.notice openvpn[15961]: net_addr_v4_del: 10.8.3.3 dev tun1
Jun 25 04:25:40 DD-WRT daemon.notice openvpn[15961]: SIGTERM[soft,exit-with-notification] received, process exiting
Jun 25 04:25:40 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jun 25 04:25:41 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) starting/restarting...
Jun 25 04:25:41 DD-WRT user.info : [openvpn] : General Killswitch for OpenVPN enabled from OpenVPN
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23095]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23095]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23095]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23095]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23095]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23095]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23095]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23095]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23095]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23095]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23095]: WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23095]: Current Parameter Settings:
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23095]: config = '/tmp/openvpncl/openvpn.conf'
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23095]: mode = 0
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23095]: NOTE: --mute triggered...
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23095]: 361 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23095]: OpenVPN 2.5.6 mips-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 23 2022
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23095]: library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.09
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23098]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jun 25 04:25:41 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23098]: WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1400)
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: Control Channel MTU parms [ L:1522 D:1140 EF:110 EB:0 ET:0 EL:3 ]
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: Data Channel MTU parms [ L:1522 D:1450 EF:122 EB:389 ET:0 EL:3 ]
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: TCP/UDP: Preserving recently used remote address: [AF_INET]45.83.91.27:1194
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: Socket Buffers: R=[172032->172032] S=[172032->172032]
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: UDPv4 link local: (not bound)
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: UDPv4 link remote: [AF_INET]45.83.91.27:1194
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: TLS: Initial packet from [AF_INET]45.83.91.27:1194, sid=8427431c a6d779f5
Jun 25 04:25:41 DD-WRT user.info root: openvpn watchdog /usr/bin/openvpn-watchdog.sh on tunnel tun1 running
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: NOTE: --mute triggered...
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23098]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 25 04:25:41 DD-WRT daemon.warn openvpn[23098]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 25 04:25:41 DD-WRT daemon.notice openvpn[23098]: [se520.nordvpn.com] Peer Connection Initiated with [AF_INET]45.83.91.27:1194
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: SENT CONTROL [se520.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.3.1,topology
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: OPTIONS IMPORT: timers and/or timeouts modified
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: NOTE: --mute triggered...
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: 3 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: Socket Buffers: R=[172032->344064] S=[172032->344064]
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: OPTIONS IMPORT: --ifconfig/up options modified
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: OPTIONS IMPORT: route options modified
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: OPTIONS IMPORT: route-related options modified
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: NOTE: --mute triggered...
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: 4 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: Data Channel MTU parms [ L:1453 D:1450 EF:53 EB:389 ET:0 EL:3 ]
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: net_route_v4_best_gw query: dst 0.0.0.0
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: net_route_v4_best_gw result: via 192.168.1.254 dev vlan2
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: TUN/TAP device tun1 opened
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: do_ifconfig, ipv4=1, ipv6=0
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: net_iface_mtu_set: mtu 1400 for tun1
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: net_iface_up: set tun1 up
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: net_addr_v4_add: 10.8.3.3/24 dev tun1
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: net_route_v4_add: 45.83.91.27/32 via 192.168.1.254 dev [NULL] table 0 metric -1
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: net_route_v4_add: 0.0.0.0/1 via 10.8.3.1 dev [NULL] table 0 metric -1
Jun 25 04:25:42 DD-WRT daemon.notice openvpn[23098]: net_route_v4_add: 128.0.0.0/1 via 10.8.3.1 dev [NULL] table 0 metric -1
Jun 25 04:25:43 DD-WRT daemon.warn openvpn[23098]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Jun 25 04:25:43 DD-WRT daemon.notice openvpn[23098]: Initialization Sequence Completed
Jun 25 05:11:49 DD-WRT daemon.debug ntpclient[23524]: Connecting to 2.pool.ntp.org [16.16.55.166] ...
Jun 25 05:11:49 DD-WRT daemon.info ntpclient[23524]: Time set from 2.pool.ntp.org [16.16.55.166].
Jun 25 05:11:49 DD-WRT daemon.info process_monitor[16308]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 25 05:25:41 DD-WRT daemon.notice openvpn[23098]: TLS: soft reset sec=3600/3600 bytes=1127247/-1 pkts=6378/0
Jun 25 05:25:41 DD-WRT daemon.notice openvpn[23098]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Jun 25 05:25:41 DD-WRT daemon.notice openvpn[23098]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
Jun 25 05:25:41 DD-WRT daemon.notice openvpn[23098]: NOTE: --mute triggered...
Jun 25 05:25:41 DD-WRT daemon.notice openvpn[23098]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 05:25:41 DD-WRT daemon.warn openvpn[23098]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 25 05:25:41 DD-WRT daemon.warn openvpn[23098]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 25 05:25:41 DD-WRT daemon.notice openvpn[23098]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 05:25:41 DD-WRT daemon.notice openvpn[23098]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 05:25:41 DD-WRT daemon.notice openvpn[23098]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 25 05:39:11 DD-WRT daemon.err openvpn[23098]: read UDPv4 [EHOSTUNREACH]: Host is unreachable (code=148)
Jun 25 05:39:15 DD-WRT daemon.err openvpn[23098]: read UDPv4 [EHOSTUNREACH|EHOSTUNREACH]: Host is unreachable (code=148)
Jun 25 05:39:19 DD-WRT daemon.err openvpn[23098]: read UDPv4 [EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH]: Host is unreachable (code=148)
Jun 25 05:39:22 DD-WRT daemon.notice openvpn[23098]: NOTE: --mute triggered...
Jun 25 05:39:25 DD-WRT user.warn root: openvpn watchdog: openvpn tunnel tun1 failed, now restarting openvpn client, to reboot set vpn_onfail_reboot=1
Jun 25 05:39:25 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) successfully stopped
Jun 25 05:39:25 DD-WRT daemon.notice openvpn[23098]: 2 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 05:39:25 DD-WRT daemon.notice openvpn[23098]: SIGTERM received, sending exit notification to peer
Jun 25 05:39:25 DD-WRT daemon.err openvpn[23098]: read UDPv4 [EHOSTUNREACH|EHOSTUNREACH|EHOSTUNREACH]: Host is unreachable (code=148)
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23098]: TCP/UDP: Closing socket
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23098]: /tmp/openvpncl/route-down.sh tun1 1400 1453 10.8.3.3 255.255.255.0 init
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23098]: net_route_v4_del: 45.83.91.27/32 via 192.168.1.254 dev [NULL] table 0 metric -1
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23098]: net_route_v4_del: 0.0.0.0/1 via 10.8.3.1 dev [NULL] table 0 metric -1
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23098]: net_route_v4_del: 128.0.0.0/1 via 10.8.3.1 dev [NULL] table 0 metric -1
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23098]: Closing TUN/TAP interface
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23098]: net_addr_v4_del: 10.8.3.3 dev tun1
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23098]: SIGTERM[soft,exit-with-notification] received, process exiting
Jun 25 05:39:27 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jun 25 05:39:27 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) starting/restarting...
Jun 25 05:39:27 DD-WRT user.info : [openvpn] : General Killswitch for OpenVPN enabled from OpenVPN
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23843]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23843]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23843]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23843]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23843]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23843]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23843]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23843]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23843]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23843]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23843]: WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23843]: Current Parameter Settings:
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23843]: config = '/tmp/openvpncl/openvpn.conf'
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23843]: mode = 0
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23843]: NOTE: --mute triggered...
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23843]: 361 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23843]: OpenVPN 2.5.6 mips-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 23 2022
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23843]: library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.09
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23846]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jun 25 05:39:27 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23846]: WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1400)
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: Control Channel MTU parms [ L:1522 D:1140 EF:110 EB:0 ET:0 EL:3 ]
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: Data Channel MTU parms [ L:1522 D:1450 EF:122 EB:389 ET:0 EL:3 ]
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: TCP/UDP: Preserving recently used remote address: [AF_INET]45.83.91.27:1194
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: Socket Buffers: R=[172032->172032] S=[172032->172032]
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: UDPv4 link local: (not bound)
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: UDPv4 link remote: [AF_INET]45.83.91.27:1194
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: TLS: Initial packet from [AF_INET]45.83.91.27:1194, sid=b9585450 3a7b2e72
Jun 25 05:39:27 DD-WRT user.info root: openvpn watchdog /usr/bin/openvpn-watchdog.sh on tunnel tun1 running
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: NOTE: --mute triggered...
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23846]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 25 05:39:27 DD-WRT daemon.warn openvpn[23846]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 25 05:39:27 DD-WRT daemon.notice openvpn[23846]: [se520.nordvpn.com] Peer Connection Initiated with [AF_INET]45.83.91.27:1194
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: SENT CONTROL [se520.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: OPTIONS IMPORT: timers and/or timeouts modified
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: NOTE: --mute triggered...
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: 3 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: Socket Buffers: R=[172032->344064] S=[172032->344064]
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: OPTIONS IMPORT: --ifconfig/up options modified
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: OPTIONS IMPORT: route options modified
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: OPTIONS IMPORT: route-related options modified
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: NOTE: --mute triggered...
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: 4 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: Data Channel MTU parms [ L:1453 D:1450 EF:53 EB:389 ET:0 EL:3 ]
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: net_route_v4_best_gw query: dst 0.0.0.0
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: net_route_v4_best_gw result: via 192.168.1.254 dev vlan2
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: TUN/TAP device tun1 opened
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: do_ifconfig, ipv4=1, ipv6=0
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: net_iface_mtu_set: mtu 1400 for tun1
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: net_iface_up: set tun1 up
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: net_addr_v4_add: 10.8.0.3/24 dev tun1
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: net_route_v4_add: 45.83.91.27/32 via 192.168.1.254 dev [NULL] table 0 metric -1
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: net_route_v4_add: 0.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: net_route_v4_add: 128.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Jun 25 05:39:29 DD-WRT daemon.warn openvpn[23846]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Jun 25 05:39:29 DD-WRT daemon.notice openvpn[23846]: Initialization Sequence Completed
Jun 25 06:11:50 DD-WRT daemon.debug ntpclient[24175]: Connecting to 2.pool.ntp.org [92.241.223.83] ...
Jun 25 06:11:53 DD-WRT daemon.debug ntpclient[24175]: Timed out waiting for 2.pool.ntp.org [92.241.223.83].
Jun 25 06:11:53 DD-WRT daemon.debug ntpclient[24175]: Connecting to 212.18.3.19 [212.18.3.19] ...
Jun 25 06:11:56 DD-WRT daemon.debug ntpclient[24175]: Timed out waiting for 212.18.3.19 [212.18.3.19].
Jun 25 06:11:56 DD-WRT daemon.debug ntpclient[24175]: Connecting to 88.99.174.22 [88.99.174.22] ...
Jun 25 06:11:59 DD-WRT daemon.debug ntpclient[24175]: Timed out waiting for 88.99.174.22 [88.99.174.22].
Jun 25 06:11:59 DD-WRT daemon.err process_monitor[16308]: cyclic NTP Update failed (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 25 06:39:27 DD-WRT daemon.notice openvpn[23846]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Jun 25 06:39:27 DD-WRT daemon.notice openvpn[23846]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
Jun 25 06:39:27 DD-WRT daemon.notice openvpn[23846]: VERIFY KU OK
Jun 25 06:39:27 DD-WRT daemon.notice openvpn[23846]: NOTE: --mute triggered...
Jun 25 06:39:27 DD-WRT daemon.notice openvpn[23846]: 4 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 06:39:27 DD-WRT daemon.warn openvpn[23846]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 25 06:39:27 DD-WRT daemon.warn openvpn[23846]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 25 06:39:27 DD-WRT daemon.notice openvpn[23846]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 06:39:27 DD-WRT daemon.notice openvpn[23846]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 06:39:27 DD-WRT daemon.notice openvpn[23846]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 25 07:12:00 DD-WRT daemon.debug ntpclient[24730]: Connecting to 2.pool.ntp.org [194.58.205.20] ...
Jun 25 07:12:03 DD-WRT daemon.debug ntpclient[24730]: Timed out waiting for 2.pool.ntp.org [194.58.205.20].
Jun 25 07:12:03 DD-WRT daemon.debug ntpclient[24730]: Connecting to 212.18.3.19 [212.18.3.19] ...
Jun 25 07:12:06 DD-WRT daemon.debug ntpclient[24730]: Timed out waiting for 212.18.3.19 [212.18.3.19].
Jun 25 07:12:06 DD-WRT daemon.debug ntpclient[24730]: Connecting to 88.99.174.22 [88.99.174.22] ...
Jun 25 07:12:09 DD-WRT daemon.debug ntpclient[24730]: Timed out waiting for 88.99.174.22 [88.99.174.22].
Jun 25 07:12:09 DD-WRT daemon.err process_monitor[16308]: cyclic NTP Update failed (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 25 07:32:27 DD-WRT daemon.info httpd[15692]: [httpd] : Authentication fail
Jun 25 07:32:27 DD-WRT daemon.err httpd[15692]: [httpd] : Request Error Code 401: Authorization required. Wrong username and/or password!
Jun 25 07:35:31 DD-WRT user.warn root: openvpn watchdog: openvpn tunnel tun1 failed, now restarting openvpn client, to reboot set vpn_onfail_reboot=1
Jun 25 07:35:31 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) successfully stopped
Jun 25 07:35:31 DD-WRT daemon.err openvpn[23846]: event_wait : Interrupted system call (code=4)
Jun 25 07:35:31 DD-WRT daemon.notice openvpn[23846]: SIGTERM received, sending exit notification to peer
Jun 25 07:35:32 DD-WRT daemon.notice openvpn[23846]: TCP/UDP: Closing socket
Jun 25 07:35:32 DD-WRT daemon.notice openvpn[23846]: /tmp/openvpncl/route-down.sh tun1 1400 1453 10.8.0.3 255.255.255.0 init
Jun 25 07:35:32 DD-WRT daemon.notice openvpn[23846]: net_route_v4_del: 45.83.91.27/32 via 192.168.1.254 dev [NULL] table 0 metric -1
Jun 25 07:35:32 DD-WRT daemon.notice openvpn[23846]: net_route_v4_del: 0.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Jun 25 07:35:32 DD-WRT daemon.notice openvpn[23846]: net_route_v4_del: 128.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Jun 25 07:35:32 DD-WRT daemon.notice openvpn[23846]: Closing TUN/TAP interface
Jun 25 07:35:32 DD-WRT daemon.notice openvpn[23846]: net_addr_v4_del: 10.8.0.3 dev tun1
Jun 25 07:35:32 DD-WRT daemon.notice openvpn[23846]: SIGTERM[soft,exit-with-notification] received, process exiting
Jun 25 07:35:33 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jun 25 07:35:33 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) starting/restarting...
Jun 25 07:35:33 DD-WRT user.info : [openvpn] : General Killswitch for OpenVPN enabled from OpenVPN
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25124]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25124]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25124]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25124]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25124]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25124]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25124]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25124]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25124]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25124]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25124]: WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
Jun 25 07:35:33 DD-WRT daemon.notice openvpn[25124]: Current Parameter Settings:
Jun 25 07:35:33 DD-WRT daemon.notice openvpn[25124]: config = '/tmp/openvpncl/openvpn.conf'
Jun 25 07:35:33 DD-WRT daemon.notice openvpn[25124]: mode = 0
Jun 25 07:35:33 DD-WRT daemon.notice openvpn[25124]: NOTE: --mute triggered...
Jun 25 07:35:33 DD-WRT daemon.notice openvpn[25124]: 361 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 07:35:33 DD-WRT daemon.notice openvpn[25124]: OpenVPN 2.5.6 mips-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 23 2022
Jun 25 07:35:33 DD-WRT daemon.notice openvpn[25124]: library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.09
Jun 25 07:35:33 DD-WRT daemon.notice openvpn[25128]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25128]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jun 25 07:35:33 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jun 25 07:35:33 DD-WRT daemon.notice openvpn[25128]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 25 07:35:33 DD-WRT daemon.notice openvpn[25128]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 25 07:35:33 DD-WRT daemon.warn openvpn[25128]: WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1400)
Jun 25 07:35:33 DD-WRT daemon.notice openvpn[25128]: Control Channel MTU parms [ L:1522 D:1140 EF:110 EB:0 ET:0 EL:3 ]
Jun 25 07:35:33 DD-WRT user.info root: openvpn watchdog /usr/bin/openvpn-watchdog.sh on tunnel tun1 running
Jun 25 07:35:38 DD-WRT daemon.err openvpn[25128]: RESOLVE: Cannot resolve host address: se520.nordvpn.com:1194 (Try again)
Jun 25 07:35:38 DD-WRT daemon.notice openvpn[25128]: Data Channel MTU parms [ L:1522 D:1450 EF:122 EB:389 ET:0 EL:3 ]
Jun 25 07:35:38 DD-WRT daemon.notice openvpn[25128]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
Jun 25 07:35:38 DD-WRT daemon.notice openvpn[25128]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
Jun 25 07:35:43 DD-WRT daemon.err openvpn[25128]: RESOLVE: Cannot resolve host address: se520.nordvpn.com:1194 (Try again)
Jun 25 07:35:43 DD-WRT daemon.warn openvpn[25128]: Could not determine IPv4/IPv6 protocol
Jun 25 07:35:43 DD-WRT daemon.notice openvpn[25128]: SIGUSR1[soft,init_instance] received, process restarting
Jun 25 07:35:43 DD-WRT daemon.notice openvpn[25128]: Restart pause, 5 second(s)
Jun 25 07:35:48 DD-WRT daemon.warn openvpn[25128]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 25 07:35:48 DD-WRT daemon.warn openvpn[25128]: WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1400)
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: Control Channel MTU parms [ L:1522 D:1140 EF:110 EB:0 ET:0 EL:3 ]
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: Data Channel MTU parms [ L:1522 D:1450 EF:122 EB:389 ET:0 EL:3 ]
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: TCP/UDP: Preserving recently used remote address: [AF_INET]45.12.220.227:1194
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: Socket Buffers: R=[172032->172032] S=[172032->172032]
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: UDPv4 link local: (not bound)
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: UDPv4 link remote: [AF_INET]45.12.220.227:1194
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: TLS: Initial packet from [AF_INET]45.12.220.227:1194, sid=74a65a24 ec36e304
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: NOTE: --mute triggered...
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 07:35:48 DD-WRT daemon.warn openvpn[25128]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 25 07:35:48 DD-WRT daemon.warn openvpn[25128]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 25 07:35:48 DD-WRT daemon.notice openvpn[25128]: [se515.nordvpn.com] Peer Connection Initiated with [AF_INET]45.12.220.227:1194
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: SENT CONTROL [se515.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.1.1,topology
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: OPTIONS IMPORT: timers and/or timeouts modified
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: NOTE: --mute triggered...
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: 3 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: Socket Buffers: R=[172032->344064] S=[172032->344064]
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: OPTIONS IMPORT: --ifconfig/up options modified
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: OPTIONS IMPORT: route options modified
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: OPTIONS IMPORT: route-related options modified
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: NOTE: --mute triggered...
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: 4 variation(s) on previous 3 message(s) suppressed by --mute
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: Data Channel MTU parms [ L:1453 D:1450 EF:53 EB:389 ET:0 EL:3 ]
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: net_route_v4_best_gw query: dst 0.0.0.0
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: net_route_v4_best_gw result: via 192.168.1.254 dev vlan2
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: TUN/TAP device tun1 opened
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: do_ifconfig, ipv4=1, ipv6=0
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: net_iface_mtu_set: mtu 1400 for tun1
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: net_iface_up: set tun1 up
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: net_addr_v4_add: 10.8.1.5/24 dev tun1
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: net_route_v4_add: 45.12.220.227/32 via 192.168.1.254 dev [NULL] table 0 metric -1
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: net_route_v4_add: 0.0.0.0/1 via 10.8.1.1 dev [NULL] table 0 metric -1
Jun 25 07:35:49 DD-WRT daemon.notice openvpn[25128]: net_route_v4_add: 128.0.0.0/1 via 10.8.1.1 dev [NULL] table 0 metric -1
Jun 25 07:35:50 DD-WRT daemon.warn openvpn[25128]: WARNING: this configuration may cache password
Joined: 16 Nov 2015 Posts: 6437 Location: UK, London, just across the river..
Posted: Sat Jun 25, 2022 9:00 Post subject:
looking at the log, it looks like watchdog is working and its doing its job..i only don't understand why, its trying the same se520.nordvpn.com server again, as its it down for some odd reason..and yes VPN providers tend to do that, in order to relieve their servers overloads...its just a bad VPN practice..
and then after few try's it seems its is successful, whit the next server that is operational se515.nordvpn.com ...
To be honest, my VPN provider is not that bad, but with a risk to insult the VPN gurus and developers...i don't use the GUI option for multiple server choice..nor i use the GUI keep alive
i know, i shouldn't use advanced VPN commands with no reason, but im an old school guy, if its working its working.. i still use the old way, as well i do have some lines to prevent ISP DNS use, or DNS6 or any ipv6 routes, so resolving hosts is more independent...
I have those in advanced VPN box
ill put a little explanation for what each line does
verb 5 - this specifies the log
pull-filter ignore "dhcp-option DNS" - this will ignore VPN DNS and will use DNSmasq DNS resolving inside the VPN
pull-filter ignore "dhcp-option DNS6" - same as above but disables IPv6 DNS
pull-filter ignore "ifconfig-ipv6" - ignores any ipv6
pull-filter ignore "route-ipv6" - ignores any ipv6 router
pull-filter ignore "redirect-gateway ipv6" - ignores any ipv6 gateways
keepalive 10 120 - keeps servers pinged
reneg-sec 12000 - this specifies time for cypher negotiation
server-poll-timeout 10 - this gives 10 sec time out if server goes down, before to try the next server inline
remote server IP or name port - those are the next servers you want to use
remote server IP or name port
the last will look like
remote se520.nordvpn.com 1994 -- or any port you use
but, let see what the other gurus will say, im also interested to learn..and find out...
the log seems to be showing you have been connected at last... _________________ Atheros
TP-Link WR740Nv1 ---DD-WRT 55630 WAP
TP-Link WR1043NDv2 -DD-WRT 55723 Gateway/DoT,Forced DNS,Ad-Block,Firewall,x4VLAN,VPN
TP-Link WR1043NDv2 -Gargoyle OS 1.15.x AP,DNS,QoS,Quotas
Qualcomm-Atheros
Netgear XR500 --DD-WRT 55779 Gateway/DoH,Forced DNS,AP Isolation,4VLAN,Ad-Block,Firewall,Vanilla
Netgear R7800 --DD-WRT 55819 Gateway/DoT,AD-Block,Forced DNS,AP&Net Isolation,x3VLAN,Firewall,Vanilla
Netgear R9000 --DD-WRT 55779 Gateway/DoT,AD-Block,AP Isolation,Firewall,Forced DNS,x2VLAN,Vanilla
Broadcom
Netgear R7000 --DD-WRT 55460 Gateway/SmartDNS/DoH,AD-Block,Firewall,Forced DNS,x3VLAN,VPN
NOT USING 5Ghz ANYWHERE
------------------------------------------------------
Stubby DNS over TLS I DNSCrypt v2 by mac913
Yeah the openvpn watchdog done its job when there was no internet because it retarted the openvpn and had internet again after 5/10 minutes (shown at the end of the log)
I've previously tried replacing the Nordvpn servers with other recommended ones but always seems to do this
Unless it has some sort of key expiry and at this moment in time it needed renewing with the Nord server?...
Last edited by Jord9857 on Sat Jun 25, 2022 9:17; edited 1 time in total
Joined: 16 Nov 2015 Posts: 6437 Location: UK, London, just across the river..
Posted: Sat Jun 25, 2022 9:17 Post subject:
Jord9857 wrote:
Yeah the openvpn watchdog done its job when there was no internet because it retarted the openvpn and had internet again after 5/10 minutes (shown at the end of the log)
I've previously tried replacing the Nordvpn servers with other recommended ones but always seems to do this
yep its not a bug in the firmware i guess, but more likely Nord VPN bad practice...
Im on PIA and its been rock solid...but, it could be also the servers and their status, i use...
yep try to give a key renew time don't leave it to 0
try 14400 _________________ Atheros
TP-Link WR740Nv1 ---DD-WRT 55630 WAP
TP-Link WR1043NDv2 -DD-WRT 55723 Gateway/DoT,Forced DNS,Ad-Block,Firewall,x4VLAN,VPN
TP-Link WR1043NDv2 -Gargoyle OS 1.15.x AP,DNS,QoS,Quotas
Qualcomm-Atheros
Netgear XR500 --DD-WRT 55779 Gateway/DoH,Forced DNS,AP Isolation,4VLAN,Ad-Block,Firewall,Vanilla
Netgear R7800 --DD-WRT 55819 Gateway/DoT,AD-Block,Forced DNS,AP&Net Isolation,x3VLAN,Firewall,Vanilla
Netgear R9000 --DD-WRT 55779 Gateway/DoT,AD-Block,AP Isolation,Firewall,Forced DNS,x2VLAN,Vanilla
Broadcom
Netgear R7000 --DD-WRT 55460 Gateway/SmartDNS/DoH,AD-Block,Firewall,Forced DNS,x3VLAN,VPN
NOT USING 5Ghz ANYWHERE
------------------------------------------------------
Stubby DNS over TLS I DNSCrypt v2 by mac913
Last edited by Alozaros on Sat Jun 25, 2022 9:20; edited 1 time in total
Joined: 18 Mar 2014 Posts: 12884 Location: Netherlands
Posted: Sat Jun 25, 2022 9:19 Post subject:
Well unless you really know what you are doing stick to the GUI
In the GUI you can enter multiple NORD VPN servers which the router will try one after each other unless you enable random
Add the following to the Additional Configuration:
Quote:
verb 5
keepalive 10 120 #check if provider does not pushes ping-exit, that takes precedence and you have to use a watchdog
resolv-retry infinite
reneg-sec 0 #slightly unsafe to use so not recommended
But indeed it looks like the VPN cannot reach the server any more, as Alozoros said sometimes they kick you off if a server is too busy it is also possible you have an internet glitch or other router problem.
Visuals would be great. So we can see what the MTU settings are and other things. Don't need to see keys, but screenshots sure help diagnose what could be wrong. _________________ "The woods are lovely, dark and deep,
But I have promises to keep,
And miles to go before I sleep,
And miles to go before I sleep." - Robert Frost
"I am one of the noticeable ones - notice me" - Dale Frances McKenzie Bozzio
Well unless you really know what you are doing stick to the GUI
In the GUI you can enter multiple NORD VPN servers which the router will try one after each other unless you enable random
Add the following to the Additional Configuration:
Quote:
verb 5
keepalive 10 120 #check if provider does not pushes ping-exit, that takes precedence and you have to use a watchdog
resolv-retry infinite
reneg-sec 0 #slightly unsafe to use so not recommended
But indeed it looks like the VPN cannot reach the server any more, as Alozoros said sometimes they kick you off if a server is too busy it is also possible you have an internet glitch or other router problem.
Maybe @eibgrad has some more ideas?
I have multiple Nord servers listed in the GUI
I will add this to the additional config now, it happened again this morning and even after the openvpn watchdog restarting didn't fix it - couldn't resolve for any of the Nord servers I have listed (were working as I haven't changed for a few days)
Jun 26 11:10:32 DD-WRT daemon.err httpd[15692]: [httpd] : Request Error Code 401: Authorization required. Wrong username and/or password!
Jun 26 11:13:30 DD-WRT daemon.debug ntpclient[9271]: Connecting to 2.pool.ntp.org [81.236.171.34] ...
Jun 26 11:13:33 DD-WRT daemon.debug ntpclient[9271]: Timed out waiting for 2.pool.ntp.org [81.236.171.34].
Jun 26 11:13:33 DD-WRT daemon.debug ntpclient[9271]: Connecting to 212.18.3.19 [212.18.3.19] ...
Jun 26 11:13:36 DD-WRT daemon.debug ntpclient[9271]: Timed out waiting for 212.18.3.19 [212.18.3.19].
Jun 26 11:13:36 DD-WRT daemon.debug ntpclient[9271]: Connecting to 88.99.174.22 [88.99.174.22] ...
Jun 26 11:13:39 DD-WRT daemon.debug ntpclient[9271]: Timed out waiting for 88.99.174.22 [88.99.174.22].
Jun 26 11:13:39 DD-WRT daemon.err process_monitor[16308]: cyclic NTP Update failed (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Jun 26 11:18:09 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) successfully stopped
Jun 26 11:18:09 DD-WRT user.info : [openvpnserver] : OpenVPN daemon (Server) successfully stopped
Jun 26 11:18:09 DD-WRT user.info : [pptpd] : daemon successfully stopped
Jun 26 11:18:09 DD-WRT daemon.err openvpn[8566]: event_wait : Interrupted system call (code=4)
Jun 26 11:18:09 DD-WRT daemon.notice openvpn[8566]: SIGTERM received, sending exit notification to peer
Jun 26 11:18:10 DD-WRT user.info : [openvpn] : OpenVPN daemon (Server) starting/restarting...
Jun 26 11:18:10 DD-WRT daemon.warn openvpn[9522]: Consider setting groups/curves preference with tls-groups instead of forcing a specific curve with ecdh-curve.
Jun 26 11:18:10 DD-WRT daemon.notice openvpn[8566]: TCP/UDP: Closing socket
Jun 26 11:18:10 DD-WRT daemon.notice openvpn[8566]: /tmp/openvpncl/route-down.sh tun1 1400 1453 10.8.0.4 255.255.255.0 init
Jun 26 11:18:10 DD-WRT daemon.notice openvpn[8566]: net_route_v4_del: 45.83.91.27/32 via 192.168.1.254 dev [NULL] table 0 metric -1
Jun 26 11:18:10 DD-WRT daemon.notice openvpn[8566]: net_route_v4_del: 0.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Jun 26 11:18:10 DD-WRT daemon.warn openvpn[8566]: sitnl_send: rtnl: generic error (-3): No such process
Jun 26 11:18:10 DD-WRT daemon.warn openvpn[8566]: ERROR: Linux route delete command failed
Jun 26 11:18:10 DD-WRT daemon.notice openvpn[8566]: net_route_v4_del: 128.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Jun 26 11:18:10 DD-WRT daemon.warn openvpn[8566]: sitnl_send: rtnl: generic error (-3): No such process
Jun 26 11:18:10 DD-WRT daemon.warn openvpn[8566]: ERROR: Linux route delete command failed
Jun 26 11:18:10 DD-WRT daemon.notice openvpn[8566]: Closing TUN/TAP interface
Jun 26 11:18:10 DD-WRT daemon.notice openvpn[8566]: net_addr_v4_del: 10.8.0.4 dev tun1
Jun 26 11:18:10 DD-WRT daemon.notice openvpn[8566]: SIGTERM[soft,exit-with-notification] received, process exiting
Jun 26 11:18:10 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jun 26 11:18:11 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) starting/restarting...
Jun 26 11:18:11 DD-WRT user.info : [openvpn] : General Killswitch for OpenVPN enabled from OpenVPN
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9604]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9604]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9604]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9604]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9604]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9604]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9604]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9604]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9604]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9604]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9604]: WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9604]: Current Parameter Settings:
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9604]: config = '/tmp/openvpncl/openvpn.conf'
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9604]: mode = 0
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9604]: NOTE: --mute triggered...
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9604]: 361 variation(s) on previous 3 message(s) suppressed by --mute
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9604]: OpenVPN 2.5.6 mips-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 23 2022
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9604]: library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.09
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9617]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 26 11:18:11 DD-WRT daemon.warn openvpn[9617]: WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1400)
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: Control Channel MTU parms [ L:1522 D:1140 EF:110 EB:0 ET:0 EL:3 ]
Jun 26 11:18:11 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: Data Channel MTU parms [ L:1522 D:1450 EF:122 EB:389 ET:0 EL:3 ]
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: TCP/UDP: Preserving recently used remote address: [AF_INET]45.83.91.27:1194
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: Socket Buffers: R=[172032->172032] S=[172032->172032]
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: UDPv4 link local: (not bound)
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: UDPv4 link remote: [AF_INET]45.83.91.27:1194
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: TLS: Initial packet from [AF_INET]45.83.91.27:1194, sid=66968e29 794e0cca
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Jun 26 11:18:11 DD-WRT user.info root: openvpn watchdog /usr/bin/openvpn-watchdog.sh on tunnel tun1 running
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
Jun 26 11:18:11 DD-WRT daemon.notice openvpn[9617]: NOTE: --mute triggered...
Jun 26 11:18:12 DD-WRT daemon.notice openvpn[9617]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Jun 26 11:18:12 DD-WRT daemon.warn openvpn[9617]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 26 11:18:12 DD-WRT daemon.warn openvpn[9617]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 26 11:18:12 DD-WRT daemon.notice openvpn[9617]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 26 11:18:12 DD-WRT daemon.notice openvpn[9617]: [se520.nordvpn.com] Peer Connection Initiated with [AF_INET]45.83.91.27:1194
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: SENT CONTROL [se520.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.3.1,topology s
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: OPTIONS IMPORT: timers and/or timeouts modified
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: NOTE: --mute triggered...
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: 3 variation(s) on previous 3 message(s) suppressed by --mute
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: Socket Buffers: R=[172032->344064] S=[172032->344064]
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: OPTIONS IMPORT: --ifconfig/up options modified
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: OPTIONS IMPORT: route options modified
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: OPTIONS IMPORT: route-related options modified
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: NOTE: --mute triggered...
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: 4 variation(s) on previous 3 message(s) suppressed by --mute
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: Data Channel MTU parms [ L:1453 D:1450 EF:53 EB:389 ET:0 EL:3 ]
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: net_route_v4_best_gw query: dst 0.0.0.0
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: net_route_v4_best_gw result: via 192.168.1.254 dev vlan2
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: TUN/TAP device tun1 opened
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: do_ifconfig, ipv4=1, ipv6=0
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: net_iface_mtu_set: mtu 1400 for tun1
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: net_iface_up: set tun1 up
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: net_addr_v4_add: 10.8.3.3/24 dev tun1
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: net_route_v4_add: 45.83.91.27/32 via 192.168.1.254 dev [NULL] table 0 metric -1
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: net_route_v4_add: 0.0.0.0/1 via 10.8.3.1 dev [NULL] table 0 metric -1
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: net_route_v4_add: 128.0.0.0/1 via 10.8.3.1 dev [NULL] table 0 metric -1
Jun 26 11:18:13 DD-WRT daemon.warn openvpn[9617]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Jun 26 11:18:13 DD-WRT daemon.notice openvpn[9617]: Initialization Sequence Completed
Jun 26 11:18:13 DD-WRT user.info : [openvpn] : General Killswitch for OpenVPN enabled via Firewall
Jun 26 11:18:13 DD-WRT user.info : [vpn modules] : vpn modules successfully unloaded
Jun 26 11:18:13 DD-WRT user.info : [vpn modules] : nf_conntrack_proto_gre successfully loaded
Jun 26 11:18:13 DD-WRT user.info : [vpn modules] : nf_nat_proto_gre successfully loaded
Jun 26 11:18:14 DD-WRT user.info : [vpn modules] : nf_conntrack_pptp successfully loaded
Jun 26 11:18:14 DD-WRT user.info : [vpn modules] : nf_nat_pptp successfully loaded
Jun 26 11:18:16 DD-WRT user.info : [servicemanager] : waiting for services to finish (4)...
Jun 26 11:18:16 DD-WRT user.info : [cron] : daemon successfully stopped
Jun 26 11:18:16 DD-WRT user.info : [ipv6] : successfully stopped
Jun 26 11:18:16 DD-WRT user.info : [pptpd] : daemon successfully stopped
Jun 26 11:18:16 DD-WRT user.info : [cron] : daemon successfully started
Jun 26 11:18:16 DD-WRT cron.info cron[10163]: (CRON) STARTUP (fork ok)
Jun 26 11:18:19 DD-WRT user.info : [openvpn] : General Killswitch for OpenVPN enabled via Firewall
Jun 26 11:18:19 DD-WRT user.info : [vpn modules] : vpn modules successfully unloaded
Jun 26 11:18:19 DD-WRT user.info : [vpn modules] : nf_conntrack_proto_gre successfully loaded
Jun 26 11:18:19 DD-WRT user.info : [vpn modules] : nf_nat_proto_gre successfully loaded
Jun 26 11:18:19 DD-WRT user.info : [vpn modules] : nf_conntrack_pptp successfully loaded
Jun 26 11:18:19 DD-WRT user.info : [vpn modules] : nf_nat_pptp successfully loaded
Jun 26 11:18:21 DD-WRT user.info : [wland] : daemon successfully stopped
Jun 26 11:18:22 DD-WRT user.info : [wland] : daemon successfully started
Jun 26 11:18:24 DD-WRT user.info : [httpd] : daemon successfully stopped
Jun 26 11:18:24 DD-WRT daemon.info httpd[15692]: [httpd] : httpd server shutdown
Jun 26 11:18:24 DD-WRT daemon.info httpd[10706]: [httpd] : httpd server started at port 80
Jun 26 11:18:24 DD-WRT user.info : [httpd] : http daemon successfully started
Jun 26 11:58:37 DD-WRT user.warn root: openvpn watchdog: openvpn tunnel tun1 failed, now restarting openvpn client, to reboot set vpn_onfail_reboot=1
Jun 26 11:58:37 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) successfully stopped
Jun 26 11:58:37 DD-WRT daemon.err openvpn[9617]: event_wait : Interrupted system call (code=4)
Jun 26 11:58:37 DD-WRT daemon.notice openvpn[9617]: SIGTERM received, sending exit notification to peer
Jun 26 11:58:38 DD-WRT daemon.notice openvpn[9617]: TCP/UDP: Closing socket
Jun 26 11:58:38 DD-WRT daemon.notice openvpn[9617]: /tmp/openvpncl/route-down.sh tun1 1400 1453 10.8.3.3 255.255.255.0 init
Jun 26 11:58:38 DD-WRT daemon.notice openvpn[9617]: net_route_v4_del: 45.83.91.27/32 via 192.168.1.254 dev [NULL] table 0 metric -1
Jun 26 11:58:38 DD-WRT daemon.notice openvpn[9617]: net_route_v4_del: 0.0.0.0/1 via 10.8.3.1 dev [NULL] table 0 metric -1
Jun 26 11:58:38 DD-WRT daemon.notice openvpn[9617]: net_route_v4_del: 128.0.0.0/1 via 10.8.3.1 dev [NULL] table 0 metric -1
Jun 26 11:58:38 DD-WRT daemon.notice openvpn[9617]: Closing TUN/TAP interface
Jun 26 11:58:38 DD-WRT daemon.notice openvpn[9617]: net_addr_v4_del: 10.8.3.3 dev tun1
Jun 26 11:58:38 DD-WRT daemon.notice openvpn[9617]: SIGTERM[soft,exit-with-notification] received, process exiting
Jun 26 11:58:38 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jun 26 11:58:39 DD-WRT user.info : [openvpn] : OpenVPN daemon (Client) starting/restarting...
Jun 26 11:58:39 DD-WRT user.info : [openvpn] : General Killswitch for OpenVPN enabled from OpenVPN
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11110]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11110]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11110]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11110]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11110]: WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11110]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11110]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11110]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11110]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11110]: WARNING: file '/tmp/openvpncl/ta.key' is group or others accessible
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11110]: WARNING: file '/tmp/openvpncl/credentials' is group or others accessible
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11110]: Current Parameter Settings:
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11110]: config = '/tmp/openvpncl/openvpn.conf'
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11110]: mode = 0
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11110]: NOTE: --mute triggered...
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11110]: 361 variation(s) on previous 3 message(s) suppressed by --mute
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11110]: OpenVPN 2.5.6 mips-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 23 2022
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11110]: library versions: OpenSSL 1.1.1n 15 Mar 2022, LZO 2.09
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:16
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11114]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Jun 26 11:58:39 DD-WRT user.info root: openvpn watchdog control /usr/bin/controlovpnwdog.sh started
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11114]: WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1400)
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: Control Channel MTU parms [ L:1522 D:1140 EF:110 EB:0 ET:0 EL:3 ]
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: Data Channel MTU parms [ L:1522 D:1450 EF:122 EB:389 ET:0 EL:3 ]
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1502,tun-mtu 1400,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: TCP/UDP: Preserving recently used remote address: [AF_INET]45.83.91.27:1194
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: Socket Buffers: R=[172032->172032] S=[172032->172032]
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: UDPv4 link local: (not bound)
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: UDPv4 link remote: [AF_INET]45.83.91.27:1194
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: TLS: Initial packet from [AF_INET]45.83.91.27:1194, sid=6f1a7321 812fa7ad
Jun 26 11:58:39 DD-WRT user.info root: openvpn watchdog /usr/bin/openvpn-watchdog.sh on tunnel tun1 running
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA7
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: NOTE: --mute triggered...
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: 5 variation(s) on previous 3 message(s) suppressed by --mute
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11114]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1502', remote='link-mtu 1634'
Jun 26 11:58:39 DD-WRT daemon.warn openvpn[11114]: WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1532'
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Jun 26 11:58:39 DD-WRT daemon.notice openvpn[11114]: [se520.nordvpn.com] Peer Connection Initiated with [AF_INET]45.83.91.27:1194
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: SENT CONTROL [se520.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: OPTIONS IMPORT: timers and/or timeouts modified
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: NOTE: --mute triggered...
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: 3 variation(s) on previous 3 message(s) suppressed by --mute
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: Socket Buffers: R=[172032->344064] S=[172032->344064]
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: OPTIONS IMPORT: --ifconfig/up options modified
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: OPTIONS IMPORT: route options modified
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: OPTIONS IMPORT: route-related options modified
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: NOTE: --mute triggered...
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: 4 variation(s) on previous 3 message(s) suppressed by --mute
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: Data Channel: using negotiated cipher 'AES-256-GCM'
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: Data Channel MTU parms [ L:1453 D:1450 EF:53 EB:389 ET:0 EL:3 ]
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: net_route_v4_best_gw query: dst 0.0.0.0
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: net_route_v4_best_gw result: via 192.168.1.254 dev vlan2
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: TUN/TAP device tun1 opened
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: do_ifconfig, ipv4=1, ipv6=0
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: net_iface_mtu_set: mtu 1400 for tun1
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: net_iface_up: set tun1 up
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: net_addr_v4_add: 10.8.0.4/24 dev tun1
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: net_route_v4_add: 45.83.91.27/32 via 192.168.1.254 dev [NULL] table 0 metric -1
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: net_route_v4_add: 0.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Jun 26 11:58:40 DD-WRT daemon.notice openvpn[11114]: net_route_v4_add: 128.0.0.0/1 via 10.8.0.1 dev [NULL] table 0 metric -1
Jun 26 11:58:41 DD-WRT daemon.warn openvpn[11114]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Jun 26 11:58:41 DD-WRT daemon.notice openvpn[11114]: Initialization Sequence Completed
Jun 26 12:13:40 DD-WRT daemon.debug ntpclient[11291]: Connecting to 2.pool.ntp.org [91.209.0.17] ...
Jun 26 12:13:43 DD-WRT daemon.debug ntpclient[11291]: Timed out waiting for 2.pool.ntp.org [91.209.0.17].
Jun 26 12:13:43 DD-WRT daemon.debug ntpclient[11291]: Connecting to 212.18.3.19 [212.18.3.19] ...
Jun 26 12:13:46 DD-WRT daemon.debug ntpclient[11291]: Timed out waiting for 212.18.3.19 [212.18.3.19].
Jun 26 12:13:46 DD-WRT daemon.debug ntpclient[11291]: Connecting to 88.99.174.22 [88.99.174.22] ...
Jun 26 12:13:49 DD-WRT daemon.debug ntpclient[11291]: Timed out waiting for 88.99.174.22 [88.99.174.22].
Jun 26 12:13:49 DD-WRT daemon.err process_monitor[16308]: cyclic NTP Update failed (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22)
Joined: 31 Jul 2021 Posts: 2146 Location: All over YOUR webs
Posted: Sun Jun 26, 2022 14:37 Post subject:
Ive taken the liberty to include the insanely huge inline logs into quotes, code blocks wont work since there's some PHP issue/limitation which breaks the initial closing bracket. At least in quotes/code blocks it makes it saner to look at.
On doing this triggered another forums bug that breaks the layout, Ive submitted a couple of fixes and waiting on them going live.
@Jord9857 Just a suggestion; would be nice that when logs are that long, instead attaching them as a text file to your replies, it makes following the threads much easier to read as opposed to the endless scrolling your large logs force everyone to go through.
Based on the most recent syslog, which has the watchodog enabled, seems to me the tunnel is just failing for some unexplained reason. Once connected, it will run for at least an hour, then renegotiate the session key successfully, but eventually fail w/ the following message (which I've NOT seen before).
Jun 25 05:39:11 DD-WRT daemon.err openvpn[23098]: Read Udpv4 [Ehostunreach]: Host Is Unreachable (Code=148)
At that point, the tunnel seems borked, and eventually the watchdog detects it and reboots.
There's no obvious reason from the rest of the syslog to explain it. Seems more of a problem w/ the VPN provider. Some are known to kick off users when the server is overloaded, or down for maintenance. But this is a little different. The tunnel just stops working.
As an experiment, you might try using TCP rather than UDP (assuming NordVPN supports it). Maybe that will ensure both sides the connection is still valid (UDP, being connection-less, depends solely on timeout to detect the loss of a peer).